This text file is the raw feed for the TSCM-L, dating back to the LISTSERVE move back and 1994, and spanning foward with a large segment of the archive in a single file in order to make it easier to use for your reference in TSCM matters between 1999 and 2006. The earlier 1991-1994 and 1994-1999 LISTSERV archives can only be provided to confirmed U.S Citizens, and the post 2006 posts can be found on Google. In total this part of the archive is almost 35 megabytes, the 1991 to 1999 list serve is a huge amount of source code used to drive TSCM instruments (about 500 MB worth), and I have no idea how large the Google Archive of the post-2006 materials are (it has been rolling for over 12 years). ------------------------------ From: Charles P Date: Tue Jan 2, 2001 10:15pm Subject: Re: Re: Playstation 2 Tomb Raiders ----- Original Message ----- From: To: Sent: Tuesday, January 02, 2001 12:51 PM Subject: [TSCM-L] Re: Playstation 2 > Anyone have ideas as to what Saddam Hussein intends to use the Sony > Playstation 2 for? > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 2223 From: Date: Tue Jan 2, 2001 10:42pm Subject: ZDNet: News: Is PlayStation2 a military weapon? HAVE A GREAT DAY !!! ---------- http://www.zdnet.com/zdnn/stories/news/0,4586,2550857,00.html [Non-text portions of this message have been removed] 2224 From: Kohlenberg, Toby Date: Tue Jan 2, 2001 10:16am Subject: RE: A lesson in reality... Out of curiousity, what exactly does any portion of this discussion have to do with TSCM? toby Toby Kohlenberg, CISSP Intel Corporate Information Security STAT Team Information Security Specialist 503-264-9783 Office & Voicemail 877-497-1696 Pager "Just because you're paranoid, doesn't mean they're not after you." PGP Fingerprint: 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 > -----Original Message----- > From: Robert G. Ferrell [mailto:rferrell@r...] > Sent: Tuesday, January 02, 2001 5:18 AM > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] A lesson in reality... > > > >The toilet paper costs a buck. The 2000 pages of paperwork it > >takes to comply with all the applicable regulations and agencies > >and sanctions and certifications and programs is where the > >difference comes from. > > I've never seen a political discussion between extreme > opposing viewpoints where either side accomplished much of > anything beyond enraging their opponents, so I'm going to > stay far away from the central thrust of this thread. > However, I would like to point out that a great many folks > are putting considerable effort into reducing or eliminating > the need for paperwork when providing services to the U. S. > government. My agency, for example. The National Business > Center is a franchise agency of the U. S. Department of the > Interior that (among other things) develops applications > for paperless bidding, bid notification, invoice tracking, > and payment from Treasury. If you're a potential contractor > for the U.S. government, take a look at > > http://www.nbc.gov/products/procurement.html > > More and more agencies are signing up for this sort of thing > every day. As a franchise agency, I might add, we're required > (eventually) to "pay our own way" without any direct financial > support from Congress. > > As H. L. Mencken once wrote, "The wheels of bureacracy grind > slowly, but exceedingly fine." That doesn't have a lot of > relevance here, but it's still a great quote. > > ;-) > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2225 From: Shawn Hughes Date: Wed Jan 3, 2001 0:10am Subject: computers >>> Subject: WORD PERFECT >>> >>> >>> This has got to be one of the funniest I've heard of in a long time. >>> Truthfully, I think this guy should have been promoted, not fired. This >> is a true story from the WordPerfect Helpline which was transcribed from a >>> recording monitoring the customer care department. Needless to say the >>Help Desk employee was fired; however, he/she is currently suing the Word >>Perfect organization for "Termination without Cause." >>> >>> Actual dialogue of a former Word Perfect Customer Support employee (now I >>> know why they record these conversations!) >>> "Ridge Hall computer assistance; may I help you?" >>> "Yes, well, I'm having trouble with WordPerfect." >>> "What sort of trouble?" >>> "Well, I was just typing along, and all of a sudden the words went away." >>> "Went away?" >>> "They disappeared." >>> "Hmm. So what does your screen look like now?" >>> "Nothing." >>> "Nothing?" >>> "It's blank; it won't accept anything when I type." >>> "Are you still in WordPerfect, or did you get out?" >>> "How do I tell?" >>> "Can you see the C: prompt on the screen?" >>> "What's a sea-prompt?" >>> "Never mind, can you move your cursor around the screen?" >>> "There isn't any cursor: I told you, it won't accept anything I type." >>> "Does your monitor have a power indicator?" >>> "What's a monitor? >>> "It's the thing with the screen on it that looks like a TV. >>> "Does it have a little light that tells you when it's on?" >>> "I don't know," >>> "Well, then look on the back of the monitor and find where the power cord >>> goes into it. Can you see that?" >>> "Yes, I think so," >>> "Great. Follow the cord to the plug, and tell me if it's plugged into the >>> wall." >>> "Yes, it is," >>> "When you were behind the monitor, did you notice that there were two >>cables >>> plugged into the back of it, not just one?" "No." >>> >>> "Well, there are. I need you to look back there again and find the other >>> cable." >>> "Okay, here it is," >>> "Follow it for me, and tell me if it's plugged securely into the back of >>> your computer." >>> "I can't reach," >>> "Uh huh. Well, can you see if it is?" >>> "No." >>> "Even if you maybe put your knee on something and lean way over?" "Oh, >>it's >>> not because I don't have the right angle - it's because its dark." >>> >>> "Dark?" >>> "Yes the office light is off, and the only light I have is coming in from >>> the window." >>> "Well, turn on the office light then." >>> "I can't." >>> "No? Why not?" >>> "Because there's a power failure," >>> "A power... A power failure? Aha, Okay, we've got it licked now. Do you >>> still have the boxes and manuals and packing stuff your computer came >in?" >>> "Well, yes, I keep them in the closet." >>> >>> Good. Go get them, and unplug your system and pack it up just like it was >>> when you got it. Then take it back to the store you bought it from." >>> "Really? Is it that bad?" >>> >>> "Yes, I'm afraid it is." >>> "Well, all right then, I suppose. What do I tell them?" >>> "Tell them you're too stupid to own a computer." 2226 From: Larry Hountz - -(©ø©)- Date: Tue Jan 2, 2001 2:37pm Subject: Re: Re: Playstation 2 I thought for the chips... here is some very good feedback.. http://www.zdnet.com/tlkbck/comment/22/0,7056,87627-402464,00.html Larry.. ----- Original Message ----- From: To: Sent: Tuesday, January 02, 2001 12:51 PM Subject: [TSCM-L] Re: Playstation 2 > Anyone have ideas as to what Saddam Hussein intends to use the Sony > Playstation 2 for? > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2227 From: Date: Wed Jan 3, 2001 4:05am Subject: Is Sony's Playstation2 a Military weapon ? Japan thinks the game machine could be used to guide missiles -- sothe coun= try is leveling export controls.By Reuters UPDATED April 16, 2000 8:21 AM PT= TOKYO -- Japan has slapped export controls on Sony Corp.'s new,hugely popul= ar Playstation2 video game because the machine is sosophisticated it could b= e used for military purposes, media saidSunday. The hit home game machine, w= hich includes a digital video disc playerand will eventually offer Internet = access, is Sony's most profitableproduct. The company said it had shipped 1.= 4 million in the monthafter the game's March 4 launch. Sound off here!! Post= your commenton this story. The console and its eight-megabyte memory card = have been designatedas ``general-purpose products related to conventional we= apons¥¥because they contain components that could be used for militarydevice= s such as missile guidance systems, Kyodo news agency quotedindustry sources= as saying. Playstation2 is the first game console to face export controls u= nderthe Foreign Exchange and Foreign Trade Control Law, Kyodo said. The law = requires the trade ministry's approval for the export ofrestricted products = worth more than 50,000 yen ($472). Thus, theexport of more than two consoles= would be controlled because each ispriced at 39,800 yen. Sony: Competition = allows no compromise``We have mixed feelings because our efforts to produce = a gameconsole of the highest quality have resulted in legalrestrictions,¥¥ t= he Asahi Shimbun newspaper quoted an official ofSony Computer Entertainment = Inc. as saying. ``We could not compromise because of the fierce competition = in theindustry,¥¥ he said. Officials of the trade ministry and Sony could no= t be reached forfurther comment. With U.S. software giant Microsoft Corp. (N= asdaq: MSFT) due to enterthe lucrative video game market next year with its = ownhigh-performance console, tentatively called the X-Box, exportcontrols co= uld hinder Sony's ability to compete, Kyodo quotedindustry sources as saying= . Get free e-mail and voicemai 2228 From: Date: Wed Jan 3, 2001 4:15am Subject: Is Sony's Playstation2 a Military weapon ? Japan thinks the game machine could be used to guide missiles -- so the country is leveling export controls. By Reuters UPDATED April 16, 2000 8:21 AM PT TOKYO -- Japan has slapped export controls on Sony Corp.'s new, hugely popular Playstation2 video game because the machine is so sophisticated it could be used for military purposes, media said Sunday. The hit home game machine, which includes a digital video disc player and will eventually offer Internet access, is Sony's most profitable product. The company said it had shipped 1.4 million in the month after the game's March 4 launch. Sound off here!! Post your comment on this story. The console and its eight-megabyte memory card have been designated as ``general-purpose products related to conventional weapons¥¥ because they contain components that could be used for military devices such as missile guidance systems, Kyodo news agency quoted industry sources as saying. Playstation2 is the first game console to face export controls under the Foreign Exchange and Foreign Trade Control Law, Kyodo said. The law requires the trade ministry's approval for the export of restricted products worth more than 50,000 yen ($472). Thus, the export of more than two consoles would be controlled because each is priced at 39,800 yen. Sony: Competition allows no compromise ``We have mixed feelings because our efforts to produce a game console of the highest quality have resulted in legal restrictions,¥¥ the Asahi Shimbun newspaper quoted an official of Sony Computer Entertainment Inc. as saying. ``We could not compromise because of the fierce competition in the industry,¥¥ he said. Officials of the trade ministry and Sony could not be reached for further comment. With U.S. software giant Microsoft Corp. (Nasdaq: MSFT) due to enter the lucrative video game market next year with its own high-performance console, tentatively called the X-Box, export controls could hinder Sony's ability to compete, Kyodo quoted industry sources as saying. Get free e-mail and voicemail Try ZDNet eCircles -- your private place on the Web Join ZDNet now! The first version of the PlayStation generated approximately 40 percent of Sony's group-based operating profits. Sony Computer Entertainment Inc, a Sony Corp. subsidiary, has said it aims to ship four million PlayStation2 consoles in Japan and three million each in Europe and the United States in 2000/01. Overseas shipments are due to start later this year. ``These days there are so many items that have technology for civilians that can also be used for military purposes, and of course, PlayStation2 is among these goods,¥¥ the Asahi Shimbun newspaper quoted military commentator Kensuke Ebata as saying. PlayStation2 could guide a missile Military analysts cited the example of a Tomahawk missile that needs to ``see¥¥ where it is going until it strikes its target and must process graphic material at high speed to keep to its target. PlayStation2's graphic processing capability is fast enough to enable it to be used in a missile. Japan's government has become increasingly wary of the possibility that products meant for civilian use could be diverted for weapons use. Japanese radar and communications devices for civilian use were discovered in a North Korean submarine sunk by the South Korean military in December 1998, and two Japanese men were arrested in January on suspicion of illegally shipping parts for anti-tank rocket launchers to Iran. The export restrictions are just the latest in a string of problems that have plagued Sony's most profitable product. Sony Computer Entertainment said this month that users could illegally manipulate the machine to copy DVD movies to videotape. Last month it said it had found the game player could be used to watch digital video disk software sold overseas in breach of a worldwide agreement among DVD player makers. HAVE A GREAT DAY !!! 2229 From: Tom Mann Date: Wed Jan 3, 2001 9:51am Subject: Re: Re: Playstation 2 Dear Pat: I was told that the chip in the Play Station will allow Hussein to radically improve his surface to air missile and anti-aircraft gunnery systems in relation to tracking targets. Tom Mann Guardian International Salem, OR 2230 From: Mike Date: Wed Jan 3, 2001 10:07am Subject: Playstation 2 Obviously he intends to modify them for use as computers. Nuff Said- Bootleg [Non-text portions of this message have been removed] 2231 From: Date: Wed Jan 3, 2001 11:26am Subject: Y2K Computer Glitch Hits 7-Eleven Y2K Computer Glitch Hits 7-Eleven By David Koenig AP Business Writer Wednesday, Jan. 3, 2001; 4:36 p.m. EST DALLAS ‚Äì‚Äì A Y2K-type computer bug hit cash registers in 7-Eleven stores this week, causing them to read the new year as 1901 instead of 2001 and inconveniencing customers who wanted to make credit-card purchases. A spokeswoman said the problem was fixed late Tuesday night and most stores were operating normally Wednesday. Officials at the Dallas-based chain of about 5,200 U.S. convenience stores and thousands more around the world thought they had nipped calendar-related computer glitches a year ago when, like many other big corporations, they geared up for an onslaught of Y2K bugs that never came. 7-Eleven said it spent $8.8 million preparing its in-store computer systems for the rollover from 1999 to 2000. "This was all specifically devised for 7-Eleven and was all Y2K-compliant," said Margaret Chabris. "We did some 10,000 tests on it, and it was working fine until Monday." Chabris said about 15 percent of 7-Eleven's sales involve credit cards ‚Äì not including credit-card ports on the outside gas pumps, which she said were not disrupted. 7-Eleven had 1999 sales of $8.25 billion. Chabris said it wasn't clear whether the company lost any sales because of the outage. For one thing, customers could still pay by cash or check. For another, she said, most of the stores still have devices for manually taking an imprint of a customer's credit card. The chain has a proprietary system that tracks inventory, weather forecasts ‚Äì to change the product mix during hot or cold spells ‚Äì and all cash-register sales. The system is critical in helping 7-Eleven manage inventory in stores that have limited shelf space. The 7-Eleven spokeswoman said major hardware and software vendors on the overall system, installed in 1999, included Electronic Data Systems Corp., NCR Corp., and Affiliated Computer Systems of Dallas. An EDS spokesman said the company did not work on the point-of-sale system, where the bug occurred, which 7-Eleven confirmed. Businesses and government agencies braced for service disruptions a year ago because older computers and software were programmed to use only two digits to represent the year. The shortcut saved computer memory by ignoring the 21st century. 2232 From: St. Clair, James Date: Wed Jan 3, 2001 10:14am Subject: RE: Re: Playstation 2 Well, it should be noted that while all of this is theoretically true, there is no magic fix for this. PS2's run on a standard 32-bit processor, but there vector graphics rendering is EXTREMELY fast, on the order of a super computer . The problem is these machines must be networked and reprogrammed to be used any other way but playing GOLF or NASCAR, and that is cantankerous: PS2s were not designed for this, and Saddam may not have the best script kiddies available. Given his historical penchant for charity, he may even be planning on handing them out to kids as a "hearts and minds". He has previously given away free art supplies before the embargo.. Jim -----Original Message----- From: Tom Mann [mailto:guardian@n...] Sent: Wednesday, January 03, 2001 10:51 AM To: patedwards@w... Cc: TSCM-L@eGroups.com Subject: Re: [TSCM-L] Re: Playstation 2 Dear Pat: I was told that the chip in the Play Station will allow Hussein to radically improve his surface to air missile and anti-aircraft gunnery systems in relation to tracking targets. Tom Mann Guardian International Salem, OR ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2233 From: Psiber Joe Date: Wed Jan 3, 2001 5:06pm Subject: Re: Re: Playstation 2 ----- Original Message ----- From: "Tom Mann" To: Cc: Sent: Wednesday, January 03, 2001 8:51 AM Subject: Re: [TSCM-L] Re: Playstation 2 > Dear Pat: > > I was told that the chip in the Play Station will allow Hussein to > radically improve his surface to air missile and anti-aircraft gunnery > systems in relation to tracking targets. > > Tom Mann > Guardian International > Salem, OR > > I believe this stems from the fact that the PS2 is the first console system with a powerful enough processor to make it worth your while. Somewhere (slashdot?) I believe it was quoted that it takes just 7 - 10 PS2 processors per missle; and at $200/unit wholesale, this is a /bargin/ for a country underneath econonic sanctions. Psiber Joe 2234 From: James M. Atkinson, Comm-Eng Date: Wed Jan 3, 2001 6:19pm Subject: New cameras focus on fuel bandits New cameras focus on fuel bandits http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 by David Williams, Motoring Editor Twenty-four surveillance is being launched by police at London filling stations to combat a huge rise in the number of people stealing fuel - following a year of sharp petrol price rises. Up to £2 million worth of fuel is now being stolen from forecourts in the capital every month. Motorists are driving off with up to £60 of fuel at a time, although the average haul in London is £26. The boom in "drive-offs" has doubled since the problem was reported in the summer, when 1,200 garages within the M25 were losing between £750,000 and £1 million every month. Then the British Oil Security Syndicate (Boss) said thousands of drive-offs were occurring every four weeks. Nationally the crisis cost petrol retailers at least £11.2 million last year. New Year figures, however, are expected to show a doubling in drive-offs in the past eight months, and police say the crimewave is nationwide. Now the Met has begun fighting back by installing high-resolution spy cameras linked to a powerful mobile police computer, and arrests have already been made. The computer reads every car number plate entering a forecourt and checks them against lists of known offenders who have previously been reported to police following drive-offs. Police also programmed the computer to issue an alert if it spots vehicles involved in other crimes or with no valid tax disc. In most cases offenders are approached by plain-clothes officers before they drive off. Backed by the oil industry, the operation was launched secretly at 30 south London forecourts and is expected to spread throughout London before going nationwide. Detective Inspector Larry Lawrence said: "The computer works in the blink of an eye and has proved very successful. "We are pleased to be working with Boss to tackle forecourt crime. The figures are quite high but this type of crime is preventable. "We believe the pattern we have found in south London reflects a London-wide problem." Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip of the iceberg as forecourt crime goes. People who do this normally engage in other crimes too." Earlier this year Boss reported that since 1998 credit card fraud at filling stations across Britain leapt from £12.2 million to £19 million. Drivers claiming to have "forgotten their wallet" and driving off rose to £5 million this year. Police also urged oil firms to install barriers at petrol station forecourts. They feel that with further rises in the cost of petrol, drive-offs will continue to soar. In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around 77.9p. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2235 From: Talisker Date: Thu Jan 4, 2001 0:22pm Subject: Re: New cameras focus on fuel bandits I saw a TV programme on this recently, and know that the number plate reading is working well, however, I really can't see that reading the tax disc is feasible, in the UK the lettering is just over an inch tall and on top off hard to copy colouring making the letter outline difficult to read, add to this that the disc is displayed inside the windscreen at a variety of positions and angles. Also the disc is displayed in a portion of the windscreen outside the coverage of the wipers. Any opinions from the CCTV geeks out there? Oh and the range from camera to windcreen is 10,s of metres Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Thursday, January 04, 2001 12:19 AM Subject: [TSCM-L] New cameras focus on fuel bandits New cameras focus on fuel bandits http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 by David Williams, Motoring Editor Twenty-four surveillance is being launched by police at London filling stations to combat a huge rise in the number of people stealing fuel - following a year of sharp petrol price rises. Up to £2 million worth of fuel is now being stolen from forecourts in the capital every month. Motorists are driving off with up to £60 of fuel at a time, although the average haul in London is £26. The boom in "drive-offs" has doubled since the problem was reported in the summer, when 1,200 garages within the M25 were losing between £750,000 and £1 million every month. Then the British Oil Security Syndicate (Boss) said thousands of drive-offs were occurring every four weeks. Nationally the crisis cost petrol retailers at least £11.2 million last year. New Year figures, however, are expected to show a doubling in drive-offs in the past eight months, and police say the crimewave is nationwide. Now the Met has begun fighting back by installing high-resolution spy cameras linked to a powerful mobile police computer, and arrests have already been made. The computer reads every car number plate entering a forecourt and checks them against lists of known offenders who have previously been reported to police following drive-offs. Police also programmed the computer to issue an alert if it spots vehicles involved in other crimes or with no valid tax disc. In most cases offenders are approached by plain-clothes officers before they drive off. Backed by the oil industry, the operation was launched secretly at 30 south London forecourts and is expected to spread throughout London before going nationwide. Detective Inspector Larry Lawrence said: "The computer works in the blink of an eye and has proved very successful. "We are pleased to be working with Boss to tackle forecourt crime. The figures are quite high but this type of crime is preventable. "We believe the pattern we have found in south London reflects a London-wide problem." Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip of the iceberg as forecourt crime goes. People who do this normally engage in other crimes too." Earlier this year Boss reported that since 1998 credit card fraud at filling stations across Britain leapt from £12.2 million to £19 million. Drivers claiming to have "forgotten their wallet" and driving off rose to £5 million this year. Police also urged oil firms to install barriers at petrol station forecourts. They feel that with further rises in the cost of petrol, drive-offs will continue to soar. In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around 77.9p. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2236 From: Date: Thu Jan 4, 2001 4:39pm Subject: Playstation2 The prices have risen dramatically on Playstation2 systems,from the suggested retail of $250 plus. Auctions at Ebay list $350-$550. At Amazom they are topping out at the $2200 range! That's supply and demand,for you! HAVE A GREAT DAY !!! 2237 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 6:34pm Subject: Clinton directive designed to reshape counterintelligence activities [News] Published Friday, January 5, 2001 Clinton directive designed to reshape counterintelligence activities Washington Post WASHINGTON, D.C. -- President Clinton has signed an order establishing a counterintelligence board that will bring together high-ranking FBI, CIA and Defense Department officials in an effort to devise a more effective strategy to combat spying, senior administration officials said Thursday. Dubbed "CI-21," which stands for counterintelligence for the 21st century, the "presidential decision directive" creates a board of directors, chaired by FBI Director Louis Freeh, that is charged with implementing a "pro-active" counterespionage program. The board will hire an executive who will be the federal government's foremost expert on counterintelligence, officials said. "It is a dramatic change," a senior Clinton administration official said. In addition to Freeh, other members of the board will be the CIA deputy director, the deputy secretary of defense and a representative of the attorney general. The operation will be housed at the CIA. The presidential directive is significant, senior Clinton administration officials said, because it restructures the counterintelligence community by formalizing information-sharing without regard to borders or federal agencies. It also reflects a heightened focus on economic espionage and other types of spying, rather than solely emphasizing the protection of government secrets. "We have always looked at spies and tried to figure out who was spying on us and what they were after," a senior administration official said. "Now, we are looking more at what it is we want to protect. We will no longer focus on embassies as the centers of foreign intelligence-gathering activities." The CI-21 concept was developed in the aftermath of recent security lapses that revealed systemic failures in sharing information about spying. While information will be shared and counterespionage strategy coordinated, the CIA will not be permitted to conduct surveillance activities in the United States; its agents will continue to operate abroad. Former FBI counterterrorism chief Bob Blitzer said CI-21 represents a major improvement. "It is a big change because of the deliberate focus" on counterespionage, Blitzer said. "This new structure will bring everyone together in terms of how to assess what is going on abroad, what is going on here, and what the entire intelligence community needs to do to counter past, present and emerging threats." The first task of the board of directors will be to identify American threats and vulnerabilities. And under CI-21, the National Security Council, composed of Cabinet-level secretaries with responsibility for security issues, also will have a new oversight role in counterintelligence. "All of this," a White House official said, "really depends on the willingness of the players to make sure that the directive is carried out and these agencies cooperate." © Copyright 2001 Washington Post. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2238 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 6:37pm Subject: Judge gets video in home privacy case http://www.freep.com/news/locoak/zpriv_20010105.htm Judge gets video in home privacy case January 5, 2001 BY SALLY FARHAT FREE PRESS STAFF WRITER A prosecuting attorney turned in a videotape to an Oak Park judge Thursday depicting a 23-year-old woman taking a shower and using the toilet -- video her stepfather is accused of secretly filming. Oakland County Assistant Prosecutor Kathryn Steiner said that the nine scenes she gave Judge Marvin Frankel during a preliminary examination Thursday are strong enough to convict John Brown, 33, of eavesdropping. She chose not to include video Brown allegedly filmed of the woman in the living room. Defense attorney Scott Weinberg told the judge Thursday that no one has a reasonable expectation of privacy in a living room, whether a family member or a baby-sitter. That's his interpretation of a state eavesdropping statute that says it is illegal to spy on people with cameras or listening devices in places where they have a reasonable expectation of privacy. "This was the defendant's own home," said Weinberg, who also defended a Royal Oak man last year who was convicted of videotaping his daughter's 18-year-old girlfriend as she showered in their home. "The statute has to be reasonable expectation of privacy. The question of fact now becomes, is the bathroom in the clients' own home considered private?" The case was bound over to Oakland County Circuit Court, and that question will be decided by Judge Wendy Potts on Jan. 17. Brown's bond was reduced to $10,000, but he remained in Oakland County Jail. Brown, who is accused of secretly videotaping his wife and stepdaughter, is charged with 10 counts of eavesdropping. He faces up to 2 years in prison and a $2,000 fine on each count, if convicted. The visibly shaken stepdaughter, who found a camera hidden in the shower drain last month, recounted for Frankel how it felt to discover that she had been taped. "He said, 'It was an obsession,' " the stepdaughter said, burying her face in her hands as she referred to Brown. The videotaping started two weeks before the stepdaughter moved into the Oak Park home Brown shared with her mother, the 23-year-old testified. Brown also faces another court date in front of Judge Barry Howard on Jan. 24 for a probation violation relating to an earlier criminal sexual misconduct conviction involving a 9-year-old step-granddaughter. His bond in that case is set at $50,000. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2239 From: Gerard P. Keenan Date: Wed Jan 3, 2001 8:34pm Subject: FL licensing for security/Brad Robinson Sorry for the crosspostings. Can anyone point me in the right direction for licensing laws in Florida for security guard companies? We are licensed as a Guard and Patrol Agency in the state of NY, and are looking into establishing a presence in Florida due to a number of recent inquiries from that state. Is there a reciprocity licensing agreement between NY and FL? Secondly, I know Brad Robinson is on some of these lists. Can you please contact me via private email at your earliest convenience? I lost your contact info when I had my massive computer crash a couple of months ago. Thanks to everyone in advance. Jerry Keenan [Non-text portions of this message have been removed] 2240 From: Gerard P. Keenan Date: Thu Jan 4, 2001 11:22am Subject: FL lic./virus warning Just wanted to say a big "THANKS" to all the replies I received on the Florida Licensing info I requested. You guys (and gals!) are all terrific! I also want to pass out a warning about viruses. The holidays are over, but the danger from viruses is, apparently, far from over. We've all heard about the Snow White & the Seven Dwarfs virus that's been making the rounds. Be very, very careful of this one. It seems to be propagating big time. I've been hit with it eight times in the last 2 weeks -- two of those times were just this morning!! The first one came in today around 0930, and the second one came in about 1110. Luckily, I recognized it before opening it and they have been deleted from my computer. I don't know where they're coming from, but if I received it twice in less than 2 hours, I'm pretty sure it'll pop up again. So I wanted to let everyone know that it's out there and making the rounds today. I also received a 3rd virus in between the two SW&7Ds. It came with an email from another list I belong to. This time there was no warning, but my Norton caught it and got rid of it. As many of you know, I have two email accounts. The Snow White virus came in on my earthlink account. The unknown virus came in on my other one through a local server (suffolk.lib.ny.us). And all before noon! Again, thanks to everyone who responded. Got some really good info from it -- and all very helpful. Jerry K. [Non-text portions of this message have been removed] 2241 From: Shawn Hughes Date: Thu Jan 4, 2001 7:33pm Subject: decoding software Hello, I know that this is more a surveillance than a counter - surveillance question, but does anyone have experience with the Code - 3 series of decoding software from Hoka products? I don't have it in the budget ($800+) for it now, but would it be worthwhile to consider over, say a M8000 ? TIA, Shawn 2242 From: Craig Snedden Date: Fri Jan 5, 2001 8:36am Subject: Re: New cameras focus on fuel bandits I can see that a recognition system would be able to pick up the pre-printed portion of the tax disc and the colour (different colours for different validity periods), which may catch out quite a number of defaulters, but in my experience, only an inspection with the "mark one eyeball" will ascertain if the handwritten portion (the vehicles details) has been tampered with or not. It is a common method of alteration for a stolen tax disc to be treated with a substance to fade or remove the pen ink, then fill in the details for the car that it is going to be displayed on. Such alterations are easily spotted by close visual inspection and touching the disc, but I can't see a camera system being able to pick up on these. I'm sure the Government "boffins" will be looking at an RF device (passive or active) embedded in the vehicle which will be validated by some means and if invalid will send out a signal to static speed cameras, police cars etc. This raises questions of civil rights and freedom of movement....... Local authorities in the U.K. have just been given powers to raise revenue from taxing vehicles entering certain areas, commonly city centres, supposedly in a move to combat congestion. The U.K. has just recently adopted the European Convention of Human Rights. Does the imposition of a tax on my freedom of movement on the public highway, when there is no alternative route to my destination, not impose on my Human Rights? I know our cousins in the US have been tackling these sorts of questions for years now. Any comments? Sorry this got a bit off topic, but in a way it's still to do with surveillance..... ;-) Craig ----- Original Message ----- From: "Talisker" To: "TSCM-L Mailing List" ; "James M. Atkinson, Comm-Eng" Sent: Thursday, January 04, 2001 6:22 PM Subject: Re: [TSCM-L] New cameras focus on fuel bandits > I saw a TV programme on this recently, and know that the number plate > reading is working well, however, I really can't see that reading the tax > disc is feasible, in the UK the lettering is just over an inch tall and on > top off hard to copy colouring making the letter outline difficult to read, > add to this that the disc is displayed inside the windscreen at a variety of > positions and angles. Also the disc is displayed in a portion of the > windscreen outside the coverage of the wipers. > > Any opinions from the CCTV geeks out there? Oh and the range from camera to > windcreen is 10,s of metres > > Andy > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > talisker@n... > > The opinions contained within this transmission are entirely my own, and do > not necessarily reflect those of my employer. > > > > > > ----- Original Message ----- > From: "James M. Atkinson, Comm-Eng" > To: "TSCM-L Mailing List" > Sent: Thursday, January 04, 2001 12:19 AM > Subject: [TSCM-L] New cameras focus on fuel bandits > > > > New cameras focus on fuel bandits > > http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 > > by David Williams, > Motoring Editor > > Twenty-four surveillance is being launched by police at London filling > stations to combat a huge rise in the number of people stealing fuel - > following a year of sharp petrol price rises. > > Up to £2 million worth of fuel is now being stolen from forecourts in the > capital every month. Motorists are driving off with up to £60 of fuel at a > time, although the average haul in London is £26. > > The boom in "drive-offs" has doubled since the problem was reported in the > summer, when 1,200 garages within the M25 were losing between £750,000 and > £1 million every month. > > Then the British Oil Security Syndicate (Boss) said thousands of drive-offs > were occurring every four weeks. Nationally the crisis cost petrol retailers > at least £11.2 million last year. > > New Year figures, however, are expected to show a doubling in drive-offs in > the past eight months, and police say the crimewave is nationwide. > > Now the Met has begun fighting back by installing high-resolution spy > cameras linked to a powerful mobile police computer, and arrests have > already been made. The computer reads every car number plate entering a > forecourt and checks them against lists of known offenders who have > previously been reported to police following drive-offs. > > Police also programmed the computer to issue an alert if it spots vehicles > involved in other crimes or with no valid tax disc. > > In most cases offenders are approached by plain-clothes officers before they > drive off. Backed by the oil industry, the operation was launched secretly > at 30 south London forecourts and is expected to spread throughout London > before going nationwide. Detective Inspector Larry Lawrence said: "The > computer works in the blink of an eye and has proved very successful. > > "We are pleased to be working with Boss to tackle forecourt crime. The > figures are quite high but this type of crime is preventable. > > "We believe the pattern we have found in south London reflects a London-wide > problem." > > Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip > of the iceberg as forecourt crime goes. People who do this normally engage > in other crimes too." Earlier this year Boss reported that since 1998 credit > card fraud at filling stations across Britain leapt from £12.2 million to > £19 million. > > Drivers claiming to have "forgotten their wallet" and driving off rose to £5 > million this year. > > Police also urged oil firms to install barriers at petrol station > forecourts. They feel that with further rises in the cost of petrol, > drive-offs will continue to soar. > > In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around > 77.9p. > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2243 From: Date: Fri Jan 5, 2001 6:14am Subject: PlayStations Some of you have been commenting on Saddams' PlayStation. Here are some ideas. Reportedly, the PS2's powerful chips could be put to military use, but according to a Sony representative, "If somebody buys and uses PlayStations for military purposes, it is something we cannot control." What will happen once all those PS2s arrive in Baghdad? Here are a few possibilities: 1. Parts and Labor: Iraqi government at standstill while federal employees redeployed to fill out warranty cards. 2. Fitting In: PlayStation 2 now available in camouflage colors. 3. Hollywood Calls: Saddam Hussein offered the title role in next year's highly anticipated sequel, "How the Grinch Stole Detroit's Christmas." 4. Keeping Up With the Jones's: Kuwait stockpiles thousands of Atari 2600s, declares formation of elite SuperPong battalion. 5. Form Follows Function: All Iraqi tanks redesigned to include reset button. 6. Cheat Code: Pressing Triangle plus Square while pressing the Down arrow on the PS2 console annihilates Desert Shield with a roundhouse kick. 7. Fashion Sense: Iraqi armed forces required to dress like fighters in Tekken Tag Tournament. 8. Entertainment Aloft: Iraqi jets now include in-flight DVD movies. 9. Sign Me Up: Kids who didn't get a PS2 start enlisting in the Iraqi military, hoping to score a spare unit. 10. New Game: SCUD Missile Command. [Non-text portions of this message have been removed] 2244 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 7:21pm Subject: Man Arrested at Wal-Mart, Charged With Video Voyeurism St. Petersburg Times January 04, 2001, Thursday Man Arrested at Wal-Mart, Charged With Video Voyeurism Times Staff Writers PLANT CITY - A man was arrested after he installed a tiny video camera in the toe of his sneaker and then followed women around a store to look up their skirts with the gadget, police said. Daniel W. Searfoss, 42, was charged with voyeurism Sunday and taken to the Hillsborough County jail, investigators said. He was released on $ 500 bail later that day. Two women at a local Wal-Mart complained to managers and police Sunday that Searfoss had been following them around the store, Plant City police Detective Kevin Shultz said. One of the women said she saw a camera on one of Searfoss' sneakers, Shultz said. Searfoss, who told police he was a mechanic, was held by store security while they waited for police to arrive. When authorities got there, they found Searfoss with a sophisticated filming system, police Chief Bill McDaniel said. "He had a camera in his shoe and wires that went up his pants and came out at his waist," McDaniel said. "It's the first time that I know of that someone did such an elaborate job. He had his shoes specially altered for this." The wires were connected to a videocassette recorder carried inside a bag, McDaniel said. Police examined the tapes and saw that other unsuspecting women had also been snooped upon. McDaniel said Plant City enacted the voyeurism law in 1998 because of similar problems at public beaches and restrooms. Voyeurism is the lewd or indecent watching, filming or taping of any person without that person's knowledge or consent. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2245 From: Date: Fri Jan 5, 2001 3:33pm Subject: Clinton orders retooling of counterintelligence Clinton orders retooling of counterintelligence By Steve Holland WASHINGTON, Jan 5 (Reuters) - President Bill Clinton, in his waning days in office, has ordered a retooling of the country's counterintelligence efforts to take account of new espionage threats and protect the private sector, the White House said on Friday. The order will establish a new top government position -- a national counterintelligence executive charged with overseeing activities between the FBI, CIA and other agencies, and making sure they have enough money. White House National Security Council spokesman P.J. Crowley said Clinton signed the order in late December with a view toward addressing a changing espionage environment in which computer hackers can steal government and corporate secrets. "Before, you were worried about foreign intelligence services that might be operational out of embassies here in the United States. Now you have to worry about getting hacked by someone who is trying to glean information that we need to protect," he said. Clinton leaves office on Jan. 20. President-elect George W. Bush's spokesman, Ari Fleischer, declined to comment on the order, which Bush could decide to change after taking office. The national executive job is similar to that of the national drug control policy director, which coordinates anti-drug activities among various agencies and lobbies for funding for the effort on Capitol Hill. Crowley said the executive would work not only within the government but with the private sector "to make sure we understand potential threats to technology and infrastructure." The executive, unlikely to be named before Clinton leaves office, would have no role in investigations. U.S. officials have long worried about the possibility of a terrorist attack on the country's electricity grid or telephone systems. Protecting company research and development secrets has increasingly been viewed as a priority in the government. DEFINE CROWN JEWELS A key goal of the new office would be to identify the most precious items for the protection of U.S. national security, that if stolen or tampered with could be disastrous. "The first element will be understanding what is truly the crown jewel rather than costume jewelry," a senior U.S. intelligence official told Reuters on condition of anonymity. For example it could be the sophisticated W-88 nuclear warhead, a secret policy stating the "real intentions" of the United States in some realm, and disruption of the Middle East peace process, the official said. In the private sector it could be the need to maintain U.S. dominance in the world of information technology, he added. "It's a much broader concept than simply what are hostile intelligence services doing to us?" the official said. "What is so important to us that it must not be damaged?" The government last year drew fire for its handling of Taiwanese-born Los Alamos scientist Wen Ho Lee, who was never charged with spying and was freed from jail in September 2000 after pleading guilty to one count of downloading nuclear weapons design secrets to a non-secure computer. The new office was not created in response to Lee or past espionage cases, but rather to shift from a predominant focus on hostile nations which "in today's world ... is going to miss more than it's going to get," the intelligence official said. "The FBI surveilling the Russian embassy is a good thing, we ought to keep doing it, but to think that that was 98 percent of your defense is crazy," he said. For example in the 1999 case of the Russian diplomat accused of monitoring an eavesdropping device planted in the State Department, the new counterintelligence executive might have checked to see whether the U.S. military or another agency had some interest in feeding him information before arresting him, the official said. The new counterintelligence executive's office would replace the National Counterintelligence Center, which was instituted after the 1994 arrest of a CIA officer, Aldrich Ames, who was later convicted of spying for Moscow. (Additional reporting by Tabassum Zakaria) 16:12 01-05-01 2246 From: Date: Fri Jan 5, 2001 3:32pm Subject: Conference on the Future of European Intelligence to Take Place in CastleOutside Rome, Italy 14-16 February 2001 Conference on the Future of European Intelligence to Take Place in CastleOutside Rome, Italy 14-16 February 2001 WASHINGTON, Jan. 4 /PRNewswire/ -- A very exclusive gathering of the top European intelligence authorities will take place within a castle on the outskirts of Rome, Italy, from 14 through 16 February 2001. With the support of the Italian government as well as the European Parliament and the European Commission, six Italian educational institutes have organized the first really high-level public conference on "Intelligence in the 21st Century." The purpose of the conference is to offer to a select audience of participants from government, business and academic communities a critical overview of the revolution of intelligence at the beginning of the new century and to discuss the emergence of a new cultural paradigm regarding intelligence and its use in the decision-making process. The Government of Italy itself anticipates a near-term modernization of its intelligence community while also seeking to establish new open relationships with appropriate private sector and non-governmental organizations. The larger European community in turn is contemplating the need for a special European intelligence architecture that uses the Internet and European encryption to create shared capabilities that reduce European dependence upon and vulnerability to non-European intelligence collection capabilities. Confirmed speakers include the most authoritative representatives from various European countries as well as England, the United States, and Canada. The event is organized into half-days covering the new intelligence challenges, economic and information warfare, transnational threats, new methods of intelligence analysis and the open source revolution, business intelligence sources and methods, and the future of intelligence in Italy. A number of exhibits and special meals will enhance the ability of participants to network with senior European intelligence officials and examine new private sector offerings. Due to the intimate nature of the castle and the security arrangements that will characterize this event there are only 120 seats and 15 exhibits available on a first come first served basis. Profile Keywords: Analytic Services, Business Information, C3I Systems, Database and Information Management, Education, Geographic Information, Graphics, Intelligence Support, Mission Planning, Modeling & Simulation, Open Source Intelligence, Research, Space Operations, Surveillance Systems, Training, Workstations SOURCE Open Source Solutions, Inc. 2247 From: A Grudko Date: Fri Jan 5, 2001 10:16am Subject: Re: Sony's Playstation2 a Military weapon ? ----- Original Message ----- > Japan thinks the game machine could be used to guide missiles -- so the > country is leveling export controls. And Elvis is alive and well in Tokyo. Just don't give him a Playstation or he could take over the world...... Sounds like marketing ploy no. 367, "Tell the public they can't have it and everyone will want one", or No. 448, "Make it illegal and the price goes up" Here in SA we have a few shops that sell LCO FM +/-100 Meg room and series phone bugs 'under the counter' for US$ 150 - and as we all know these things cost about $4 in components to build. The nice metal PCB enclosure, the fancy packaging and a 100% profit margin probably push the wholsale price up to a whopping $15! So how can the retailer get away with a 1 000% mark up? Consumer ignorance. First they think these things are actually sophisticated! Second, the retailer implies that the importation/manufacturing/posession of this 'high tech' equipment is ILLEGAL (which in this country it isn't but it's USE contravienes a number of laws). Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2248 From: A Grudko Date: Sat Jan 6, 2001 7:17am Subject: Re: New cameras focus on fuel bandits ----- Original Message ----- > I really can't see that reading the tax disc is feasible >..... the disc is displayed inside the windscreen at a variety of > positions and angles. Also the disc is displayed in a portion of the > windscreen outside the coverage of the wipers. > Any opinions from the CCTV geeks out there?.... the range from camera to > windcreen is 10,s of metres I don't consider myself an expert (not even a geek) but we've done a lot of covert CCTV observation under a wide range of conditions. There are many factors in play here but few problems are insummountable given enough motivation (usually money). We have a 1200mm focal length Bausch & Lomb reflector lens which will read a number plate at 1500 metres. It hooks up to a Nikon 35mm camera but has a 'C type' adaptor for CCTV cameras. I have not tried to read a tax disk at short range but I think it would work - I once photoed an airport employee's ID from our van at about 30 metres and could read his name, which was in about 12 point typeface, perhaps 4 mm high. I could envisage a camera with pan and tilt controlled by a computer which was programmed to recognise the specific shape of the disk as the target, even controlling focus (which is critical with this type of lens, as is camera 'wobble' with this kind of magnification). Multiple cameras would have to be available per vehicle on the forecourt to ensure the angle of view was optimmum, never mind factors such as dirty windscreens, poor lighting rain (in England? - no!) or reflections. And as you imply, anti- photocopy features (reflections or contrasts) are actualy designed to hinder camera resolution. And if the field of view was wide enough to see both the number plate (bottom front center of the car) and the tax disk (potentially a metre higher and an equal distance left or right) the resolution would have to be increadible and hence the digital drive space huge per frame. Unless someone sits there and pans/zooms manually. Different on the US or German type plates where the annual licence info is on the plate (Big Brother Uncle Sam worked that out long ago. Invalid licence - welcome to Club Fed and maybe have your car confiscated! Check out the tollgates on the Sam Houston Freeway, Tx) Sounds disproportunatly expensive to me. But who knows, Maybe Jack Straw doesn't only exceed the speed limit (the head of the UK's police service was nabbed by their excellent vehicle surveillance system but not prosicuted) but steals petrol and someone is out to nail him ;-) Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2249 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:00am Subject: NSA abandons wondrous stuff NSA abandons wondrous stuff http://www.sunspot.net/content/cover/story?section=cover&pagename=story&storyid=1150520223288 Surprises: Astronomers who took over an abandoned spy base find remarkable, expensive and often incomprehensible stuff at every turn. By Laura Sullivan Sun National Staff Originally published Jan 5 2001 "There are things on this site you will never see anywhere else." TRANSYLVANIA COUNTY, N.C. - Along the long, twisting road through the Pisgah National Forest, the first sign that something is out of the ordinary is a line of giant transformers. Then, around the bend, a barbed-wire fence, guard shack and surveillance cameras protect what looks like nothing more than another hill of trees and dense shrubbery. It is anything but. This is the entrance to one of the National Security Agency's former spy stations, a place shrouded in secrets and denials, the source of local lore that seems right out of "X-Files." What is inside that giant geodesic dome that looks like a golf ball? Where do the tunnels snaking beneath the 202-acre site lead? Why are the rugs welded to the floors of the windowless buildings? Few people have been beyond these gates, deep inside the Appalachian Mountains, 50 miles southwest of Asheville. The NSA abandoned the site to the U.S. Forest Service five years ago, leaving behind a deserted minicity in the middle of nowhere. Now, some of the secrets are being revealed. Last year, with the base boarded up and close to demolition, the property was transferred to a group of astronomers in exchange for a piece of land in western North Carolina. Over the past year, they have begun piecing together the site's past. "There are things on this site you will never see anywhere else," said site manager Jim Powers. "I've never had someone come here that wasn't blown away." The astronomers, who formed the Pisgah Astronomical Research Institute, were attracted by two 85-foot satellites dishes on the site - some of the largest in the country - which could be repositioned to catch deep-space radio signals and allow them to study the life and death of stars. When the group arrived in January 1999, they expected a basic, albeit large, government facility, but as the weeks passed they realized little about the site was what it appeared. As they began to install their computers, they found hundreds of miles of top-of-the-line cabling running under every floor. They discovered that the self-contained water and sewer treatment plant could handle tens of thousands of gallons of water at a time and the generator could produce 235 kilowatts of energy - powerful enough to light up a small city. In a basement room of one of the larger buildings, they found the entrance to a 1,200-foot tunnel system that connects two of the site's main buildings. Every inch of floor in more than four buildings was covered with two-by-two-foot squares of bleak brown carpet. When the astronomers tried to replace it, they discovered it was welded with tiny metal fibers to the floor. The result, they eventually realized, is that the rugs prevent the buildings from conducting static electricity. Even the regular lighting looks different, covered by sleek metal grids that prevent the light bulbs from giving off static interference. The few windows are bulletproof. But what fascinated the astronomers was the still-operable security system that, among other things, sounds an alarm in the main building any time the front perimeter is crossed. The group can watch on monitors as cars approach from miles away. Inside the site, the agency had taken further measures. One area is in a small, sunken river ravine surrounded by barbed wire and an additional guard post. Steps, with reflective metal paneling to shield the identity of those walking beneath, lead down a small hill and wind their way to two small buildings with conference rooms inside - both of which once emanated "white noise" to prevent electronic eavesdropping. What Powers and several others in the group find remarkable, though, is not just the expansive network of buildings and security, but the extraordinary cost of all they items they have found - items the agency discarded. He said the extensive fiber optic cabling that runs for miles under the floors and through the tunnel system is the most expensive on the market. When a state regulator came out to issue a permit for a massive underground storage tank with a double lining, the astronomers said he told them he wished he had a camera. He wanted to take a picture to show his co-workers because he had never seen a system so sophisticated. And the agency didn't just install one water tank; it installed two. In a basement room, beneath a system that pressurizes wells, is another system just like it. "You see this kind of thing everywhere here," Powers said. "They never have just one of something." Even most of the heavy bolt locks - which every door has - are covered by black boxes locked with padlocks. Despite the site's stark appearance, there are some human - and humorous - vestiges. A bright happy face is painted on the smallest of the four satellite dishes on the site, something one former employee said was done so that they could "smile back at the Russians." Inside the tunnels, too, are chalk drawings of animals and warriors resembling those found in caves thousands of years ago. Aside from the rustling of deer and the wild turkeys that run rampant across the hundreds of vacant parking spaces, everything about the place is now eerily quiet. Paperwork in the guard shack is held in place by a stapler though no one has been inside the small building in years. Security cameras still work and alarms all still sound, though no one is listening. When the agency withdrew in 1995, some of the 300 workers, especially those who grew up locally and got hired on as groundskeepers and mechanics, returned to the nearby towns, though many say they are still forbidden to talk about their work. Most of the others - the security officers, military personnel and cryptologists - left the area for their next Department of Defense post. The site dates back to the early 1960s, when a scaled-down version was carved out to support the space program. It was operated at first by the National Aeronautics and Space Administration, and scientists used the early satellite dishes to track the flights into outer space and kept the door open for school groups and visitors who wanted to learn more about space missions. But suddenly in 1981, the NSA took over from NASA. Local hikers and hunters who stumbled onto some of the agency's acreage would be suddenly surrounded by armed guards who appeared as if from nowhere to escort them out of the woods. Vans with darkened windows shuttled past the local coffee shops, fueling rumors. The agency's presence was hard on the local employees as well. Don Powell began working on the site in 1967 as a car mechanic and spent the next three decades learning the mechanics of every inch of the satellite dishes for the Defense Department. He also learned to avoid questions about his work and to lie to his neighbors. For 15 years people would approach him and the few other local workers, asking what was out there, what they did and, of course, what is that golf ball? "The kids would always ask, what's in [that] giant dome?" He would tell them it was "filled with chocolate pudding," he said. "I couldn't even tell my wife. I couldn't tell anyone." The 1995 closure appears to have caught the agency by surprise. It had recently cleared several more areas and laid the foundations for additional smaller satellite dishes that were never built. One newly built satellite dish, which one insider says was never turned on, was dismantled and shipped to England. The Forest Service tried unsuccessfully to engineer a land trade for three years, hampered by a site that posed many problems for the few interested parties - from the remote location to the expense of removing satellite dishes embedded 80 feet into the ground. The agency was about to return with a bulldozer when the astronomers group, headed by benefactor J. Donald Cline, a scientist and former computer executive, offered to buy and trade 375 acres along the French Broad River in North Carolina for the spy station. What made the site, shielded from interference in a natural bowl-shaped terrain, so perfect for the NSA made the site perfect for the astronomers as well. They plan to use the satellite dishes to read the characteristics of elements given off by dying stars. "This area is free of light pollution," Powers said, as he stood in the middle of a vast, empty parking lot. "It's also clean in terms of electromagnetic interference like cell phone towers or things that create electromagnetic noise. "And we can be sure there won't be any in the future because the Forest Service owns everything around here. ... It's easy to see why they liked this place." Recently, in one of a dozen large empty rooms in one of four mostly empty office buildings where the group decided to set up shop, four scientists stood around a portable panel of monitors and computers, watching the results of a test appear on a screen. "It's stardust," said the site's technical director, astronomer Charles Osborne. "This stuff is just floating around out there. It's the building blocks of life." In order to use the satellite dishes, they had to spend months trying to slow them down. Both of the 85-foot dishes swing on two axes, an extravagance the astronomers suspect allowed the agency to swing the face around swiftly to catch up with satellites orbiting Earth. The astronomers need the dishes to move no faster than the speed of Earth itself. But there is much on the site that the astronomers don't know what to do with, such as the paper-shredding building up on one hill, the large helicopter pad on top of another, and down in a valley of well-manicured grass, that giant golf ball, similar to those seen at NSA headquarters at Fort Meade. Close up from the outside, the ball is a circle of triangles, no two identical, that feel like Gore-Tex to the touch. When one triangle at the bottom is pushed, several triangles around it gyrate, letting off a low grumbling sound of bending metal echoing throughout the ball. Inside, past a small door less than 4 feet tall, the ball glows white, lighted by the sunlight outside reflecting and bouncing inside from one triangle to another. In its center is a 40-foot satellite dish, cleaner and smoother than any of the others. It looks new, though it has been there for years. There are unusual numbered patterns on the dish's white panels, laid out like a cheat sheet to a jigsaw puzzle. The astronomers believe that the triangles vary in size as a clever way to minimize the effect of interference that comes from patterns. Enclosing the dish under such a surface, they speculate, would protect it from the weather, and prevent anyone else from seeing it or reading the direction it is pointed. For the astronomers, though, this curious dish is somewhat irrelevant. They need dishes with large faces, like the two bigger ones, to read the radio signals of stars millions of light-years from Earth. >From far above on the perfectly level, perfectly painted helicopter pad with a view of miles of mountains and green trees, Powers laughed at the differences between the previous owners and the astronomers, a group short on staff and scraping for funding. He studied the golf ball. "You'll go a long way before you find anything like that around anywhere else," he said. " ... But nothing about this place is what it seems." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2250 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:09am Subject: Clinton Creates Secrets Panel January 05, 2001 Clinton Creates Secrets Panel http://www.lasvegassun.com/sunbin/stories/bw-wh/2001/jan/05/010500817.html ASSOCIATED PRESS WASHINGTON (AP) -- President Clinton has signed an order creating a national counterintelligence executive to oversee the government's efforts to protect its most vital national security secrets, administration officials said Friday. The new counterintelligence executive will have a four-member board composed of the director of the FBI, the deputy secretary of defense, the deputy director of the Central Intelligence Agency and a Justice Department representative. White House spokesman Jake Siewert said Clinton took the action to help adapt U.S. counterintelligence efforts to a post-Cold War era "in which danger could come just as easily from a laptop (computer) and not the traditional cloak-and-dagger spies." "The old system was designed to counter intelligence threats that came from our adversaries in the Cold War," Siewert said. "Now you're in a new era where those threats are not quite as centrally localized, and you need a more integrated system." Siewert said although the incoming Bush administration could reverse Clinton's decision, that looks doubtful since it is strongly supported by the CIA, FBI, Defense Department and other agencies involved in counterintelligence matters. He said national security adviser Sandy Berger had briefed his anticipated successor, Condoleezza Rice. "They can undo it, but this is not a partisan issue," Siewert said. The organization will reside at CIA headquarters and will replace the CIA's National Counterintelligence Center, according to an administration official who discussed the matter in advance of the White House announcement. The center was created in 1994 after the arrest of Aldrich Ames, a longtime CIA officer convicted of spying for the former Soviet Union. Clinton's order was first reported in Friday's editions of The New York Times and The Washington Post. The existing counterintelligence center at CIA focuses on known, suspected or potential intelligence losses. The new organization will take a broader, more forward-looking approach to determining which national secrets are most vital, which are of greatest interest to foreign governments and how U.S. agencies can cooperate to protect them. Siewert said he believed it was unlikely Clinton would name the counterintelligence executive before he leaves office Jan. 20. Prior to the Ames case, which was one of the worst intelligence disasters in CIA history, the FBI and other government agencies had their own counterintelligence operations but there was no central government-wide office in charge of protecting secrets. --- On the Net: the National Counterintelligence Center at http://www.nacic.gov -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2251 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:11am Subject: Interagency Board to Revise Counterintelligence Strategy Interagency Board to Revise Counterintelligence Strategy http://www.iht.com/articles/6496.html David A. Vise Washington Post Service Saturday, January 6, 2001 WASHINGTON President Bill Clinton has signed an order establishing a counterintelligence board that will bring together high-ranking FBI, CIA and Defense Department officials in an effort to devise a more effective strategy to combat spying, according to senior administration officials. . The presidential directive creates a board chaired by the head of the Federal Bureau of Investigation, Louis Freeh, that is charged with carrying out a "pro-active" counterespionage program. The board will hire an executive who will be the federal government's foremost expert on counterintelligence, officials said. . "It is a dramatic change," a senior Clinton administration official said. "It is revolutionary in its focus and perspective." . In addition to Mr. Freeh, other members of the board will be the deputy director of the Central Intelligence Agency, the deputy secretary of defense and a representative of the attorney general. The operation will be run out of offices at the CIA. The directive is significant, senior Clinton administration officials said, because it restructures the counterintelligence community by formalizing information-sharing without regard to borders or federal agencies. . It also reflects a heightened focus on economic espionage and other types of spying, rather than solely emphasizing the protection of government secrets. . "We have always looked at spies and tried to figure out who was spying on us and what they were after," a senior administration official said. "Now, we are looking more at what it is we want to protect. We will no longer focus on embassies as the centers of foreign intelligence-gathering activities." . The new approach was developed after security lapses that revealed systemic failures in sharing information about spying. The board's first task will be to produce a study identifying threats and vulnerabilities. . Under the concept, the National Security Council also will have a new oversight role in counterintelligence. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Ocean Group Date: Fri Jan 3, 2003 10:18am Subject: PCR Pcr....? Isn't that what the KGB(or whatever the Russian dept was in charge of making US tech's earn their wages!) planted in the US crest given to the Yanks in one of their embassies back in the olden days....? I read about that...the Yanks brought it into the UN Council meeting and gave the Russian rep's heart attacks...! Ha ha.... You might find some info on the unit from the UN minutes! I think I remember seeing it on someone's tscm website....I can't remember where exactly...but I think it was Kevin Murray's site..... I guess the use for it was that it was totally dorment most of the time, ie night time etc when sweeps were carried out, or if the sweeps were random only activated when someone important arrived at the embassy for meetings etc....the SA wouldn't see anything if there was no signal at the time....right? Cheers Vance Deran Ocean Group, Technical Security Division, Ireland. Message: 4 Date: Tue, 31 Dec 2002 01:20:27 -0000 From: "jdobbs2001 " Subject: passive cavity resonator operation Is there any public information regarding PCR's? estimated range and companies known to manufacture them. Is a PCR a typical T3 device used by LE or your typical PD? Why would someone use such a device since its operation would be obvious on any spectrum analyser. 6724 From: Ocean Group Date: Fri Jan 3, 2003 10:20am Subject: ID card solution... ######################################## Before I start, excuse anyone who has been getting emails bounced back from my email address, things went down over Christmas and no one noticed, hopefully all is back online though and please resend your messages, Thanks. ######################################## Hi Matt, Yeah that is a real fast buck option but to be honest I'd be too worried of sticky fingers messing around with the laminate and going design happy with creative id's. Ideally if a high grade laminate could pass as a pvc therm printed card then people would be less likely to munipulate them(or at least try)...that would be a fairly reasonable solution. Maybe a system whereby the inks are printed onto an ultra thin soft laminate and then over coated in a harder pvc like film that would give it an appearance of a therm printed card. But not only that making the things durable and waterproof and thus avoiding making them by the dozen per employee....Come to think of it I wouldn't see why the top over coat of laminate couldn't be hot thermal applied(like a standard laminator) hence making a good card. But the heat may cause image bleed on the underlying soft film from the standard OEM deskjet inks.... Unfortunately I haven't come by any high grade laminate system like that. Does anyone have any ideas regarding this? Of course I could just walk into Compustore and pick up a pack of HP laminate to run on a HP deskjet and off I go, but I see that coming back to haunt me in the future! But your right, $1400 is a waste of cash for an id system, fine for a large org but not for an SME. Hmmm, not easy, anyway maybe someone will have an idea. All the best Kind regards Vance Deran, Ocean Group, Technical Security Division, Ireland. Quoted: Message: 3 Date: Tue, 31 Dec 2002 22:04:38 -0800 From: "Matt Paulsen" Subject: RE: ID cards... If cost is a concern, why not just laminate a printout from a bubblejet/inkjet and a cheap webcam? Total cost is under $125 for everything easily and if you scrounge used you can get it all less than $50. Or if that's not great... around $1400 with a cam... but why waste the cash I ask.. you can get this http://www.pricegrabber.com/search_getprod.php/masterid=466060/search=FARGO% 2520printer/ut=0ce01c8e4f1f7082 http://www.pricegrabber.com/search_getprod.php/masterid=21255/search=card%25 20printer/ut=0ce01c8e4f1f7082 6725 From: cybersnoops1 Date: Fri Jan 3, 2003 1:37pm Subject: Wanted: Real-time GPS tracker... Seeking information on "real-time" GPS vehicle tracking devices. Any with knowledge of the best available to please contact via private email to: jhall@t... Thanks! John Hall President ASG Investigations jhall@t... 888.n2fraud 6726 From: Matt Paulsen Date: Sat Jan 4, 2003 11:31pm Subject: RE: ID card solution... Source it - http://www.123barcode.com/cards.htm -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: Friday, January 03, 2003 8:21 AM To: TSCM Group Subject: [TSCM-L] ID card solution... ######################################## Before I start, excuse anyone who has been getting emails bounced back from my email address, things went down over Christmas and no one noticed, hopefully all is back online though and please resend your messages, Thanks. ######################################## Hi Matt, Yeah that is a real fast buck option but to be honest I'd be too worried of sticky fingers messing around with the laminate and going design happy with creative id's. Ideally if a high grade laminate could pass as a pvc therm printed card then people would be less likely to munipulate them(or at least try)...that would be a fairly reasonable solution. Maybe a system whereby the inks are printed onto an ultra thin soft laminate and then over coated in a harder pvc like film that would give it an appearance of a therm printed card. But not only that making the things durable and waterproof and thus avoiding making them by the dozen per employee....Come to think of it I wouldn't see why the top over coat of laminate couldn't be hot thermal applied(like a standard laminator) hence making a good card. But the heat may cause image bleed on the underlying soft film from the standard OEM deskjet inks.... Unfortunately I haven't come by any high grade laminate system like that. Does anyone have any ideas regarding this? Of course I could just walk into Compustore and pick up a pack of HP laminate to run on a HP deskjet and off I go, but I see that coming back to haunt me in the future! But your right, $1400 is a waste of cash for an id system, fine for a large org but not for an SME. Hmmm, not easy, anyway maybe someone will have an idea. All the best Kind regards Vance Deran, Ocean Group, Technical Security Division, Ireland. Quoted: Message: 3 Date: Tue, 31 Dec 2002 22:04:38 -0800 From: "Matt Paulsen" Subject: RE: ID cards... If cost is a concern, why not just laminate a printout from a bubblejet/inkjet and a cheap webcam? Total cost is under $125 for everything easily and if you scrounge used you can get it all less than $50. Or if that's not great... around $1400 with a cam... but why waste the cash I ask.. you can get this http://www.pricegrabber.com/search_getprod.php/masterid=466060/search=FARGO% 2520printer/ut=0ce01c8e4f1f7082 http://www.pricegrabber.com/search_getprod.php/masterid=21255/search=card%25 20printer/ut=0ce01c8e4f1f7082 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6727 From: Paolo Sfriso Date: Sun Jan 5, 2003 5:42am Subject: International Transport of TSCM Equipment Dear Colleagues. As most of you may know, an essential document for all involved in International TSCM services is an "ATA Carnet". More information on this document, how and where to obtain it, etc. can be found at the following website: http://www.iccwbo.org/index_ata.asp . Best wishes for a safe and prosperous 2003. Your Italian Contact. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 6728 From: Date: Sun Jan 5, 2003 8:05am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6729 From: Date: Sun Jan 5, 2003 8:05am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6730 From: Date: Mon Jan 6, 2003 1:51pm Subject: Spies keep busy as ever, quietly from the January 02, 2003 edition - http://www.csmonitor.com/2003/0102/p06s01-woeu.html Spies keep busy as ever, quietly On Friday, Russia banned US Peace Corps volunteers, accusing them of espionage. By Fred Weir | Special to The Christian Science Monitor MOSCOW - Following Russia's historic rapprochement with the West after Sept. 11, even celluloid superspy James Bond has forgiven his traditional nemesis in Moscow and gone in search of fresh enemies. The latest Bond flick, "Die Another Day," has the evergreen hero battling bad guys from the hermit state of North Korea. That's fiction, but in the real world, actual spies appear to be busier than ever. In the past month alone, Canada and Sweden angrily expelled Russian diplomats for "activities incompatible with their status," the familiar code for espionage. Moscow announced Friday that it will no longer accept US Peace Corps workers, after denying visas to 30 of 64 volunteers, charging they were up to more than humanitarian work. "The leading intelligence agencies of the world have strengthened their presence in Russia," complained Oleg Firomolotov, deputy chief of counterintelligence for the FSB security service, in a recent interview with the government paper Rossiskaya Gazeta. "Russia is a priority object of their activity." From the other side, the authoritative Jane's Intelligence Digest warns that "Russian intelligence operations in the West appear to be rapidly escalating." In London alone, the number of operatives of Moscow's SVR external spy service has jumped from just one in 1991 to 33 today, the journal estimates. Russian President Vladimir Putin responded to the Sept. 11 terrorist attacks by moving Russia into solid geopolitical alignment with the West. In the past year, Russian and US special services have cooperated closely in the war against terrorism, and Moscow has even forged a historic friendship pact with the Western military alliance NATO. Experts say Mr. Putin's gestures were genuine, and that the Kremlin sees cooperation with the West as crucial, to overcome Russia's post-Soviet economic malaise and national identity crisis. "In the war against the Taliban and Al Qaeda in Afghanistan, Russia provided more help to the United States than all the countries of NATO combined," says Vyacheslav Nikonov, head of the independent Politika Foundation, and a former political adviser to the Soviet KGB security service. "We have a common enemy now, and such contacts are very much in the interests of both sides." In the short term, however, Russia's political shift has not brought the hoped-for wave of foreign investment to revive its sluggish economy, particularly the crumbling military-industrial complex. One traditional solution, with which former KGB foreign agent Putin is personally familiar, is to ferret out Western technological and managerial secrets by means of espionage. "Intelligence services will always exist," says former KGB operative Stanislav Lekarev. "It's a mistake to associate espionage with war. In fact, the less shooting is going on, the more spying there will be. Russia's secret services were much depleted in the post-Soviet era, so they're only now beginning to get back up to speed." Two Russian diplomats expelled from Canada recently were reportedly agents of the GRU armed forces intelligence wing, seeking access to high-tech military secrets. Two Russians kicked out of Sweden in November were allegedly trying to penetrate Telefon AB LM Ericson, a company that makes cellphones and aircraft radar systems. Both cases resulted in old-fashioned tit-for-tat expulsions of Canadian and Swedish diplomats from Moscow. The thirty American Peace Corps workers barred from Russia last month stand accused of "collecting information on the social, political, and economic situation in Russian regions, [on] staff members of bodies of power, [and] on elections," according to FSB director Nikolai Patrushev. Russian security officials are understandably tight-lipped about their espionage abroad, but often publicly express pride in their Soviet heritage, which includes running a formidable spy network in the West. In a recent Rossiskaya Gazeta interview, the head of Russia's SVR external intelligence agency, Sergei Lebedev, suggested that tradition may not have died with the USSR. "Even now, many of our supporters help us out of political conviction," he said. "There are people abroad who sympathize with Russia and support our efforts to build a multipolar world, to ensure a global balance of forces." Experts say the international spy game now seldom leads to splashy public scandals the way it did in cold war days. Today, leaders dance a careful two-step around their countries' shadow activities. "We've learned to spy and smile at the same time," says Mikhail Lyubimov, a famous Soviet agent who, since his retirement, has become one of Russia's best-loved writers of espionage novels. "Our presidents go on kissing each other, and have become very adept at pretending nothing is happening." Mr. Lebedev, the SVR chief, also hinted that what the public sees of today's cloak-and-dagger world is just the tip of the iceberg. "I can tell you there are plenty of cases in which a spy is unmasked, and he is allowed by mutual agreement to leave the country quietly," he said. "Neither the press nor anyone else ever gets to hear about it." But the continuing focus of Russian security services on catching spies, and the broad definitions of the term they seem to apply, has some experts and human rights advocates worried. "All reforms are coming to an end and we are returning to the past," says Konstantin Preobrazhensky, a former KGB colonel turned critic. "The same bitter and vengeful people are in charge, and they feel their chance to return has arrived." "We see a lot of dubious accusations against journalists, environmentalists, human rights workers and scientists," says Otto Latsis, with the liberal daily Novoye Izvestiya. "This has nothing to do with ensuring national security, and a lot to do with intimidating people who commit themselves to political causes that are inconvenient for the state, or who associate too much with foreigners." In October, the FSB raided the offices of Baikal Ecological Wave, a coalition dedicated to saving Siberia's fragile Lake Baikal, seizing maps, volunteer lists, and computers. Then, this month, the commander of Russia's north Caucasus military zone, Viktor Kazantsev, accused humanitarian agencies of supplying food to Chechen rebels. "All this aid activity should be taken under tough control," he said. "We all know perfectly well who works in the Red Cross: spies." Some argue Russia's security services are using harsh domestic tactics in a misguided effort to prove their relevance to a population weary of old enemy stereotypes. "Our secret agents are the last children of the cold war," says Yury Shchekochikhin, deputy chairman of the State Duma's security commission. "Of course the state must protect its secrets. But it's time for our special services to grow up and stop trying to divide the world into black and white, them and us. That time is gone forever." [Non-text portions of this message have been removed] 6731 From: Louisiana Investigator Date: Tue Jan 7, 2003 9:53am Subject: RE: Wanted: Real-time GPS tracker... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Check out the items at http://store.yahoo.com/national-scientific/ The NSC Followit looks interesting. Louisiana has a very poor GSM network, but most other areas in the US have good GSM coverage. If so, I think that this device would be excellent for asset or vehicle tracking. If you do purchase one of these items, please reply with a brief evaluation. Hope this helps, Ricky Gray Richard T. Gray Jr., Licensed Private Investigator Gray & Associates, L.L.C. A Professional Investigative Firm 408 North Parkerson Crowley, LA 70527 337-785-0046 Voice 337-785-2768 Fax Serving All of Louisiana WWW.LA-PI.COM - -----Original Message----- From: cybersnoops1 [mailto:info@n...] Sent: Friday, January 03, 2003 1:38 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Wanted: Real-time GPS tracker... Seeking information on "real-time" GPS vehicle tracking devices. Any with knowledge of the best available to please contact via private email to: jhall@t... Thanks! John Hall President ASG Investigations jhall@t... 888.n2fraud Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use iQA/AwUBPhr35WUZ0inzIURkEQJ/dACgsViDjVQNrwtZmsMYyH/76Zsj6pMAoLzu HXXAttyrXYaPkJgXWT4ZSLVD =hD8e -----END PGP SIGNATURE----- 6732 From: Ocean Group Date: Tue Jan 7, 2003 11:22am Subject: High Tech Wire Strippers Hi, This may seem like a strange question, but a colleague informed me today he has seen a laser wire stripper. He says its just like a laser pointer but more powerful and can used to melt away the plastic in a precise area of typical small electronic wire.... He is however, unable to give me a supplier or any other details so I am a little skeptical as to its existance... Can anyone shed some light on this? Kind regards Vance Deran Ocean Group, Technical Security Division, Ireland. 6733 From: Date: Tue Jan 7, 2003 10:44am Subject: Cryptome Log Subpoenaed Cryptome Log Subpoenaed http://yro.slashdot.org/yro/03/01/07/0550242.shtml?tid=99 Posted by chrisd on Tuesday, January 07, @10:14AM from the john-has-my-tie dept. PaulBu writes "Stopped by on Cryptome tonight... It seems that their logs have been subpoenaed by Massachusetts Assistant Attorney General Chief, Corruption, Fruad (sic) & Computer Crime Division. Cryptome's answer was that "logs of Cryptome are deleted daily, or more often during heavy traffic, to protect the privacy of visitors to the site." (Good job!) See here: http://cryptome.org/cryptome-log.htm [Non-text portions of this message have been removed] 6734 From: Louisiana Investigator Date: Tue Jan 7, 2003 10:30pm Subject: Periscope for Surveillance Van -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Does any list members have any surveillance van equipment for sale? I am particularly interested in a motorized periscope. Thanks in advance, Richard Gray Richard T. Gray Jr., Licensed Private Investigator Gray & Associates, L.L.C. A Professional Investigative Firm 408 North Parkerson Crowley, LA 70527 337-785-0046 Voice 337-785-2768 Fax Serving All of Louisiana WWW.LA-PI.COM -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use iQA/AwUBPhupZmUZ0inzIURkEQLZlgCbBjD2gnfATqsG3o11KD5WPwbZEewAoL9k OLVGWj+NqxqjRZ1fJQcKgflM =tfCJ -----END PGP SIGNATURE----- 6735 From: James M. Atkinson Date: Wed Jan 8, 2003 6:06pm Subject: Dear Abby Dear Abby My husband is a lying cheat. He tells me he loves me, but he has cheated our entire marriage. He is a good provider and has many friends and supporters. They know he is a lying cheat, but they just ignore the issue. He is a hard worker but many of his coworkers are leery of him. Every time he gets caught, he denies it all. Then he admits that he was wrong and begs me to forgive him. This has been going on for so long, everyone in town knows he is a lying cheat. To top it off, he ignores me just because I am a lesbian. Abby, I just don't know what to do. Signed, Frustrated in New York ----- Frustrated in New York: You should dump him. Now that you are finally a New York Senator, you don't need him anymore. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6736 From: Steve Uhrig Date: Wed Jan 8, 2003 8:10pm Subject: Executive World Services? If anyone is on here from Executive World Services, be advised sales@executiveworldservices just sent me a virus which was detected and quarantined. The message had a subject something like 'Frame Spacing'. Anyone having BOTH of these two addresses: sales@executiveworldservices *and* Steve@s... in their address book is a suspect for being infected. The infection may well not be on the executiveworldservices end. We've seen this before, and the culprit was an innocent third party who had both our addresses in his address book. Took a lot of investigation on the part of a savvy list member to isolate a third party problem. Someone needs to take appropriate action. If YOU have both addresses in your address book, it may be YOU. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6737 From: Marcel Date: Thu Jan 9, 2003 11:57am Subject: LJK-Junior Low Cost Vehicle Tracking Product ( BW)(NV-INTERTRAK-3)(NMRX) InterTrak, Televoke & Numerex Introduce LJK-Junior Low Cost Vehicle Tracking Product;``Security is More Important Than Ever Before'' Business Editors/High-Tech Writers 2003 International CES LAS VEGAS--(BUSINESS WIRE)--Jan. 9, 2003--InterTrak Tracking Services, L.L.C. (www.trackmenow.com), responding to dealer requests for a simplified version of their successful LJK-EXT GPS vehicle tracking product is proud to announce that it will be showing its new LJK-Junior model at the 2003 Consumer Electronics Show. The show takes place in Las Vegas, from January 9-12, 2003, Booth 4856. The LJK-Junior includes two inputs, three outputs and independently mounted combination Cellular/GPS hi-gain antennas. "The LJK-Junior culminates our dealer field experience and includes the most popular product features, yet the LJK-Junior is simple to install coupled with a lower MSRP," says Barnet Fagel, InterTrak's Vice President of Sales and Marketing. Fagel added "We have been in the market for the last two years collecting real world market information that has been used to define the new LJK-Junior to appeal to mass market buyers." About InterTrak InterTrak L.L.C. has offices in Frisco, Texas and Chicago whose employees have accumulated 20 years of vehicle security and tracking experience. InterTrak now markets the most cost efficient vehicle location products and service in North America. Coupling the combined industry talents of its corporate staff InterTrak is well positioned to take advantage of the burgeoning Telematics market. Combining the communications power of the Internet, Cellular Communications, and the Global Positioning System (GPS), InterTrak promises to be the bright star on the automotive location horizon. For additional information on InterTrak's products and services call1-866-FINDME1 (346-3631) or visit us www.trackmenow.com. About Televoke Televoke "connects people to things" by providing an automated web and telephony service platform that enables individuals and enterprises to track and control valuable assets (e.g., people or vehicle). For the first time ever, businesses and their customers can be proactively notified via phone, pager or email when a valuable fixed or mobile asset is at risk. The Televoke service platform can be customized and branded for any partner, and integrated with virtually any enterprise system, hardware device, GPS or other location technology, wireless or wire line network. For more information on Televoke, visit www.televoke.com or send an email to info@t.... About Numerex Numerex (Nasdaq:NMRX) is a technology company comprised of operating subsidiaries that develop and market a wide range of communications products and services. The Company's primary focus is wireless data communications utilizing proprietary network technologies. The Company primarily offers products and services in wireless data communications through Cellemetry(R) and Data1Source(TM), and digital multimedia through PowerPlay(TM). These services enable customers around the globe to monitor and move information for a variety of applications from home and business security to distance learning. In addition, the Company offers wire line alarm security products and services, as well as telecommunications network operational support systems. For more information on Numerex, please visit our Web site at: http://www.nmrx.com. --30--lr/da* CONTACT: InterTrak L.L.C., Frisco Barnet Fagel, 1-866-FINDME1 (346-3631) Ext. 111 barnet@t... KEYWORD: TEXAS NEVADA TRACK INDUSTRY KEYWORD: SOFTWARE COMPUTERS/ELECTRONICS AUTOMOTIVE TELECOMMUNICATIONS PRODUCT TRADESHOW SOURCE: InterTrak Tracking Services, L.L.C. http://www.businesswire.com/cgi-bin/f_headline.cgi?day0/230090318&ticker=nmrx 6738 From: Ocean Group Date: Wed Jan 8, 2003 3:46pm Subject: News - CCTV Security cameras are getting smart -- and scary From wealthy private homes to military installations, security cameras are going high tech. Prompted in part by new fears after the Sept. 11, 2001, terrorist attacks, camera makers, security specialists, hard-disk makers and chip designers are transforming the art of video surveillance, long known for its grainy, black-and-white images and reams of tape. http://www.siliconvalley.com/mld/siliconvalley/4883623.htm 6739 From: Jacob Date: Wed Jan 8, 2003 9:04pm Subject: Re: ID cards... Vance, The two big players in the card printer business are ELTRON and FARGO. They both have web sites and there are many distrubuters in the US. The also sell "overlaminates" that can contain gold ink patterns or hollograms. There can print on regular pvc or even ProxCards or MagStripe cards. Here are a few links to get you going. http://www.e-scan.com/plastic.htm http://store.yahoo.com/cardprinterwarehouse/ http://www.plastic-id-card-printers.com/ Jake Ryan This message was scanned with Norton AntiVirus 2002. [Non-text portions of this message have been removed] 6740 From: Buzz Benson Date: Thu Jan 9, 2003 2:41pm Subject: Re: Executive World Services? After reading Steve's msg I immediately ran a full Norton scan revealing no infections. Steve's infectious msg was received from the address "sales@executiveworldservices" which is not a valid sender address. It is only a a mailbox for incomming mail. I called Steve and after some discussion it was determined that the suspect virus probably uses SMTP to propagate and randomly selects email addresses from resident data bases in the host. An example would be a varient of the WORM KLEZ. So, as Steve said earlier, check your addresses for "sales@executiveworldservices" and "steve@swssec". If you have both you may be the host. Scan with Norton Anti-virus. Thanks for the heads-up Steve. Buzz Benson EWS Atlanta USA www.executiveworldservices.com email: buzzben@m... Tel: (678) 316 7002 Fax: (706) 654 2080 >From: "Steve Uhrig" >Reply-To: Steve@s... >To: tscm-l@yahoogroups.com >Subject: [TSCM-L] Executive World Services? >Date: Wed, 08 Jan 2003 21:10:54 -0500 > >If anyone is on here from Executive World Services, be advised >sales@executiveworldservices just sent me a virus which was detected >and quarantined. > >The message had a subject something like 'Frame Spacing'. > >Anyone having BOTH of these two addresses: > >sales@executiveworldservices > >*and* > >Steve@s... > >in their address book is a suspect for being infected. The infection >may well not be on the executiveworldservices end. We've seen this >before, and the culprit was an innocent third party who had both our >addresses in his address book. Took a lot of investigation on the >part of a savvy list member to isolate a third party problem. > >Someone needs to take appropriate action. If YOU have both addresses >in your address book, it may be YOU. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ _________________________________________________________________ The new MSN 8 is here: Try it free* for 2 months http://join.msn.com/?page=dept/dialup 6741 From: James M. Atkinson Date: Thu Jan 9, 2003 11:10pm Subject: SpyKing As many of you know my website concerns methods, techniques, and protocols used to find bugs and wire tapes, and the art and craft of hunting spies. Part of this involves covering court cases when spies and their associates are busted, and presenting historical public documents about how the business operated prior to the bust, during the bust, during the court case, and then watching how the people involved re-invent themselves (all culled from government documents). A good example is the following page where I cover the Frank Jones bust, which includes court documents on the case, incorporation documents, and so on. http://www.tscm.com/FNJspyking.html There is a very, very small amount of materials that is not based on court documents, but this small amount is based on interviews I have personally performed, or taken from published articles (with appropriate credit) and added my own added commentary. Please let me know if you find any errors or omissions, and please let me know if you think I need to clarify anything on this or any other page. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6742 From: Steve Uhrig Date: Sat Jan 11, 2003 8:45pm Subject: Someone else has a virus Anyone having both the following addresses in their address book should check their machine for virii: walshingham@c... AND Steve@s... I received a spoofed message from the compuserve address. As with the other one earlier this week, some third party machine is infected, and is sending random messages to persons in your address book, spoofing the headers of someone else in your address book. The spoof apparently is coming from the AOL domain, specifically: LugNutz3@a... Headers below. ================ Status: U Return-Path: Received: from halfdome.istep.com ([66.250.97.227]) by merlin (EarthLink SMTP Server) with ESMTP id 18xxZk1bz3NZFlq0 for ; Sat, 11 Jan 2003 18:36:38 -0800 (PST) Received: from rly-ip06.mx.aol.com (rly-ip06.mx.aol.com [205.188.156.51]) by halfdome.istep.com (8.12.3/8.12.3/Debian -4) with ESMTP id h0C2a51l006898 for ; Sat, 11 Jan 2003 18:36:06 -0800 Received: from logs-tp.proxy.aol.com (logs-tp.proxy.aol.com [152.163.204.135]) by rly-ip06.mx.aol.com (v89.10) with ESMTP id RELAYIN5-0111213522; Sat, 11 Jan 2003 21:35:22 1900 Received: from Wuntnqpno (AC958C1C.ipt.aol.com [172.149.140.28]) by logs-tp.proxy.aol.com (8.12.6/8.12.6) with SMTP id h0C2X7qq183116 for ; Sat, 11 Jan 2003 21:33:08 -0500 (EST) Date: Sat, 11 Jan 2003 21:33:07 -0500 (EST) Message-Id: <200301120233.h0C2X7qq183116@l...> From: walsingham To: steve@s... Subject: {Virus?} Bottom footer table MIME-Version: 1.0 Content-type: multipart/mixed; boundary="Ds85WC93ulO0637jf59tV66820v9zJQb386Sa" X-Apparently-From: LugNutz3@a... X-MailScanner: Found to be infected X-MailScanner-SpamCheck: not spam, SpamAssassin (Message larger than max testing size) X-PMFLAGS: 570949760 0 1 P6AE60.CNM --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Warning: This message has had one or more attachments removed Warning: (msg-4856-5.html, href.scr). Warning: Please read the "VirusWarning.txt" attachment(s) for more informat= ion. --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" Content-Disposition: attachment; filename="VirusWarning.txt" Content-Transfer-Encoding: quoted-printable This is a message from the I-Step E-Mail Virus Protection Service ---------------------------------------------------------------------- The original e-mail attachment "msg-4856-5.html" was believed to be infected by a virus and has been replaced by this warning message. If you wish to receive a copy of the *infected* attachment, please e-mail helpdesk and include the whole of this message in your request. Alternatively, you can call them, with the contents of this message to hand when you call. At Sat Jan 11 18:36:10 2003 the virus scanner said: Found dangerous IFrame tag in HTML message Note to Help Desk: Look on I-Step Mail System in /var/spool/MailScanner/qua= rantine/20030111 (message h0C2a51l006898). --=20 I-Step Communications Anti-Virus Team (415) 777-3268 mail-support@i... --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" Content-Disposition: attachment; filename="VirusWarning.txt" Content-Transfer-Encoding: quoted-printable This is a message from the I-Step E-Mail Virus Protection Service ---------------------------------------------------------------------- The original e-mail attachment "href.scr" was believed to be infected by a virus and has been replaced by this warning message. If you wish to receive a copy of the *infected* attachment, please e-mail helpdesk and include the whole of this message in your request. Alternatively, you can call them, with the contents of this message to hand when you call. At Sat Jan 11 18:36:10 2003 the virus scanner said: href.scr Infection: W32/Klez.H@mm Windows Screensavers are often used to hide viruses (href.scr) Note to Help Desk: Look on I-Step Mail System in /var/spool/MailScanner/qua= rantine/20030111 (message h0C2a51l006898). --=20 I-Step Communications Anti-Virus Team (415) 777-3268 mail-support@i... --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: application/octet-stream; name=fact_driver[1].htm Content-Transfer-Encoding: base64 Content-ID: ================== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6743 From: A Grudko Date: Sat Jan 11, 2003 10:33pm Subject: Re: Someone else has a virus - Original Message - From: Steve Uhrig > Anyone having both the following addresses in their address book > should check their machine for virii: > walshingham@c... Thanks Caught on it's way in and zapped by my code-warriors. Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6744 From: A Grudko Date: Sun Jan 12, 2003 3:15am Subject: Yaesu FT90-R mods I have a Yaesu FT90-R (which is a great radio) which I use primarily for UHF comms on 407-409 Rx, 417- 419 Tx on a + 10 Meg repeater system. Secondary comms are simplex in the 407 - 409 range and this is a problem for me as Tx is blocked below 410.00 . Does anyone have a modification around this block. Private replies please. Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6745 From: frost_bitten_ca Date: Fri Jan 10, 2003 0:54pm Subject: What might someone do with stuff like this? Usable range apparantly to 60 feet, audible to 300 feet. HyperSonic Sound What is HSS? HyperSonic Sound Technology is simply the most revolutionary sound reproduction system of this century. Not since the development of the "cone" loudspeaker more than 75 years ago has any technology provided such significant departure from conventional loudspeakers and such a remarkable new approach to the reproduction of sound ... http://www.atcsd.com/tl_hss.html --- Put sound where you want it Is already successfully used by major corporations, museums, and other venues all over the world ï Delivers clean, clear audio with ~1% distortion ï Is fully CE compliant ï Uses zero-lag, realtime processing, making video synchronization simple ï Has proven long-term reliability, with public installations running for years http://www.holosonics.com/ 6746 From: Rick Hofmann - MICROSEARCH Date: Sun Jan 12, 2003 7:09pm Subject: Antennas I am looking for input from anyone with experience using the Electrometrics or Summitek collapsible antennas. Any information will be greatly appreciated. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 6747 From: James M. Atkinson Date: Mon Jan 13, 2003 7:17am Subject: Espionage Case May Face Public Trial Espionage Case May Face Public Trial By Ted Bridis Associated Press Writer Sunday, January 12, 2003; 1:20 PM Washington Post ALEXANDRIA, Va. -- It's the first U.S. espionage trial in nearly 50 years that could end in a death sentence: A retired Air Force master sergeant, deeply in debt, is accused of offering satellite secrets to Saddam Hussein and others for more than $13 million in Swiss currency. Barring a last-minute plea agreement, jury selection was to begin Monday in the case against Brian Patrick Regan in U.S. District Court. His lawyers waged a late, unsuccessful fight to delay the trial because of a possible U.S. invasion of Iraq, one of the countries to whom Regan was accused of offering to sell secrets. Legal experts said a plea avoiding trial this late was unlikely. "I think you can assume any offers that were put on the table have been long-since rejected," said Lawrence S. Robbins. He was the losing defense lawyer in the last espionage trial, in 1997, when a federal jury convicted a married couple of spying for East Germany. Full-blown spy trials in civilian courtrooms are rare. The Justice Department nearly always negotiates a plea agreement, even in cases where espionage has resulted in the deaths of America's foreign agents. That is because the government could suffer embarrassing disclosures of sensitive information in a public courtroom, including hints that could help other spies learn to evade detection and capture. The government also often needs the defendant's help to describe which secrets might have been handed over to foreign governments. Leverage to negotiate a plea is so powerful that prosecutors complain about threats from defense lawyers that a public trial could expose their secrets. "The government has to choose between dropping the charge or revealing the information," said Michael Woods, a former chief in the FBI spy-hunting unit that investigated Regan. Citing national security, U.S. District Judge Gerald Bruce Lee barred the public and reporters from attending some earlier hearings in Regan's case. Defense lawyers have pored over classified documents for weeks at the federal courthouse inside a secure room where cellular telephones and pagers are not allowed. Two other lawyers in the 1997 espionage case with Robbins, James Clyde Clark and Joseph John McCarthy, are among four court-appointed attorneys for Regan. In that case, Therese Marie Squillacote, a former Defense Department lawyer, was sentenced to nearly 22 years in prison; her husband, Kurt Alan Stand, got more than 17 years. Regan retired from the Air Force in August 2000 to work for a defense contractor in the National Reconnaissance Office. He was pulled off a flight to Zurich, Switzerland, at Dulles International Airport one year later by FBI spy-hunters, who had been secretly following him and videotaping him inside his office for months. The FBI said it found on Regan a spiral notebook with codes describing images of a missile launcher in the northern no-fly zone over Iraq and of another launcher in China. Agents said Regan also carried, tucked inside his right shoe, addresses he found on the Internet showing locations for embassies in Switzerland and Austria for the governments of Iraq, China and Libya. On Regan's home computer, the FBI said it found a dramatic letter drafted to Saddam offering details about American satellites that could help Iraq hide its anti-aircraft missiles. The letter demanded $13 million in Swiss francs and complained that movie stars and athletes make more money. "If I am going to risk my life and the future of my family, I am going to get a fair price," the letter said. Court records indicate that Regan, a father of four, carried debts of at least $53,000 at the time. Prosecutors have said they would introduce Regan's credit-card and banking records during the trial. Regan has pleaded innocent to three counts of attempted espionage and one additional count of illegally gathering national security information. The Bush administration has taken an unusually aggressive posture against Regan, pledging to seek the death penalty if he is convicted. That is despite government indications it has little evidence Regan actually turned over any information and no evidence anyone died as a result of any alleged disclosures. In espionage cases against the CIA's Aldrich Ames or the FBI's Robert Hanssen, the spying was tied directly to the executions of U.S. agents overseas. Following plea agreements, both were sentenced to life without parole. "It does seem rather a perverse reality," said Paul Stevens, the legal adviser to the White House National Security Council in 1987. "But the paramount interest here is in preserving and protecting national security." No U.S. citizen has been executed in an espionage case since Julius and Ethel Rosenberg in June 1953, for revealing nuclear bomb secrets to the Soviet Union. The death penalty was re-enacted in 1994 as a punishment for peacetime espionage, although none of 11 people indicted for espionage since then has faced it. "This may reflect a calculation on the part of the government that they need to show they are willing to try these cases," said Stewart Baker, former general counsel for the National Security Agency. "We're in a climate when the importance of maintaining secrets is likely to get a favorable response from a jury." Regan's lawyers have spent much of their time focused on the threat of the death penalty, which they criticize as "arbitrary and irrational." In one court filing, defense lawyers called his letter to Saddam "the alleged rantings of a retired Air Force master sergeant prepared in what appears to be an effort to scam a foreign government out of $13 million." Defense lawyers also have indicated they would introduce evidence about Regan's mental health during any penalty phase, to help him escape a death sentence. © 2003 The Associated Press -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6748 From: Ben Evans Date: Sun Jan 12, 2003 0:42pm Subject: Re: Yaesu FT90-R mods www.mods.dk is the best place for this type of mod to be found. -Ben At 11:15 AM 1/12/2003 +0200, you wrote: >I have a Yaesu FT90-R (which is a great radio) which I use primarily for UHF >comms on 407-409 Rx, 417- 419 Tx on a + 10 Meg repeater system. > >Secondary comms are simplex in the 407 - 409 range and this is a problem for >me as Tx is blocked below 410.00 . > >Does anyone have a modification around this block. > >Private replies please. > >Andy Grudko (British), Grad I.S, South Africa >SIRA investigators Reg. No. 8642 >www.grudko.com , andy@g... . Est. 1981. International investigations >(+27 12) 244 0255 - 244 0256 (Fax). >IPA, SACI, WAD, CALI, UKPIN, IWWA. >When you need it done right - first time > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6749 From: The Inhabitant Date: Sun Jan 12, 2003 5:29pm Subject: Spy King This ìspy kingî who was caught by this United States may have known how to acquire electronic bugs, but has not knowledge of the law. Ref: Title 18 USCA section 3401 The Warrant is invalid that was used to arrest Frank Jonesís liberty. Ref: Title 28 USCA section 601 et. seq. The Federal Magistrate has no authority to move, unless the unknowing respondent involuntarily volunteers to controvert its singular innocence. Ref: Title 18 USCA section 3041 Not only did the Magistrate fail to append its signature as required by law, but it has failed to effectuate the seal of its office. Ref: Title 28 USCA section 638c This particular covert agent apparently had no Intel on the laws of this United States. Ref: Title 28 USCA FRCP Rule 1, 2, 4, 9, 12 This Spy King was not convicted of any crime. It simply involuntarily volunteered for a criminal contempt in equity that which has not standing in law. Ref: Title 5 USCA section 701 et. seq. here on the banks of the Choptank, off the shores of the Chesapeake Bay, stands this Inhabitant upon the Land Consensus Tollit Errorem Communis error facit jus Speaking the Truth in times of universal deceit is a revolutionary act. George Orwell --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.443 / Virus Database: 248 - Release Date: 1/10/03 [Non-text portions of this message have been removed] 6750 From: AccessOneNetworkNorthwest AONNRecords Date: Sun Jan 12, 2003 11:17pm Subject: Foolish Frank Jones was foolish. I read the entire file and was astounded. I could see a master spy who would feign weakness in order to lead potential adversaries to believe that his capabilities were unsecure and low level, thus he could then dance circles around them, but Jones had no plan. His mind was gone and he didn't know what the hell he was doing - he didn't know what century it was. More alarming was was his blatant proliferation of restricted technology and the raising of awareness of things which most shouldn't be concerned with. Frank Jones was no SpyKing. The brief was most hilarious as well as frightening. Thank God for counter espionage. AONN --------------------------------- Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now [Non-text portions of this message have been removed] 6751 From: Hawkspirit Date: Mon Jan 13, 2003 9:17am Subject: Equipment for sale Date: Sun, 12 Jan 2003 21:11:20 -0000 From: "j7lionrush " Subject: Counter measures gear for sale All the equipment is new in box unless indicated and what I paid for it. What I'm asking is in ( ). Or best offer. 1. DP-19 $295.00 ($270) 2. TT-46 $395.00 ($370) 3. TD-20 $295.00 ($270) 4. WIDE BAND MICRO B.D. $295.00 ($270) 5. TE-4200 $395 ($370) 6. JM-20&SAFELINE $495.00 ($450) 7. CPM 700 $2525.00 (USED) ($2200) As I mentioned before all items except the CPM 700 are NIB. I also have the following items I'm trying to off load: Steiner Binos:10x50 Police. NIB ($500.00/$300). 10x30 Nighthunter, NIB.($300/$250) US Armor Body Armor custom made w/trauma plate, used, ex. condition. ($275) Elec. lock pick, NIB, best offer Lockaid Tool, NIB, best offer Master Pick Set, NIB, best offer High-Tech Pick Set, NIB, best offer Lock pick equip. made in US, (exept for elec. lock pick). Hatch lrg/x-lrg, slash guard gloves, new. Best offer. 2 pair. Various elec. c-s manuals/books, I'll throw in no charge. Anything you buy, I'll pay the shipping and insurance. Please respond privately by e-mail if interested. John M. Leontieff Alliance Security and Investigations 2510 Leach Ct. S.E. Olympia, WA 98501 (360) 709-0369 WA. State License 601886548 Member NAIS 6752 From: Date: Mon Jan 13, 2003 9:04am Subject: Testing Just wanted to see if I was able to get through. Because of SPAM I had to change e-mail accounts. Thanks. From: Does it matter Date: Sat Jan 3, 2004 9:10am Subject: Internet phone usuage I just wanted to let ppl on this group know incase they may wonder about this type of service it is great. At home I use Vonage's service and it is incredibly clear. Several times I moved it around from office to other locations and got mixed results because of the various signal strengths that I was getting pumped through my cable service. When I finally tried it at home where I have had Comcast's interenet service since day one there were 0 interrupts. If anyone is thinking of trying something like this I can recommend the service that I use to people. Thanks Darren 8135 From: Date: Tue Jan 6, 2004 6:38am Subject: Re: Re: CIA Science and Technology Directorate Museum Opens << The C130s had a detector that could, at short ranges, pick up the RF generated by a vehicle's electric's and then take them out.>> Delightful. About what year was this? Technology is a good thing. [Non-text portions of this message have been removed] 8136 From: David Alexander Date: Wed Jan 7, 2004 3:24am Subject: FW: Re: CIA Science and Technology Directorate Museum Opens Igloo White ran from 1969 onwards. The ignition detection system was code-named Black Crow. Don't forget they were basic trucks, probably using magnetos. Not much (probably square root of nothing) in the way of suppression fitted to them. See home.att.net/~c.jeppeson/igloo_white.html for more technical details on the remote trail sensor units Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent:06 January 2004 17:39 To:TSCM-L@yahoogroups.com Cc:dave_ale@o... Subject:Re: [TSCM-L] Re: CIA Science and Technology Directorate Museum Opens << The C130s had a detector that could, at short ranges, pick up the RF generated by a vehicle's electric's and then take them out.>> Delightful. About what year was this? Technology is a good thing. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ 8137 From: Mitch D Date: Wed Jan 7, 2004 4:10am Subject: RCA Lyra 2780 pocket Video/Audio Recorder Ran the Lyra 2780 through some simple tests for various applications,it performed well and passed. With an internal 20G HDD and removable compact Flash mem, its deadly in the field as a pocket recorder. It will record audio, as well as video for over 10 hours.It accepts a composite video input,as well as audio through an AV cable adapter. Unit accepts an external 12 V DC Input Video is in mpeg4 format we used a small low quality color cam for bench testing,playback on a monitor demonstrated smooth fluid video with a crisp color image. There is no on screen T/D stamp. Audio capability testing yielded excellent results utilizing a inexpensive consumer grade microphone,AKG 1000 pro line mic,and another mike from a law enforcement supplier. The unit is effective,easily passes for a PDA,and is something to be kept out of secure conference rooms,product development areas etc...
http://www.rca.com/product/viewdetail/0,,PI700667-CI700324,00.html At at 5 1/4 inches high by 3 1/4 inches wide by 1 inch deep, the Lyra AV Jukebox can slip into a large pocket. The color screen, measuring 2 7/8 inches wide by 2 1/4 inches high, sits in the middle of the Jukebox face, with two rocker buttons on the right side for navigating on-screen menus. Plugged into a Windows or Macintosh computer through a USB 2.0 cable, the Jukebox appears to the PC as a hard drive - so you move files back and forth by drag and drop. You can even use the Jukebox to store data files, such as Word documents, that can't be played on the device. For music, the Jukebox plays songs in the MP3 and WMA formats For photographs, the Jukebox displays images stored in the widespread JPEG format. You can show pictures one at a time, or start a slide show that automatically moves through images. For video, the Jukebox plays MPEG4 video clips. If you have clips in that format, you can drag them into the Jukebox. The Jukebox acts as a recorder for both audio and video. There's a "line in" jack on the Jukebox that connects to a cable, included in the box, ending in the familiar yellow video jack and red and white audio jacks. The cable can plug into any audio source - such as a home stereo system - to record music in MP3 format. Or the cable can plug into any video source - such as cable box, videocassette recorder, DVD player or camcorder - to record full-motion video with sound. The Jukebox holds 40 hours of video recorded this way; to get 80 hours, you must first prepare compressed video on a computer. In addition to the headset jack for listening to music, there is a "line out" jack for connecting the Jukebox to a stereo or television - again with the yellow, red and white plugs - for playing back audio and video. RCA promises a free software upgrade soon that will extend battery life to 12 hours for audio playback, by turning off the power-intensive color screen. __________________________________ Do you Yahoo!? Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus 8138 From: Does it matter Date: Tue Jan 6, 2004 11:33am Subject: Re: Portable MP3 Players Brian, Not every device leaves a registry entry. In fact lots of the thumb drives/usb key chain drives don't leave any remnants of being there. Good advice on the disable of the usb. --- In TSCM-L@yahoogroups.com, "Brian Varine" wrote: > There is a way to lock out the USB ports on 2000/2003/XP. We did this at my > last company and DoD does it as well. I'm not sure which setting you need to > tweak but it can be done. I can look it up if someone is really interested. > One other interesting feature is that every device that gets connected to > the machine leaves a registry entry. When performing a forensic analysis you > can see what they've attached. Unfortunately it doesn't tell you what > they've transferred. > > Brian 8139 From: Mitch D Date: Thu Jan 8, 2004 5:15pm Subject: Landlord goes to trial for placing illegal wiretap/cam Alleged snooping landlord in pretrial conference Gary Alan Rubio By Jeanine Gore--Half Moon Bay Review The El Granada landlord accused of installing a video camera behind his tenant's bathroom mirror and tapping her telephone line will meet in closed session Thursday with the judge and prosecution to determine whether his case will move to trial. According to Deputy District Attorney Steve Wagstaffe, the Superior Court Review hearing is an opportunity for both the defense and prosecution to hear what sort of sentence Judge Craig Parsons plans to impose on Gary Alan Rubio, if convicted. Then Rubio will have a chance to re-enter his plea, said Wagstaffe. "It's like a pretrial conference," he said. Wagstaffe said Superior Court Reviews are occasionally used as a way to resolve "non-violent" felony cases before trial. But, he said, avoiding trial is unlikely for Rubio because of the unusual nature of his case. "This case is a little different," Wagstaffe said. "Something tells me this one won't be that easy to resolve." Rubio, an electrical engineer, was arrested Oct. 5 at his El Granada home. Police charged him with two misdemeanor counts for trespassing and invasion of privacy and one felony charge for installing an unauthorized wiretap. At his arraignment Nov. 10 he pleaded not guilty. If the case proceeds, the next step is a preliminary hearing and then trial. If convicted, Rubio faces up to three years in state prison for the wiretap, six months in county jail for invasion of privacy, and six months in county jail for trespassing. Wagstaffe said the DA's office is confident it has a "strong" case against Rubio. "We feel the evidence is strong enough that the jury will convict him," said Wagstaffe. Loretta Rhodes, the alleged victim, said she plans to bring a $1 million civil suit against her landlord following his criminal trial. Rhodes discovered the mini-camera Oct. 5 with the help of Sheriff's deputies, who later found evidence of a wiretap beneath the home. Neither Rhodes' attorney, Jim Lassart of San Francisco, nor Rubio's attorney, Stephen Defilippis of San Jose, could be reached for comment on the case. http://www.hmbreview.com/articles/2004/01/07/news/local_news/story3.txt __________________________________ Do you Yahoo!? Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus 8140 From: James M. Atkinson Date: Fri Jan 9, 2004 7:21pm Subject: MARTIAN AIR FORCE DENIES STORIES OF UFO CRASH MARTIAN AIR FORCE DENIES STORIES OF UFO CRASH Gusev Crater (MPI) - A spokesthing for Mars Air Force denounced as false rumors that an alien space craft crashed in the desert, outside of Ares Vallis on Saturday. Appearing at a press conference today, General Rgrmrmy The Lesser stated that "the object was, in fact, a harmless high-altitude weather balloon, not an alien spacecraft". The story broke late Saturday night when a major stationed at nearby Ares Vallis Air Force Base contacted the Gusev Crater Daily Record with a story about a strange, balloon-shaped object which allegedly came down in the nearby desert, "bouncing" several times before coming to a stop, and "deflating in a sudden explosion of alien gases." Minutes later, General Rgrmrmy The Lesser contacted the Daily Record telepathically to contradict the earlier report. General Rgrmrmy The Lesser stated that hysterical stories of a detachable vehicle roaming across the Martian desert were blatant fiction, provoked by incidences involving swamp gas. But the general public has been slow to accept the Air Force's explanation of recent events, preferring to speculate on the "other-worldly" nature of the crash debris. Conspiracy theorists have condemned Rgrmrmy's statements as evidence of "an obvious government cover-up," pointing out that Mars has no swamps. They point to the release of secret government memos detailing attempts to discredit reports of the landings by alien space craft. The memos discuss stategies to avoid troubles similar to those caused by the War of the Worlds radio program of years ago. The program, which featured a sensational story of gigantic oxygen breathing two-eyed invaders from Earth, sparked planet wide panic. Local residents like Driv Rhodo, who lives in the area of the alleged landings, are even more sceptical. "I seen it with my own 5 eyes" claimed Rhodo last week. "I've lived here over 300 years, most of my adult life-form. Them things used to be few and far between but lately they come in every few years or so. The government wants to bury the truth but I can tell you what's real. The Earthlings are going to invade and the government is spending our hard earned tax dollars on press releases and denials instead of preparing for the battle to come." A spokesthing denied any government involvement in the disappearance of Rhodo, who has not been seen since shortly after the interview, claiming "Any sentient being knows that a planet with the concentrations of water and oxygen found on Earth is a deadly and inhospitable environment for the formation of life, much less intelligent life. The fear and consternation caused by the unfounded and wild speculations of citizens like Rhodo are a traitorous disservice to the citizens of Mars." ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8141 From: James M. Atkinson Date: Sat Jan 10, 2004 10:09am Subject: Florida judge sues women who accused him of spying http://www.montereyherald.com/mld/montereyherald/news/7670050.htm Posted on Fri, Jan. 09, 2004 Florida judge sues women who accused him of spying By KEVIN HOWE khowe@m... A Florida judge who was once charged with peeping and prowling in a case involving a Maryland mother and her daughter at a Carmel motel has filed a malicious-prosecution lawsuit against the two women. Charles Weaver Cope, 54, a judge on the Pinellas-Pasco Counties Circuit Court, served the Monterey County Superior Court lawsuit this week on veterinarian Lisa Jeanes, 33, and her mother, physician Nina Jeanes, both of Maryland. "I'm pretty scared," Lisa Jeanes said Thursday. "The whole thing's a horrifying experience. I was hoping it was over. I'm pretty shocked and disheartened to hear about this. I really want it to be over with for good." Being served with the suit, she added, was "Very much a surprise. I thought the whole thing was over with." Though the prowling and peeping charges were eventually reduced to public drunkenness, Cope was formally reprimanded by Florida judicial authorities as a result of the Carmel incident. Adding to his troubles, the November issue of Readers Digest cited the Carmel case while listing him as one of three recipients of its "Broken Gavel Award" given to "sleazy, corrupt or abusive" judges. "From what I know of the case, the lawsuit won't survive long," said John Mills, the lawyer who prosecuted Cope in Florida for the Judicial Qualifications Commission, a watchdog of judicial behavior. "What I've said all along is that the way Judge Cope has handled the allegations against him has done much more harm to the judiciary than any of the conduct he was charged with." Cope was arrested in April 2001 after the Jeaneses complained to Carmel police that he had tried to enter their hotel room with a stolen key. Cope had met the women earlier when all three were intoxicated, police said. They were vacationing in Carmel and he was attending a judicial conference. Monterey County prosecutors initially charged him with misdemeanor counts of peeping and prowling. The criminal case against him ended in a plea bargain in August 2002, when Cope entered a written no-contest plea of public drunkenness. Five other misdemeanor charges were dropped. Cope was ordered to pay a $1,000 fine and donate $5,000 to charity. He was credited for 28 days served in a Florida residential alcohol treatment center in September 2001, said Lisa Poll, a Monterey County deputy district attorney. The case caused a stir in Florida, where Cope was tried before Florida's Judicial Qualifications Commission in June 2002. According to reports in the St. Petersburg Times, Lisa Jeanes testified that Cope introduced himself by offering to help her in a time of emotional distress. She testified that he then made unwanted sexual advances on the beach and later tried to enter her room. Cope's Florida attorney countered that she was lying to cover up an amorous encounter with the judge. The Florida panel found Cope guilty of public drunkenness and inappropriate behavior but dismissed several other charges. Last August the Florida Supreme Court publicly reprimanded Cope for his behavior, but he remains on the bench. Cope's suit alleges that the women's allegations against him "were without probable cause, were malicious, and made for an improper purpose" and that "all charges against plaintiff (Cope) were favorably terminated in his favor." Prosecutor Poll commented at the time Cope entered his no-contest plea that her office believed the women's account of what went on in Carmel, and that the other misdemeanor charges -- prowling, peeping, aggravated trespassing, petty theft, and battery -- were not dropped for lack of evidence. "We discussed the resolution with (Lisa Jeanes) extensively and with her agreement decided not to put her through the hardship of a trial," Poll said. Prosecutors also felt that bringing in witnesses from Virginia, Maryland, and Florida would be too difficult for them and too costly for local taxpayers, Poll said. Cope's suit alleges that the accusations caused him economic harm and asks for actual and punitive damages in excess of $25,000. Lisa Jeanes said she is working on finding an attorney to respond to the suit within the required 30 days. The suit was filed Aug. 4 but was not formally served on the women until this week because Cope's attorney, Charles Warner of Monterey, had been waiting for legal documents from Florida. Kevin Howe can be reached at 646-4416. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8142 From: James M. Atkinson Date: Sat Jan 10, 2004 1:24pm Subject: It's a fitting tribute. I would invite list members to check out the following: http://madblast.com/funflash/swf/theUSA.swf It's a fitting tribute. -jma ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8143 From: Date: Sat Jan 10, 2004 5:38pm Subject: pinhole camera attached to ATM was transmitting PIN numbers to van Article published January 10, 2004 ATM thief on probation Paul Raymore Valentin Raducan, 31, pleaded no contest to one charge of fraudulent use of an access card, a misdemeanor, in Nevada County Superior Court Nov. 18. Raducan had initially been charged with two other felony counts, including concealing, selling or withholding stolen property and burglary; however, both of these charges were dismissed. Raducan received three years of conditional probation for his plea (the equivalent of pleading guilty) in addition to 20 days' jail time and a fine of $708.78. Other conditions of his probation: He is required to submit to search and seizure, he is forbidden to possess any access cards such as credit cards and ATM cards unless they have been issued to him, and he is forbidden to possess electronic surveillance equipment. The defendant also agreed to pay restitution, although that amount had not yet been determined. After Raducan's arrest in early November, agents with the FBI were looking into whether Raducan might have ties to an organized crime ring linked to similar activities nationwide. After further investigation, the bureau decided that there was not enough evidence to pursue charges other than those he faced in the state of California. Raducan was arrested Nov. 5 in Truckee after local police noticed him talking with another man on a two-way radio in the vicinity of the U.S. Bank branch on Donner Pass Road. A silver van was parked nearby with the motor running and nobody inside. Inside the van, officers found a laptop computer, a suitcase and a new coffee maker that had recently been purchased from Starbucks Coffee. Further investigation revealed that Raducan had purchased more than $1,100 worth of coffee equipment from Starbucks, using two credit cards that had been reported stolen in the North Lake Tahoe area earlier that day. Officers also found a pinhole camera attached to the U.S. Bank ATM machine, which they believe was transmitting PIN numbers of potential victims to the laptop inside the van. [Non-text portions of this message have been removed] 8144 From: Date: Sat Jan 10, 2004 9:36pm Subject: "They were called 'shorties,'" a term he learned from wiretap surveillance Hints and hunches lead to an ID theft ring and an elusive suspect What began in Hudson County as simple bank-fraud case has mushroomed Sunday, January 11, 203 BY TED SHERMAN Star-Ledger Staff Some knew him as Sug, short for Sugar. Others called him Sabor. He was sued under the name Kendall Dailey and indicted as Annur Hamilton. He had an address in Newark, could be found in Baltimore, was living in a Springfield townhouse, and had an apartment in Hamilton Township outside Trenton. From Our Advertiser The credit card in his wallet was in the name of Barnum. He was arraigned last week on a 31-count indictment in Hudson County, where he now sits in jail on $2.5 million bail. His lawyer says he is the victim of mistaken identity. This is a story of how the man of many names came to be arrested in the parking lot of a Dunkin' Donuts in Plainfield. He is accused of heading a multimillion-dollar identity theft ring that used 29 people and a multitude of fake names to clear out bank accounts across the state. Investigators are still trying to unravel the scheme, which first came to light last year. They say it involved a nurse who provided names of terminally ill patients; several bank employees who supplied account numbers of their customers; state motor vehicle agents who provided bogus licenses; a Newark print shop that made phony documents; and a mortgage broker and real estate appraisers who falsified the value of houses that were bought and sold in the names of people whose identities were stolen. Were it not for a detective's hunch and a car -- a $68,500 silver-gray BMW 745i, registered to a sham address -- an arrest may never have been made in the case, law enforcement officials say. THE HOT WHITE-COLLAR CRIME Identity theft targeted nearly 10 million people last year at a cost of $5 billion to the victims and nearly $48 billion to business and financial institutions, the Federal Trade Commission estimates. It is a relatively easy fraud to commit. Personal and credit data are available to just about anyone. Online or telephone transactions require virtually no human contact. Many victims do not know they have been targeted until their money is gone. The ease of changing identities makes it hard for law enforcement to track suspects. "You are dealing with a phantom, basically, and that makes it more difficult," explained Joel S. Lisker, a former FBI special agent who is senior vice chairman of Dudinsky, Lisker and Associates, a Washington, D.C., consulting and lobbying firm. At the same time, identity theft is not a high priority for most law enforcement agencies, notes Robert D. McCrie, an expert in security management at John Jay College of Criminal Justice in New York. "That's why it's the most rapidly growing white-collar crime in the country," he said. Fraud artists who engage in identity theft typically fragment their activities so if someone does start an investigation, the crime will seem of little significance, McCrie pointed out. That was how it began for Hudson County Prosecutor Edward J. De Fazio. When representatives of the Provident Bank of New Jersey, based in Jersey City, came in one day last year to report apparent tampering with several customer accounts, he thought he had a simple fraud case on his hands, he recalled. The accounts had been converted illegally to make them Internet-accessible, enabling checks to be cut electronically and then mailed out. Provident Bank officials declined to explain how that could happen, but noted none of their customers lost money. The prosecutor said money was streaming out of the accounts. "The checks were being made out to various names and apparent businesses, at $8,000 to $9,000 at a clip, but not in even amounts," he said. "Initially we weren't sure what it was all about, but we saw they were going to a Mailboxes Etc. box in South Orange, so we knew we were on to something." The checks were made out to people and businesses that never saw the money -- all identity theft victims. One check for $7,914.30 was made out to a man with cerebral palsy who was a client of Cerebral Palsy of Essex and West Hudson in Belleville, but the check was mailed to the South Orange address. Later on, his name would turn up on several fraudulent real estate transactions. Investigators found a list of other people with cerebral palsy during a search of one suspect's apartment. Officials at the social service agency declined to comment on the matter. No arrests have been made of anyone connected with the center. In the beginning, De Fazio said, there was no paper trail beyond the identity theft victims, and the amounts of money involved were not particularly large. Many of the transactions stretched far beyond Hudson County. Investigators began recording similar transactions -- some linked by the same names -- in a series of thick, black, three-ring binders that now completely fill a bookcase in the sixth-floor office of the prosecutor. What emerged, said Sgt. Thomas Cooney, a member of the special investigations unit, was the discovery that a small network of operatives, most of them women with forged identification, was being used to cash checks on accounts in banks all over New Jersey -- including Provident, Fleet Bank, Sovereign Bank, PNC Bank and the former First Union. "They were called 'shorties,'" Cooney said of the women, a term he learned from later wiretap surveillance. "Some were paid as much as $1,000 per transaction. They would be dropped off and told if there were any problems, to leave the ID and just walk out." SARA MEETS SABOR Sara Henry had a good job. The 28-year-old registered nurse from Lindenwold in Camden County was employed by Cross Country TravCorps, the nation's largest medical staffing firm. She was living in Philadelphia while on assignment at Frankford Hospital, a small critical-care facility in the Northeast section of the city. In February, she went with a girlfriend to Atlanta for the annual NBA All-Star Game -- a glittery all-weekend extravaganza of flashing lights, thumping music and entertainment by Mariah Carey, as Michael Jordan battled it out on the floor of the Philips Arena with Kobe Bryant and Yao Ming. It was there that Henry met her friend's ex-boyfriend and his cousin, who was introduced to her as Sabor, a young man who tooled around in a high-performance BMW sedan. A transcript of Henry's interview with detectives, part of the public record in the state's case to revoke her New Jersey nursing license, outlines how her involvement began. Henry said she started dating Sabor when she got back home. She quickly learned he went by other names. Once, while they were at dinner, he paid for the meal by pulling out a credit card in the name of Barnum. "Did he ever explain to you who Mr. Barnum was?" Henry was asked. "No," she said. The conversation with her new boyfriend eventually turned to the subject of people who might not worry if their names were borrowed. "He said since you're a nurse, that you could get me into people that were maybe gonna be sick for a while; weren't gonna be checking their mail; somebody that may be dying or didn't have any family," she told investigators. "And he said I could take the names. All I would need is a name and a birthdate." No one would be hurt, she said he told her. "He said that he would take a name from someone; sometimes it was his friend's relatives or other people and he would take their names and put them into a mortgage and then, about a year later, they would reappraise the house for more than what they bought it for and they would sell it and then everyone would get money," Henry said. "The person whose name it was in, the loan would be paid off and then their credit would ... be higher." He suggested she could get 20 percent of any profits. She eventually gave him three names -- all gravely ill patients at Frankford Hospital. One was on life support. Two others were terminal, including a man with lung cancer. THE HUNCH Tom Cooney, the Hudson County investigator, felt as if he was tracking a ghost. He had a list of dummy accounts, reams of ATM activity, fraudulent credit cards, and he began to figure someone was at the center of a growing scheme. His suspect did not have a name. No one knew what the suspect looked like. Still, it wasn't exactly as if the guy was lying low. Cooney's gut told him his target was driving a silver-gray BMW 745i that had been leased and registered to one of the fake names and addresses in the binders. No one was making payments on the sedan. Cooney had only the license plate -- a hook he could not reel in without blowing the whole investigation. He didn't want to arrest the driver right away, not if he wanted any chance of unraveling what increasingly appeared to be a sophisticated fraud ring. In an effort to follow the vehicle and the driver, Cooney began trying to trace transactions on credit cards tied to some of his identity theft victims. As cops have for decades, he stuck pins onto a map to determine where money was being spent. Purchases clustered around Route 22, east of Mountainside, in Union County. "There were places he frequented. Restaurants, gas stations, stores," Cooney recounted. "So we staked out the highway, hoping he would drive down one morning." An undercover unit would be ready to roll off the center island of the east-west state highway and begin tailing the silver-gray BMW. It was a shot in the dark, Cooney readily conceded. As he sat there one morning, staking out the crawling, rush-hour traffic, Cooney glumly realized just how many high-end BMWs are out there. And it might well have ended there, a search for the veritable needle in a haystack, when Cooney spotted the familiar BMW logo atop a Springfield car dealership and played a hunch. Cooney decided he had nothing to lose by talking to the service manager. Maybe the manager had seen the car. "We hit pay dirt. It was just plain luck," he said, smiling as he retold the story. Employees at JMK BMW on Route 22 did remember the car and the driver. "We knew him," said a service adviser. "He came in a few times. We gave him a ride home." The address they had was a townhouse complex on the other side of the highway in Springfield. Two other cars leased under false names turned out to be parked there as well -- a Lincoln Navigator SUV and another BMW. Six weeks later, the prosecutor's office obtained a court order to wiretap cell phones. "We knew there were more people involved. We wanted to see who they were," explained De Fazio. CALLING THE BANKS Cooney still was not sure of the name of the suspect, but he concluded the driver of the BMW was the likely boss of the operation. Investigators in the Hudson County Prosecutor's Office said their cell phone surveillance showed calls to the toll-free numbers of several banks, one after another, to obtain account balances on specific customers. The accounts would then be drained. Lt. Timothy Griffin, commander of the special investigations unit, said: "We knew what they were doing, but not where or when." More surprising to investigators were some calls that led to bank employees. At least two bank employees would be charged with feeding account information about customers to the ring. It was not just bank accounts being looted. At the same time, more cars were being leased under assumed names and disappearing, including a Hummer H2, Mercedes-Benzes, Land Rovers and Jaguars. Authorities told a Randolph schoolteacher, Judy Moore, that several luxury cars had been purchased in her name. "For a couple of months, I was the owner of a Mercedes and a Hummer," Moore recalled later. "We would drive down the highway and see one and say, 'Is that one mine?'" Moore's savings account was raided as well -- a money market account that she had never written a check against. "There was nothing I could have done about it," she said. "The money was gone before I knew it." She did not learn of the fraud until she received a call from the prosecutor's office. Moore is not sure why her account and name were targeted, but an employee of Fleet Bank, identified by prosecutors as Shamia Nichole Jones, 24, of Orange, was later indicted. Fleet Bank quickly restored all of the stolen funds, Moore said. Luxury houses also were being purchased, and second mortgages were providing cash to the buyers through fraudulently inflated appraisals, said De Fazio. In one case, a newly built $895,000 beachfront house in Brigantine was bought, and a second $125,000 mortgage was taken out against an inflated value provided by an appraiser allegedly in on the plan. The real estate scheme extended throughout the state. When De Fazio's investigators swooped in, the group was negotiating to buy a $2.6 million house on Chelsea Drive in Livington, De Fazio said. THE MVC LINK Henry had a girlfriend who worked at the New Jersey Motor Vehicle Commission's Mount Holly agency. The woman, Sheilina Moore, could provide registration documents on vehicles with no questions asked, Henry told detectives. Sabor wanted to meet Sheilina Moore. He had a black 2003 Hummer H2, and Moore would provide documentation in the name of Terry C. Moore. Sabor told Henry that Terry Moore was a relative of his. "For doing this for Sabor, was she paid anything?" investigators asked. "Two thousand dollars," replied Henry. "I put it under the mat of her car she left unlocked in the back." Sheilina Moore was arrested in November by the FBI, accused of participating in a separate ring dealing in driver's licenses on the black market. Moore also got Sabor a driver's license, Henry said. She remembered the last name on the license was Hamilton. THE CRACKDOWN He was a man with many names. After hours of surveillance tapes, they knew him as "Sug." They knew he used the name Jamal Barnum. And they knew him as Annur Hamilton. "We weren't quite sure what his name was until we arrested him," said Cooney. As investigators got closer, the man with many names began to get nervous. He told his girlfriend people were following him. "He called me and said that the FBI were following him and his baby's mother," Henry told detectives. "He said that they didn't have anything on him." It was June, and De Fazio decided he had enough to move in. With 25 search warrants and an army of police and agents from the FBI, authorities made more than 20 arrests and seized cars, documents and computers across New Jersey. According to a search warrant report, authorities found keys to a BMW and Jaguar in Henry's apartment, along with computer equipment, digital cameras and lamination devices that investigators said were used to create phony licenses and ID. Photos of women Cooney identified as operatives in the scheme were found on the computer disk drive. Also discovered were automobile registration certificates for Jamal Barnum, blank New Jersey birth certificates with raised seals from the Township of Livingston and the city of Newark, and bank and brokerage account statements for several potential identity-theft victims, according to the report. Cooney arrested the man with many names outside a Dunkin' Donuts in Plainfield. He was booked as Annur Hamilton, 30, of Hamilton Township. Henry would later identify him from a photograph as the man she knew as Sabor. "He was really in shock," said Cooney, remembering the scene as the man was brought down to Jersey City to be booked. He was sitting there, Cooney said, and more than 20 of "his closest friends show up" to be fingerprinted and photographed. Last week, 23 men and women named in a 31-count indictment were arraigned in Hudson County on charges of conspiracy, theft by deception, identity theft, financial facilitation of criminal activity, possession of motor vehicles with altered identification numbers, and receiving stolen property, said Assistant Prosecutor Mary Ellen Gaffney, who is handling the case. Five others still have not been apprehended. Sara Henry, who had no prior criminal record, pleaded guilty Monday to a downgraded charge of conspiracy to commit fraud -- a third-degree crime that could mean no jail time when she is sentenced. She will be expected to testify as a prosecution witness, Gaffney said. Henry's lawyer, Ron Helmer of Haddon Heights, said his client received nothing for her participation in the scheme. The man with many names sits in the Hudson County jail, on $2.5 million bail. According to Cooney, he was charged with forgery in Union County in 1998 under the name of Kendall Dailey. There is a tax lien against him under several names in Essex County, records show, and a string of different addresses under the name of Hamilton. His attorney, Elise DiNardo of Jersey City, says authorities have the wrong man. "He has a college degree. His father is a physician," said the attorney. "They are alleging he's the mastermind of this organization, but I don't see how that's possible." According to DiNardo, Hamilton buys distressed houses in foreclosure, restores them and resells them for a living. DiNardo said the state has been very vague as to what proof it has, and her client did not know any of the co-defendants in the case. "Mr. Hamilton lives a modest life," she said. Cooney is convinced otherwise. "This," he said, "is a case of people where every instance of their lives -- from the time they got up in the morning until they went to bed at night -- was a fraud." Copyright 2004 NJ.com. All Rights Reserved. [Non-text portions of this message have been removed] 8145 From: Date: Sun Jan 11, 2004 1:23am Subject: Al Qaeda hunt follows old tracks -*Al Qaeda hunt follows old tracks Sat January 10, 2004 09:41 PM ET By Simon Cameron-Moore ANGOR ADDA, Pakistan (Reuters) - U.S. troops on the Afghan side of the border have two simple rules to follow: don't cross over, and radio the Pakistan army first before shooting at any suspected al Qaeda militant spotted over there.T The Pakistani general pointed across the dusty plain on the other side of the frontier from the village of Angor Adda, his finger following a jeep hurtling towards the U.S. base of Shikin a few miles to the north in the Afghan province of Paktia. "The camp is there, see that patch of white?" General Shaukat Sultan said, indicating a faintly visible compound near the foot of a range of ochre and grey hills. Everything in South Waziristan, a tribal area in Pakistan's North West Frontier Province has the same two-tone hue, from the high serrated ridges and rocky slopes of the mountains to the dried out riverbeds and mud walls of its isolated settlements. "Over there," he said sweeping round to another range of hills to the west, "is where our troops killed eight al Qaeda and captured 18 two months ago. "That encounter was billed as a demonstration of the Pakistan army's commitment to the U.S. led "war on terror". Two soldiers were killed. A month later a couple more al Qaeda men were gunned down in the same area. Just last week, the Pakistani army launched another operation against suspected Islamic militants in South Waziristan involving troops and helicopters. The army entered the semi-autonomous tribal areas for the first time in mid-2002 to seal the borders against fugitive al Qaeda and Taliban fighters. President Pervez Musharraf told Reuters just days after the first of two assassination attempts on him in December that the last time Pakistan had any substantial clue al Qaeda kingpin Osama bin Laden or his deputy Ayman al Zawahri were in Pakistan was nearly nine months ago. Electronic surveillance, possibly from one of the U.S.-manned listening posts in the tribal areas, put one of them in Waziristan -- but subsequent searches yielded nothing. BYWORD FOR MILITANCY Waziristan is ideal for any seasoned guerrilla fighter, like bin Laden and al Zawahri, to lie low. The region is redolent with conflict and intrigue. The British military intelligence officer T.E. Lawrence, better known as "Lawrence of Arabia", was in Waziristan in 1928 -- when the Raj was unhappy with a troublesome king in Kabul. For more than 150 years the mountain caves of the North West Frontier provided hiding for holy war warriors, or mujahideen, who India's British colonial rulers dubbed "Hindustani Fanatics". Like bin Laden, they were followers of the strict fundamentalist Wahabi sect of Islam that spread out of Arabia to the Indian sub-continent in the early 19th Century. Their running battles with the British lasted over a century. "We found the ashes of his fire still warm in his cave but he had flown. Our informer as usual informed both ways." Jack Lowis, the British Political Agent for South Waziristan, wrote those words 60 years ago about the hunt for the Faqir of Ipi, a Muslim holy man whose fighters took on the British Raj. The Faqir was never caught, but he represents more than just a historical parallel. His son was reportedly a brother-in-arms of bin Laden, fighting with the mujahideen who drove the Red Army out of Afghanistan in the 1980s. FRIEND OR FOE Pakistan says it has captured more than 500 al Qaeda suspects so far, but its army has suffered casualties in the hunt. At another village in South Waziristan 10 troops and two al Qaeda members were killed in a clash last June. But still, U.S. servicemen carry tales back to reporters in Kabul of Taliban militia slipping over the border for sanctuary in Pakistan, unhindered by watching Pakistani troops. General Sultan bristled with indignation: "There is no question of anyone in the Pakistan army assisting the enemy. They owe their loyalty to the flag, not to any individuals. "Pakistan's forces are full of Pashtuns. And the Taliban, an Islamic student militia that emerged less than two decades ago, is also largely Pashtun. While many tribesmen dislike the Taliban for preaching ways that go against traditional Pashtun culture, local leaders say the ethnic ties mean sympathies for the Taliban are there. To add to the complications of making out friend from foe on the border, a string of friendly fire incidents between U.S. and Pakistani forces highlighted a communication gap. On New Year's Eve last year, a U.S. F-16 warplane dropped a bomb on a madrassa near Angor Adda killing two Pakistani troopsafter an exchange of fire in which a U.S. soldier also died. In August, U.S. forces shot dead two Pakistani soldiers in another "friendly fire" incident in Waziristan -- this time provoking a protest from Musharraf. Procedures have been tightened since. U.S. officers from the Shikin base regularly meet their counterparts in Angor Adda, and keep them informed by radio. Pakistani officers say the U.S. troops are also required to alert them first before firing across the border to avoid return fire. STATUS SYMBOLS Bullets fly regularly in Waziristan even without the two friendly armies' crossfire. The tribes have a gun culture that makes Detroit appear tame. "People really do own heavy arms -- rocket and grenade launchers, sometimes even (shoulder-fired) stinger missiles," Sikander Hayat Khan Sherpao, an opposition lawmaker in Peshawar, a city at the southern end of the Khyber Pass. Olaf Caroe, the last British Governor-General on the Frontier and an authority on Pashtun tribes, compared to the Wazir to a panther and the region's other main clan, the Mahsud, to a wolf. He wrote: "The wolf pack is more purposeful, more united and more dangerous. "Angor Adda is in Mahsud territory. As an army patrol passed by, two Mahsud youths lounged around a Frontier Force checkpoint in the village as if they owned it. The Kalashnikovs cradled in their arms gave them the right to act that way, just as the Martini-Henry rifles and the long-barrelled jezails of their forefathers did in bygone eras. A Pakistan army colonel nodded sagely: "This is a very dangerous place. Every child has a gun." [Non-text portions of this message have been removed] 8146 From: James M. Atkinson Date: Sun Jan 11, 2004 10:48am Subject: Thieves plant spy cameras in Hong Kong cashpoint machines http://www.khaleejtimes.com/DisplayArticle.asp?xfile=data/theworld/2004/January/theworld_January165.xml§ion=theworld&col= Thieves plant spy cameras in Hong Kong cashpoint machines (DPA) 8 January 2004 HONG KONG - Pinhole spy cameras capable of filming people tapping in their PIN numbers have been found hidden in two bank cashpoint machines in Hong Kong, a news report said on Thursday. The cameras - discovered in two machines outside a Hang Seng Bank branch - could transmit images to a remote receiver, according to the South China Morning Post. Hundreds of customers who used the cashpoint machines have now been contacted for their cards to be cancelled although no thefts from accounts had been reported, the newspaper said. Similar hidden cameras have been found fitted into cashpoint machines in mainland China and Malaysia but the discovery at the Hang Seng Bank is the first of its kind in Hong Kong. A Hang Seng Bank spokeswoman refused to tell the newspaper where and how the spy cameras had been fitted into the cashpoint machine cubicles. It is believed thieves may have intended to use the information to empty bank accounts after stealing cashpoint cards from customers following their visits. Alternatively, duplicate cards could be produced so that thieves could then use the PIN numbers to access the accounts of customers they have photographed. Less than 50 reports of thefts involving cashpoint machine transactions were reported in Hong Kong last year, police said. However, only three months ago, Hong Kong Monetary Authority officials advised banks to step up cashpoint machine security amid fears of sophisticated new theft attempts. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8147 From: Does it matter Date: Thu Jan 8, 2004 1:55pm Subject: Wiretaps, Feds, voip Hope this interests people. Darren The agencies have asked the Federal Communications Commission to order companies offering voice over Internet Protocol (VoIP) service to rewire their networks to guarantee police the ability to eavesdrop on subscribers' conversations. Without such mandatory rules, the two agencies predicted in a letter to the FCC last month that "criminals, terrorists, and spies (could) use VoIP services to avoid lawfully authorized surveillance." The letter also was signed by the Drug Enforcement Administration. This is not the first time the Bush administration has expressed concern about terrorists and other lawbreakers using VoIP to evade wiretaps. As previously reported by CNET News.com, a proposal presented quietly to the FCC in July sought guaranteed surveillance access to broadband providers. But the latest submission, which follows a recent FCC forum on Internet telephony, is more detailed than before and specifically targets VoIP providers as a regulatory focus. In general, VoIP providers have pledged to work with police, and some, like Level 3 Communications, do not oppose the regulations the FBI is seeking. Others, like a coalition of 12 smaller VoIP providers including BullDog Teleworks and PingTone Communications, have told the FCC that "there are various industry initatives under way and the commission should allow those initiatives time to succeed before preemptively regulating." Federal and local police rely heavily on wiretaps. In 2002, the most recent year for which information is available, police intercepted nearly 2.2 million conversations with court approval, according to the Administrative Office of the U.S. Courts. Wiretaps for that year cost taxpayers $69.5 million, and approximately 80 percent were related to drug investigations. Those statistics do not include approximately the same number of additional wiretaps authorized by the Foreign Intelligence Surveillance Act. When weighing the FBI's request, the FCC will have to decide whether a 1994 law called the Communications Assistance for Law Enforcement Act (CALEA) applies to VoIP providers. The law is ambiguous. It clearly requires "telecommunications carriers" to provide ready wiretapping access while explicitly exempting "information services." If the FCC decides CALEA does not apply, the debate would shift to Congress, which could decide to amend the law. When Internet links are used to carry voice calls that begin and end in the traditional, circuit-switched network--a move that Verizon Communications announced Wednesday--that would easily fall within CALEA's existing definitions. But Internet-to-Internet voice links like those offered by VoIP companies Vonage and Skype are closer to information services and fall into a regulatory gray area. The status of voice conversations carried through instant-messaging programs is even more unclear, as is the FCC's ability to compel overseas VoIP providers to comply with U.S. rules. "The FCC should ignore pleas about national security and sophisticated criminals because sophisticated parties will use noncompliant VoIP, available open source and offshore," said Jim Harper of Privacilla.org, a privacy advocacy Web site. "CALEA for VoIP will only be good for busting small-time bookies, small-time potheads and other nincompoops." One unusual section of the FBI letter is that it claims the bureau is seeking to protect Americans' privacy rights: "Mandatory CALEA compliance by VoIP providers would better protect the privacy of VoIP users than a voluntary approach. CALEA protects the privacy of surveillance suspects by requiring carriers to provision the surveillance in a confidential manner." Otherwise, the FBI argues, a VoIP company might turn over a "full pipe" to police that would include conversations of more people than necessary. At least one FCC commissioner has expressed strong support for sweeping VoIP into CALEA's requirements, which currently apply only to telephone companies. "We must understand the concerns raised by DOJ and FBI that classifying Vonage's VoIP as an information service severely undercuts CALEA," Jonathan Adelstein said last month. "VoIP jeopardizes the ability of federal, state and local governments to protect public safety and national security against domestic and foreign threats. Public safety is not negotiable." 8148 From: Brian Varine Date: Fri Jan 9, 2004 1:23pm Subject: Wireless transmitter intrusions This is pretty comical: http://www.ananova.com/news/story/sm_853744.html?menu=news.latestheadlines Burger King customers told: 'You are too fat to have a Whopper' Police believe teenage pranksters are hacking into the wireless frequency of a US Burger King drive-through speaker to tell potential customers they are too fat for fast food. Policeman Gerry Scherlink said the pranksters told one customer who had just placed an order: "You don't need a couple of Whoppers. You are too fat. Pull ahead." The offenders are reportedly tapping into the wireless frequency at the restaurant in Troy, Michigan. Police believe the culprits are watching and broadcasting from close range. Officer Scherlinck said the men are telling customers who order a Coca-Cola that, "We don't have Coke." And when the customer asks what they do have, the hacker would say: "We don't have anything. Pull ahead." But what has managers concerned is the profanity the hackers are using, according to police. A drive-through customer has told police if he had children with him in the car and someone used profanity, he would have been upset. Burger King franchise owner Tony Versace issued the following statement in response to the incidents: "We apologise to our customers who've been insulted by the use of this drive-through speaker." Management at the fast-food restaurant are reportedly trying to change the radio frequency used for the speakers, reports Local 4. 8149 From: James M. Atkinson Date: Mon Jan 12, 2004 11:49am Subject: The Charge of the Light Brigade The Charge of the Light Brigade by Alfred Tennyson. -------------------------------------------------------------------------------- Half a league, half a league, Half a league onward, All in the valley of Death Rode the six hundred. "Forward the Light Brigade! Charge for the guns!" he said. Into the valley of Death Rode the six hundred. Forward, the Light Brigade!" Was there a man dismay'd? Not tho' the soldier knew Some one had blunder'd. Theirs not to make reply, Theirs not to reason why, Theirs but to do and die. Into the valley of Death Rode the six hundred. Cannon to right of them, Cannon to left of them, Cannon in front of them Volley'd and thunder'd; Storm'd at with shot and shell, Boldly they rode and well, Into the jaws of Death, Into the mouth of hell Rode the six hundred. Flash'd all their sabres bare, Flash'd as they turn'd in air Sabring the gunners there, Charging an army, while All the world wonder'd. Plunged in the battery-smoke Right thro' the line they broke; Cossack and Russian Reel'd from the sabre-stroke Shatter'd and sunder'd. Then they rode back, but not, Not the six hundred. Cannon to right of them, Cannon to left of them, Cannon behind them Volley'd and thunder'd; Storm'd at with shot and shell, While horse and hero fell, They that had fought so well Came thro' the jaws of Death, Back from the mouth of hell, All that was left of them, Left of six hundred. When can their glory fade? O the wild charge they made! All the world wonder'd. Honor the charge they made! Honor the Light Brigade, Noble six hundred! ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8150 From: Michael Puchol Date: Sun Jan 11, 2004 4:37pm Subject: Re: Wiretaps, Feds, voip Hi, The greatest problem with this is the very old saying "if you outlaw xxxx, then only outlaws will have xxxx" (substitute the xxxx for your favourite weapon, device, algorithm or communications technology). In this case, what is to stop a criminal using an SSH session and tunnel the VoIP over it? It would look like normal, SSH-encrypted traffic to anyone watching the packets fly by, so the wiretap technology would be useless - unless the SSH keys could be obtained by some method, it is unlikely that the conversation could be recovered in a timeframe of use in an investigation. I just hope that most criminals stay as technically illiterate as they are now - read the "I was a hacker for the mob" article in Wired a couple months ago (nov. or dec. issue, can't remember right now), it's rather interesting. Best regards, Mike ----- Original Message ----- From: "Does it matter" To: Sent: Thursday, January 08, 2004 8:55 PM Subject: [TSCM-L] Wiretaps, Feds, voip > Hope this interests people. > > Darren > > > > > > The agencies have asked the Federal Communications Commission to > order companies offering voice over Internet Protocol (VoIP) service > to rewire their networks to guarantee police the ability to > eavesdrop on subscribers' conversations. > > Without such mandatory rules, the two agencies predicted in a letter > to the FCC last month that "criminals, terrorists, and spies (could) > use VoIP services to avoid lawfully authorized surveillance." The > letter also was signed by the Drug Enforcement Administration. > 8151 From: human being Date: Mon Jan 12, 2004 11:25am Subject: 'MRI system for semiconductors' saw this article about an ''MRI system for semiconductors'' and wondered exactly what it meant. apparently it is for quality control for chips, yet it also said their product line was related signal analyzers. how is this different from the gear that TSCM equipment works-- does the analysis of the guts of a computer and its signaling ever get review? or is this a part of the profession not meant for common review? why i ask is because i read something about how a single photon can affect a single transistor (in space, on a satellite for instance) and previously i wondered how a speaker can also be used as a microphone (as is said in basic texts i've read) - thus, could it be that a chip may be looking like a simple IC yet perform some dual-function, making a radio into a transmitter? and would a signal analyzer or oscilloscope or other tools find such a thing? or, then again, is this not realistic to the field, (of inquiry). brian 'MRI system for semiconductors' // signal analyzer? 'Leisz, 50, is founder, president and CEO of Wavecrest Corp., an Eden Prairie manufacturer of equipment that is fast enough and accurate enough to detect flaws in even the fastest of the hyper-speed semiconductors now under development.' ... 'Today, the speed of Wavecrest's products is measured in attoseconds, which is the time it takes light to traverse not a hair, but an atom. Whoops, there's that glaze again.' brian thomas carroll: research-design-development architecture, education, electromagnetism http://www.electronetwork.org/bc/ 8152 From: Nicolas Gregoire Date: Mon Jan 12, 2004 2:13am Subject: Re: Gen Hawleys politically incorrect mssg On Mon, 2004-01-05 at 18:33, Mitch D wrote: > The plain fact is that our country has, with all our > mistakes and blunders, always been and always will be the > greatest beacon of freedom, charity, opportunity, and affection > in history. If you need proof, open all the borders on Earth and > see what happens. OK. So let's forget that USA is/was giving money and/or weapons to the School of Americas, to Ben Laden, to the contras, etc. Have you ever heard about state-terrorism ? Please read some Chomsky books about this and give a real look to real life. -- Nicolas Gregoire 8153 From: Does it matter Date: Mon Jan 12, 2004 6:47pm Subject: I can "see" you aren't telling the truth? This takes the cake. One little gadget debuting at CES claims to put truth detection voice analysis on the bridge of your nose. "Voice Analysis Eyeglasses" provide real-time analysis on the inside of the lenses about whoever is talking at the time, says its maker, the Israeli company Nemesysco, which developed the technology for counterterrorism and government customers. "A chip inside the glasses is able to read the voice frequency of the person you are talking to," said Beata Gutman, a spokeswoman for the company. "The voice is analyzed through that chip and there are lights that indicate whether the person is lying." She said the truth specs were expected to be available at the end of January for $400-$500. 8154 From: Thomas Shaddack Date: Mon Jan 12, 2004 7:38pm Subject: Re: Wiretaps, Feds, voip (fwd) ---------- Forwarded message ---------- Subject: Re: [TSCM-L] Wiretaps, Feds, voip Date: Tue, 13 Jan 2004 01:54:57 +0100 (CET) From: Thomas Shaddack To: Michael Puchol On Sun, 11 Jan 2004, Michael Puchol wrote: > > The greatest problem with this is the very old saying "if you outlaw xxxx, > then only outlaws will have xxxx" (substitute the xxxx for your favourite > weapon, device, algorithm or communications technology). In this case, what > is to stop a criminal using an SSH session and tunnel the VoIP over it? Maybe the difference between TCP and UDP. VoIP is almost exclusively UDP-only, as little dropouts don't matter while latency is much more important. TCP, if available, is usually only a fallback mode. > It would look like normal, SSH-encrypted traffic to anyone watching the > packets fly by, so the wiretap technology would be useless - unless the > SSH keys could be obtained by some method, it is unlikely that the > conversation could be recovered in a timeframe of use in an > investigation. There are other possibilities as well. Any VPN system will do; industrial standard is IPSec, available for all major platforms - built-in in Windows, available for Linux 2.4 kernel at www.freeswan.org and either built-in or as different-named add-ons for other systems. Another VPN implementation that looks secure is OpenVPN , based on OpenSSL and running on Windows 2000/XP and Linux/BSD/Solaris/Mac. Any kind of VoIP can be run through a VPN. The VPN supplies the encryption of the call. There are even VoIP programs with strong crypto support. My favorite one is the old but good SpeakFreely (don't believe the rumours it's dead - all that happened is that the original author/maintainer steps away from the development which moves to Sourceforge), which runs in both various unixes and Windows; the problem there is the key handshake, which has to be performed by an external application (which then in turn can run SF process and feed it with the negotiated session key). Another one often suggested is Skype, but I'd be wary about it as it's closed-source. My favorite way is using SpeakFreely with session keys prenegotiated and physically exchanged on strips of paper and manually entered in every couple days, and call negotiation (when to call, and the IP addresses to use) done over Jabber or ICQ; more sophisticated software for this is under slow, relaxed-pace development. Even a combination of methods is possible. Occassionally one of my ISP's routers dies and I lose access to good part of the Net - I don't see most foreign IPs, but I see the office I have a VPN connection into, so by setting up a proxy (and UDP forwarding) I can regain the connectivity for the price of couple dozens milliseconds. With an "accomplice" (or a hired machine in a colocation) in other country, it's possible - for the cost of few dollars and couple milliseconds - foil (to certain degree) even traffic analysis, using the offshore machine as a "meeting point". For further increase of cost and delay and dropped packets it's possible to chain such machines as well. Personally I am pretty excited about the recent development of tiny computers with low power requirements and capability to run eg. Linux; they have lots of applications, including but not limited to low-cost mobile secure telephone devices. If time and money permit, I would like to try to hack together such toy. > I just hope that most criminals stay as technically illiterate as they > are now - read the "I was a hacker for the mob" article in Wired a > couple months ago (nov. or dec. issue, can't remember right now), it's > rather interesting. The state of technological literacy is atrocious in all segments of society. For some real stories from the trenches check http://www.userfriendly.org/community_techtalesarchive.html > Best regards, > > Mike > > ----- Original Message ----- > From: "Does it matter" > To: > Sent: Thursday, January 08, 2004 8:55 PM > Subject: [TSCM-L] Wiretaps, Feds, voip > > > > Hope this interests people. > > > > Darren > > > > > > > > > > > > The agencies have asked the Federal Communications Commission to > > order companies offering voice over Internet Protocol (VoIP) service > > to rewire their networks to guarantee police the ability to > > eavesdrop on subscribers' conversations. > > > > Without such mandatory rules, the two agencies predicted in a letter > > to the FCC last month that "criminals, terrorists, and spies (could) > > use VoIP services to avoid lawfully authorized surveillance." The > > letter also was signed by the Drug Enforcement Administration. > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8155 From: Date: Mon Jan 12, 2004 9:47pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: How much interest do you have in a new model of phone analyser for TSCM? o A. None at all o B. Somewhat Interested o C. Interested o D. Very Interested o E. Extremely Interested To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1170141 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 8156 From: Fernando Martins Date: Tue Jan 13, 2004 1:51am Subject: Re: pinhole camera attached to ATM was transmitting PIN numbers to van this is a present hazard in Europe, i think there is no need but, there are pictures available of the scam "implementation" watch out for strange boxes (like, in a ATM outside a bank, there is no box with the bank documentation/brochures ... the cam is in the bottom) where we insert the card, the gear is a little more fat (there is a fake one on the top) FM ----- Original Message ----- From: To: Sent: Sunday, January 11, 2004 4:38 AM Subject: [TSCM-L] pinhole camera attached to ATM was transmitting PIN numbers to van > > > > Article published January 10, 2004 > ATM thief on probation > > > Paul Raymore > > Valentin Raducan, 31, pleaded no contest to one charge of fraudulent use of > an access card, a misdemeanor, in Nevada County Superior Court Nov. 18. Raducan > had initially been charged with two other felony counts, including > concealing, selling or withholding stolen property and burglary; however, both of these > charges were dismissed. > > Raducan received three years of conditional probation for his plea (the > equivalent of pleading guilty) in addition to 20 days' jail time and a fine of > $708.78. > > Other conditions of his probation: He is required to submit to search and > seizure, he is forbidden to possess any access cards such as credit cards and ATM > cards unless they have been issued to him, and he is forbidden to possess > electronic surveillance equipment. The defendant also agreed to pay restitution, > although that amount had not yet been determined. > > After Raducan's arrest in early November, agents with the FBI were looking > into whether Raducan might have ties to an organized crime ring linked to > similar activities nationwide. After further investigation, the bureau decided that > there was not enough evidence to pursue charges other than those he faced in > the state of California. > > Raducan was arrested Nov. 5 in Truckee after local police noticed him talking > with another man on a two-way radio in the vicinity of the U.S. Bank branch > on Donner Pass Road. A silver van was parked nearby with the motor running and > nobody inside. > > Inside the van, officers found a laptop computer, a suitcase and a new coffee > maker that had recently been purchased from Starbucks Coffee. Further > investigation revealed that Raducan had purchased more than $1,100 worth of coffee > equipment from Starbucks, using two credit cards that had been reported stolen > in the North Lake Tahoe area earlier that day. > > Officers also found a pinhole camera attached to the U.S. Bank ATM machine, > which they believe was transmitting PIN numbers of potential victims to the > laptop inside the van. > > > > > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8157 From: David Alexander Date: Thu Jan 15, 2004 10:24am Subject: man flies Atlantic with 5 bullets in pocket The big news here in the UK this morning is that a man with a Sierra Leone passport arrived at Heathrow Airport (London, England) with 5 rounds of ammunition in his pocket. He arrived on a flight from the USA. I don't know if the US 'readers' of this list are aware of the problems that flights from the UK (and I suspect other countries too) have had. A lot of flights have either been delayed or cancelled. Also we are very unhappy with the (in our opinion) the high-handed way that the US security authorities have been dealing with other countries. For example, the FBI and DHS are insisting that European countries flout their own privacy laws and supply data about passengers that should not be in the public domain. The net result among most people I know is quite simple - we're not coming to America as long as this is in force. We have zero confidence in the security authorities to keep the information safe and not misuse it. I'd just like to say that right now, we are laughing ourselves stupid. I know it's not you guys who read this list, please don't think I'm having a go at you personally, I'm not. Your postings show how dumba** you think most of this is and how ineffective it is on internal flights. Now you know, it's no better on the international ones either. Considering how long your sea and land borders are I'm sure that, if I wanted to, I could get a whole platoon of 'illegals' into the USA without detection or going anywhere near a scheduled flight. I also think that, with the relatively low value of second-hand airliners at the moment, if I was OBL and looking to repeat 9/11 I'd just buy a couple of old soviet Aeroflot transport aircraft and book them on 'one-way cargo runs' into the USA. My 2c. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8158 From: James M. Atkinson Date: Thu Jan 15, 2004 6:40pm Subject: The leak that went awry http://www.csmonitor.com/2004/0116/p11s03-cods.html Commentary > Daniel Schorr from the January 16, 2004 edition The leak that went awry By Daniel Schorr WASHINGTON - The making of a coverup, like the making of a sausage, is not always pleasant to watch. Attorney General John Ashcroft, who rarely recuses himself from anything, has suddenly decided to get out from under the investigation of who leaked the identity of a CIA covert officer. And Mr. Ashcroft, who rarely misses his turn on camera, left it to Deputy Attorney General James Comey to make the announcement - and also to disqualify himself. Why would the Justice Department pass off what looks like a quintessentially Washington investigation to the US attorney in Chicago? Perhaps for that very reason. Fingering CIA officer Valerie Plame after her husband, former Ambassador Joseph Wilson exploded the administration's African-uranium-to-Iraq theory, smacked of typically Washingtonian bureaucratic revenge. Who in the White House could have picked up the telephone and made that vengeful call to columnist Robert Novak? The FBI has presumably interviewed a lot of officials and subpoenaed a lot of telephone records for the week of the leak last June. Mr. Comey says that what led to the attorney general's withdrawal was "an accumulation of facts." If those facts point to someone in the White House who has a personal relationship with the attorney general, it could present a perceived conflict of interest. As US Attorney Patrick Fitzgerald took over the investigation, word was leaked to The Washington Post that maybe no crime was committed in the first place. The Post's source pointed out that while it is a felony under the 1982 Agents' Protection Act to identify a federal agent undercover, this does not apply if the leaker did not know that Ms. Plame was an undercover operative. Nice try! The original Novak column last July that started all the fuss emphasized the importance of his scoop because "the agency has never before declassified that kind of information." White House spokesman Scott McLellan says that no one wants to get to the bottom of this more than President Bush, and that the president has directed staff members to cooperate with the investigation. But, if everyone on the staff were cooperating, the mystery probably would've been solved by now. Who took it on himself or herself to "declassify" a sensitive national security secret? Stay tuned for the 2004 chapter in the story of the leak that went awry. . Daniel Schorr is a senior news analyst at National Public Radio. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8159 From: James M. Atkinson Date: Fri Jan 16, 2004 3:50pm Subject: CPM-700's and OSCOR's for Sale If any list member is interested I would like to move eight new CPM-700's, three new deluxe OSCOR's, and two new ORION's and can provide a attractive pricing on them along with immediate/next day shipment. All equipment is brand new, unused, unopened, and under a virgin factory warranty I can take all major credit cards, checks, and/or wire transfer. Please email me privately if your interested, -jma ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8160 From: Date: Fri Jan 16, 2004 3:51pm Subject: possible participation of foreign experts in the investigation Eurasia Insight - Wiretap Controversy Flares in Kyrgyzstan Eurasia Insight: WIRETAP CONTROVERSY FLARES IN KYRGYZSTAN 1/16/04 Kyrgyzstan’s presidential and parliamentary votes may be over a year away, but election-related maneuvering is already underway. Both critics and supporters of President Askar Akayev have taken steps in recent days to consolidate their respective forces. Meanwhile, controversy has erupted over the alleged “bugging” of a member of parliament’s office. The bugging controversy began January 14, when MP Ismail Isakov, who chairs the lower house of parliament’s State Security Committee, announced that he had discovered a listening device planted behind a radiator in his office. He hinted the National Security Service (NSS) was responsible for planting the bug, estimating that it had been functioning for up to 18 months, according to a report by the AKIpress news agency. Isakov called for the resignations of Akayev and NSS chief Kalyk Imankulov. Shortly after the initial discovery, bugs were uncovered in the offices of other MPs, including Azimbek Beknazarov and the leader of the Atameken Party, Omurbek Tekebaev. Beknazarov in recent years has been a fierce critic of Akayev’s administration. [For background see the Eurasia Insight archive]. Parliament Speaker Abdigani Erkebayev characterized the discoveries as “anti-constitutional actions,” and the legislature moved to open a probe into the incident. The head of parliament’s International Affairs Committee, Alisher Abdimomunov, suggested that foreign governments were “ready to cooperate with the investigating group,” the Kabar news agency reported January 15. Government officials have rejected the assertion that state security agents were involved. Imankulov, the NNS chief, hinted that government opponents could have staged the incident, insisting that security services haven’t employed “such a technique for the last 10 years,” the Kabar news agency reported. Imankulov went on to say the incident might “be the beginning of a PR campaign” in connection with the scheduled parliamentary vote in early 2005. He also raised the possibility of a “third force” being responsible for the episode. State prosecutors announced that they had opened a formal criminal investigation, citing Criminal Code Article 136, which prohibits unauthorized wiretaps and other invasions of privacy. Imankulov welcomed the possible participation of foreign experts in the investigation. Such experts could “satisfy both parties -- government and opposition -- so that as a result there won’t be doubts about the investigation’s legitimacy,” he said. The bugging controversy flared as political factions started preparing for the parliamentary election. At a January 14 news conference, six opposition parties announced that they were forming a united front called “For People’s Power.” The bloc comprises political movements that have sought to push Akayev from power. On January 12, two pro-government parties Unity and Alga – announced their merger. Such consolidation raises the chances that the political parties will gain a sufficient share of the vote to secure seats in the next parliament. http://www.eurasianet.org/departments/insight/articles/eav011604_pr.shtml [Non-text portions of this message have been removed] 8161 From: James M. Atkinson Date: Sat Jan 17, 2004 11:56am Subject: Profundity GEORGE CARLIN STRIKES AGAIN 1. Ever wonder about those people who spend $2.00 apiece on those little bottles of Evian water? Try spelling Evian backwards: NAIVE. 2. Isn't making a smoking section in a restaurant like making a peeing section in a swimming pool? 3. OK.... so if the Jacksonville Jaguars are known as the "Jags" and the Tampa Bay Buccaneers are known as the "Bucs," what does that make The Tennessee Titans? 4. If 4 out of 5 people SUFFER from diarrhea...does that mean that one enjoys it? 5. There are three religious truths: a. Jews do not recognize Jesus as the Messiah. b. Protestants do not recognize the Pope as the leader of the Christian faith. c. Baptists do not recognize each other in the liquor store or at Hooters. 6. If people from Poland are called Poles, why aren't people from Holland called Holes? 7. Do infants enjoy infancy as much as adults enjoy adultery? 8. If a pig loses its voice, is it disgruntled? 9. Why do croutons come in airtight packages? Aren't they just stale bread to begin with? 10. Why is a person who plays the piano called a pianist but a person who drives a racecar is not called a racist? 11. Why isn't the number 11 pronounced onety one? 12. If lawyers are disbarred and clergymen defrocked, doesn't it follow that electricians can be delighted, musicians denoted, cowboys eranged, models deposed, tree surgeons debarked, and dry cleaners depressed? 13. If Fed Ex and UPS were to merge, would they call it Fed UP? 14. Do Lipton Tea employees take coffee breaks? 15. What hair color do they put on the driver's licenses of bald men? 16. I was thinking about how people seem to read the Bible a whole lot more as they get older; then it dawned on me.... They're cramming for their final exam. 17. I thought about how mothers feed their babies with tiny little spoons and forks, so I wondered what do Chinese mothers use? Toothpicks? 18. Why do they put pictures of criminals up in the Post Office? What are we supposed to do, write to them? Why don't they just put their pictures on the postage stamps so the mailmen can look for them while they deliver the mail? 19. If it's true that we are here to help others, then what exactly are the others here for? 20. You never really learn to swear until you learn to drive. 21. Ever wonder what the speed of lightning would be if it didn't zigzag? 22. If a cow laughed, would milk come out of her nose? 23. Whatever happened to Preparations A through G? ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8162 From: Steve Uhrig Date: Sat Jan 17, 2004 8:25pm Subject: FCC Radio Museum online courtesy of the Radio Club of America newsletter: http://www.fcc.gov/omd/history Covers the history of radio, ideas which made it possible, more. Emphasis on mobile radio and its applications for safety, business and personal use. Hertz, Marconi, Fessenden, Tesla, Alexanderson, DeForest and Armstrong are mentioned. Something to bookmark and read when you're stuck in a hotel room some evening. Good historical info. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8163 From: Date: Sun Jan 18, 2004 5:51am Subject: NSA relents on files' release NSA relents on files' release Secret agency allows EPA, MDE, Fort Meade to view pollution report; Cursory look shows no problems; Edited version planned because of security fears; access later to full study By Rona Kobell Sun Staff January 18, 2004 Baltimore Sun After months of denying regulators access to a key environmental study, the National Security Agency has opened its doors and its files - if only for a peek. Officials from the Environmental Protection Agency, the Maryland Department of the Environment and Fort Meade's environmental office got their first look last week at the super-secret eavesdropping agency's building contamination study, which outlines potential pollution problems. NSA is situated on a corner of the Fort Meade Army post in Odenton, which has been listed since 1998 on the EPA's Superfund list of the nation's most hazardous sites. Although NSA is not near the main areas of concern, regulators long have suspected that NSA has handled some hazardous waste over the years. But their cursory review of the NSA study didn't yield any red flags. "Based on my brief review, I did not see any regional environmental impacts resulting from historical operations at the NSA campus," said Fort Meade environmental engineer Jeffrey Thornburg. NSA expects to release an edited version of the report to regulators and the public next month. That version will include the environmental studies, but not maps, historical data and building function details that the NSA has deemed sensitive. "The study is currently under review to remove information relating to NSA's plans, operations, and potential security vulnerabilities," an NSA spokeswoman said last week. Federal and state regulators will be able to return to NSA and view the full report if they need more information. Historical data, such as the location of a wood-treatment facility or computer chip-making operation, might explain why certain contaminants turn up in certain places. If the edited report does not answer all such questions, Thornburg said, he'll go back to see the full version. For months, the lack of environmental information from the global code-breaking agency has frustrated regulators and citizens who have been working together to clean up the 86-year-old Army post. Over the past five years, the Army's environmental office has identified close to 200 areas of potential contamination that could cause long-term ground-water and soil problems, most stemming from fuel, solvents and munitions dating to the post's years as a major training camp for soldiers. By last summer, only 30 sites still required further cleanup. Board and Army That swift action and exchange of information improved the once-contentious relations between the Army and the Restoration Advisory Board, the citizen-regulator group overseeing the Superfund cleanup. Rather than participating in the Army's study, the NSA conducted its own in 2002. Last year, NSA officials gave the findings to an EPA representative, but abruptly took the report back, noting new post-Sept. 11, 2001, security concerns. NSA said the report revealed too much about its buildings and their functions. NSA told The Sun last month that it launched the study at the advisory board's request and not in response to Superfund requirements. However, EPA officials considered the pollution study a key part of the regulatory process. Advisory board Chairwoman Zoe Draughon said the NSA agreed to release the information only after the news reports circulated and public pressure increased. "The NSA is releasing the report not because it's the right thing to do, but because it's being forced to do it," she said. "But at this point, I'll take anything." Review by regulators Draughon said she doesn't need to see the unedited report as long as the regulators can review it. "NSA can't check themselves and say, 'Oh, we're OK,'" she said. "They have to let the people who are supposed to do the checking do their jobs." Board members hope that the NSA's cooperation is a sign that the agency's door may be opening more than just a crack. In the past few months, NSA and Army officials have met more frequently. "We're bridging any sort of gaps in our relationship," Thornburg said. "This is really setting the tone for future communication between NSA and Fort Meade." [Non-text portions of this message have been removed] From: Mitch D Date: Mon Jan 3, 2005 1:06am Subject: Re: un-bug / VLF reception PS to JMA's answer: if its not tx'ing or powered,only a nljd,or physical search would find it. __________________________________ Do you Yahoo!? Meet the all-new My Yahoo! - Try it today! http://my.yahoo.com 10497 From: Rob Muessel Date: Mon Jan 3, 2005 9:35am Subject: RE: Sweep needed Roger- I can recommend Steve Whitehead and Lorenzo Lombard of TSCM Services in South Africa. I've known these guys for 10+ years and they will do the job quite well. Best Regards, Rob Muessel -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Sunday, January 02, 2005 10:53 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Sweep needed Sweep needed in South Africa. Roger Tolces Electronic Security. Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10498 From: James M. Atkinson Date: Mon Jan 3, 2005 9:25am Subject: Re: un-bug / VLF reception At 02:06 AM 1/3/2005, Mitch D wrote: >PS to JMA's answer: >if its not tx'ing or powered,only a nljd,or physical search >would find it. TDR Analysis of the power lines would have found it, so would thermal imagery, and acoustic sounding. A magnetic analysis of the area with a gauss probe (not a metal detector) would likely have revealed it as well. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10499 From: DJ Date: Mon Jan 3, 2005 6:50pm Subject: Microphones Steve you could probably answer this one. In the movie Enemy of the State (steve did a great job here), I saw many microphones used at long ranges to listen into the subjects conversations. Does anyone have any whitepapers or any other information on the availability of microphones that will work at a distance of over 20 feet from the subject? Thanks, IT2 Garrett 10500 From: fjansgmxnet Date: Tue Jan 4, 2005 8:15am Subject: Re: un-bug / VLF reception > A magnetic analysis of the area with a gauss probe (not a metal detector) would likely have revealed it as well. Very interesting point. If I would use some sensitve hall sensor as a gauss probe, what will I see in what range from the UN-bug? I would expect an AC magnetic field of a few milli-gauss in a range of about 10 to 20 cm apart from this bug, if the bug is in the non transmitting / non batterie loading mode, correct? Best regards, Frank 10501 From: delta Date: Tue Jan 4, 2005 8:33am Subject: looking for a tdr hello everybody i m looking for a little tdr portable to test telephone wire here in france what kind of product can i buy ? any reference ? someone here can help me to find this product at resonnable price ? many thanks david from paris 10502 From: Larry Nevin Date: Tue Jan 4, 2005 9:27pm Subject: Re: looking for a tdr David, I have a Riser Bond TDR that is in great shape. I am no longer in the business and I have not used it in three years. The unit has all of the manuals and cables in its own plastic case. If that fits your need I will sell it at a greatly reduced price. Thanks, Larry Nevin Fire In The Hole Inc. --- delta wrote: > > hello everybody > i m looking for a little tdr portable to test telephone wire here in france > what kind of product can i buy ? any reference ? > someone here can help me to find this product at resonnable price ? > many thanks > david from paris > > > > > ===== "EXPECT MORE THAN OTHERS THINK POSSIBLE!" 10503 From: delta Date: Wed Jan 5, 2005 1:48am Subject: Re: looking for a tdr hello larry and many thanks for your answer can you tell me the model you have to sell to me ? the price of course to buy your tdr here in france ? many thanks please contact me direct with my email agenceadi@o... david from paris 10504 From: James Greenwold Date: Wed Jan 5, 2005 6:31pm Subject: Re: Digital Cell phone scanning In days of old, (the analog days) We had software running a R7000. And could find the number we were looking for and follow the tower pass as the cell taveled along. I get ask regularily about the ability to scan a cell phone. I'm ask mostly by "foil hat club" members. But real or not the question is asked. Now, almost all phones are digital. The common answer would be that a phone could be hacked and turned into a scanner for close proximaty, but I have not seen one. So I ask you guys... How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? -- Thank you for your time James Greenwold Bureau Of Technical Services 715-726-1400 bts@t... 10506 From: J. Coote Date: Wed Jan 5, 2005 9:17pm Subject: RE: looking for a tdr David, You might find a used Tektronix 1502B, 1502C, 1503B or 1503C. These will do a good job on unenergized lines. The TDRs have some front-end voltage protection, but better to be careful. Tektronics had a protector or adapter for live lines, but I don't know the model number. The 1502 series is limited to 2,000 feet I believe but has good resolution. The 1503 series go to many times that. Another name that comes to mind is Riser-Bond. They make several TDRs. The very cheap TDRs only give basics, such as distance to open or distance to short and are unsuitable for TSCM. You might also look for companies who lease or rent test equipment. Jay -----Original Message----- From: delta [mailto:agenceadi@o...] Sent: Tuesday, January 04, 2005 6:33 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] looking for a tdr hello everybody i m looking for a little tdr portable to test telephone wire here in france what kind of product can i buy ? any reference ? someone here can help me to find this product at resonnable price ? many thanks david from paris 10507 From: Ian Wraith Date: Thu Jan 6, 2005 5:18am Subject: Re: Digital Cell phone scanning Hello James Greenwold wrote: > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of > the threat? Can the estranged husband be listening to his wife? Or is the > tech needed place it in the expert mode? With an encrypted digital cell phone systems such as GSM the threat from monitoring comes from Government agencies and there is no risk of estranged husbands listening. There are a few sites on the internet advertising GSM monitoring equipment but usually this equipment looks very suspect. I have been told there are a few digital mobile phone systems in the US which have no encryption but even with those I have yet to see any hobbyist level equipment for monitoring. Regards Ian 10508 From: Hawkspirit Date: Thu Jan 6, 2005 10:48am Subject: Sweeps needed Home sweep needed in Naples Florida Business sweep needed in Flint, Michigan If you can handle these contact me ASAP. Roger Tolces Electronic Security Co. 760-329-4404 HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] 10509 From: James M. Atkinson Date: Thu Jan 6, 2005 10:59am Subject: Warning: Don't brush teeth with toilet brush! http://www.msnbc.msn.com/id/6794153/ Warning: Don't brush teeth with toilet brush! Awards handed out for wackiest consumer warnings The Associated Press Updated: 10:15 a.m. ET Jan. 6, 2005 DETOIT - The sign on the toilet brush says it best: "Do not use for personal hygiene." That admonition was the winner of an anti-lawsuit group's contest for the wackiest consumer warning label of the year. The sponsor, Michigan Lawsuit Abuse Watch, says the goal is "to reveal how lawsuits, and concern about lawsuits, have created a need for common sense warnings on products." The $500 first prize went to Ed Gyetvai, of Oldcastle, Ontario, who submitted the toilet-brush label. A $250 second prize went to Matt Johnson, of Naperville, Ill., for a label on a children's scooter that said, "This product moves when used." No oral use A $100 third prize went to Ann Marie Taylor, of Camden, S.C., who submitted a warning from a digital thermometer that said, "Once used rectally, the thermometer should not be used orally." This year's contest coincides with a drive by President Bush and congressional Republicans to put caps and other limits on jury awards in liability cases. "Warning labels are a sign of our lawsuit-plagued times," said group President Robert Dorigo Jones. "From the moment we raise our head in the morning off pillows that bear those famous Do Not Remove warnings, to when we drop back in bed at night, we are overwhelmed with warnings." The leader of a group that opposes the campaign to limit lawsuits admits that while some warning labels may seem stupid, even dumb warnings can do good. "There are many cases of warning labels saving lives," said Joanne Doroshow, executive director of the Center for Justice and Democracy in New York. "It's much better to be very cautious ... than to be afraid of being made fun of by a tort reform group." The Wacky Warning Label Contest is in its eighth year. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10510 From: secureoffice Date: Thu Jan 6, 2005 1:39pm Subject: Re: Microphones Jim It's not my place to comment on the relationship between two people or how they behave. I was simply pointing out the fact. It was not meant as a condemnation or opposite. As a list owner you are perfectly entitled to do what you see fit. However, it's not my place to comment on who was right or wrong, and I won't. I was simply letting Mr Garrett know that he should contact Steve directly should he require his specific response. I trust the matter requires no further explanation. Kindest regards -Ois --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > Ois, > > The only time that I have ever banned or removed someone from the list is > when that person becomes extremely disruptive and rude or abusive to the > list membership, or if I catch them doing naughty, naughty things. > > Steve was indeed banned from this group a few months back, but only after > his repeat transgressions significantly exceeded his welcome and my > tolerance of his often offensive Prima Donna behavior. tripped the squelch > circuit. He was given ample time to mend his behavior for at least six > month before his being banned. > > "sapiens timet et declinat malum stultus transilit et confidit, > Proverb14:16 > > The list needs good communications, and a place where members can ask > questions and discuss all levels of TSCM from the beginner and apprentice > levels to the Technician and Engineering levels. The list exists to > improve the profession, and for no other purpose. > > Also, greetz to the list members who are going out to the Little Red School > house for the first time, enjoy the daily commute (you know who you are). > > -jma > > > > At 02:26 PM 1/5/2005, secureoffice wrote: > > > >Steve was banned from the group by the group owner, you'll need to > >email him directly if you want his opinion. > > > >Regards > > > >-Ois > > > > > >--- In TSCM-L@yahoogroups.com, "DJ" wrote: > > > > > > > > > Steve you could probably answer this one. In the movie Enemy of the > > > State (steve did a great job here), I saw many microphones used at > > > long ranges to listen into the subjects conversations. Does anyone > > > have any whitepapers or any other information on the availability of > > > microphones that will work at a distance of over 20 feet from the > > > subject? > > > > > > Thanks, > > > IT2 Garrett > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- 10511 From: Dragos Ruiu Date: Thu Jan 6, 2005 0:20pm Subject: Call For Articles: MISC Magazine - CanSecWest/core05 (Details in French Below) Win a trip to attend CanSecWest/core05. Get published in MISC Magazine. Contest Details: You just have to write an original article (3500-4000 words) for publication in MISC Magazine on any topic related to computer security: exploit writing, (anti-)virus, (anti-)forensics, network, protocol manipulation, honeypots, IDS/IPS, reverse engineering, telecoms, and so on... For a list of subjects already covered in the magazine have a look at http://www.miscmag.com/sommaire.php The best submitted article (details below) will win a free trip (airfare, hotel) and conference registration. All contest information available on http://www.miscmag.com/csw05-tc.php The conference website can be found at http://cansecwest.com The CanSecWest/core05 conference consists of tutorials on technical details about current issues, innovative techniques and best practices in the information security realm. Many famous researchers contribute each year. The attendees are a multi-national mix of professionals involved on a daily basis with security work and provide a social networking opportunity to mingle with eminent technical researchers. It will be held on May 4-6 at the Mariott Renaissance hotel in downtown Vancouver, British Columbia, Canada. MISC is a french magazine focusing on information security. Each issue features an in-depth coverage of a specific topic through a series of articles exploring the subject. Beside this key theme regular columns provide the reader with advanced techniques pertaining to information security. Because security can not be limited to technical and scientific aspects MISC also covers domains like law or information warfare. The winning article submission receives: - registration for CanSecWest/core05 donated by the conference - 4 nights in the conference hotel (Mariott Renaissance) paid for by the conference (though incidental costs are still your responsibility). - a round-trip to Vancouver (Canada), paid by Diamond Edition (the winner must have a valid passport and visa if needed) - the publication of your article in MISC, paid at the regular MISC rate (to use as spending money on your trip). The committee will select the best article which will be published in MISC Magazine. The 5 following criteria will guide the committee's choice: 1) education: how much does it teach? 2) innovation: how is it new? 3) technical level: what is the technical level of the article? 4) applicability: does it affect a lot of people? 5) style: grammar, orthography, syntax, clarity, ... More than one article may be published in MISC Magazine, but only the best one will win the trip. To have a chance to win, send article submission by email to csw05@m... along with the following information before the 29th of January 2005: 1) Author, and geographical location (country of origin/passport) and contact info (e-mail, postal address, phone, fax). We need a real name and real contact details or we won't be able to pay for the trip. 2) Employer and/or affiliations. 3) 3 to 5 keywords describing the topic of the proposal 4) The article, written either in French or English, and using the style sheets available at http://www.miscmag.com/styles/ 5) Optionally, any samples (code or whatever) related to the article. 6) The folowing declaration: I, , hereby certify that the submitted article has been written by me and that I own the intellectual property contained in it. I, , give Diamond Editions the right to publish this article in their magazines. If a submission is incomplete, the article will not be considered for the challenge. Only one submission per person is allowed - if there are multiple submissions, only the last one will be considered. Please submit all proposals by January 29 latest. Results will be communicated to the participants on the 15th February 2005. MISC Magazine : http://www.miscmag.com CanSecWest/core05 : http://cansecwest.com --------------------- CanSecWest/core05 - MISC Magazine Gagner un sÈjour pour assister ‡ CanSecWest/core05. Comment faire ? Simplement en Ècrivant un article original de 3500-4000 mots sur le thËme de la sÈcuritÈ informatique : techniques d'exploits, (anti-)virus, (anti-)forensics, manipulation de rÈseau, dÈtournement de protocoles, pots ‡ miel et autres IDS/IPS, reverse engineering, tÈlÈcoms, etc... Pour dÈcouvrir les sujets traitÈs dans MISC, vous pouvez visiter http://www.miscmag.com/sommaire.php. Tous les dÈtails sur : http://www.miscmag.com/csw05-tc.php La confÈrence CanSecWest/core05 se compose de tutoriaux sur les questions actuelles, les techniques innovatrices et les meilleures pratiques dans le domaine de sÈcuritÈ de l'information. De prestigieux orateurs y participent chaque annÈe, permettant ainsi aux auditeurs de se tenir informÈs des derniËres nouveautÈs du secteur. Elle se dÈroule du 4 au 6 Mai 2005 ‡ Vancouver (Canada). Le magazine franÁais ´ 100% sÈcuritÈ informatique ª MISC est composÈ d'un dossier traitant de maniËre approfondie d'un thËme, et de nombreuses rubriques permettant ‡ chacun de dÈcouvrir les techniques avancÈes liÈes ‡ la sÈcuritÈ de l'information. MISC traite Ègalement des domaines connexes (droit ou guerre de l'information par exemple) car la sÈcuritÈ de l'information ne se limite pas ‡ des problËmes techniques et scientifiques. Prix pour le vainqueur : - l'entrÈe ‡ CanSecWest - 4 nuits d'hÙtel ‡ l'hÙtel de la confÈrence (Mariott Renaissance) - le billet d'avion pour se rendre ‡ Vancouver, achetÈ par Diamond Edition (le vainqueur devra disposer, si besoin, d'un passeport valide et d'un visa pour le Canada) - la publication de l'article, rÈmunÈrÈ au tarif normal des auteurs de MISC, dans un numÈro ‡ venir de MISC. Le jury sÈlectionnera la meilleure proposition, qui sera ensuite publiÈe dans MISC Magazine. La barËme se dÈcompose en 5 critËres, d'importance Ègale : 1) Èducation : l'article est-il pÈdagogique ? 2) innovation : quelle(s) part(s) de nouveautÈ ? 3) technicitÈ : quel est le niveau technique de l'article ? 4) portÈe : est-ce que cela concerne beaucoup de personnes ? 5) style : orthographe, grammaire, clartÈ, ... Tous les bons articles seront susceptibles d'Ítre publiÈs dans MISC, mais seul le meilleur remportera le voyage ‡ CanSecWest. Pour participer, il faut envoyer un mail ‡ csw05@m... avec les informations suivantes avant le Samedi 29 Janvier : 1) prÈsentation : nom, prÈnom, ville/pays d'origine, nationalitÈ, contact (e-mail, adresse postale, tÈlÈphone, fax) Attention : sans ces informations, votre prix ne pourra vous Ítre remis. 2) employeur et/ou affiliation 3) 3-5 mots clÈ pour caractÈriser l'article 4) l'article, Ècrit en Anglais ou en FranÁais, et respectant les feuilles de style : http://www.miscmag.com/styles/ 5) Èventuellement, des exemples (codes ou autres) liÈs ‡ l'article 6) La mention suivante : Je soussignÈ dÈclare sur l'honneur Ítre l'auteur de l'article soumis afin de participer au concours, et que j'en dÈtiens donc les droits de propriÈtÈ intellectuelle. En cas de victoire, j'autorise Diamond Edition ‡ faire usage de mon article dans leurs publications. Tout mail incomplet invalidera la participation. Une seule participation par personne est autorisÈe. Date limite de participation : Samedi 29 Janvier 2005, date de rÈception du mail faisant foi. Liens utiles MISC Magazine : http://www.miscmag.com CanSecWest/core05 : http://cansecwest.com -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, CanadaMay 4-6 2005 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 10512 From: delta Date: Thu Jan 6, 2005 0:27pm Subject: Re: looking for a tdr many thanks jay for your help i think i m going to buy a riserbond 3300 here in france thanks to all for your help and your experience with tdr i think this mailing liste is very good david 10513 From: Lawrence Dillard Date: Thu Jan 6, 2005 3:34pm Subject: Lawrence D. Dillard This is to tell all his friends, Larry died in his sleep, sometime last night or early this morning. If you need to know more , or want to contact me, my e-mail address is cdillards@m..., 303-661-0660 Cheryle 10514 From: Hawkspirit Date: Thu Jan 6, 2005 9:00pm Subject: Sweep Needed Anyone have a portable x-ray unit for a sweep in Cincinnati Ohio? Roger Tolces Electronic Security Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] 10515 From: littledog Date: Fri Jan 7, 2005 11:48am Subject: vonage? Hello, could anyone out the give me their insight on the new broadband cable phone services? Are they more or less secure and since it seems that everything is controlled through a website (or is it?) like customizing the service to a record of all incoming and outgoing calls, are they vulnerable to hackers? I'm new and still in the little red schoolhouse..thanx 10516 From: Agent Geiger Date: Fri Jan 7, 2005 6:15pm Subject: Re: vonage? I have been using the service for several months with no problems. --- littledog wrote: > > Hello, could anyone out the give me their insight on > the new broadband cable phone services? Are they > more or less secure and since it seems that > everything is controlled through a website (or is > it?) like customizing the service to a record of all > incoming and outgoing calls, are they vulnerable to > hackers? I'm new and still in the little red > schoolhouse..thanx > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10517 From: James M. Atkinson Date: Fri Jan 7, 2005 6:43pm Subject: Re: vonage? The quality of the audio tends to be less then that of a hard wired dedicated phone line with annoying echo's and barrel effect audio. Security is another question... because there is none. -jma At 12:48 PM 1/7/2005, littledog wrote: >Hello, could anyone out the give me their insight on the new broadband >cable phone services? Are they more or less secure and since it seems that >everything is controlled through a website (or is it?) like customizing >the service to a record of all incoming and outgoing calls, are they >vulnerable to hackers? I'm new and still in the little red schoolhouse..thanx ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10518 From: Agent Geiger Date: Fri Jan 7, 2005 8:51pm Subject: Re: vonage? There is no real security on ANY phone line. However, my line quality has been just as good a traditional landline. It depends on the quality of your Internet connection. The number can also have ANY area code and is very portable. Not to mention, is very cheap. --- "James M. Atkinson" wrote: > > The quality of the audio tends to be less then that > of a hard wired > dedicated phone line with annoying echo's and barrel > effect audio. > > Security is another question... because there is > none. > > -jma > > > > At 12:48 PM 1/7/2005, littledog wrote: > > > >Hello, could anyone out the give me their insight > on the new broadband > >cable phone services? Are they more or less secure > and since it seems that > >everything is controlled through a website (or is > it?) like customizing > >the service to a record of all incoming and > outgoing calls, are they > >vulnerable to hackers? I'm new and still in the > little red schoolhouse..thanx > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10519 From: David Kervin Date: Fri Jan 7, 2005 6:17pm Subject: Technical Surveillance Countermeasure Personnel Technical Surveillance Countermeasure Personnel General Information Document Type: Presolicitation Notice Solicitation Number:HQ0095-05-R-0012 Posted Date:Jan 06, 2005 Original Response Date:Jan 24, 2005 Current Response Date:Jan 24, 2005 Original Archive Date:Feb 08, 2005 Current Archive Date:Feb 08, 2005 Classification Code:R -- Professional, administrative, and management support services Set Aside:Total Small Business Naics Code:561611 -- Investigation Services Contracting Office Address Other Defense Agencies, Washington Headquarters Services, Acquisition and Procurement Office, Acquisition and Procurement Office, RDF, Room 1F1K711B 1155 Defense Pentagon, Washington, DC, 20301-1155 Description The contractor shall provide personnel that are Agilent certified to perform duties of management, coordination, and operation of advanced radio frequency monitoring equipment. The contractor will be responsible for the analysis of all signal data collected. Duties shall include the configuration of equipment to optimize performance, maintenance of a Windows 2000 network server, investigative data analysis, database management, advice and assistance for system development from software packages used to assist in collection and analysis. The contractor shall resolve any anomalies the system may detect and provide monthly progress reports of the systems development to the PFPA Technical Security Program Manager. The contractor shall provide quarterly status briefings to senior Department of Defense executives, policy and decision makers. This requirement will be solicited as a sole source requirement to Vector Technologies, LLC. The NAICS code associated with this requirement is 561611. Point of Contact Patricia Hill, Contract Specialist, Phone 703 614 6354, Fax 703 692 0811, Email patricia.hill.ctr@w... - Jeraline Artis, Procurement Analyst, Phone (703) 697 4350, Fax (703) 692 4091, Email jeraline.artis@w... Place of Performance Address:Pentagon Force Protection Agency 9000 Defense Pentagon, Room 4E139 Washington D.C. Postal Code:20301 [Non-text portions of this message have been removed] 10520 From: dj Date: Fri Jan 7, 2005 7:49pm Subject: Re: vonage? Vonage/Lingo/Primus .. basically all work the same way. The voice quality is a little less because of the compression but these type of q's are right up my alley. I work as a technology consultant and have been working with Voice Over IP for sometime now. The calls are not encrypted by no means and are vulnerable to about any type hack. The boxes that control these are similar in nature to cisco's voip but different in the fact that they provide a client with a dial tone on the down side of the box. The boxes have a mac address and obtain a ip through a dchp server. The big problems with them is that with NAT they tend to loose their stay alive signals. Lets say that the call generates on port 5060 and then another call comes in to the box via call waiting. NAT will migrate that port to lets say 17500 and keep the orginal call at that port. That port is migrated at your local router and not on the service providers end. So the keep alive signal ... (really just a packet) that says that this call shouldn't be disconnected is send to the box at port 5060 and cannot find an active conversation because you hung up with your 3rd party. So the system disconnects you. Also about 9 minutes into a call they boxes all seem to migrate with NAT to a new port number due in part to trying to free up lower level port numbers for use by local apps. Using Cain and Able a program that is readily available you can simply enumerate the MAC and IP of the local box and then using a port scanner see which port it is operating on. Solar Winds does this with no problem but there are a million port scanners and network analyzer/sniffers that one can use. If one does not password protect and encrypt the password of the administration side of the boxes it is simple to take control of ones box. As for putting the packets back together to generate the original call. Well I haven't found a program that will do that very well but let me know if you do. v/r, IT2 Garrett --------------------------------- Do you Yahoo!? Yahoo! Mail - You care about security. So do we. [Non-text portions of this message have been removed] 10521 From: Michael Puchol Date: Sat Jan 8, 2005 4:07am Subject: Re: vonage? Hi, A couple of months ago a phreaker demonstrated that you can give yourself any caller ID you want if you have a Vonage account, at least for a while. He simply called Vonage and gave them the number of a well-known TV actor, and told them it was his landline number, if they could link the caller ID of his VoIP account to this number. Amusingly, they complied without any questions, and he now could make calls using the actor's caller ID, and all calls made on the Vonage network to the actor's phone would be re-routed to the phreaker's VoIP phone. Vonage's comments were that yes, they would put any caller ID a costumer requests, it could even be President Bush's phone number (yes, they did say this!), and then do a check with the phone company involved, which could take some two weeks. So for two weeks you could make phone calls pretending to be anyone you want. Doesn't say much for them IMHO... Regards, Mike 10522 From: Tech Sec Lab Date: Sat Jan 8, 2005 7:49am Subject: RE: Technical Surveillance Countermeasure Personnel Does anyone have any info or experience regarding the Agilent certification? Please respond off list, Kind regards -Ois ******************************************** Message: 5 Date: Sat, 8 Jan 2005 02:17:12 +0200 From: "David Kervin" Subject: Technical Surveillance Countermeasure Personnel Technical Surveillance Countermeasure Personnel General Information Document Type: Presolicitation Notice Solicitation Number:HQ0095-05-R-0012 Posted Date:Jan 06, 2005 Original Response Date:Jan 24, 2005 Current Response Date:Jan 24, 2005 Original Archive Date:Feb 08, 2005 Current Archive Date:Feb 08, 2005 Classification Code:R -- Professional, administrative, and management support services Set Aside:Total Small Business Naics Code:561611 -- Investigation Services Contracting Office Address Other Defense Agencies, Washington Headquarters Services, Acquisition and Procurement Office, Acquisition and Procurement Office, RDF, Room 1F1K711B 1155 Defense Pentagon, Washington, DC, 20301-1155 Description The contractor shall provide personnel that are Agilent certified to perform duties of management, coordination, and operation of advanced radio frequency monitoring equipment. The contractor will be responsible for the analysis of all signal data collected. Duties shall include the configuration of equipment to optimize performance, maintenance of a Windows 2000 network server, investigative data analysis, database management, advice and assistance for system development from software packages used to assist in collection and analysis. The contractor shall resolve any anomalies the system may detect and provide monthly progress reports of the systems development to the PFPA Technical Security Program Manager. The contractor shall provide quarterly status briefings to senior Department of Defense executives, policy and decision makers. This requirement will be solicited as a sole source requirement to Vector Technologies, LLC. The NAICS code associated with this requirement is 561611. Point of Contact Patricia Hill, Contract Specialist, Phone 703 614 6354, Fax 703 692 0811, Email patricia.hill.ctr@w... - Jeraline Artis, Procurement Analyst, Phone (703) 697 4350, Fax (703) 692 4091, Email jeraline.artis@w... Place of Performance Address:Pentagon Force Protection Agency 9000 Defense Pentagon, Room 4E139 Washington D.C. Postal Code:20301 [Non-text portions of this message have been removed] 10523 From: Hawkspirit Date: Sat Jan 8, 2005 0:51pm Subject: TSCM History For those of you who collect TSCM history http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=73336&item=5741413404 &rd=1 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] 10524 From: Brian Varine Date: Sat Jan 8, 2005 7:35am Subject: Vonage/VoIP ----- Original Message ----- From: To: Sent: Saturday, January 08, 2005 5:21 AM Subject: [TSCM-L] Digest Number 1787 > Hello, could anyone out the give me their insight on the new broadband > cable phone services? Are they more or less secure and since it seems that > everything is controlled > through a website (or is it?) like customizing > the service to a record of all incoming and outgoing calls, are they > vulnerable to hackers? I'm new and still in the little red > schoolhouse..thanx Most VOIP providers are not "secure" but then again, neither are hardwired phones. All VoIP providers are using well known protocols for signalling and codecs so it's not difficult to tap a call. If the attacker can see the packets, they can decode the voice. There is a new VoIP freeware detector and recorder called VoIPong that works off Linux (http://www.enderunix.org/voipong/), it handles G.711 (64k) and they are looking to support G.723 and G.729 (8k). The other part of VoIP to secure is the call manager system. Most vendors are using standard Windows 2000/Windows 2003 Servers so security can vary from non-existant to really good, it all depends. I would ass*u*me companies like Vonage have good security on their call management systems since all of their services are directed at Internet users. I have audited some enterprises with VoIP systems and the security is typically not very good. Their rationale is they are "protected" by a firewall so why secure/harden the servers. A lot don't realize that if their network gets bombed (ala Nimda/Code Red/SQL Slammer), they lose their phone service. A few enterprises fortunately have done it right..secure servers on a protected subnet with the voice traffic going over separate VLAN's and wire. 10525 From: savanted1 Date: Sat Jan 8, 2005 1:46pm Subject: Comments Dear, Esteemed Group Members I have just formed the TICSA Study group on Yahoo. Please by all means feel free to join and participate in educating yourself towards ascertaining the TICSA Certified Associate credential. Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Regards, 10526 From: Date: Sat Jan 8, 2005 11:34am Subject: Security Considerations For VOIP Systems January 2005 http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:11am Subject: Counter-intelligence entity formed Counter-intelligence entity formed http://www.dawn.com/2001/01/06/int11.htm WASHINGTON, Jan 5: President Bill Clinton has ordered the creation of a special entity to make US counterintelligence more responsive to new threats unlike Cold War "cloak and dagger" spy challenges, the White House said on Friday. "A threat today can as easily come from a laptop as it could from an old, cloak-and-dagger spy, and we need a counterintelligence capability that matches that new globalized reality," said Clinton spokesman Jake Siewert. A counterintelligence "czar," will head the special board, comprising top CIA, FBI and Defence Department officials, and will be charged with taking a forward-looking approach to safeguarding the nation's secrets. The move aims to "to create a process through which the agencies that are charged with responsibilities for counterintelligence ... can work together in a way that's more coordinated and looks at new threats, assesses them and decides how to protect our secrets," according to Siewert. "We've moved into a world in which threats are more diverse and diffuse, and we need a counterintelligence capacity that recognizes the realities of the changing world," said the official. The spokesman cited the threat posed by cyber-warfare, pointing to high-profile computer viruses spread globally last year. Siewert said President-elect George W. Bush, who takes office January 20, would likely appoint the first "czar" to head the board. But the Republican could also decide to reverse the order.-AFP -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2253 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:14am Subject: Former Cuban spy testifies against ex-allies on trial Former Cuban spy testifies against ex-allies on trial http://www.miamiherald.com/content/today/news/americas/carib/cuba/digdocs/102513.htm Published Saturday, January 6, 2001, in the Miami Herald Man gives agents' techniques, efforts to infiltrate Pentagon's Southern office BY GAIL EPSTEIN NIEVES gepstein@h... Avoiding eye contact with his former associates, an acknowledged former Cuban intelligence agent gave jurors a quick training course in spying Friday. He was the first witness to testify about personal in-the-field involvement with any of the five accused spies on trial. Joseph Santos, 40, looked toward the defendants only once when he identified accused spy Gerardo Hernandez. Santos said Hernandez was a Miami-based Cuban ``illegal officer,'' or ranking intelligence agent, who in 1995 assigned Santos and his wife, Amarylis, their primary mission: to infiltrate the Southern Command. Prosecutors contend that Havana was intent on penetrating the Pentagon's Southern Command headquarters, which directs U.S. military operations in Latin America and the Caribbean. Southcom announced its move to Miami from Panama in March 1995. Santos and his wife are already serving prison terms after pleading guilty to one count of conspiracy to act as a foreign agent. Their terms are likely to be cut short for their help testifying against Hernandez, who prosecutors say conspired with the Cuban military to murder four Brothers to the Rescue fliers in 1996. Santos was born in New Jersey to Cuban parents who later returned to Cuba. He became a university professor in electrical engineering and was recruited by the Directorate of Intelligence in April 1984, he said. His wife joined later. In 1986, he began ``basic training to work as an intelligence agent'' in Santa Clara. As his agent name, he chose Mario. His wife chose the name Julia. She was sentenced to 42 months in prison. Testifying through an interpreter, Santos said he was trained in all aspects of intelligence gathering, from how to penetrate an organization to how to photograph documents and handle them without leaving fingerprints. He also learned techniques for countersurveillance, recruitment, creating microdots, interpreting Morse code shortwave radio broadcasts, running computer encryption programs and how to pass findings to his fellow agents. The most sought-after morsels? ``Any information that might be classified, restricted or secret,'' he said. A frequent recruitment technique, especially overseas? Not telling the whole truth: ``Quite often the fact that they're working for Cuba is omitted,'' he said. Santos said agents were given a ``communications plan'' that designated permanent meeting places for different scenarios they might encounter. If he somehow lost contact with his handler, for instance, he was to go to the Driftwood Motel at 17121 Collins Ave. in Miami Beach and an intelligence officer would meet him. Santos' testimony was no surprise to the defense. His entire training history was outlined on computer disks that the FBI seized during their investigation of the spy ring. The contents fill three huge volumes that have been provided to jurors. In November 1995, Santos said, he was introduced to Hernandez during a meeting at the Pollo Tropical at Northwest 57th Avenue and Seventh Street. Hernandez -- who used a different name -- directed the Santoses to conduct research comparing FedEx, United Parcel Service and U.S. Postal Service because Cuba's intelligence headquarters was looking for new ways to transport its agents' encrypted computer diskettes. But Hernandez told the couple that their main mission was to penetrate the Southern Command by getting jobs there. They failed at that assignment, though at their sentencing hearing, prosecutors said the couple filed at least one ``detailed'' report on the Southcom headquarters complex in western Miami-Dade County. Prosecutors have said the Santoses were among the least culpable of 14 people indicted in 1998 after a major counterintelligence investigation into the so-called Cuban Wasp Network, La Red Avispa. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2254 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:16am Subject: Newly Created Spy Czar to Help U.S. Modernize Security Efforts Newly Created Spy Czar to Help U.S. Modernize Security Efforts http://www.latimes.com/news/nation/20010106/t000001491.html Espionage: Clinton's order envisions an updated counterintelligence system. It is backed by the CIA and FBI, and Bush is also expected to support it. From Associated Press WASHINGTON--President Clinton has signed an order creating a national counterintelligence executive to oversee the government's efforts to protect its most vital national security secrets, administration officials said Friday. The new executive will have a four-member board composed of the director of the FBI, the deputy secretary of Defense, the deputy director of the CIA and a Justice Department representative. White House spokesman Jake Siewert said Clinton took the action to help adapt U.S. counterintelligence efforts to a post-Cold War era "in which danger could come just as easily from a laptop [computer] and not the traditional cloak-and-dagger spies." "The old system was designed to counter intelligence threats that came from our adversaries in the Cold War," Siewert said. "Now you're in a new era where those threats are not quite as centrally localized and you need a more integrated system." Siewert said that, although the incoming Bush administration could reverse Clinton's decision, that looks doubtful since it is strongly supported by the CIA, the FBI and other agencies involved in counterintelligence matters. He said national security advisor Samuel R. "Sandy" Berger had briefed his anticipated successor, Condoleezza Rice. "They can undo it, but this is not a partisan issue," Siewert said. The organization will reside at CIA headquarters and will replace the CIA's National Counterintelligence Center, according to an administration official who discussed the matter in advance of the White House announcement. The center was created in 1994 after the arrest of Aldrich H. Ames, a longtime CIA officer convicted of spying for the former Soviet Union. The existing counterintelligence center at the CIA focuses on known, suspected or potential intelligence losses. The new organization will take a broader, more forward-looking approach. Siewert said it is unlikely Clinton will name the executive before he leaves office Jan. 20. Before the Ames case, which was one of the worst intelligence disasters in CIA history, the FBI and other government agencies had their own counterintelligence operations, but there was no central, government wide office in charge of protecting secrets. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2255 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:17am Subject: Philippines: 'Bugging' witness a no-show Philippines: 'Bugging' witness a no-show http://www.philstar.com/philstar/news200101060417030.htm 1/6/01 Senators suspended yesterday investigation on the alleged wiretapping and spying operations of the Presidential Anti-Organized Crime Task Force (PAOCTF) after a police official failed to appear at the hearing. Majority Floor Leader Francisco Tatad told reporters yesterday he had moved for a suspension of the investigation because the Senate had not heard from the unnamed police official, who had earlier promised to testify. "We had to suspend the investigation because next week our schedule will be full with the opening of the special session," Tatad said. Senate Secretary Lutgardo Barbo told reporters yesterday the police officer, who he identified only as "Mendoza," had sent feelers that he would like to testify to shed light to allegations that PAOCTF agents had bugged the phones of senators and other government officials. "I am not at liberty to give details but what I learned is that he was volunteered by somebody," he said. Yesterday, Chief Justice Hilario Davide Jr., impeachment court presiding officer, ordered to be make public the testimony of Lt. Col. Disocoro Reyes, PAOCTF chief technical officer, at an executive session of the court,, Earlier, Reyes told the impeachment court that PAOCTF has acquired P60 million worth of electronic surveillance equipment to monitor the operations of criminal syndicates. However, Reyes said that he can only testify about the details in an executive session because the matter is classified and involves national security. Tatad said he saw "nothing secret" about the documents presented by Reyes at the executive session because these contained details on a Kodak 200-mm. digital camera and other electronic surveillance equipment. Last Thursday, Senate President Aquilino Pimentel Jr. informed the impeachment court that a police officer is willing to testify that the senators had been placed under surveillance and that their telephones had been bugged. Pimentel told reporters he would not identify the witness until he had appeared before the Senate and revealed everything he knows about the alleged bugging operation. "I just told the court there is another police officer who is reportedly willing to testify openly that there was such a bugging of senators. If he is available tomorrow he will testify, if not maybe the following day," he said. ≠ Perseus Echeminada -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2256 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:23am Subject: TV Recorders Take Quantum Leap TV Recorders Take Quantum Leap by John Gartner 2:00 a.m. Jan. 6, 2001 PST http://www.wired.com/news/technology/0,1282,40493,00.html?tw=wn20010106 LAS VEGAS -- The second generation of personal video recorders (PVR) could give you a better view of football games than if you were on the 50-yard line. At this week's Consumer Electronics Show (CES), hard drive maker Quantum is demonstrating a video system that will enable set-top boxes, televisions, gaming consoles and satellite TVs to provide multiple camera angles, new instant replay features and even more programming. Personal video recording will be one of the many television-computing convergence technologies at CES, which runs through Tuesday. Quantum's (HDD) QuickView IEEE 1394 DVR Subsystem, which was announced earlier this week, extends the VCR-like programming and navigation features made popular by companies such as TiVo and ReplayTV by expanding the storage capacity and adding enhanced streaming video and file management technology. Quantum has added customized software for file management, which controls multiple real-time streams simultaneously and receives television programming schedules to its hard disk technology that was originally developed for PCs, according to Bentley Nelson, director of strategic marketing at Quantum. Nelson said broadcasters will develop new services that will distribute multiple audio- and videostreams in the background for later playback on Quickview-enabled recorders. For example, satellite TV broadcasters can send images from multiple camera angles during a live sporting event or concert into a buffer on their PVR. Fans will be able to select a variety of instant replay views, while the live feed continues to be received by the players. Nelson said that pay-per-view broadcasters could similarly stream multiple movies over a single channel, and customers would then choose any movie to playback at a time of their choosing. Quantum hard drives are used in the majority of PVR systems, including those from TiVo, ReplayTV and DirecTV. Panasonic is the first consumer electronics company to license the Quickview technology, and Nelson expects the first devices to hit store shelves within 6 months. Devices will likely include 40 gigabytes of storage, and Nelson expects that capacity to double within 14 months. Nelson said that PVRs are replacements for VCRs, CD changers, set-top boxes and satellite receivers, and the overall market could be twice that of PC hard disks. According to research firm IDC, the market for PVRs will continue will grow to 14 million units sold per year by the year 2004. Nelson said Quickview works with "5C Content Protection," a copyright technology used in encoding movies. Quickview also supports the 1394 Function Control Protocol that enables multiple devices to be daisy-chained to create an "unlimited" audio or video archive, Nelson said. Other top PVR competitors that will be showing off new products at CES will include Microsoft, TiVo, DirecTV and America Online. Microsoft chief Bill Gates will deliver the Opening Keynote address at CES on Saturday, when he is expected to unveil the much anticipated Xbox gaming console. He will likely demonstrate Microsoft's latest iteration of the WebTV platform, which like the Quantum system, creates an integrated media management platform that links to the TV. Thomson Multimedia has integrated WebTV's Ultimate PC service into its RCA-DIRECTV DWD490RE system, which will be unveiled at CES. The digital satellite TV receiver combines DIRECTV programming, digital video recording, interactive TV and Internet access with a hard disk-based recorder. The system has two digital tuners, enabling viewers to record two shows at the same time or watch one show while recording another. During his Monday morning keynote, Barry Schuler, president of America Online's (AOL) interactive services group, will talk about the company's AOLTV initiative that provides access to the their popular Internet services through set-tops and PVRs. Motorola (MOT) will unveil its Streamaster 5000T set-top box, which will be sold by telecommunications carriers and combines voice, video and data services through Digital Subscriber Line (DSL) connections. Blockbuster announced this week they will use the Streamaster boxes to deliver movies on demand in Portland, Oregon, and Salt Lake City. Other new product areas that will be featured at CES are Bluetooth wireless devices, advances in home networking and portable MP3 players, and components for the digital car such as satellite radios and telematics products. Copyright © 1994-2001 Wired Digital Inc. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2257 From: Date: Sat Jan 6, 2001 6:48am Subject: Tour The Former NSA Site Pisgah Astro Research Institute Site Tour or http://www.pari.edu/ 2258 From: Edward J. Michaels Date: Sat Jan 6, 2001 8:59am Subject: New to the list My name is Ed Michaels and I am Director of Investigations for General Security Systems, Inc., surveillance & investigations division known as GSSI. We are a 26 year old licensed private detective agency in MD, NJ & PA with corporate offices in our own building located at 1339 Brandywine Street in Philadelphia, PA. We have branch offices located in St. Claire PA, Maplewood NJ, Woodbury NJ and Tinicum, MD. My own background includes over 30 years in private security and investigation as well as public law enforcement and safety. I am not a retiree from law enforcement or public safety as I do not play politics well. I have invested 8 years of my carrier to labor strife security and 13 to defense investigation, surveillance and counter surveillance for corporate America, attorneys, insurance carriers and self insurers. [Non-text portions of this message have been removed] 2259 From: Jason Miles Dibley Date: Sat Jan 6, 2001 0:00pm Subject: Re: New cameras focus on fuel bandits In answer to the question raised regarding the feasibility of a camera to read a tax disc attached to a vehicle. The simple answer is that it doesn't. The cameras in these systems reads the number plate of the vehicle, that acquired image of the number plate is then checked against a number of lists that are loaded into the computer onboard the number plate reading system. These lists will be vehicles wanted by police, customs, security services, etc. Included on this computer will be an current list of all unlicensed vehicles in that area. This list will have come from the Vehicle licensing agency in Swansea (wales). As the system reads the number plate, if it appears on anyone of the lists then an activation will occur alerting the operators what the interest in the vehicle is. They will then stop and approach the vehicle and deal with it accordingly. So it's not that clever really just a shuttered CCD camera that acquires an image illuminated by pulsed infra-red light (so it can operate in the dark), of the vehicle number plate. The ANPR (Automatic Number Plate Recognition) software will then work out what letters and numbers appear on the plate. Once this is done it simply checks the number against the lists that have been loaded into the system. If the plate appears on the system that the machine shouts at the operators. Who will take the appropriate action. I hope this answers your question. Signed J M Dibley QCC Interscan Ltd. ************************************************************** Please visit our associates Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan Ltd as soon as possible or send mail to contact@q.... QCC Information Security Ltd. Registered in England and Wales No. 03773029 ----- Original Message ----- From: "Craig Snedden" To: Sent: Friday, January 05, 2001 2:36 PM Subject: Re: [TSCM-L] New cameras focus on fuel bandits > I can see that a recognition system would be able to pick up the pre-printed > portion of the tax disc and the colour (different colours for different > validity periods), which may catch out quite a number of defaulters, but in > my experience, only an inspection with the "mark one eyeball" will ascertain > if the handwritten portion (the vehicles details) has been tampered with or > not. > > It is a common method of alteration for a stolen tax disc to be treated with > a substance to fade or remove the pen ink, then fill in the details for the > car that it is going to be displayed on. Such alterations are easily > spotted by close visual inspection and touching the disc, but I can't see a > camera system being able to pick up on these. > > I'm sure the Government "boffins" will be looking at an RF device (passive > or active) embedded in the vehicle which will be validated by some means and > if invalid will send out a signal to static speed cameras, police cars etc. > > This raises questions of civil rights and freedom of movement....... > > Local authorities in the U.K. have just been given powers to raise revenue > from taxing vehicles entering certain areas, commonly city centres, > supposedly in a move to combat congestion. The U.K. has just recently > adopted the European Convention of Human Rights. Does the imposition of a > tax on my freedom of movement on the public highway, when there is no > alternative route to my destination, not impose on my Human Rights? > > I know our cousins in the US have been tackling these sorts of questions for > years now. Any comments? > > Sorry this got a bit off topic, but in a way it's still to do with > surveillance..... ;-) > > Craig > > ----- Original Message ----- > From: "Talisker" > To: "TSCM-L Mailing List" ; "James M. Atkinson, > Comm-Eng" > Sent: Thursday, January 04, 2001 6:22 PM > Subject: Re: [TSCM-L] New cameras focus on fuel bandits > > > I saw a TV programme on this recently, and know that the number plate > > reading is working well, however, I really can't see that reading the tax > > disc is feasible, in the UK the lettering is just over an inch tall and on > > top off hard to copy colouring making the letter outline difficult to > read, > > add to this that the disc is displayed inside the windscreen at a variety > of > > positions and angles. Also the disc is displayed in a portion of the > > windscreen outside the coverage of the wipers. > > > > Any opinions from the CCTV geeks out there? Oh and the range from camera > to > > windcreen is 10,s of metres > > > > Andy > > http://www.networkintrusion.co.uk > > Talisker's Network Security Tools List > > ''' > > (0 0) > > ----oOO----(_)---------- > > | The geek shall | > > | Inherit the earth | > > -----------------oOO---- > > |__|__| > > || || > > ooO Ooo > > talisker@n... > > > > The opinions contained within this transmission are entirely my own, and > do > > not necessarily reflect those of my employer. > > > > > > > > > > > > ----- Original Message ----- > > From: "James M. Atkinson, Comm-Eng" > > To: "TSCM-L Mailing List" > > Sent: Thursday, January 04, 2001 12:19 AM > > Subject: [TSCM-L] New cameras focus on fuel bandits > > > > > > > > New cameras focus on fuel bandits > > > > http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 > > > > by David Williams, > > Motoring Editor > > > > Twenty-four surveillance is being launched by police at London filling > > stations to combat a huge rise in the number of people stealing fuel - > > following a year of sharp petrol price rises. > > > > Up to £2 million worth of fuel is now being stolen from forecourts in the > > capital every month. Motorists are driving off with up to £60 of fuel at a > > time, although the average haul in London is £26. > > > > The boom in "drive-offs" has doubled since the problem was reported in the > > summer, when 1,200 garages within the M25 were losing between £750,000 and > > > £1 million every month. > > > > Then the British Oil Security Syndicate (Boss) said thousands of > drive-offs > > were occurring every four weeks. Nationally the crisis cost petrol > retailers > > at least £11.2 million last year. > > > > New Year figures, however, are expected to show a doubling in drive-offs > in > > the past eight months, and police say the crimewave is nationwide. > > > > Now the Met has begun fighting back by installing high-resolution spy > > cameras linked to a powerful mobile police computer, and arrests have > > already been made. The computer reads every car number plate entering a > > forecourt and checks them against lists of known offenders who have > > previously been reported to police following drive-offs. > > > > Police also programmed the computer to issue an alert if it spots vehicles > > involved in other crimes or with no valid tax disc. > > > > In most cases offenders are approached by plain-clothes officers before > they > > drive off. Backed by the oil industry, the operation was launched secretly > > at 30 south London forecourts and is expected to spread throughout London > > before going nationwide. Detective Inspector Larry Lawrence said: "The > > computer works in the blink of an eye and has proved very successful. > > > > "We are pleased to be working with Boss to tackle forecourt crime. The > > figures are quite high but this type of crime is preventable. > > > > "We believe the pattern we have found in south London reflects a > London-wide > > problem." > > > > Tom Sterling, Boss chief, said: "The habitual drive-off offender is the > tip > > of the iceberg as forecourt crime goes. People who do this normally engage > > in other crimes too." Earlier this year Boss reported that since 1998 > credit > > card fraud at filling stations across Britain leapt from £12.2 million to > > £19 million. > > > > Drivers claiming to have "forgotten their wallet" and driving off rose to > £5 > > million this year. > > > > Police also urged oil firms to install barriers at petrol station > > forecourts. They feel that with further rises in the cost of petrol, > > drive-offs will continue to soar. > > > > In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around > > 77.9p. > > > > -- > > > > ======================================================================= > > Sed quis custodiet ipsos Custodes? > > "In a time of universal deceit, telling the > > truth is a revolutionary act" - George Orwell > > ======================================================================= > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > ======================================================================= > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Technical Security, and Counterintelligence Site on the Internet. > > ======================================================================= > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2260 From: Jordan Ulery Date: Sat Jan 6, 2001 10:04pm Subject: Re: Digest Number 475 Florida has an extensive web site that may answer your question. You may also wish to direct the question to PI-Digest for comment from PIs from FL. Message: 3 > Date: Wed, 3 Jan 2001 21:34:36 -0500 > From: "Gerard P. Keenan" > Subject: FL licensing for security/Brad Robinson 2261 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 10:52pm Subject: Book Recommendation - Spooked: Espionage in Corporate America Good evening, Here is another book that I think list members will find really interesting as it is right on target as to what we are all about, and what we do to stop or at least neutralize technical espionage. It's also a good book to give to potential customers along with your business card, and a company brochure regarding your TSCM and bug detection services. One of the authors is actually a list member, and at least one list member is quoted in several cases. Spooked: Espionage in Corporate America Adam L. Penenberg Marc Barry Barnes and Noble Price: $20.80 (20% Discount) Retail Price: $26.00 In-Stock: Ships 2-3 days Format: Hardcover, 288 pp. ISBN: 0738202711 Publisher: Perseus Publishing Pub. Date: December 2000 You can order it directly on the Barnes and Noble website by clicking on the following link... and let me know what you think after you read it. http://barnesandnoble.bfast.com/booklink/click?sourceid=324303&bfpid=0738202711&bfmtype=BOOK -------------------------------------------------------------------- List members should also know that the classic eavesdropping movie "The Conversation" was recently released on DVD, and this movie is something every TSCM'er should have. It is rumored that the movie was actually based on the experiences of one of the members of this list. The Conversation Francis Ford Coppola, Gene Hackman, John Cazale, Allen Garfield http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0097360230741&bfmtype=dvd Barnes and Noble Price: $24.99 (16.6% Discount) Format: Wide Screen / Dolby 5.1 / Surround Sound Region Code: 1 Original release date: 1974 Video/DVD Release Date: 12/12/2000 UPC: 97360230741 PARAMOUNT Includes: Production and Technical Notes: Aspect Ratio: 1.85.1 Presentation: Wide Screen Sound: Dolby Digital, Surround Sound Language: English, FranÁais Subtitles: English Time: 1 Hour 53 Minutes or if you prefer a VHS cassette version: http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0097360230789&bfmtype=dvd Barnes and Noble Price: $12.99 (13.3% Discount) In Stock: 24 hours (Same Day) Original release date: 1974 UPC: 97360230789 PARAMOUNT -------------------------------------------------------------------- There was a recent variation of the above movie, which also had Gene Hackman in it (playing a character very similar to that he played in "The Conversation"), and it is a MUST HAVE for anybody in the TSCM or technical security professions. On an added note two list members were technical consultants to the movie. Enemy of the State Tony Scott, Will Smith, Gene Hackman, Jon Voight http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0717951001634&bfmtype=dvd Barnes and Noble Price: $24.99 (16.6% Discount) In Stock: 24 hours (Same Day) Format: Wide Screen / Dolby 5.1 Region Code: 1 Rating: Original release date: 1998 Video/DVD Release Date: 6/15/1999 UPC: 717951001634 WALT DISNEY VIDEO Includes Production and Technical Notes: Aspect Ratio: 2.35:1 Presentation: Wide Screen Sound: Dolby Digital Features: Closed Caption, movie trailer, featurette, Language: English, FranÁais Time: 2 Hours 12 Minutes or if you prefer a VHS cassette version: http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0786936091526&bfmtype=dvd Barnes and Noble Price: $12.99 (13.3% Discount) In Stock: 24 hours (Same Day) Original release date: 1998 Video/DVD Release Date: 11/2/1999 UPC: 786936091526 WALT DISNEY VIDEO -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2262 From: James M. Atkinson, Comm-Eng Date: Mon Jan 8, 2001 9:24am Subject: Pentagon Traffic Jam A Marine colonel, on his way home from work at the Pentagon, came to a dead halt in traffic and thought to himself, "Wow, this traffic seems worse than usual. Nothing's even moving." The colonel noticed a police officer walking back and forth between the lines of cars, so he rolled down his window and asked, "Officer what's the hold up?" The officer replied, "The President is just so depressed about the thought of moving with Hillary to New York that he stopped his motorcade in the middle of the Beltway and he's threatening to douse himself in gasoline and set himself on fire. He says his family hates him and he doesn't have the money to pay for the new house. We're taking up a collection for him." Oh really? How much do you have so far?" " About three hundred gallons, but a lot of folks are still siphoning." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2263 From: Elliott & Associates, Ltd. Date: Mon Jan 8, 2001 0:01pm Subject: The Conversation A couple of weeks back there was some discussion about the movie The Conversation with Gene Hackman. A comment was made to the effect that it was rumored that the movie was based on the life of a TSCM list member. The facts are that the movie was patterned after the life of Hal Lipset who was a PI in San Francisco for years. In fact Hal Lipset served as an advisor on the movie. Hal Lipset died a couple of years back, but was playing with recording/video devices up to the end. In the mid 60s Hal Lipset was one of several people who testified before Congress about eavesdropping devices, bugging, etec. Up to this point (60s) there had been no federal law prohibiting use of bugging devices. Hal got national attention because of his Martini Olive bug which was really a toy and good for 10 to 20 feet and that was if it hadn't been eaten The Martini Olive bug should not be confused with the Vagina transmitter designed by Winston Arrington. The Vagina transmitter will go 500 feet or better to a receiver. Just setting the record straight. Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com 2264 From: 1RCM <1RCM@M...> Date: Mon Jan 8, 2001 5:55pm Subject: Information Needed Hi List, I'm looking for any list member who might be located in the Boise, ID. area. I'm contemplating an equipment deal with an individual at that location and would be interested in any possible local reputation information and/or paying for someone's time to have them check the piece before I buy it. The items' cost isn't that extravagant but still is far more than I care to lose blindly. Please respond directly and off-list. Thanks, Bob 1RCM@M... 2265 From: Ray Fitgerald Date: Mon Jan 8, 2001 6:34pm Subject: Re: The Conversation One of my favorite movies.I have two copies. Your info is right on the mark. Another good one more up to date is "Sneakers" with Robt Redford.And "Enemy of the State" Raymond J. Fitzgerald Bureau Of Special Services bosspi@i... http://business.inc.com/bosspi 845-543-6487 --- 845-534-1060 FAX Licensed & Bonded Investigators in N.Y. since 1973 Member: NALI,ALDONYS,NAPPS,COIN,EPIC. " Truth Never Fears Detection " -----Original Message----- From: Elliott & Associates, Ltd. To: TSCM-L@egroups.com Date: Monday, January 08, 2001 1:03 PM Subject: [TSCM-L] The Conversation >A couple of weeks back there was some discussion about the movie The >Conversation with Gene Hackman. A comment was made to the effect that it was >rumored that the movie was based on the life of a TSCM list member. > >The facts are that the movie was patterned after the life of Hal Lipset who >was a PI in San Francisco for years. In fact Hal Lipset served as an >advisor on the movie. > >Hal Lipset died a couple of years back, but was playing with recording/video >devices up to the end. > >In the mid 60s Hal Lipset was one of several people who testified before >Congress about eavesdropping devices, bugging, etec. Up to this point >(60s) there had been no federal law prohibiting use of bugging devices. Hal >got national attention because of his Martini Olive bug which was really a >toy and good for 10 to 20 feet and that was if it hadn't been eaten > >The Martini Olive bug should not be confused with the Vagina transmitter >designed by Winston Arrington. The Vagina transmitter will go 500 feet or >better to a receiver. > >Just setting the record straight. > > >Bill Elliott, CII >ELLIOTT & ASSOCIATES, Ltd. (GMT -7) >http://www.prvt-eye.com > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 2266 From: William Knowles Date: Mon Jan 8, 2001 8:58pm Subject: Documentary Examines NSA Role, History http://ap.tbo.com/ap/breaking/MGAY80WKNHC.html [I see this will be on again at 10:00pm C.S.T. -WK] By Eun-Kyung Kim Associated Press Writer Jan 6, 2001 - 12:11 PM WASHINGTON (AP) - The National Security Agency, the supersecret intelligence mission most Americans do not even know exists, gives some explanation in a television documentary for its tightlipped behavior. "It's really important that the American people understand what we do, that we are in fact a relatively powerful organization. And it's absolutely critical that they don't fear the power that we have," the agency's director, Lt. Gen. Michael V. Hayden, says in a rare interview. The History Channel program, airing Monday as part of the network's "History's Mysteries" series, seeks to explain the agency's mission and examines recent controversies. Considered the eavesdropping branch of the intelligence community, the NSA gathers information through satellites, telephone intercepts and other methods. Not much else is known about the NSA, which employees joke stands for "No Such Agency" Hayden offers little more. "We intercept communications of adversaries of the United States and attempt to turn that into wisdom for American policy-makers and commanders," he said, according to a transcript of the show. "By the same token, we attempt to prevent other nations from doing that to the United States of America. That's what we do." Congress recently resolved a budget battle over funds for the NSA when President Clinton signed legislation authorizing money for intelligence agencies, including the NSA and CIA. He had vetoed the original spending bill because of a provision that would have made the leaking of government secrets a felony offense. The exact budget figure included in the bill is classified. "If you were comparing NSA to a corporation in terms of dollars spent, floor space occupied and personnel employed, it would rank in the top 10 percent of the Fortune 500 companies," said Judith Emmel, a spokeswoman for the agency, which has its headquarters in Fort Meade, Md. Last year, the NSA defended itself against allegations it illegally snooped into e-mail messages and other communications between ordinary Americans. On the cable program, Hayden denied such action. "I'm here to tell you that we don't get close to the Fourth Amendment," he said, referring to the constitutional provision prohibiting unreasonable search and seizure. "We, for better or worse, stay comfortably away from that line." The program recounts the agency's history and the codes it has deciphered from Japanese, German, Vietnamese and other foreign governments during past conflicts. "The ability to do communications intelligence has saved lives. It has kept us out of war. It has shortened war when we've been in it," said David Hatch, NSA senior historian. The NSA had to revise its mission after the 1991 collapse of the Soviet Union. The agency soon shifted its focus to terrorists, drug traffickers and the threat of war over the Internet. "Cyberwar is a term that you hear today a lot. And the business we're in is to counter the effectiveness of cyberwarfare against our infrastructures," said Michael Jacobs, deputy director of information assurance. "We acquire information, we determine its value and we pass it on," said Maureen Baginski, who heads NSA's Office of the Director. "Really, what you have here is a bunch of Americans that are safeguarding Americans." -- On the Net: National Security Agency: http://www.nsa.gov History Channel: http://www.historychannel.com/ *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2267 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 0:48am Subject: Shake-up could revive KGB Shake-up could revive KGB By Andrew Jack in Moscow http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3PE8PLQHC&live=true&tagid=ZZZAFZAVA0C&subheading=europe Published: January 8 2001 20:35GMT Last Updated: January 8 2001 22:31GMT The Russian government is considering reorganising its special services organisations, triggering concerns from critics about the re-creation of the Soviet-era KGB. Quoted on Russian press agencies, Sergei Ivanov, secretary of the advisory Security Council, said that strengthening links between the special services was one of the priority issues for the coming six months. The agencies involved would include the FSB, responsible for intelligence gathering, the Border Guards, and Fapsi, the agency in charge of interception of communications. Mr Ivanov's statement sparked a warning from Sergei Yushenkov, deputy chairman of the Russian parliament's security committee, that in the wake of the restoration of the music of the Soviet-era national anthem, the KGB's name - meaning the committee for state security - could also be reintroduced. Mr Yushenkov said the recreation of a single agency might make the activities more efficient, but it would reduce the control of civil society over their operations. Since the appointment of Vladimir Putin, a former KGB agent and one-time head of the FSB, as president, there has been growing concern by liberal critics over the power of the security services. Former president Boris Yeltsin broke up the KGB after the 1991 coup against the ex-Soviet leader Mikhail Gorbachev, although he never fully disbanded its constituent parts. Mr Yushenkov said the government had proposed draft legislation in the parliament last November on the reunification of the special services, but it had triggered too much concern to be passed. Mr Ivanov, himself a former KGB agent and long-standing colleague of Mr Putin, has been tipped as a possible future defence minister, prime minister or head of the presidential administration. He has been active in building up the influence of the Security Council. The council has been instrumental in developing Russia's national security, military and information doctrines, and has expanded its role into the social sector, politics and other areas. The Russian daily newspaper Sevodnya, which is owned by Vladimir Gusinsky, the exiled media tycoon who has been critical of Mr Putin's administration, last week warned of the risk of a return of the KGB. However, Konstantin Preobrazhensky, a security analyst and former KGB agent who has become a strong critic of the organisation, said he doubted that the former special services would be formally reunited into a single organisation. He said that each division - including the SVR or foreign espionage network - had its own ministerial-level chief, all of whom would be reluctant to share information or give up their power in favour of a single head. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2268 From: Date: Mon Jan 8, 2001 1:47pm Subject: New Member - UK. ISDN I'm a well established P.I in the UK and looking for any info on the systems alternative use of ISDN lines. I'm told that this now has the same use as the old analogue Infinity Transmitter. I appreciate your all mostly from the States but any idea's ? 2269 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:42pm Subject: History Looks at the NSA History Looks at the NSA http://www.wired.com/news/politics/0,1283,41063,00.html by Declan McCullagh 2:00 a.m. Jan. 9, 2001 PST WASHINGTON -- As anyone who watched Enemy of the State knows, the National Security Agency is a rapacious beast with an appetite for data surpassed only by its disregard for Americans' privacy. Or is the opposite true, and the ex-No Such Agency staffed by ardent civil libertarians? To the NSA, of course, its devilish reputation is merely an unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden, has taken every opportunity to say so, most recently on a History Channel documentary that aired for the first time Monday evening. "It's absolutely critical that (Americans) don't fear the power that we have," Hayden said on the show. He dismissed concerns about eavesdropping over-eagerness and all but said the NSA, far from being one of the most feared agencies, has become one of the most handicapped. One reason, long cited by agency officials: Encryption. The show's producers obligingly included stock footage of Saddam Hussein, saying that the dictator-for-life has been spotted chatting on a 900-channel encrypted cell phone. That's no surprise. The NSA, as Steven Levy documents in his new Crypto book (which the documentary overlooks), has spent the last 30 years trying to suppress data-scrambling technology through export regulations, court battles, and even personal threats. Instead of exploring that controversial and timely subject that's tied to the ongoing debate over privacy online, "America's Most Secret Agency" instead spends the bulk of an hour on a history of cryptography starting in World War II. Most of the documentary could have aired two decades ago, and no critics are interviewed. One of the few surprises in the otherwise bland show is the NSA's new raison d'etre -- infowar. Since its inception in the dark days of the Cold War, the NSA has had two missions, protecting the government's communications while tunneling through the ciphers that guard the enemy's. (Occasionally the two have conflicted.) "The business we're in is to counter the effectiveness of cyberwar against our infrastructure," said Michael Jacobs, the NSA's deputy director for information systems security. Jacobs cited power grids, transportation, air traffic, energy and health services as examples of industries "which have information that is critical to some segment of our society" and must be protected from terrorists, criminals and hackers. In the agency's National Cryptologic Strategy for the 21st Century document, the NSA says it will "develop applications to leverage emerging technologies and sustain both our offensive and defensive information warfare capabilities." One part of the NSA, the Information Systems Security Organization, is devoted to just that. The group even has an outreach program to take advantage of the "talents of government and industry partners" in secure system design, evaluation, and testing. Another program (call 800-688-6115) even offers two-day training classes. If all this sounds like a tremendously geeky community college, the NSA doesn't seem to mind. "I'm here to tell you we don't get close to the Fourth Amendment," says the NSA's Lt. Gen. Hayden. The Fourth Amendment, as we learned in civics classes, explicitly prohibits "unreasonable" searches and seizures, and implicitly allows reasonable ones. What that means in practice is that the NSA is not permitted by law to spy on American citizens. But that broad prohibition, codified in the Foreign Intelligence Surveillance Act, hasn't stopped fears of NSA overzealousness, fueled by persistent reports of the Echelon data-reporting system. In early 2000, the House Intelligence committee held hearings after an outcry over a reported NSA global surveillance system called Echelon. Few legislators asked tough questions. In fact, the National Commission on Terrorism recommended last summer that Congress should give federal police more eavesdropping abilities and increase the budgets of spy agencies. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2270 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:45pm Subject: Nowhere to hide / A special report on privacy Nowhere to hide / A special report on privacy http://www.thestar.com/apps/AppLogic+FTContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=978841852931&call_page=TS_@Biz&call_pageid=971794782442&call_pagepath=Business/@Biz As monitoring tools multiply, society weighs your privacy against profit, public interest in knowing Tyler Hamilton TECHNOLOGY REPORTER A SPECIAL REPORT ON PRIVACY Two astronauts hold a secret meeting in a tightly sealed space pod, detailing through whispers a plan to seize control of their computer-hijacked vessel. In the background, the hijacker - a malfunctioning supercomputer named HAL 9000 - silently observes the movement of their lips, processes the data and analyzes the meaning of their supposedly private conversation. It's a chilling scene. As filmmaker Stanley Kubrick demonstrated in his sci-fi movie classic, 2001: A Space Odyssey, it's virtually impossible to conceal one's privacy in an age where technology rules the day - and in many cases, runs amok. In the 33 years since Kubrick released his film, our technological odyssey has become more science than fiction. The year is 2001. We live in a highly connected digital society, one that's capable of peeking into our personal worlds, taking detailed snapshots and following the trail of electronic cookie crumbs we leave behind. The threat to individual privacy is more real than ever, as more consumer, financial and medical data is collected as fuel for our burgeoning electronic economy. Governments watch and track us in the name of health and welfare. Businesses monitor and study us to sell more goods and keep their employees honest. ---------------------------------------------------------------------------- `If there is no demonstrated need for the information, it should be gone.' - Bruce Phillips, Canada's former privacy commissioner `It's not like there's this evil intention. Part of (the fear) is that nobody actually follows the data trail.' - Valerie Steeves, Carlton University law professor ---------------------------------------------------------------------------- Sometimes we know it's happening. Sometimes we don't. Either way, privacy breaches are being felt and noticed. Consider the following: The U.S. Federal Bureau of Investigation has called ``identity theft'' - a form of fraud through impersonation - the fastest growing crime in North America, partly because of the ease with which personal data can be accessed through computer systems and the Internet; A perceived lack of privacy and security on the Internet continues to be cited in Canadian and U.S. studies as the leading factor holding back the growth of e-commerce. Meanwhile, a recent Canadian study found that half of commercial Web sites in Canada don't have policies aimed at protecting consumer privacy; According to Denver-based research firm The Privacy Foundation, workplace surveillance was the leading privacy concern in 2000, an issue that has lowered staff morale at many companies. Privacy advocates say the need to protect our lives from unwanted, unnecessary and malicious intrusions has come to a critical juncture. But where do we draw the line? And what are the rules for crossing that line? The answers will have profound social, economic and legal implications for businesses, governments, consumers and citizens. ``We have an enormous obligation to get it right,'' says Marc Rotenberg, executive director of the Electronic Privacy Information Center in Washington, D.C. ``Privacy has become a global issue. It has become a political issue. It has become a technological issue. It has become an issue for the courts.'' In the United States, more than two dozen companies have been sued for tracking online consumers without their consent, including Internet advertising firm DoubleClick Inc. and defunct e-tailer Toysmart.com. More than 65 privacy-related bills are currently pending in Congress. Meanwhile, the U.S. Federal Trade Commission has unofficially accepted a role as privacy watchdog. So far, it has taken action against nearly 200 companies. ``Yes, we actually pay people to surf the Net,'' says FTC commissioner Mozelle Thomson. ``This issue is on the front burner.'' In Canada, the legislators have been busier than the lawyers. Last week, a new federal law - formerly known as Bill C-6 - came into force that gives Canadian consumers more control over how their information is collected and used in the private sector. The new legislation, which complements the existing public sector Privacy Act, aims to promote electronic commerce by creating an online environment of trust and respect. But that's just the beginning of Canada's privacy odyssey. The provinces - except for Quebec, which already has private-sector legislation - will soon be jumping in with their own draft bills, laying the foundation for future laws to deal with health records, genetic testing and surveillance in the workplace. ---------------------------------------------------------------------------- `These are huge issues that as a society we have to confront. Privacy will be the defining issue of this new decade we're entering.' - George RadwanskI, Canada's privacy commissioner ---------------------------------------------------------------------------- ``These are huge issues that as a society we have to confront,'' says George Radwanski, the country's new federal privacy commissioner, whose policing powers now extend to the private sector. ``Privacy will be the defining issue of this new decade we're entering,'' he says. ``My role is to be the champion of Canadians in this regard and to make them aware of these issues.'' A fishbowl society Radwanski points out that privacy is not absolute. We reveal much about ourselves by simply opening up a bank account, handing in a rÈsumÈ for a job, or walking out our front door to pick up the daily newspaper. Still, he says privacy in the electronic age is deteriorating at an alarming rate. To make matters worse, it has become increasingly difficult to pinpoint just who's watching us and where our personal information is flowing. Stealth video cameras record us in parking lots, elevators and office buildings. Software keeps track of our keystrokes, e-mails and the Web sites we visit. Radio scanners frequently intercept our wireless phone calls, and satellite-tracking technologies can trace the location of vehicles, not to mention the fashionable ``smart'' devices we carry with us. In the United States, the FBI is using a technology called Carnivore that can target and randomly read e-mail as it passes through gateways to the Web. The software was designed to net criminals, but critics charge that it catches much more than it should. As the motto on one electronic surveillance Web site reads: ``In God we trust. All others we monitor.'' Biometric technologies have even made it possible for computers to spot us in crowds, recognize us through our own unique odours and identify us through the rhythm of our walk. About a year ago, a computer scientist at Carnegie Mellon University in Pittsburgh taught a computer to read lips - just like HAL. Sadly, real-time surveillance is just the tip of the iceberg. Below the surface lie large masses of personal databanks, increasingly organized and often unprotected from hackers, disgruntled employees and old-fashioned criminals. Governments, businesses and law enforcement agencies use powerful, memory-rich databases known as ``data warehouses'' to electronically store and analyze this information, creating a way to sketch eerily accurate profiles of our lives. ``This is all being linked together,'' says Austin Hill, president of Montreal-based Zero-Knowledge Systems Inc., a developer of software that lets people conceal their online identities. Hill says the Internet, helped by its multimedia cousin the World Wide Web, has made it easier than ever to collect, share, replicate, move and link this information. And it can do it at lightning speeds, thanks to advances in fibre-optic technologies that transport data as pulses of light. The Internet has essentially become a universal repository for personal data, easily accessible by a growing number of Web-enabled devices - from laptops and Palm organizers to ``smart'' phones and fridges. Michael Power, a privacy expert and partner with Canadian law firm Gowlings, likes to think of data as a liquid. ``Information flows like water,'' he explains. ``If it hits something it just finds another way to get around it.'' Still, the question remains: Why collect all this data in the first place? In the public sector, politicians argue that getting a better understanding of constituents allows them to do their jobs properly and keep the streets safer at night. Whether it's a gun registration database, a criminal DNA repository or the latest Statistics Canada census, the idea is to use this data to shape policy, improve government services and limit dangers to society. ``The policy-makers are very much into an efficiency mode of thinking,'' says Valerie Steeves, a law professor at Ottawa's Carleton University and a specialist in privacy policy. ``There's a real resistance to stopping the flow.'' In Ontario, the government is pushing through a plan to issue multi-purpose ``smart cards'' that would combine a person's photograph with health, driver's license, birth certificate and other information. A computer chip embedded within the card would keep updated records of an individual's interaction with hospitals, courts and traffic cops. The provincial government is also building a network that would integrate information flowing through the justice system, meaning lawyers, courts and police could access a common pool of data. A similar network is planned for health care. Nationally, the federal government has been no less active. Its Government On-Line initiative aims to provide electronic access to all federal programs and services by 2004, changing the way citizens file taxes or apply for passports. This spring, Ottawa will spend about $400 million and employ 40,000 staff to collect personal data for this year's Statscan census. Beginning May 15, more than 30 million Canadians will be asked intimate questions about their lives, and many will be legally required to divulge their income, ethnicity, disabilities - even sexual orientation. In exchange for the intrusive questionnaire, the government promises confidentiality. Where does the information end up? In a database where it undergoes statistical analysis, just like all census information from the past. And for the first time, Statscan will allow certain individuals to file their information over the Internet. ``It's not like there's this evil intention,'' says Steeves, referring to the many instances where governments collect sensitive personal information. ``Part of (the fear) is that nobody actually follows the data trail.'' That said, the Big Brother envisioned by George Orwell in his book 1984 doesn't look so threatening when measured against big business. The desire to monitor employees and the thirst for consumer data has grown to unprecedented levels in the corporate world. Video surveillance, keystroke monitoring, e-mail filtering and voice-mail recording are now common features in the workplace, where an increasing number of employers are asserting their right to audit the productivity of their staff and protect themselves from potential lawsuits. In the United States alone, two-thirds of corporations monitor their employees to some degree, according to the American Management Association. Meanwhile, the value of personal information as a well-focused marketing and advertising tool has soared in the Internet and computing age. Data mining and analysis software is helping online and off-line companies know their customers better, whether the goal is understanding buying behaviour, making note of product preferences or anticipating future purchases. Ultimately, advertising can be directed and personalized to build stronger customer relationships and sell more Gap jeans, Coke products or Trojan condoms. This explains why more than 85 per cent of all Web sites collect personal information from online visitors. For dot-coms such as DoubleClick and Amazon.com, this information is critical to their existence. For loyalty programs like Air Miles, such information is their existence. The threat Jason Catlett, a leading privacy guru south of the border and founder of advocacy firm Junkbusters Corp., says the detail and quality of information being collected is becoming more and more invasive, and it's doubling every two years. ``There's a real danger here of concentration of information, because it provides a single point of failure,'' says Catlett. ``If there's no one watching the shop, then the shoplifters are going to run amok.'' For many people, the response is: so what. How, they ask, can something as simple as data represent a threat or danger? The answer to this question goes far beyond the annoyance of spammers, junk mailers and telemarketers. Rather, it deals with the risks posed by stalkers, thieves, suspicious lovers, curious employers and overly snoopy insurance companies. Consider the following two cases: Last month, it was discovered that an outlaw biker gang had infiltrated Quebec's automobile-insurance board and, by accessing its computer systems, tracked down the addresses and phones numbers of rival gang members, police officers and journalists. Police suspect that confidential data was wrongfully obtained on Journal de Montreal reporter Michel Auger - who was shot five times on Sept. 13 in his newspaper's parking lot - and may have been passed along to his assailants, making it easier to track him. In 1997, a grandmother from Ohio received a letter from a prison inmate in Texas who knew intimate details about her life, such as how often she uses sleeping aids, deodorizers and hemorrhoid medication. The inmate, a convicted rapist, also offered in his letter to fulfill her sexual desires and fantasies when he was eventually released from prison. Needless to say, the woman suffered months of emotional and psychological torture. It was eventually discovered that the inmate bought the data from another prisoner. Apparently, the second inmate had a data entry job as part of a prison-labour program. The data in question was an elaborate consumer survey the woman had filled out earlier. ``Don't blame things like the Internet,'' says Catlett. ``Blame the increase in the amount of data, and the lack of controls in handling it.'' It's not that consumers never knowingly hand over their information. Generally, people don't hesitate to participate in online surveys or loyalty programs if it means discounts on merchandise or better, more personalized customer service. What many don't know is where their personal data could end up. The cases, unfortunately, are plentiful. In British Columbia in the mid-1990s, three staff at a Vancouver abortion clinic found out that their license plate numbers had been obtained through an RCMP computer system. It was later discovered that the officer who accessed the records had passed along the personal data to his mother - a worker with an anti-abortion group. David Flaherty, then privacy commissioner of British Columbia, used that case as part of a larger investigation into the abuses with motor vehicle databases. ``I've done some work more recently with abortion clinics,'' says Flaherty, who now works as a privacy consultant. ``Their staff literally have to look under their cars for bombs before they get into them.'' Flaherty - who considers privacy a human right - says there is a blind assumption among many individuals that safeguards for protecting personal information are being followed. He says most organizations have no interest in unnecessarily invading people's privacy, but mistakes do happen. ``I'm surprised at how many people work in some of these database-intensive industries with access to information,'' he says. ``Sure, they all have confidentiality agreements - big deal.'' Whether it's an innocent slip of the mouse, a case of taking kickbacks, or a security oversight that is sniffed out by hackers, employees that have access to computer systems within an organization are often the weakest link when it comes to protecting privacy. Network firewalls, biometric technologies, security passwords and encryption software can help, but only if processes and procedures are closely followed and audited. According to research firm IDC Canada Ltd., accidents and human error - not hackers - pose the biggest security threat to business computer networks and Web sites in Canada. When such systems hold vast amounts of personal data, a security risk instantly becomes a privacy risk. It's no wonder Bruce Phillips, Canada's former privacy commissioner, decided last spring to blow the whistle on a huge database system created by Human Resources Development Canada. The database, designed for no apparent purpose, carried detailed profiles on more than 33 million Canadians - information gathered without their knowledge or consent. ``If there is no demonstrated need for the information, it should be gone,'' says Phillips, explaining that purpose and consent are two basic principles to which organizations should adhere. HRDC tried to defend the database as a research tool, but two weeks later, under the weight of public criticism, it pulled the plug. Privacy risks grow even larger when such information is being gathered by profit-driven Web ventures that are far less stable than government. Take Toysmart.com, an online retailer that filed for bankruptcy in June. Despite assurances in its privacy policy that it would protect the personal information of its customers and never share that data with third parties, Toysmart decided to auction off its customer list to the highest bidder as a way to help pay off its debts. Last year, more than 210 ``dot-coms'' went belly up, according to San Francisco-based consulting firm Webmergers.com. The closures left 15,000 people out of work and hundreds of detailed customers lists at the mercy of disgruntled employees and anonymous buyers. ``There is an awful lot of data out there floating around with nobody willing to protect it,'' says Catlett, adding that the Toysmart.com case demonstrates what companies are willing to do when backed against a wall. ``You don't want some pervert calling up your kids pretending to be Ken and asking for Barbie. (The Toysmart customer list) deserves protection.'' But even genuine attempts at protection often fail: In January, 1999, a security oversight with the Airmiles.ca Web site exposed detailed personal information on tens of thousands of Canadians who had filled out a ``confidential'' survey for the popular rewards program. In all, 82 categories of information were open for view, including data about types of credit cards held, the number of cars owned and whether the person was a pet owner or mobile-phone user. Fortunately, credit card numbers and data on specific product purchases were not revealed; Last April, Toronto-based wireless service provider Look Communications also blamed human error for a security breach that left hundreds of customer files - including phone and credit card numbers - exposed on the Internet. Amazom.com, Microsoft Corp., Yahoo Inc., AT&T Corp. and Nissan Motor Co. Ltd. are among a list of well-known companies that have experienced similar goof-ups. Then there are the blatant attacks. Online auction site Egghead.com admitted last month that someone had breached their computer systems and possibly stolen up to 3.7 million credit card numbers and other customer information. The fact that so much data is floating around unguarded or under attack explains why identity theft - the use of another person's identity to commit fraud - has quickly become the fastest growing crime in North America. These days, crawling around in garbage dumpsters, picking pockets and raiding mailboxes has been replaced by Internet search engines, do-it-yourself hacker kits and online services that do all the dirty work for a nominal fee. ---------------------------------------------------------------------------- `As search engines become more powerful, they become a way to aggregate that information. That's how you create a profile on somebody.' - Michael Power, partner with Gowlings law firm ---------------------------------------------------------------------------- ``If it goes into a computer system, you never know where it's going to show up,'' explains Power, the partner with Gowlings. ``As search engines become more powerful, they become a way to aggregate that information. That's how you create a profile on somebody.'' Once that profile is created, it's easy for someone you've never met to impersonate you, make purchases under your name, access bank accounts and commit other crimes. Then one day, you get an unpleasant surprise: Your bank account is empty, your credit cards are run up, your credit record is shot and you've been wrongfully linked to a number of criminal offences. Clearing up that mess and trying to restore your reputation often creates emotional, psychological and economic suffering . In one high-profile case, Mari Frank, an attorney from Laguna Niguel, Calif., discovered that someone had purchased a sports car, spent more than $10,000 at Toys ``R'' Us Inc., damaged a rental car and accumulated $50,000 in debt using personal information that could have easily been found on the Internet. Many novice Internet users respond to unsolicited e-mails that promise rewards in exchange for detailed data about them. Others fill out information to gain access to certain sites on the Web. Where this information ends up is anyone's guess. In Canada, cases of identity theft have been harder to track because most law enforcement authorities here lump the crime under the umbrella of general fraud. ``There's no program to deal specifically with the issue of identity theft,'' says Sgt. Paul Marsh, spokesperson for the RCMP. ``Our current reporting does not break out fraud done online.'' Marsh says the offences of personation and fraud currently found in the Criminal Code have been considered adequate to address the question of identity theft, but he adds that the RCMP is examining ways of statistically distinguishing off-line and online fraud within its computer systems. Such statistics may be necessary to prepare for tomorrow. Many privacy advocates point out that the fears we exhibit today are largely related to the dangers that lie in the future if the privacy issue isn't adequately addressed. For example, the collection of health and medical information by governments, non-profit groups, pharmacies, doctors, hospitals and medical information Web sites raises the issue of how this information - if it's stolen, monitored, leaked, shared or sold - can be used to discriminate against people. ``It's particularly difficult with health care to guard against secondary uses, because the insurance and drug industries are so much a part of the medical sector,'' says Steeves, the Carleton University law professor. Steeves says the spectre of eugenics is very real in an age where animals have already been cloned and genetic defects can be easily recorded. In the workplace, drug tests that can also detect whether a woman has stopped taking the birth control pill could easily lead to dismissal in advance of maternity leave. Getting a job or life insurance could also become more difficult if a genetic flaw that ``may'' lead to future illness raises a red flag. A new dot-com in the United States called First Genetic Trust has created what it calls a ``genetic banking'' service. For a fee, the company collects, analyzes and maintains an individual's genetic data for confidential and secure storage, or use in ongoing clinical trials. The potential value of the service is compelling when applied to medical research, drug discovery and personalized diagnosis and treatment of genetically related illness. But what if the company goes bankrupt? It begs the question at a time when bankrupt companies like Toysmart.com are making headlines by trying to sell off customer lists. ``There's all sort of privacy rhetoric,'' says Steeves. ``But very little privacy protection.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2271 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:59pm Subject: Trial turns spotlight on US-Cuban espionage Trial turns spotlight on US-Cuban espionage http://www.boston.com/dailyglobe2/009/nation/Trial_turns_spotlight_on_US_Cuban_espionage+.shtml By Richard ChacÛn, Globe Staff, 1/9/2001 IAMI - One Cuban man pretended to be a Puerto Rican, memorizing a 30-page phony life story. Another landed a janitor's job at a US naval base in Key West, keeping an eye on military activity. And a third posed as a Cuban defector so that he could infiltrate Cuban-American exile groups and send information back to Havana. These are just some of the eyebrow-raising stories emerging from a federal trial here. The case, which resembles a John le Carre thriller, offers a rare glimpse into the modern world of US-Cuban espionage. The three men are among five accused of being Cuban spies - part of an espionage ring known to US intelligence officials as the Wasp Network. According to the US government, more than a dozen Cuban secret agents tried to infiltrate US exile groups and military bases in Florida through most of the last decade until law enforcement agents broke up the ring in 1998. Four of the suspects - including Juan Pablo Roque, who defected to Miami from Cuba amid much fanfare by exile leaders - have been indicted in absentia because they escaped to the island nation before being arrested. Five others, including two married couples, have pleaded guilty and are expected to testify against their former comrades. But it's the trial of the remaining five that is drawing the most attention now from leaders and curious intelligence spectators hoping to peer into the shadowy world of US and Cuban espionage operations. In testimony last week, Joseph Santos, an agent who confessed to authorities, said he and his wife received orders from an alleged ringleader, Gerardo Hernandez, to penetrate the US military's Southern Command headquarters in Miami. Santos said he also was assigned to study Federal Express, United Parcel Service, and the US Postal Service for mailing some of the information they gathered. Authorities and prosecutors are relying on thousands of pieces of evidence that were gathered from court-ordered apartment searches or through routine intelligence work, such as intercepting short-wave radio signals, computer messages, or coded phone conversations. Government attorneys have assembled several thick binders of transcripts of messages between the spies and their bosses in Havana. Some of the transmissions talk in flowery language about the importance of their work for Cuba's 41-year-old Communist revolution, while others deal with more mundane things, like what clothes they wore that day, where they shopped, or their constant need for more money from Havana. Prosecutors accuse the men of having prior knowledge of plans by Cuba to shoot down two planes belonging to the Miami-based exile group Brothers to the Rescue on Feb. 24, 1996. Hernandez, a Cuban who prosecutors say posed as a Puerto Rican to hide his true identity, is charged with conspiracy to murder in connection with that incident. The suspects admit they were working on orders from Havana but deny obtaining classified information from the exile community or from any US military facility. In an encrypted message shown in testimony last week, Cuban intelligence officials in Havana tell their workers in Miami to ''uncover plans for acts of aggression against Cuba'' by the United States by keeping an eye out for increased military training, the movement of personnel or an increase in flights from the US naval base in Boca Chica, Fla. The agents kept meticulous notes of their actions and expenses. Among the notes confiscated by authorities are envelopes and small scraps of paper carefully detailing money distributed to all of the ring's participants. Using a network that stretched from Mexico City to Miami and New York, agents were given specific instructions from Havana on where to meet other Cuban officials to pass information or collect money. According to government transcripts released this week, meetings were held in the frozen food section of a Queens supermarket, in a men's restroom at a Bronx diner and at a McDonald's restaurant in Miami. All of the agents tried hard to blend in into their American surroundings as much as possible, renting apartments in Hollywood, Fla., and in Miami; taking out memberships at local video stores; and, in some cases, finding girlfriends or getting married even if they had spouses back home in Cuba. The trial has also been a delicate matter for US officials, who worry about publicly divulging too much of their intelligence techniques. Over the years, FBI officials intercepted the group's calls and short-wave radio messages, conducted apartment searches, and confiscated about 1,000 encrypted computer disks. Questions have also been raised in local media over whether the FBI knew about plans to shoot down the exile plans and whether the incident could have been avoided. US authorities have denied withholding any information. The realization that Havana's spies worked and lived among them has stung the anti-Castro Cuban exile community here, which has suffered setbacks following the Elian Gonzalez saga last year and the death in 1997 of its most colorful leader, Jorge Mas Canosa, longtime president of the Cuban American National Foundation. ''There is a willingness in this community to give people from Cuba the benefit of the doubt and to welcome them,'' said Dennis Hays, vice president of the foundation, adding that Cuban-Americans may be more cautious of new arrivals. ''A case like this shows how cold-blooded people can be and creates a huge sense of betrayal and bewilderment.'' This story ran on page A08 of the Boston Globe on 1/9/2001. © Copyright 2001 Globe Newspaper Company. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2272 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 7:01pm Subject: Jailed Cuban spy identifies his `handlers' Jailed Cuban spy identifies his `handlers' Published Tuesday, January 9, 2001, in the Miami Herald http://www.miamiherald.com/content/today/news/dade/digdocs/067701.htm He said both directed him to get a job at the Southern Command's Miami headquarters. BY GAIL EPSTEIN NIEVES gepstein@h... A former Cuban intelligence agent on Monday identified two more defendants in the Cuban spy trial as his ``handlers'' and said both of them directed him to get a job at the Southern Command's Miami headquarters so he could snoop for the Cuban government. The testimony of acknowledged ex-agent Joseph Santos, 40, was the first to link accused spies RamÛn LavaniÒo and Fernando Gonz·lez with in-the-trenches intelligence activity. On Friday, Santos similarly implicated co-defendant Gerardo Hern·ndez. The trial's opening weeks focused on documentary and physical evidence against the five accused spies. With Santos, jurors are hearing firsthand accounts about the inner workings of Cuba's intelligence apparatus, from spy recruitment to training to work assignments. In the case of Santos and his wife, Amarylis -- also a Cuban agent -- their achievements were far less illustrious than their assignments, according to testimony. Santos said he successfully completed a research project on the Southern Command while its new headquarters were being built in Miami's Doral section in early 1997. He and his wife took photographs of all the surrounding buildings, between Northwest 87th and 99th avenues and 25th and 40th streets, ``to provide a pretty clear idea to anyone'' what the area looked like. Santos said he gave the report to his handler LavaniÒo, an ``illegal agent'' or ranking Cuban intelligence operative who also went by the name Luis Medina. But more importantly, LavaniÒo told the Santos couple that their ``supreme task'' was to get jobs at the Pentagon's SouthCom headquarters, which directs U.S. military operations in Latin America and the Caribbean. Accused spy Gonz·lez -- who also went by the name RubÈn Campa -- gave them the same task, Santos testified. ``Penetrating'' SouthCom was a high priority set by Cuba's intelligence chiefs, according to Havana-to-Miami directives seized by the FBI and read to jurors Monday. MISSION FAILED The Santos failed at that assignment. They were too busy trying to make a legitimate living and never found a place to apply for a job, Santos said. But on cross-examination, the defense attorney for accused spy Hern·ndez scoffed at the notion that Santos could have obtained anything important -- let alone national defense secrets, a key factor for proving espionage -- even if he had managed to get hired at SouthCom. Santos does not speak English. Before his arrest, he was working as a laborer at Goya Foods and the Miami Arena. Attorney Paul McKenna read jurors a report in which Hern·ndez directed Santos to obtain ``public information'' about SouthCom. ``In fact, none of your handlers ever tasked you with getting national security information, did they?'' McKenna asked Santos. Santos responded that it was implicit that he was supposed to get information that could not be obtained ``by conventional means.'' SERVING SENTENCES Santos and his wife are already serving prison sentences after pleading guilty to one count of conspiracy to act as a foreign agent. Their terms are likely to be cut short for their help testifying against Hern·ndez, who prosecutors say conspired with the Cuban military to murder four Brothers to the Rescue fliers in 1996. McKenna cross-examined Santos about the plea agreement for a long time in an apparent bid to undermine his credibility. Under sentencing guidelines, Santos faced 60 months but prosecutors recommended he serve 48. U.S. District Judge Joan Lenard agreed. ``So these people here,'' McKenna said, naming prosecutors Caroline Heck Miller, John Kastrenakes, David Buckner and FBI Agent Al Alonso -- ``are all your friends that are helping you, correct?'' ``They're not my friends,'' Santos responded through an interpreter. ``I met those people during the investigation of the case.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2273 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 9:03pm Subject: Man charged with making tape of patrons in athletic club Man charged with making tape of patrons in athletic club Associated Press, 01/09/01 BOSTON -- A Cambridge man has been charged with secretly taping men in the locker room of a Boston fitness club. Evans Mojica, 41, was arrested at about 6:30 p.m. Monday, after he was seen walking around the men's locker room at Boston Sports Clubs carrying a black toiletry bag, police said. Patrons of the athletic club had earlier complained about a man fitting Mojica's description who was believed to be videotaping in the locker room. The club's management approached him and found that he was videotaping people through a hole in the bag, said James Borghesani, spokesman for the Suffolk County District Attorney's office. He pleaded innocent Tuesday in Boston Municipal Court to a charge of recording oral information without consent, as well as charges of lewd and lascivious behavior and disorderly conduct. Authorities said the videotape included an audio recording. He was ordered held on $500 cash bail. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2274 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 10:51am Subject: 'Soprano' Tapes Sing - Mob snitch cripples Jersey crime family Thursday, December 16, 1999 'Soprano' Tapes Sing Mob snitch cripples Jersey crime family http://www.nydailynews.com/1999-12-16/News_and_Views/Crime_File/a-50555.asp By GREG SMITH Daily News Staff Writer They are the "Soprano" tapes ≠ hours of video and audio tapes revealing the inner workings of a New Jersey-based crime family that sees itself as the inspiration for one of TV's hottest shows. The recordings were key in bagging 41 reputed mobsters in a massive organized crime bust earlier this month, but they also give a rare glimpse into what the alleged criminal class likes to watch on television. http://www.nydailynews.com/1999-12-16/News_and_Views/Crime_File/soprano.jpg Members of the reputed DeCavalcante crime family believe they have a lot in common with the characters in 'The Sopranos, above. In this case, fact seems to follow fiction. "Hey, what's this f---ing thing, 'Sopranos'?" asks Joseph (Tin Ear) Sclafani, a reputed mob soldier with a hearing aid as he waits in a car March 3 for a sitdown with another mob family. "Is that supposed to be us?" "You're in there," responds reputed capo Anthony Rotondo, as both men erupt in laughter before going on to point out several characters on the show they believe were taken whole-cloth from their real-life crime family. "Every show you watch, more and more you pick up somebody," Rotondo says. "One week it was Corky. One week it was, well, from the beginning it was ... Albert G," he says, comparing fictional mobsters to apparent real ones. Sclafani and Rotondo might not have laughed so loud had they known another companion, identified only as Ralphie, was wearing an FBI recording device. Because of Ralphie's work as an informant, Rotondo, Sclafani and 39 other members and associates of the DeCavalcante crime family were charged Dec. 2 in four real-life racketeering indictments. On the HBO show "The Sopranos," Anthony Soprano, an aging Jersey mob capo with a paunch, suffers panic attacks because of the pressures of his work. He sees a shrink, confronts the price of betrayal, considers whether it's all worthwhile. He hangs out in a topless bar called Ba Da Bing! with his cronies, who are all in construction or carting businesses. On the "Soprano" tapes, the alleged capos are all middle-aged guys with paunches who spend hours betraying one another and discussing the intricacies of how to bury a body. They hang out in a restaurant called Sacco's, and all claim legitimate jobs in construction ≠ except at least one, who runs a casino boat. They love the HBO show ≠ "great acting," Rotondo comments ≠ and point out one similarity to their lives after another, such as a TV mobster who dies of cancer just as one did in real life. But the feds are quick to say that these tapes are not fiction, and they allege that people actually ended up dead. The most jarring recordings concern the life and death of Joseph (Joey O) Masella, a 49-year-old bookie who owed everybody ≠ the DeCavalcantes, the Colombos, the Gambinos. Masella borrowed hundreds of thousands from the three mob families, hoping to hit it big as a bookie, according to the tapes. He failed. "This guy is breaking my b---s," Masella told Ralphie in the summer of 1998, referring to one of his any mob pursuers. "All I need is just three thousand. He's calling me, and calling me and calling." That June, Masella approached acting DeCavalcante boss Vincent Palermo, claiming he simply could not pay his debts. "By all rights, by all the rules, I have to kill you," Palermo replied, according to court testimony. One afternoon, Masella got a call from Steve, an alleged debtor. Steve was going to hand Masella $10,000 in cash, which Masella would immediately turn over to his creditors. But Steve was really Westley Paloscio, Masella's bookmaking partner, who masked his voice, Assistant U.S. Attorney Maria Barton alleged in court last week. Paloscio told Masella to meet Steve at the Marine Park Golf Course parking lot in Brooklyn, prosecutors alleged. Masella pulled into the dark lot around 9:30 p.m. When a red two-door sedan pulled up, Masella bounded forth to meet Steve.. He saw a man with a mustache and dark hair at the wheel, and then several flashes from a gun. Motorists rushed to the scene as the red car sped away. Masella was alive, his body riddled with bullets. He described Steve and his car and gave up Paloscio's beeper number. He died four hours later. Paloscio learned Masella survived for a while, and he worried that the botched hit could result in his death. "Somebody's going to get shot," Paloscio told Ralphie. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2275 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 3:25pm Subject: Court Rejects Psychic Appeal Court Rejects Psychic Appeal http://abcnews.go.com/sections/us/DailyNews/scotus000118.html#psychic The Supreme Court today refused to revive a lawsuit in which 16 former employees of a California psychic hotline accused ABC television of unlawfully using a hidden camera to videotape them at work. The court, without comment, turned away the former employees' argument that they should be allowed to sue ABC under a federal eavesdropping law. The secret recordings were used by ABC's PrimeTime Live program for a 1993 expose on whether employees at the hotline believed in the service. An ABC reporter had gotten a job at the Psychic Marketing Group, which advertised telephone psychic advice for $3.95 a minute. The employees sued ABC under a federal eavesdropping law that lets people tape conversations in which they are a party, unless the taping is intended to help commit a crime or damage another person. Five of those who sued were shown in the broadcast, while the rest were videotaped but did not appear in the program. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2276 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 3:53pm Subject: Cordless Phones: Who's Listening? Cordless Phones: Who's Listening? http://abcsource.starwave.com/sections/2020/2020/diaz000322.html It is not so difficult - or uncommon - for others to listen to your calls on a wireless phone. According to the Privacy Rights Clearinghouse, here's how you can protect yourself. How Others Listen - And Is It Legal? Cordless phones operate like mini-radio stations. They send radio signals from the base unit to the handset and from the handset back to the base. The signal carrying your conversation can usually be transmitted and overheard a quarter of a mile away, and can sometimes travel up to two miles. Signals from cordless phones can be picked up by a number of other devices including radio scanners, baby monitors, radios and other cordless phones. Federal law prohibits the intentional eavesdropping of cordless and cellular telephone conversations and it is also illegal to use a radio scanner "knowingly and with the intent to defraud" to eavesdrop on wire or electronic communication. Penalties for the intentional interception of cordless and cellular telephones range from fines to imprisonment. Individual states also have varying laws about intercepting phone calls. What You Can Do In most cases, your cordless phone conversations are probably overheard only briefly and accidentally. But there are people who make it a hobby to listen to cordless and cellular phone calls, so here are some tips: Cordless phones with numerous channels (25 or more) and those that automatically switch between channels are not as easily monitored as the older one- or two-channel analog models. Be aware that anyone using a radio scanner can easily eavesdrop on conversations on older model cordless phones. The newest cordless phones give a high level of protection against eavesdropping. They are digital, use a higher frequency and spread-spectrum technology, and have as many as 40 channels. (They are also more expensive than analog wireless phones.) Since there is no inexpensive way to ensure privacy on either cordless or cellular phone calls, if you do not want to take the chance that others may be listening to your call, be sure both you and the person you are talking to are on standard wire phones. Avoid discussing financial or other sensitive personal information on a cordless or cellular phone. For example, if you buy something over the phone and give your credit card information, your cordless or cellular call could be monitored, leaving you the victim of credit card fraud. When shopping for a cordless or cellular phone, insist that the manufacturer or salesperson provide you with clear explanations of any privacy protection claimed for their products. Baby monitors, children's walkie-talkies and some home intercom systems may be overheard in the same manner as cordless phones. If you are concerned about being overheard on one of these devices, be sure to turn it off when it is not in use. You might want to consider purchasing a wired unit instead. Copyright © 2000 ABC News Internet Ventures -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2277 From: Ray Van Staden Date: Thu Jan 11, 2001 8:25am Subject: Fw: ARROGRANCE Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. Transcript released by the Chief of Naval Operations RCN 10/10/95. Printed in "Rendezvous" December 1999. Canadians: "Please divert your course 15 degrees north to avoid collision". Americans: "Recommend you divert course 15 degrees north to avoid collision". Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" Canadians: "No. I say again, you must divert your course". Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic Fleet. We are accompanied by three cruisers, three destroyers and numerous support vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees north or countermeasures will be taken to ensure the safety of this ship". Canadians: "This is a lighthouse. Your call!!" --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 2278 From: Richard Thieme Date: Thu Jan 11, 2001 11:27am Subject: Re: Fw: ARROGRANCE - urban legend alert! this story has been around for a long time set in many locales. My suspicion is that the "transcript" is tongue in cheek. At 04:25 PM 01/11/2001 +0200, Ray Van Staden wrote: > >Transcript of an actual radio conversation which took place during >October 1995 between a USN War Ship sailing off the coast of >Newfoundland and the Canadian authorities. > >Transcript released by the Chief of Naval Operations RCN 10/10/95. > >Printed in "Rendezvous" December 1999. > >Canadians: "Please divert your course 15 degrees north to avoid collision". >Americans: "Recommend you divert course 15 degrees north to avoid collision". >Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". >Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" >Canadians: "No. I say again, you must divert your course". >Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic > Fleet. We are accompanied by three cruisers, three destroyers and numerous support > vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees > north or countermeasures will be taken to ensure the safety of this ship". >Canadians: "This is a lighthouse. Your call!!" > > >--- > >>From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za > > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > Richard Thieme ThiemeWorks ... professional speaking and business consulting: ThiemeWorks P. O. Box 170737 the impact of computer technology Milwaukee Wisconsin on people in organizations: 53217-8061 helping people stay flexible voice: 414.351.2321 and effective fax: 414.351.5779during times of accelerated change. cell: 414.704.4598 http://www.thiemeworks.com http://www.richardthieme.com - for information on Professional Speaking 2279 From: St. Clair, James Date: Thu Jan 11, 2001 10:33am Subject: RE: Fw: ARROGRANCE No -it's not. Every version of this story changes.. By the way, Lincoln has never sailed off of Newfoundland. J -----Original Message----- From: Ray Van Staden [mailto:secdep@v...] Sent: Thursday, January 11, 2001 9:25 AM To: TSCM-L Subject: [TSCM-L] Fw: ARROGRANCE Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. Transcript released by the Chief of Naval Operations RCN 10/10/95. Printed in "Rendezvous" December 1999. Canadians: "Please divert your course 15 degrees north to avoid collision". Americans: "Recommend you divert course 15 degrees north to avoid collision". Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" Canadians: "No. I say again, you must divert your course". Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic Fleet. We are accompanied by three cruisers, three destroyers and numerous support vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees north or countermeasures will be taken to ensure the safety of this ship". Canadians: "This is a lighthouse. Your call!!" --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2280 From: Date: Thu Jan 11, 2001 7:27am Subject: Re: Fw: ARROGRANCE In a message dated 1/11/01 8:48:38 AM Pacific Standard Time, secdep@v... writes: << Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. >> Sounds like an "urban legend" to me. 2281 From: 1RCM <1RCM@M...> Date: Thu Jan 11, 2001 5:18pm Subject: A Public Thank You Hi List, Last week I posted with a request to be contacted off-list by any list member in the Boise, Idaho area. To make a long story short, I had stumbled across a very good deal on a piece of TSCM test equipment but I was very hesitant to send the asking price for something unseen to someone unknown. I was contacted back by list member Mike Arnell. Mike was of great assistance in allowing me to close the deal in a manner that I felt quite comfortable with. And for that I would like to thank him very much. I chose to thank Mike publicly on the list as well as privately off-list for a reason. This list, like most others, sees its periods of negativity spawned by arguments, disgruntled posters, mis-information, etc., etc. But it also sees more than its fair share of that which I assume that it was originally founded for: the sharing of TSCM-related information, thoughts and ideas. I have no idea whether or not when the list was founded the moderator envisioned its usage for 'blind' business contacts or the requesting of 'professional favors'. But I for one found it very beneficial for just that purpose. And so, as long as the moderator does not disapprove, I would not hesitate to recommend to any list member that if he/she has a problem, concern or issue that another list member in a specific area might be able to help with - then simply put out the feeler. Of course remember to request the return contact and conduct your business off-list, but don't hesitate to give that first 'call for help' via a posting on the list a try! Bob Motzer From: James M. Atkinson Date: Tue Jan 8, 2002 9:54pm Subject: Re: Rent A sweep Bwwahh ha-ha-ha, ROTFLMAO -jma At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >Check this one out, you can now rent sweep equipment for the techno >do-it-yourselfer! > >http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4474 From: Steve Uhrig Date: Wed Jan 9, 2002 9:59am Subject: Gingrich's intercepted cell phone call Hill Tape Dispute Allowed to Continue Appeals Court Clears GOP Member's Suit By Juliet Eilperin Washington Post Staff Writer Wednesday, January 9, 2002; Page A17 A 1996 phone call that inadvertently bounced to a Florida couple's scanner is still echoing in political and judicial chambers, feeding a long-running lawsuit between two members of Congress. A federal court panel recently ruled that Rep. John A. Boehner (R-Ohio) can amend and go forward with his complaint against Rep. Jim McDermott (D-Wash.). The lawsuit stems from the public release of a December 1996 phone conversation involving Boehner, then-House Speaker Newt Gingrich (R-Ga.) and other House GOP leaders discussing how best to respond to an ethics committee ruling against Gingrich. A Florida couple recorded the conversation off their scanner and gave it to McDermott, then the top Democrat on the House ethics panel. Accounts of the conversation soon appeared in news articles. ============================= ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4475 From: Steve Uhrig Date: Wed Jan 9, 2002 10:21am Subject: Re: NEW APCO 25 DIGITAL SCANNER Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > Title: UNIDEN DEBUTS NEW APCO 25 DIGITAL SCANNER MODELS It is an FCC mandate for all government and public safety users to shift over to to narrow band digital. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4476 From: Hawkspirit Date: Wed Jan 9, 2002 2:53pm Subject: Theory Could someone explain the theory of what this guy is saying? Roger COMSEC C3I Wiretap Detector The Latest High Tech Wiretap Detector. -Protect yourself from legal and illegal wiretaps http://www.spycompany.com/tapdet.htm The C3I is most effective at detecting wiretaps / eavesdropping at the beginning and ending of a telephone call. At the beginning of a telephone call when someone is calling you, watch for a remote extension drawn loop wiretap to seize the line between the cadence ringing, usually between the first and third ring, creating a connection reaction. At the conclusion of any telephone call, by observing the C3I and counting / timing the number of disconnection reactions on the telephone line. The C3I will detect illegal and legal wiretapping / eavesdropping on your telephone line by establishing either a normal signature pattern or an abnormal signature pattern. 4477 From: Hawkspirit Date: Wed Jan 9, 2002 3:08pm Subject: BridgeTaps What do you make of this comment? "Telcordia reports that a significant portion of the loop population (56 percent) has bridge taps" http://www.iec.org/online/tutorials/xdsl_test/topic06.html. 4478 From: Date: Wed Jan 9, 2002 9:57am Subject: Re: Theory In a message dated 1/9/02 11:55:19 AM Pacific Standard Time, hawkspirit@e... writes: << Could someone explain the theory of what this guy is saying? >> Carefully perusing the website, he's saying send me your money. It's a piece of junk packaged in a $30 box. I've seen the prototype in it's plastic packaging. It didn't work then and I'm sure it doesn't work now. 4479 From: Date: Wed Jan 9, 2002 9:59am Subject: Re: BridgeTaps In a message dated 1/9/02 12:08:50 PM Pacific Standard Time, hawkspirit@e... writes: << What do you make of this comment? "Telcordia reports that a significant portion of the loop population (56 percent) has bridge taps" >> I think it's way out of whack. I'd say less than 5% 4480 From: Steve Uhrig Date: Wed Jan 9, 2002 3:33pm Subject: Re: BridgeTaps Once upon a midnight dreary, MACCFound@a... pondered, weak and weary: > What do you make of this comment? "Telcordia reports that a > significant portion of the loop population (56 percent) has > bridge taps" 56% of the loop population has called the FBI saying they are tapped. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4481 From: Charles P Date: Wed Jan 9, 2002 7:51pm Subject: Re: Re: BridgeTaps Perhaps that should "56% of the 'loopy' population" Actually, they are not talking at all about illegal wiretaps. There are a large number of bridge taps on older cables out there, and many new cable plants too. In new residential neighborhoods I typically find the lines to a home are tapped into a 50 or 100 pair feeder that runs down the street popping up in the pedistals along the way. When someone has multiple lines and later cancels some, the pair is free to use for their neighbor's new 2nd line- yet still accessable from the home where the pair was used last year, the telco guys are happy to find an unused pair and don't care if it was tapped off somewhere else. They show up on TDR runs often. This can be true for business lines as well. It becomes a problem for the installation of dsl lines as it can reduce the bandwith available. Small taps don't make a big difference but longer ones can be a problem. This is what the original quote was refering to. Charles Global Communications Tarrytown, NY charles@t... www.telephonesecurity.com > > What do you make of this comment? "Telcordia reports that a > > significant portion of the loop population (56 percent) has > > bridge taps" > > 56% of the loop population has called the FBI saying they are > tapped. > > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 4482 From: James M. Atkinson Date: Wed Jan 9, 2002 7:55pm Subject: Re: Theory At 12:53 PM -0800 1/9/02, Hawkspirit wrote: >Could someone explain the theory of what this guy is saying? Roger > >COMSEC C3I Wiretap Detector >The Latest High Tech Wiretap Detector. >-Protect yourself from legal and illegal wiretaps > >http://www.spycompany.com/tapdet.htm > >The C3I is most effective at detecting wiretaps / eavesdropping at the >beginning and ending of a telephone call. At the beginning of a telephone >call when someone is calling you, watch for a remote extension drawn loop >wiretap to seize the line between the cadence ringing, usually between the >first and third ring, creating a connection reaction. At the conclusion of >any telephone call, by observing the C3I and counting / timing the number >of disconnection reactions on the telephone line. The C3I will detect >illegal and legal wiretapping / eavesdropping on your telephone line by >establishing either a normal signature pattern or an abnormal signature >pattern. *** Private and Confidential *** You know the funny thing is that I spoke to the owner of the company who makes the thing a few months back as to how his product detect bugs, and he gave me one hell of a song and dance routine. He refused to discuss the technology in any way, shape, form, or manner, and tried to intimidate me by attempting to pull the "I worked for the phone company for umpteen years" crap, and the "I don't know who you think you are" game. I got the distinct impression that most of the people he deals with don't have a technical background, and when I started to ask even basic questions he started acting like an asshole and just completely stone-walled me (which made my bullshit detector go off). Sadly, instead of answering some basic questions he went on a rant about how I had to come to his offices to see the thing (for what I suspect was a controlled demo), and then he totally blew his credibility with me when he told me about the crackpot who had evaluated the thing (and was endorsing it "as an expert", bwahhh ha-ha-ha). I feel kind of sorry for the guy, and I tried to take him seriously, but from what he was describing it sounds like little more then just another blinky-box. I am more then happy to review any actually technical specifications or white papers the guy is willing to provide, but all he would provide me with was marketing hype, hyperbole, and similar crap (which of course kept making my bullshit detector go off ). The product may indeed do what they claim, hell it may even cure acne, wart, and baldness, but as an engineer I have to see technical stats on the thing, marketing hype means nothing to me. Lets see some credible stats and technical stuff. None of this marketing mumbo-jumbo foolishness, if it does what he claims then I am interested, plain and simple. The funny thing, is that the guy I talked to seemed obsessed with finding shoddy workmanship, an less considered with finding bugging devices. The "line signature box" seems like a good idea, but in reality it is actually of minimal value, and has been offered by dozens of other companies in the past (usually in the form of an impedance tester). Yes, such boxes will impress people with little or no experience under their belts, but a real TSCM professional will find it of minimal value, and usually a source of great amusement. There are even boxes that watch currently flow at the on-hook/off-hook transition point, but they are of minimal value for detecting anything other then sloppy workmanship (shucks, even simple cap meter will detect such things). You can actually buy a $20 box at Radio Shack that will detect remote extensions, so if that is all the box is doing it would explain why the guy got his panties in a bunch when I started asking questions. Your money would probably be better spent on a decent TDR, a giga-ohm test set, or even a rubber chicken.. However, I'll keep an open mind, and would encourage other to do the same; but before you part with any cash you had better ask some technical questions and get some second opinions. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4483 From: James M. Atkinson Date: Wed Jan 9, 2002 8:07pm Subject: Re: BridgeTaps At 1:08 PM -0800 1/9/02, Hawkspirit wrote: >What do you make of this comment? > >"Telcordia reports that a significant portion of the loop population (56 >percent) has bridge taps" > >http://www.iec.org/online/tutorials/xdsl_test/topic06.html. It is usually just a result of sloppy workmanship by outside plant folks. Sadly, most of them have no idea what a TDR is, let along actually use one. The percentage of "sloppy loops" varies widely. In older urban areas it may be 50-60%, but in newer suburban areas and industrial parks it may be completely zero. Any TSCM'er with a TDR can find the easily find the stuff. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4484 From: John McCain Date: Wed Jan 9, 2002 11:01am Subject: Re: Rent A sweep The really funny part is that this is apart of a NASDAQ listed company ( CGPN) selling for about 0.011 USD per share :). Cheers, JohnM At 10:54 PM 1/8/02 -0500, you wrote: >Bwwahh ha-ha-ha, > >ROTFLMAO > >-jma > > >At 7:47 PM -0800 1/8/02, Hawkspirit wrote: > >Check this one out, you can now rent sweep equipment for the techno > >do-it-yourselfer! > > > >http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts. > asp?idCategory=12 > > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > >-------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 4485 From: kirk Date: Wed Jan 9, 2002 0:33pm Subject: Re: Rent A sweep I went to their website and enlarged the picture of the phone line sweeper. GUESS who makes it?.......... CCS, hahahaha. -w--------- Original Message ---------------------------------- From: "James M. Atkinson" Date: Tue, 8 Jan 2002 22:54:09 -0500 >Bwwahh ha-ha-ha, > >ROTFLMAO > >-jma > > >At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >>Check this one out, you can now rent sweep equipment for the techno >>do-it-yourselfer! >> >>http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 > > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > -------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX LLC Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 310-388-5886 F: 310-388-5886 W: www.tactronix.com -- 4486 From: James M. Atkinson Date: Wed Jan 9, 2002 8:22pm Subject: Re: Rent A sweep What is really funny is that if you know the TSCM business several "devices" on their website stand out as being eavesdropping toys sold/"made" by CCS. The entire "rental site" read just like a CCS catalog.down to the fantasy pricing. So just how many times do you have to see the Brooklyn Bridge get sold to a tourist before you realize that something just isn't right? -jma At 1:33 PM -0500 1/9/02, kirk wrote: >I went to their website and enlarged the picture of the phone line >sweeper. GUESS who makes it?.......... CCS, hahahaha. > > >-w--------- Original Message ---------------------------------- >From: "James M. Atkinson" >Date: Tue, 8 Jan 2002 22:54:09 -0500 > >>Bwwahh ha-ha-ha, >> >>ROTFLMAO >> >>-jma >> >> >>At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >>>Check this one out, you can now rent sweep equipment for the techno >>>do-it-yourselfer! >>> > >>http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4487 From: Bug Sweeper Date: Thu Jan 10, 2002 0:51am Subject: DNR? Does anyone know of an inexpensive and simple DNR? Friend wants to keep tabs on outgoing calls while someone is housesitting over a weekend. Thanks, E. Leonard 4488 From: iDEN-Test Port-Marcelrf Date: Thu Jan 10, 2002 1:14am Subject: Re: DNR? Here is a cheap & dirty unit that interfaces to a PC. This easily installed kit logs information on all outgoing and incoming calls, as well as any tone, from either MS-DOS or Windows. This kit and provided software indicate on your computer screen the date and time of each outgoing call, the length of the call and the number dialed. Credit card numbers also are logged. For incoming calls, the device even shows how many times your phone rang. Connect this kit to a parallel port on your PC. This unit requires 12-18Vdc/200mA wall transformer or 10-12Vdc. (Includes: 3 1/2" disk, case and instruction manual. Size: 1 1/2x5x5 1/4" (HWD) http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=&product%5Fid=990%2D0080 Bug Sweeper wrote: > Does anyone know of an inexpensive and simple DNR? Friend wants to keep > tabs on outgoing calls while someone is housesitting over a weekend. > > Thanks, > > E. Leonard > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 4489 From: iDEN-Test Port-Marcelrf Date: Thu Jan 10, 2002 1:17am Subject: Re: DNR? Let me try this again: This easily installed kit logs information on all outgoing and incoming calls, as well as any tone, from either MS-DOS or Windows. This kit and provided software indicate on your computer screen the date and time of each outgoing call, the length of the call and the number dialed. Credit card numbers also are logged. For incoming calls, the device even shows how many times your phone rang. Connect this kit to a parallel port on your PC. This unit requires 12-18Vdc/200mA wall transformer or 10-12Vdc. (Includes: 3 1/2" disk, case and instruction manual. Size: 1 1/2x5x5 1/4" (HWD).) http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=&product%5Fid=990%2D0080 Bug Sweeper wrote: > Does anyone know of an inexpensive and simple DNR? Friend wants to keep > tabs on outgoing calls while someone is housesitting over a weekend. > > Thanks, > > E. Leonard -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 4490 From: greendots . Date: Wed Jan 9, 2002 9:03pm Subject: [HUMOR] - How to put up a tower antenna Apologies for wasting bandwidth with humor. --- Subject: Fw: How to put up a tower antenna I am writing in response to your request for additional information on my recent accident. In block No. 3 of the accident reporting form I put "poor planning" as the cause of the accident. You said in your letter that I should explain more fully and I trust that the following details will be sufficient. I am an amateur radio operator.. On the day of the accident, I was working alone on the top section of my new 80 foot antenna tower. When I had completed my work, I discovered that I had, over the course of several trips up the tower, brought up about 300 pounds of tools and spare hardware. Rather than carry the now unneeded tools and hardware down by hand, I decided to lower the items in a small barrel by using a pulley which, fortunately, was attached to the gin pole at the top of the tower. Securing the rope at the ground level, I went up to the top of the tower and loaded the tools and hardware into the barrel. Then I went back to the ground and untied the rope holding tightly to insure a slow descent of the 300 pounds of tools and hardware. You will note in block No. 11 of the accident form that I weigh 155 pounds. Due to my surprise at being jerked off the ground so suddenly, I lost my presence of mind and forgot to let go of the rope. Needless to say, I proceeded at a rather rapid rate up the side of the tower. In the vicinity of the 40 foot level, I met the barrel coming down. This explains my fractured skull and broken collarbone. Slowed only slightly, I continued my rapid ascent, not stopping until the fingers of my right hand were two knuckles deep into the pulley. Fortunately by this time I had regained my presence of mind and was able to hold tightly to the rope in spite of my pain. At approximately the same time, however, the barrel hit the ground and the bottom fell out of the barrel. Devoid of the weight of the tools and hardware, the barrel now weighed 20 pounds. I refer you again to my weight in block 11. As you might imagine, I began a rapid descent down the side of the tower. In the vicinity of the 40 foot level, I met the barrel coming up, This accounts for the two fractured ankles and lacerations of my legs and lower body. The encounter with the barrel slowed me enough to lessen my injuries when I fell onto the pile of tools and hardware and, fortunately, only three vertebras were cracked. I am sorry to report however that as I lay there on the tools and hardware, in pain, unable to stand, and watching the empty barrel 80 feet above me, I again lost my presence of mind, I let go of the rope. _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 4491 From: Aimee Farr Date: Thu Jan 10, 2002 11:54am Subject: FW: Secrecy News -- 01/10/02 [A vote among my female cohorts suggested that 80% of us would voluntarily enroll in such a program. The other 20% indicated they qualify for involuntary commitment. ~Aimee] > BILL WOULD BAN SPACE-BASED MIND CONTROL WEAPONS > > Rep. Dennis Kucinich (D-OH) introduced a bill in the House of > Representatives late last year that would ban weapons in space. But > while there have been many similar legislative initiatives in the past, > Rep. Kucinich's bill is distinguished by its unusually expansive > definition of "weapons." > > Among the weapons that it would proscribe the new measure includes > "psychotronic" devices that are "directed at individual persons or > targeted populations for the purpose of ... mood management, or mind > control." > > No explanation for this peculiar proposal was immediately available. > But the text of "The Space Preservation Act of 2001" (H.R. 2977), > introduced on October 2, may be found here: > > http://www.fas.org/sgp/congress/2001/hr2977.html > > The Kucinich bill was hailed by Citizens Against Human Rights Abuse, one > of a number of organizations of people who say they are victims of > government experimentation involving electromagnetic and other > psychotronic weapons. See their web site here: > > http://www.dcn.davis.ca.us/~welsh/ 4492 From: Miguel Puchol Date: Thu Jan 10, 2002 1:12pm Subject: Re: Rent A sweep I sometimes feel like buying some of these things, so that when I retire I can get some extra income from my own "Worthless Pseudo-TSCM Junk Museum" - members of this list will get free entrance :-) Cheers, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Wednesday, January 09, 2002 4:47 AM Subject: [TSCM-L] Rent A sweep > Check this one out, you can now rent sweep equipment for the techno > do-it-yourselfer! > > http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp ?idCategory=12 > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4493 From: James M. Atkinson Date: Thu Jan 10, 2002 4:29pm Subject: A Wiretap In Every Home http://www.washingtonpost.com/wp-dyn/articles/A22888-2002Jan9.html A Wiretap In Every Home By Richard Cohen Thursday, January 10, 2002; Page A19 If it is true that all trends start in California, then the rest of the country had better pay attention. Gray Davis has proposed that his state's police agencies be given the same authority to fight terrorism that Congress recently gave the feds. If this keeps up, there won't be an untapped phone in the nation. It's not that what Davis proposes is so awful. What he has in mind is a state version of the insultingly named USA Patriot Act, which among other things expanded wiretap authority at the federal level. It also permits the government to monitor e-mail and Internet sites. Uncle Sam is going to know if you've been bad or good -- so be good for goodness' sake. But you better watch out. Because already other states are asking for the same authority. All this is being done in the name of anti-terrorism, but the expanded powers could be used for any purpose approved by a court -- a state court at that. You need only peer back in history to wonder if we are going to be any safer or, maybe, much worse off. Here I must state a prejudice. Having once been a statehouse correspondent (Maryland), I am underwhelmed by the competence and professionalism of state government. Most legislators are part-time, but the lobbyists are not. Often, they lead the representatives around by the nose -- offering expertise, advice and, in a pinch, a free vacation to somewhere very nice. Similarly, state judges do not match the caliber of their federal counterparts. Unlike federal judges, who are appointed for life, state judges usually are elected. ... [...] So it is not surprising that in the past, various states have mimicked the federal government -- hunting reds, anarchists, syndicalists and, later, integrationists. States, even cities, had their own red squads, persecuting or, on rare occasion, prosecuting alleged subversives or mere dissidents. There was hardly a major city in the country that didn't have some palooka in a fedora following some bookworm in a beret. [...] Yes, I know. That was then and this is now. But even now police power can be awesome if unchecked. The power to tap phones, to accumulate damaging personal information, to track your Internet habits is the stuff of Orwell and Kafka. It was also the stuff of the late Richard Daley of Chicago and the equally late Gov. Ross Barnett of Mississippi. Police power needs to be rationed, to be monitored. ... ...The last thing we need is 50 FBIs, some of them effectively accountable to no one. Let the feds handle terrorism. That way, we'll all be safer. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4494 From: James M. Atkinson Date: Thu Jan 10, 2002 4:25pm Subject: Judge: Ohio Ban on Concealed Weapons Unconstitutional http://www.foxnews.com/story/0,2933,42654,00.html Judge: Ohio Ban on Concealed Weapons Unconstitutional Thursday, January 10, 2002 Respond to Editor Email this Article CINCINNATI - A fitness trainer, hairdresser and pizza shop owner are all breathing easier after a judge in Ohio ruled they have a right to carry concealed weapons to protect themselves. "There is no doubt that the very thought a potential victim might possess a firearm deters that element of our society that cares nothing about laws or human life but rather understands only one thing - brute force," Hamilton County Judge Robert Ruehlman wrote. The common pleas judge ruled that Ohio's law against carrying concealed weapons violates the state constitution. Lawyers for the city of Cincinnati, the county and state said they would appeal the ruling. The lawsuit was filed in July 2000 by a private investigator and four other workers who said their jobs required them to carry weapons for self-defense. The workers say the Ohio Constitution allows citizens to bear arms and doesn't say the weapons cannot be concealed. But Ohio allows only law enforcement officials or officers of the state and federal government to carry concealed weapons. The workers argued that the ban subjects people to arrest before they get a chance in court to clear themselves by arguing they had legitimate self-defense reasons to be armed. Lawyers for Cincinnati, Hamilton County and the state countered that the right to bear arms does not prevent the state from regulating how people may carry guns. They said concealed weapons pose a threat to police officers and others. "Amidst all of the baying from gun opponents is the irrefutable fact that there will always be people in our society who refuse to follow any rules and how can never been reasoned with or rehabilitated," Ruehlman wrote. "These people have no conscience and no qualms about doing harm to innocent persons. As a consequence, every law-abiding citizen of this state has the right to protect him or herself with a concealed firearm." Ruehlman defined law-abiding people as those not otherwise prohibited by federal, state or local law from possessing firearms. Ruehlman heard testimony over four days in December. After the trial, lawyers defending the state law asked the judge to remove himself from the case. They said he couldn't make a fair ruling because his wife and baby were kidnapped at gunpoint outside a strip-mall camera shop in 1989. Ruehlman's wife, Tia, said a gun probably wouldn't have helped her overcome her assailant. She said she believes that residents should be able to carry concealed weapons but had not discussed the case with her husband. Ruehlman declined to comment on the request. Anti-gun groups said they were worried about the concealed weapons case because of Ruehlman's past rulings. Those include his dismissal of Cincinnati's lawsuit against gun manufacturers two years ago. The Associated Press contributed to this report. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4495 From: John McCain Date: Thu Jan 10, 2002 2:59pm Subject: Theory (brought to mind by Comsec C3I discussion) JMA's thoughts on the Consec device brought to mind a few thoughts that we might discuss a bit on the list. It's been kinda quiet lately anyway, but if this is too far off topic for you, trash it. We, as techies and engineers, tend to think in the ways we learned the laws of elementary physics . We (ok, technically "I" instead of "we", but I'll assume others fit the pattern) have been conditioned over the years to focus on steady-state activity instead of transients; for example we usually see a series circuit in its steady-state conditions... not it's dynamic response. A good example would be closing a switch on a circuit with a battery, capacitor, and resistor. We (at least I) first think that ok, there's a fast transient, then no current flows (other than perhaps some minor leakage through the cap). But, I conceptualize the no-current state of this circuit as it's "normal" state... not the transient state. In reality, both the initial transients as well as the steady state are the "normal" states for this circuit. Only rarely do I conceptualize things in their transient, dynamic conditions. I think of an oscillator as always oscillating, a transmitter as always transmitting, receiver as always receiving, etc. I even think of office politics and inter-personal dynamics as a sort of steady-state dynamic... not a series of transient events. I rarely even consider the "steady state" of oscillators, receivers, even LEDs, etc. starting up or shutting down. Finally getting to the point! I suspect that we should consider the transient, dynamic responses in the things we analyze and pay more attention to those transients. Looking very carefully at what fast transients occur when a phone goes off hook is something I've never done. Using a TDR or SA, we look at transients (since the dynamic is their "steady state"), but do you carefully observe the first pulse of that TDR trace to see what effect the circuit under test has on the TDR instrument? Or, do you just adjust magnitude to make it look "normal" and start looking at returns? I suspect those transients are sometimes telling us things that we don't hear. Am I off base here. Do others not fall into this trap? Any thoughts? JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 4496 From: david_johnrobinson Date: Thu Jan 10, 2002 4:11pm Subject: The "Big " rental sweep debate Two things hit me regarding this listing; A) so what is new? this stuff has been out there advertised for years. B) Why does every one immediatly jump and say CCS? Let me put my cards on the table, I was the operations manager for CCS for a time here in London, and they realy do not deserve the bad mouthing they get from the group, OK so most of the stuff they provide is "crap" from a professional point of veiw, but to most of their clients it's exactly what they want (most of them are Mr and Mrs Joe schmo ) Any one wanting professional equipment would /should come to professional suppliers like our company Department Q who only deal with Government level bugs , covert equipment and GSM tracking. I don't think it is CCS for several reasons, Firstly they have exactly this type of thing on their already long established web site ; www.spyzone.com which for the genre has some very nice products. Secondly we are told by the group these are CCS type prices - wrong! when I worked there the prices were much higher - try 800% mark up and dollar prices quoted as pounds in UK, and lastly they only ask for $500 dealer price - a CCS licence costs $150.000 with no stock. So I think it's time the "farmer and the cowboy should be friends", get off CCS back , there prices and equipment will kill them and the other dinosores off soon enough. If you want to worry, and it seems you do , try talking to professional covert suppliers - if you call us a spy shop you had better duck, ask us what we can do with your GSM phone and why we have stopped telebanking and wap messaging. There will always be some one out there who wants Kiddy toys and some one who will supply them - so let them , they deserve each other. Thanks for letting me have a say, I'll sneak back into the shadows now and watch the sparks fly. Dr David J Robinson Department Q (international HQ) England +44 1903 787943 Over 25 years covert experience with British forces 4497 From: Thomas Conlon Date: Thu Jan 10, 2002 4:51pm Subject: Re: local CO Info DSLReports has the best CO info I've seen, but it relies on user input quite a bit. Are there any public resources to research a given CO for profitability and co-locations, for example, or the consumer could research like before they move? That would be sweet. -tc syseng@m... __________________________________________________ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ 4498 From: Date: Thu Jan 10, 2002 1:05pm Subject: Re: The "Big " rental sweep debate In a message dated 1/10/02 3:29:16 PM Pacific Standard Time, david_johnrobinson@h... writes: << Any one wanting professional equipment would /should come to professional suppliers like our company Department Q who only deal with Government level bugs , covert equipment and GSM tracking. >> Thank you for the ad. 4499 From: James M. Atkinson Date: Thu Jan 10, 2002 6:35pm Subject: Re: The "Big " rental sweep debate Well, OK, let's take an objective look at this. If I lay my copy of the CCS and G-Com's catalog down next to my monitor, and then pull up the pages in question the images and specs look exactly like those in the CCS listings. In fact pretty much everything on the site looks like it was lifted right off the CCS book (with a bad scanner) , and marked up 30% over confidential dealer cost. If we then review the "spyzone" website we see almost identical items being offered, but at much higher prices. If we further go to the TSCM database of eavesdropping threats (called "Raphael") we find that several very specific items being offered on the website in question are proprietary to CCS, and CCS dealers, and that all roads lead back to CCS (do you see where I am going?). In my professional opinion virtually everything on the site in question is CCS products. Well, OK... it is actually someone else product with a CSS logo on it, a fancy box, and a ridiculous price tag; but for all practical purposes it is CCS stuff. A CCS "franchise" can be had for as little as nothing, or $500, or $1500 depending on what mood strikes that day, and if you have a good cigar with you. If someone pays much more then a few grand for a "dealership" they should also be investing in several bridges and tunnels I am offering at a good price. Personally, I think it is more of a case of "Cowboy verses Cattle Rustler" -jma At 10:11 PM +0000 1/10/02, david_johnrobinson wrote: >Two things hit me regarding this listing; A) so what is new? this >stuff has been out there advertised for years. >B) Why does every one immediatly jump and say CCS? Let me put my >cards on the table, I was the operations manager for CCS for a time >here in London, and they realy do not deserve the bad mouthing they >get from the group, OK so most of the stuff they provide is "crap" >from a professional point of veiw, but to most of their clients it's >exactly what they want (most of them are Mr and Mrs Joe schmo ) >Any one wanting professional equipment would /should come to >professional suppliers like our company Department Q who only deal >with Government level bugs , covert equipment and GSM tracking. >I don't think it is CCS for several reasons, Firstly they have >exactly this type of thing on their already long established web >site ; www.spyzone.com which for the genre has some very nice >products. Secondly we are told by the group these are CCS type >prices - wrong! when I worked there the prices were much higher - try >800% mark up and dollar prices quoted as pounds in UK, and lastly >they only ask for $500 dealer price - a CCS licence costs $150.000 >with no stock. >So I think it's time the "farmer and the cowboy should be friends", >get off CCS back , there prices and equipment will kill them and the >other dinosores off soon enough. >If you want to worry, and it seems you do , try talking to >professional covert suppliers - if you call us a spy shop you had >better duck, ask us what we can do with your GSM phone and why we >have stopped telebanking and wap messaging. >There will always be some one out there who wants Kiddy toys and some >one who will supply them - so let them , they deserve each other. >Thanks for letting me have a say, I'll sneak back into the shadows >now and watch the sparks fly. >Dr David J Robinson >Department Q (international HQ) >England >+44 1903 787943 >Over 25 years covert experience with British forces -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4500 From: James M. Atkinson Date: Thu Jan 10, 2002 7:07pm Subject: Re: Theory (brought to mind by Comsec C3I discussion) One of the things I look for during a sweep of the phone lines is how the CO relay reacts to various levels of current. What I am in interested in the electrical behavior of a line during the loop relay seizing the line, and releasing it, and more specifically the "overshoot" areas of the signal. I am also interested in the frequencies that appear right at the moments of making, and then of breaking the line. Also, during this transition point you can usually bounce several TDR pulses down line and pick out mouse feces from miles away. If done properly the multi-mega ohm devices (typical LEO devices or slaves) stand out like a sore thumb, and you can see virtually anything of interest along the line. The key is to get a really good impedance match (for the transition point), and then only trigger the TDR during the transient or ringing, and preferably during the zero crossing. Remember, the phone line BORSCHT operates in milliseconds, but TDR operated in pico and nano seconds. For a millisecond or so you have a dry line, and if you can get two lines to "go dry" at the same time you can do some really wonderful thing to find bugs or other mischief. -jma At 2:59 PM -0600 1/10/02, John McCain wrote: >JMA's thoughts on the Consec device brought to mind a few thoughts that we >might discuss a bit on the list. It's been kinda quiet lately anyway, but >if this is too far off topic for you, trash it. > >We, as techies and engineers, tend to think in the ways we learned the laws >of elementary physics . We (ok, technically "I" instead of "we", but I'll >assume others fit the pattern) have been conditioned over the years to >focus on steady-state activity instead of transients; for example we >usually see a series circuit in its steady-state conditions... not it's >dynamic response. > >A good example would be closing a switch on a circuit with a battery, >capacitor, and resistor. We (at least I) first think that ok, there's a >fast transient, then no current flows (other than perhaps some minor >leakage through the cap). But, I conceptualize the no-current state of >this circuit as it's "normal" state... not the transient state. In >reality, both the initial transients as well as the steady state are the >"normal" states for this circuit. > >Only rarely do I conceptualize things in their transient, dynamic >conditions. I think of an oscillator as always oscillating, a transmitter >as always transmitting, receiver as always receiving, etc. I even think of >office politics and inter-personal dynamics as a sort of steady-state >dynamic... not a series of transient events. I rarely even consider the >"steady state" of oscillators, receivers, even LEDs, etc. starting up or >shutting down. > >Finally getting to the point! I suspect that we should consider the >transient, dynamic responses in the things we analyze and pay more >attention to those transients. Looking very carefully at what fast >transients occur when a phone goes off hook is something I've never done. > >Using a TDR or SA, we look at transients (since the dynamic is their >"steady state"), but do you carefully observe the first pulse of that TDR >trace to see what effect the circuit under test has on the TDR >instrument? Or, do you just adjust magnitude to make it look "normal" and >start looking at returns? I suspect those transients are sometimes >telling us things that we don't hear. > >Am I off base here. Do others not fall into this trap? Any thoughts? >JohnM > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-352-0350 >807 >Pioneer Web: >http://www.dcbnet.com >Champaign, IL. 61820 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4501 From: James M. Atkinson Date: Thu Jan 10, 2002 7:40pm Subject: Spy hunt sparked by 'fight with wife' http://www.ananova.com/news/story/sm_491601.html?menu= Spy hunt sparked by 'fight with wife' A man who sparked a spy alert apparently to cheer himself up after a row with his wife may have to pay thousands in compensation. The Japan Coast Guard spent more than L52,000 dispatching 17 vessels, launching aircraft 10 times, and mobilising 380 personnel. The man had reported seeing suspicious people in wet suits landing on an island. Police plan to send the case to prosecutors and charge the unidentified man. The Japan Times says he told police he hatched the story in an attempt to cheer himself up after a quarrel with his wife. It is reported the 41-year-old claimed five or six people wearing what looked like wet suits had emerged from what appeared to be a miniature submarine and landed on Enoshima Island, in Kanagawa. The coast guard then searched the North Korean freighter Sonamu. Nothing out of the ordinary was found on the ship which was first seen anchored near Enoshima just after the man made the report. The incident followed the sinking in late December of an unidentified but suspected North Korean spy ship in the East China Sea after a brief firefight with Japanese authorities. Story filed: 09:32 Thursday 10th January 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4502 From: Steve Uhrig Date: Thu Jan 10, 2002 8:49pm Subject: Re: Attacking CCS? Yes, exactly that Once upon a midnight dreary, david_johnrobinson pondered, weak and weary: > Two things hit me regarding this listing; A) so what is new? this > stuff has been out there advertised for years. B) Why does every > one immediatly jump and say CCS? Because some of us have been around a long time and have seen this stuff over and over and over. I'm talking longer than some of the players in this industry have been alive and longer than practically anyone in the industry has been in business. > Let me put my cards on the table, I was the operations > manager for CCS for a time here in London Then pardon me for being forthright, but either you were incredibly naive or you are a crook. > and they realy do not deserve the bad mouthing they get from > the group, See comment above. If you really believe this, I will go with naive. > OK so most of the stuff they provide is "crap" from a > professional point of veiw, but to most of their clients it's > exactly what they want One could make the same argument about illegal drugs or abortion. That doesn't justify it. > Any one wanting professional equipment would /should come to > professional suppliers like our company Department Q who only > deal with Government level bugs , covert equipment and GSM > tracking. Now I will change my opionion back to crook. If you only deal with 'Government level bugs', why are you inviting anyone to come to you. Do you claim to be supplying 'Government level bugs' to anyone? In the unlikely event you supply anything at all, I would expect it would be to anyone *other* than the government. Remember, there are a (very) few people around who actually work in these technologies, with government clients on a daily basis, and cannot be fooled. Most of them are smarter than me and keep their mouths shut. I speak my mind. > I don't think it is CCS for several reasons For all the reasons you mention, it absolutely fits the pattern of CCS. Lie to someone with money, schmooze them, pump up their egos and convince them they will make outrageous profits dealing with CCS. The ignorant fool (and ANYONE who deals with CCS/G-COM in ANY way is an ignorant fool) hands CCS five or six figures for the 'privilege' of acquiring their absolutely worthless but impressive boxes of nonfunctional bells and whistles. At that point the relationship, such as it was, is over unless CCS feels they can extract/extort even more money from the ignorant fool. In this case apparently, and I have seen it more times than I could count, the ignorant fool private labeled the crap because he wants the other ignorant fools who might buy it to think he manufactured it. CCS doesn't care. They got their money. They probably charged the guy extra for private labeling it, which in itself is funny because CCS was the original king of repackaging and slapping their name on standard products from other manufacturers and claiming it as their own. CCS cheated the guy pushing this private labeled crap, because he was an ignorant fool and had more money than he had brains. ANYONE who does any homework on CCS would never deal with them on any level. > a CCS licence costs $150.000 with no stock. A CCS 'license' or 'distributorship' or whatever they choose to call it costs precisely as much money as they can extract from the ignorant fool who gets involved with them. They (CCS) are very good at developing financial information on their victims, and this is how much they charge. Same with 'exclusive' rights to distribute CCS's vaporware in a particular country. I had the distinct pleasure at a trade show in New Delhi some years ago of introducing three 'exclusive distributors for all of India' to each other. Each had paid, as I recall, sums between the rupee equivalent of USD $50,000 and $200,000 for the alleged privilege of having an 'exclusive' representation for CCS in all of India. None received anything in return. Nada. If I called them tomorrow, I could purchase the exclusive rights to distribute their products in any country you could name, and I likely would be the 50th person to purchase the exclusive. You were a member of the den of thieves. You know how the game is played. You just have to pretend to defend them to justify stealing money from your victims. If you led the victim (ignorant fool) to believe something which was not true, either from a product representation standpoint or from an equipment performance standpoint, then you committed fraud. Whether you believe it or not, some day there will be a day of judgement, and you will have to provide an accounting, before man possibly and to God definitely, for your actions. You do have the opportunity to escape those penalties and erase the slate, and if you wish to discuss this issue only via PRIVATE email with me I will be glad to do so. > If you want to worry, and it seems you do , try talking to > professional covert suppliers - if you call us a spy shop you > had better duck You already provided substantial incontrovertible testimony that you are a crook, and your likely fictitious claims indicate you still are operating in the mode you learned from CCS. Therefore you fit this list's generic, and my personal, definition of a spy shop. This month is 30 years I have been manufacturing electronic surveillance and intelligence gathering products for government agencies. Do some research and you will find that is true. Manufacturing is starting with a blank CAD screen, component manufacturer's data books, designing a prototype, breadboarding and debugging a few, building the prototype, debugging it, putting a few beta test units into hands of professional users, getting their feedback and incorporating that into the design, refining the design, getting circuit boards etched and stuffed with components, firmware written, the incredibly difficult job of doing an effective job of packaging, documenting everything for small or medium scale production, writing instruction manuals, technical manuals, writing test procedures, setting up boxing and labeling and all the other tasks which exist between a wet dream and a workable effective product shipping to market. It is not taking some other company's product, repackaging it, and slapping your own name on it. Your claim of dealing in covert electronics is not the claim someone would make who genuinely does that work, but is the claim of someone who is playing the same CCS game of dealing in sensitive and restricted equipment as a sales tactic to make ignorant fools believe they are getting something they're not supposed to have. CCS caters to Walter Mittys, people who have more money than brains, and people who want to throw money at something and think they are going to get rich overnight. CCS sells dreams. They play on the mystique of dealing in sensitive and restricted technology. And ignorant fools fall for it, don't do any homework, and lose their investment. CCS plays a psychology game more than anything else. You know it and I know it and a good number of others know it. Denying it just digs your grave deeper. Some of us have been around for a while. All over the world, dealing with governments who have been cheated by CCS and seeing their tactics firsthand. I have visited most of CCS' shops around the world, played the game, flashed some cash and pretended to believe them just to see how bold they would get. I've witnessed and exposed phony government demos of theirs over and over, and some were impressingly cleverly staged. Don't forget that. There are others on this list who read your comments the same way I interpret them, who have similar backgrounds. They just, as mentioned above, have the discretion to just let you play your little spy groupie game and keep quiet. I don't often blatantly attack crooks, but you provided sufficient evidence to where a reasonable man who is familiar with this industry would believe you were and are a crook and a prevaricator (polite word for liar). I've made my comments, and of course you will have to jump in and whine and threaten and bluff and try to save face and convince all 1000+ of us who follow this excellent list that you are not a crook claiming to manufacture all sorts of secret squirrel devices but are just a bold groupie pretending to play a man's game and thinking you will fool us. You may fool some of us. You will not fool all of us. Maybe you're just mentally deficient. Maybe you are merely delusional. I don't know. More likely, you learned how to extract money from ignorant fools from your time at CCS, and are continuing to pretend, now that you have your own business card, letterhead and probably a combination phone and fax machine operating in some corner of your flat. Do you have full time employment somewhere else to earn enough money to pay the light bill and feed your fantasy of peddling vaporware to alleged government agencies? You're really only fooling yourself. You can reply however you wish, but I will not be baited and will say no more on the subject. The above represents 30 years of watching this industry and being intimately involved in the very issues I discussed, and knowing of whence I speak. The very best move you could make at this point would be to drop the issue and just back off and fade back into your 'lab' in the spare bedroom of your flat. I will work patiently for years mentoring someone who genuinely wants to start a business, pay his dues, build it on a firm foundation and, above all, be honest with everyone. I have done this with a number of members on this list, behind the scenes, for no reason other than I wanted to give something back to the younger fellows and help them get started along the right path. No one on the list knows it because I don't do it for money or to feed my ego. If someone wants to start an *honest* business and understands it takes years of work, I'm glad to share with them some of my experiences, mistakes and successes. But I give no quarter to the crooks in this industry. A former sales manager I had commented that this was the scummiest industry in which he ever had been involved. This message seems to confirm his observation. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: James M. Atkinson Date: Sat Jan 8, 2005 6:29pm Subject: Once more into the breach ACT III. SCENE I. France. Before Harfleur King Henry urging his men on at the siege of Harfleur. Once more unto the breach, dear friends, once more; Or close the wall up with our English dead. In peace there's nothing so becomes a man As modest stillness and humility; But when the blast of war blows in our ears, Then imitate the action of the tiger: Stiffen the sinews, summon up the blood, Disguise fair nature with hard-favour'd rage; Then lend the eye a terrible aspect; Let it pry through the portage of the head Like the brass cannon: let the brow o'erwhelm it As fearfully as doth a galled rock O'erhang and jutty his confounded base, Swill'd with the wild and wasteful ocean. Now set the teeth and stretch the nostril wide; Hold hard the breath, and bend up every spirit To his full height. On, on, you noblest English, Whose blood is fet from fathers of war-proof- Fathers that like so many Alexanders Have in these parts from morn till even fought, And sheath'd their swords for lack of argument. Dishonour not your mothers; now attest That those whom you call'd fathers did beget you. Be copy now to men of grosser blood, And teach them how to war. And you, good yeomen, Whose limbs were made in England, show us here The mettle of your pasture; let us swear That you are worth your breeding- which I doubt not; For there is none of you so mean and base That hath not noble lustre in your eyes. I see you stand like greyhounds in the slips, Straining upon the start. The game's afoot: Follow your spirit; and upon this charge Cry 'God for Harry, England, and Saint George!' ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10528 From: Hawkspirit Date: Sun Jan 9, 2005 0:31am Subject: E-bay Bug Sweep How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] 10529 From: Date: Sun Jan 9, 2005 5:46am Subject: TICSA Can anybody tell me what a TICSA is please, sounds like a nasty illness. David McGauley England [Non-text portions of this message have been removed] 10530 From: Date: Sun Jan 9, 2005 5:55am Subject: Re: Once more into the breach In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com writes: ACT III. SCENE I. France. Before Harfleur King Henry urging his men on at the siege of Harfleur. Once more unto the breach, dear friends, once more; Or close the wall up with our English dead. In peace there's nothing so becomes a man As modest stillness and humility; But when the blast of war blows in our ears, Then imitate the action of the tiger: Stiffen the sinews, summon up the blood, Disguise fair nature with hard-favour'd rage; Then lend the eye a terrible aspect; Let it pry through the portage of the head Like the brass cannon: let the brow o'erwhelm it As fearfully as doth a galled rock O'erhang and jutty his confounded base, Swill'd with the wild and wasteful ocean. Now set the teeth and stretch the nostril wide; Hold hard the breath, and bend up every spirit To his full height. On, on, you noblest English, Whose blood is fet from fathers of war-proof- Fathers that like so many Alexanders Have in these parts from morn till even fought, And sheath'd their swords for lack of argument. Dishonour not your mothers; now attest That those whom you call'd fathers did beget you. Be copy now to men of grosser blood, And teach them how to war. And you, good yeomen, Whose limbs were made in England, show us here The mettle of your pasture; let us swear That you are worth your breeding- which I doubt not; For there is none of you so mean and base That hath not noble lustre in your eyes. I see you stand like greyhounds in the slips, Straining upon the start. The game's afoot: Follow your spirit; and upon this charge Cry 'God for Harry, England, and Saint George!' ------------------------------------------------------------------------------ ---------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ------------------------------------------------- --------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ------------------------------------------------------------------------------ ---------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ------------------------------------------------------------------------------ ---------------------- ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Well said Jim but there were Scots Welshmen and Irishmen there at the time so you may get a few complaints. I am seriously considering the AOR SR 2000 Surveillance Receiver due out early this year Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same spec as both I asked this question a few months ago nobody had an opinion so I am trying again I have no experience of AOR David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10531 From: Andy Moore Date: Sun Jan 9, 2005 11:26am Subject: Re: Once more into the breach Dave, we had cause to look at the birdies within the AR5000+3 recently and there plenty of them - given that the 5000 is 'top of the range' it seems fair to conclude that all other AOR radios will harbour similar birdies thus you need to consider the possibility of missing some signals (for whatever purpose you might be using the receiver). Andy M PS No complaints about the Shakespeare quotation but I'm a bigger fan of the Corries' writings myself! ----- Original Message ----- From: To: Sent: Sunday, January 09, 2005 4:55 PM Subject: Re: [TSCM-L] Once more into the breach > > > > In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com > writes: > > > > ACT III. > SCENE I. > France. Before Harfleur > King Henry urging his men on at the siege of Harfleur. > > Once more unto the breach, dear friends, once more; > Or close the wall up with our English dead. > In peace there's nothing so becomes a man > As modest stillness and humility; > But when the blast of war blows in our ears, > Then imitate the action of the tiger: > Stiffen the sinews, summon up the blood, > Disguise fair nature with hard-favour'd rage; > Then lend the eye a terrible aspect; > Let it pry through the portage of the head > Like the brass cannon: let the brow o'erwhelm it > As fearfully as doth a galled rock > O'erhang and jutty his confounded base, > Swill'd with the wild and wasteful ocean. > Now set the teeth and stretch the nostril wide; > Hold hard the breath, and bend up every spirit > To his full height. On, on, you noblest English, > Whose blood is fet from fathers of war-proof- > Fathers that like so many Alexanders > Have in these parts from morn till even fought, > And sheath'd their swords for lack of argument. > Dishonour not your mothers; now attest > That those whom you call'd fathers did beget you. > Be copy now to men of grosser blood, > And teach them how to war. And you, good yeomen, > Whose limbs were made in England, show us here > The mettle of your pasture; let us swear > That you are worth your breeding- which I doubt not; > For there is none of you so mean and base > That hath not noble lustre in your eyes. > I see you stand like greyhounds in the slips, > Straining upon the start. The game's afoot: > Follow your spirit; and upon this charge > Cry 'God for Harry, England, and Saint George!' > > > > > -------------------------------------------------------------------------- ---- > ---------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------- > --------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ---- > ---------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- ---- > ---------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > > > Well said Jim but there were Scots Welshmen and Irishmen there at the time > so you may get a few complaints. > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year > Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same > spec as both > I asked this question a few months ago nobody had an opinion so I am trying > again > I have no experience of AOR > > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > The manufacture and installation of custom designed covert electronic audio > and video devices. > Sweep Services - Professional physical and Electronic countermeasures > utilising state of the art laboratory radio scanning and detection equipment. > Note: Any fellow WAPI and UKPIN members welcome to phone or call in to > discuss projects and applications or simply for free advice. > Workshop located alongside M58 junc 3. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10532 From: G P Date: Sun Jan 9, 2005 0:50pm Subject: Re: vonage? Depends on who the threat is. If you're concerned about crusty lawyers and their linemen buddies from the local telco, then broadband is the way to go. If your opponent is more high tech and has access to a skilled hacker, then sniffing SIP is trivial, especially on shared layer-2 segments such as broadband cable. A Russian group disassembled the Motorola cable modem firmware a few years ago and discovered most cable modems are running a VXworks RTOS variant; after hacking the hardware, they released several new firmware images and a special cable (http://www.tcniso.net) which allows for sniffing of broadband network traffic from a cable modem (as well as a host of other features, such as unlimited bandwidth etc). Most providers don't have encryption turned on via DOCSIS, in addition if you aren't statically hardcoding the MAC address of your default route then any one of a number of tools can be used to redirect traffic on a broadband cable segment, to and from your PC, via ARP cache poisoning. Same thing on DSL segments, although it's a bit more complicated and depends on how the DSLAM is configured. VoIP via leased line circuit (T1 for example) would be the safest, especially if you are quashing or rewriting CLID on outbound VoIP calls so people can't track back the toll records tied to a specific phone number account. Do a Google for "Fox News" +AMDOCS, toll records are pretty easy to gain access to, and lots of foreign companies are handling the processing of telephone billing records. Our national comms are as porous as our physical borders. Asterisk to Asterisk (http://www.asterisk.org) gateways, with encrypted VPN links in the middle are very secure for interoffice comms, provided each branch network is secured from outside attack with a stateful inspection firewall. --- littledog wrote: > > > Hello, could anyone out the give me their insight on > the new broadband cable phone services? Are they > more or less secure and since it seems that > everything is controlled through a website (or is > it?) like customizing the service to a record of all > incoming and outgoing calls, are they vulnerable to > hackers? I'm new and still in the little red > schoolhouse..thanx > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10533 From: Tech Sec Lab Date: Sun Jan 9, 2005 2:19pm Subject: Comments... Anyone know anything about these people...? http://www.tscmnetwork.com/ TSCM Network Post Office Box 842 Millbrook, AL 36054, USA. 10534 From: Date: Sun Jan 9, 2005 10:17am Subject: Re: Comments... In a message dated 1/9/2005 12:20:26 PM Pacific Standard Time, tscmteam@o... writes: http://www.tscmnetwork.com/ website picture [Non-text portions of this message have been removed] 10535 From: John and Sheryl Date: Sun Jan 9, 2005 1:04am Subject: RE: E-bay Bug Sweep Now I have seen everything, just last week he was selling shoes, now sweep, next week.....to be continued... John -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: January 8, 2005 11:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] E-bay Bug Sweep How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10536 From: mark de Boer Date: Sun Jan 9, 2005 3:14am Subject: Re: E-bay Bug Sweep Interesting company, and very inexpencive too, 125 dollar per our rate, how can they bring 250000 dollar in equipment and then stil make some money. M.de Boer RRB security Hawkspirit wrote: How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- ALL-NEW Yahoo! Messenger - all new features - even more fun! [Non-text portions of this message have been removed] 10537 From: Ian Wraith Date: Sun Jan 9, 2005 11:26am Subject: Re: Once more into the breach Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian 10538 From: Robin Hunter Date: Sun Jan 9, 2005 0:55pm Subject: Re- One more into the Breach Well spotted Dave McGauley, any reading of the history of the British Army will illustrate that the Scots Irish and Welsh played a disproportionate part in the building of 'Empire' and this continues today, for example the recent move of the Black Watch in Iraq and the subsequent announcement by President Blair's government of their proposed disbandment. For hundreds of years, wherever Britain has been involved in conflict the 'Jocks' have been in the frontline, I am pretty sure Shakespeare's military record is as distinguished as Tony Blair's. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 10539 From: cornolio Date: Sun Jan 9, 2005 2:56pm Subject: Best wishes and some info Hello List, First of all I would like to whish you all the best for 2005! I hope the list will keep up the high quality postings I have seen last year. I would like to point a few things that caught my attention lately. The first one is Tor: An anonymous Internet communication system. This is very promising, especially since here in Holland providers are (going to be) forced to keep huge traffic logs of all sites and URL's visited by their customers! I have TOR running here, and they are not going to snoop my web behavior , and keep the logs till the end of times :) TOR now sponsored by the EFF : http://tor.eff.org/ And together with my friend Rop I wrote a small whitepaper on a new lock vulnerability. With this technique you can open practically any pin tumbler lock, including some (very) high security ones, in seconds, without leaving (much of) a trace. What is needed is a prepared key, a hammer and little training. A video shot at the CCC congress in Berlin will be online soon, but in the meantime you might want to read the whitepaper and upgrade your locks! http://www.toool.nl/bumping.pdf (less then one Mb) Greetings, Barry Wels 10540 From: Samuel Hayes Date: Sun Jan 9, 2005 8:57pm Subject: Re: Re: Microphones This string of responses seems to have gotten away from the original question about the microphones, so to divert attention back to that I will attempt to answer as a TSCM neophyte. I would think that a microphone placed more then 20 ft from the subject would not be efficient due to the amount of ambient noise in the environment. It would probably take a professional sound engineer and alot of expensive CSI like doohickeys to filter out the surounding noise and gain access to the relevant audio...but I could be wrong. Just an educated guess ( i hope). --- secureoffice wrote: > > Jim > > It's not my place to comment on the relationship > between two people or > how they behave. I was simply pointing out the fact. > It was not meant > as a condemnation or opposite. As a list owner you > are perfectly > entitled to do what you see fit. However, it's not > my place to comment > on who was right or wrong, and I won't. > > I was simply letting Mr Garrett know that he should > contact Steve > directly should he require his specific response. > > I trust the matter requires no further explanation. > > Kindest regards > > -Ois > > > > > > > > > > --- In TSCM-L@yahoogroups.com, "James M. Atkinson" > wrote: > > > > Ois, > > > > The only time that I have ever banned or removed > someone from the > list is > > when that person becomes extremely disruptive and > rude or abusive to > the > > list membership, or if I catch them doing naughty, > naughty things. > > > > Steve was indeed banned from this group a few > months back, but only > after > > his repeat transgressions significantly exceeded > his welcome and my > > tolerance of his often offensive Prima Donna > behavior. tripped the > squelch > > circuit. He was given ample time to mend his > behavior for at least six > > month before his being banned. > > > > "sapiens timet et declinat malum stultus > transilit et confidit, > > Proverb14:16 > > > > The list needs good communications, and a place > where members can ask > > questions and discuss all levels of TSCM from the > beginner and > apprentice > > levels to the Technician and Engineering levels. > The list exists to > > improve the profession, and for no other purpose. > > > > Also, greetz to the list members who are going out > to the Little Red > School > > house for the first time, enjoy the daily commute > (you know who you > are). > > > > -jma > > > > > > > > At 02:26 PM 1/5/2005, secureoffice wrote: > > > > > > >Steve was banned from the group by the group > owner, you'll need to > > >email him directly if you want his opinion. > > > > > >Regards > > > > > >-Ois > > > > > > > > >--- In TSCM-L@yahoogroups.com, "DJ" > wrote: > > > > > > > > > > > > Steve you could probably answer this one. In > the movie Enemy of the > > > > State (steve did a great job here), I saw many > microphones used at > > > > long ranges to listen into the subjects > conversations. Does anyone > > > > have any whitepapers or any other information > on the availability of > > > > microphones that will work at a distance of > over 20 feet from the > > > > subject? > > > > > > > > Thanks, > > > > IT2 Garrett > > > > > > > ---------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, > and Real Wiretappers. > > > ---------------------------------------------------------------------------------------------------- > > James M. Atkinson > Phone: (978) 381-9111 > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 > Web: > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > > > ---------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and > Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > > > ---------------------------------------------------------------------------------------------------- > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10541 From: Date: Sun Jan 9, 2005 10:07pm Subject: Re: Once more into the breach In a message dated 09/01/2005 17:30:06 GMT Standard Time, ASMoore@A... writes: Dave, we had cause to look at the birdies within the AR5000+3 recently and there plenty of them - given that the 5000 is 'top of the range' it seems fair to conclude that all other AOR radios will harbour similar birdies thus you need to consider the possibility of missing some signals (for whatever purpose you might be using the receiver). Andy M PS No complaints about the Shakespeare quotation but I'm a bigger fan of the Corries' writings myself! ----- Original Message ----- From: To: Sent: Sunday, January 09, 2005 4:55 PM Subject: Re: [TSCM-L] Once more into the breach > > > > In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com > writes: > > > > ACT III. > SCENE I. > France. Before Harfleur > King Henry urging his men on at the siege of Harfleur. > > Once more unto the breach, dear friends, once more; > Or close the wall up with our English dead. > In peace there's nothing so becomes a man > As modest stillness and humility; > But when the blast of war blows in our ears, > Then imitate the action of the tiger: > Stiffen the sinews, summon up the blood, > Disguise fair nature with hard-favour'd rage; > Then lend the eye a terrible aspect; > Let it pry through the portage of the head > Like the brass cannon: let the brow o'erwhelm it > As fearfully as doth a galled rock > O'erhang and jutty his confounded base, > Swill'd with the wild and wasteful ocean. > Now set the teeth and stretch the nostril wide; > Hold hard the breath, and bend up every spirit > To his full height. On, on, you noblest English, > Whose blood is fet from fathers of war-proof- > Fathers that like so many Alexanders > Have in these parts from morn till even fought, > And sheath'd their swords for lack of argument. > Dishonour not your mothers; now attest > That those whom you call'd fathers did beget you. > Be copy now to men of grosser blood, > And teach them how to war. And you, good yeomen, > Whose limbs were made in England, show us here > The mettle of your pasture; let us swear > That you are worth your breeding- which I doubt not; > For there is none of you so mean and base > That hath not noble lustre in your eyes. > I see you stand like greyhounds in the slips, > Straining upon the start. The game's afoot: > Follow your spirit; and upon this charge > Cry 'God for Harry, England, and Saint George!' > > > > > -------------------------------------------------------------------------- ---- > ---------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------- > --------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ---- > ---------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- ---- > ---------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > > > Well said Jim but there were Scots Welshmen and Irishmen there at the time > so you may get a few complaints. > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year > Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same > spec as both > I asked this question a few months ago nobody had an opinion so I am trying > again > I have no experience of AOR > > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > The manufacture and installation of custom designed covert electronic audio > and video devices. > Sweep Services - Professional physical and Electronic countermeasures > utilising state of the art laboratory radio scanning and detection equipment. > Note: Any fellow WAPI and UKPIN members welcome to phone or call in to > discuss projects and applications or simply for free advice. > Workshop located alongside M58 junc 3. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks for that Andy and noted Many thanks Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10542 From: Date: Sun Jan 9, 2005 10:13pm Subject: Re: Once more into the breach In a message dated 10/01/2005 00:27:22 GMT Standard Time, i.wraith@s... writes: Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks Ian Yes I also found the AOR agent here very friendly and helpful. I would not use this device to replace my Spectrum Analyser. I have not heard anything to put me off buying the SR2000 yet Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10543 From: Date: Sun Jan 9, 2005 10:22pm Subject: AOR 2000 Photo In a message dated 10/01/2005 09:14:09 GMT Standard Time, DEMTEC@A... writes: In a message dated 10/01/2005 00:27:22 GMT Standard Time, i.wraith@s... writes: Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks Ian Yes I also found the AOR agent here very friendly and helpful. I would not use this device to replace my Spectrum Analyser. I have not heard anything to put me off buying the SR2000 yet Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> In low income neighborhoods, 84% do not own computers. At Network for Good, help bridge the Digital Divide! _Click Here!_ (http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links I have a very good quality A4 sized picture of the SR2000 supplied by AOR UK if any body would like a copy please let me know Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10544 From: Date: Mon Jan 10, 2005 8:38am Subject: Re: TICSA It stands for "TruSecure ICSA Certified Security Associate". It's a certification that complements the CISSP. More details are at: http://www.trusecure.com/knowledge/ticsa/index.shtml Note that TruSecure recently merged with Betrusted and now they go by the name Cybertrust, so the acronym may change to "CICSA" soon. 10545 From: Date: Mon Jan 10, 2005 9:19am Subject: Re: Vonage/VoIP Am I mistaken: I understood that Skype (another VoIP service) IS encrypted and thus much harder, if not impossible, to hack compared to Vonage or Pulver or... Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217) 524-6079 office (217) 467-4211 pager (217) 836-0919 mobile 10546 From: Tech Sec Lab Date: Mon Jan 10, 2005 11:38am Subject: RE: One more into the Breach [OT] LOL, reminds me of Rowan Atkinson's line, something like: ...and look, the machine gunning of 20,000 young men in 20 seconds just so Field Marshall Hague can move his drinks cabinet 6 inches closer to Berlin.... -Ois ********************************** Message: 10 Date: Sun, 9 Jan 2005 18:55:03 -0000 From: "Robin Hunter" Subject: Re- One more into the Breach Well spotted Dave McGauley, any reading of the history of the British Army will illustrate that the Scots Irish and Welsh played a disproportionate part in the building of 'Empire' and this continues today, for example the recent move of the Black Watch in Iraq and the subsequent announcement by President Blair's government of their proposed disbandment. For hundreds of years, wherever Britain has been involved in conflict the 'Jocks' have been in the frontline, I am pretty sure Shakespeare's military record is as distinguished as Tony Blair's. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com 10547 From: Tech Sec Lab Date: Mon Jan 10, 2005 11:51am Subject: Boeing probe intensifies over secret Lockheed papers Boeing probe intensifies over secret Lockheed papers By David Bowermaster Seattle Times aerospace reporter When Boeing fired a 60-year-old engineer named Ken Branch in 1999, he was cited for possessing proprietary Lockheed Martin rocket data in violation of company policy. Boeing and Lockheed were rival contenders for an enormous Air Force rocket program that both considered key to their future military and space prospects. And Branch, who had previously worked for Lockheed, apparently brought the documents with him when he joined the competition. Despite the intense rivalry over the rocket program, Boeing promptly alerted Lockheed and the Air Force that it had found the documents in Branch's files - a total of seven pages. That disclosure seemed like an impressive act of corporate honesty - until three years later, when Boeing attorneys let slip that the document trove found in Branch's cubicle actually contained 3,000 pages of Lockheed papers. When the Air Force later asked Boeing for a complete accounting, the tally mushroomed to 25,000 pages. Troubled by Boeing's constantly changing story and the massive quantity of purloined Lockheed trade secrets unearthed by subsequent reviews - more than 66,000 pages to date, held by at least five different Boeing workers - the Justice Department and Lockheed are investigating exactly how Branch came to join Boeing, how much information he may have taken with him and how it was used. And because of the document scandal, the Pentagon in 2003 stripped Boeing of launches worth $1 billion and suspended its rocket division from bidding for new government business. But the worst may be yet to come. Ongoing criminal and civil inquiries have spread into many corners of Boeing's $27 billion Integrated Defense Systems unit. Current and former Boeing executives could face indictments, and Boeing could owe Lockheed billions of dollars in damages. Additionally, the probes have intersected with the ever-expanding investigations of Darleen Druyun, the former Air Force acquisitions officer who is serving a nine-month prison sentence for improperly negotiating a job with Boeing. Branch's story is an intriguing tale of corporate spies, whistle-blowers, big-dollar defense contracts and alleged cover-ups. Yet most of it might have remained secret had Boeing not chosen to fight a legal battle with Branch after firing him. High-stakes rivalry Acquisition of McDonnell Douglas keeps Boeing in the running Boeing's all-out effort to win the Air Force's massive new rocket program began as a four-way competition. The Air Force had started the so-called Evolved Expendable Launch Vehicle (EELV) program in 1995 to create a new generation of advanced yet affordable rockets. At the time, the government was racing to build new space-based defense and spy networks, and telecommunications providers were planning scores of commercial-satellite systems. Boeing's space and defense revenues in 1996 were $5.8 billion, small compared with its commercial aerospace sales of $16.9 billion. To capitalize on the massive growth opportunities it saw in space, Boeing had purchased the rocket divisions of Rocketdyne in 1996 and would acquire the satellite-making arm of Hughes in 2000. Anticipating a winner-take-all contract that the Air Force estimated would be worth more than $15 billion over 20 years, as well as a leg up in the commercial launch business, Boeing and its three rivals saw the EELV as a pivotal project. Boeing and one other contender were eliminated in the Air Force's first cut, on Dec. 20, 1996. But Boeing stayed in the game because five days earlier it had announced plans to merge with McDonnell Douglas, one of the two EELV finalists. Boeing formally inherited McDonnell's Delta IV rocket program when the merger closed in August 1997. At the same time the merger was being hammered out, another fateful decision was being made much lower in the ranks at McDonnell: the hiring of Ken Branch away from rival Lockheed. Nearly everyone involved in Branch's hiring and in the subsequent investigations and lawsuits declined to comment for this story, citing the litigation. But documents in the case show how Boeing's pursuit of the rocket contract may have led it beyond aggressive competition and into industrial espionage and deception. Roots of a scandal Job applicant hints he can bring Lockheed secrets with him Branch joined the Delta IV team in January 1997, not long after the Air Force selected the Delta IV and the rival Lockheed Atlas V as finalists for EELV. He was paid $77,220, a 7.5 percent raise over his salary at Lockheed. In his first job interview with future boss Bill Erskine, a manager on the Delta IV ground-operations crew, Branch displayed samples of proprietary Lockheed data and hinted he could provide more if he got a job, according to a deposition by Erskine in Branch's wrongful-termination suit. Ex-Lockheed workers were prized commodities at the time. It was not unusual for them to turn up at Boeing. With only a handful of rocket builders in the United States, job switchers often moved from one competitor to another. In March of that same year, Frank Slazer, director of Delta IV business development, instructed his staff to interview former Lockheed employees "regarding their thoughts and impressions of Lockheed Martin's probable approach" to the EELV program. He cautioned, though, that they should follow the company's ethical guidelines and not seek any proprietary information. "Whatever it took" Manager pumping for information had just completed ethics training Though Branch worked on the Delta IV ground operations crew in Titusville, Fla., he traveled 43 times to the project's headquarters in Huntington Beach, Calif., during the 18 months that Boeing was preparing its formal bid to the Air Force, according to Lockheed's civil suit. The purpose of the visits is not clear from the public record. Erskine's depositions indicate he believed Branch was being pumped for information by Boeing executives, including Larry Satchell, leader of the "capture team" tasked with gathering data about the rival Atlas V. "As far as getting competition information out of Mr. Branch, the folks in Huntington Beach were the kings," Erskine later told a Boeing lawyer during an internal investigation. In October 1998, the Air Force awarded portions of the EELV contract to both finalists. Lockheed was widely considered the superior rocket builder, but the Pentagon cited Boeing's lower prices and gave it the lion's share - 19 of the first 28 EELV launches to Lockheed's nine. The Lockheed documents in Branch's files remained a closely held secret, even within the Delta IV project, for another eight months. But in June 1999, Erskine allegedly told fellow Delta IV worker Steve Griffin about Branch's job interview, and his offer to bring the entire Lockheed rocket proposal with him if he were hired. Branch has denied any such quid pro quo. In a later deposition, Griffin said he was stunned by Erskine's story, especially since he and Erskine had just completed ethics training. But he said Erskine told him he was "hired to win" and "was going to do whatever it took." Griffin alerted Boeing's legal department. Boeing had to confront a troubling internal issue - and the likelihood of leaks: Griffin's wife, Bridget, worked for Lockheed, and Boeing feared she would tell her employer what her husband had learned. Boeing attorney Mark Rabe was dispatched to investigate. He quickly found documents marked "Lockheed proprietary" in both Branch's and Erskine's offices. That triggered the calls to Lockheed and the Air Force. Boeing attorney Gary Black informed Lockheed that Boeing had found seven pages of harmless data, and said no one except Branch or Erskine had seen or used it. Boeing Delta IV program manager Michael Kennedy called the Air Force to report the same thing. Those calls, however, vastly understated the proprietary data found in Rabe's original investigation. In a later deposition, Rabe said there was a "five- to six-inch stack" of Lockheed material on Branch's desk, and "approximately one additional box of Lockheed Martin marked information" found in subsequent searches. But an investigator for the Pentagon's Defense Criminal Investigative Service said later in a separate affidavit that Rabe's initial search turned up "approximately 3,000 pages of material and filled two document storage boxes." And when the Air Force investigated the document theft in summer 2003, it concluded that Rabe had found eight boxes containing 24,500 pages of Lockheed material. Seven pages? Or 25,000? Many documents were at first considered nonproprietary What exactly Rabe found, and when, are crucial issues as investigators try to answer a fundamental question: Did Boeing orchestrate a cover-up to deceive Lockheed and the Pentagon about the quantity of stolen data in its hands? Or, as Boeing claims, did the company innocently misclassify much of the information in Branch's cubicle as nonproprietary and thus insignificant? Five months after alerting Lockheed to the seven pages, Black called again in November 1999 to say an exhaustive investigation had revealed 197 more pages of proprietary Lockheed data at Boeing. Again, Black said no one outside of Branch or Erskine had seen or used it, and the documents were of little relevance. Boeing stuck to that story for two years. But when Boeing began fighting the wrongful-termination suit that Branch and Erskine filed over their 1999 firing, the company inadvertently revealed the full scale of the document theft. Specifically, two Florida lawyers hired to defend Boeing in March 2002 filed a "statement of undisputed facts" that acknowledged the full box of Lockheed data that Rabe had found. They notified Lockheed in November 2001 and sent it 2,700 additional pages of material beyond the 204 Black had returned in 1999. Suddenly alerted that Boeing had at least 10 times as much confidential Lockheed data as previously acknowledged, Lockheed asked for full disclosure from Black and Valerie Schurman, who was the lead lawyer for all Boeing space and communications businesses at the time. Although the two Boeing attorneys were privy to Rabe's findings from the start, they reiterated that Boeing had turned over everything it had found to Lockheed - about 3,000 pages, or 22,000 pages less than it would turn over in April 2003. Boeing explains these early discrepancies this way: It says attorney Black was aware of the roughly 3,000 pages of Lockheed material found in Branch's office in 1999. But he believed only 204 pages were truly proprietary, and those were the ones he returned to Lockheed in November 1999. Black never updated the Air Force that Boeing had found material beyond the original seven pages, but the company insists that was merely an oversight. "We've been very candid with the Air Force," said Boeing spokesman Dan Beck. "Mistakes were made, follow-ups were not done that ought to have been done." The Air Force, in April 2003, made a specific written request to see all Lockheed material found in the offices of Branch and Erskine. A new Boeing attorney handling the case then sent the Air Force and Lockheed 22,000 pages of data. This massive document dump prompted Air Force deputy general counsel Steven Shaw to conclude in an investigative report that Boeing hadn't been straight with the government from 1999 to 2003. "The information Boeing provided to [Lockheed] and the Air Force was false and misleading," he wrote. Boeing insists those thousands of pages beyond the initial 3,000 found by Rabe were not reported because they were innocently misplaced. In 1999, Rabe retrieved everything in Branch's office that he believed might be sensitive Lockheed material, said Boeing spokesman Beck. But around 15,000 pages of Lockheed material from Branch's office were deemed inconsequential, so a member of Boeing's security staff boxed them up and sent them to external Boeing lawyers for storage. An additional 7,000 pages of documents found in a technical library, and allegedly brought to Boeing by Branch, were sent to the same lawyers. There, they were ignored for more than three years. More to come "Substantial violations of federal law," Air Force undersecretary charges The Air Force came down hard on Boeing after the April 2003 disclosures. Within three months, Undersecretary of the Air Force Pete Teets stripped Boeing of seven launches worth $1 billion and reallocated them to Lockheed. He also suspended Boeing from bidding for new government launch business until the criminal investigation is complete and the Air Force is satisfied Boeing has changed its ways. That suspension has stretched for more than 19 months, and its endpoint is unknown. "Boeing has committed serious and substantial violations of federal law," Teets said at a news briefing in July 2003. The Air Force also referred the case to federal prosecutors. The U.S. Attorney in Los Angeles charged Branch and Erskine in 2003 with conspiracy to steal trade secrets. Satchell, chief of the "capture team," is a target of the probe and is likely to be charged as well, said his attorney in court papers. Branch and Erskine will be tried in March, and the criminal investigation remains active. Prosecutors have amassed more than 160,000 pages of evidence and at least nine current or former Boeing employees have testified before a federal grand jury, according to court filings last year. The same court papers revealed that Boeing acknowledged to the U.S. Attorney in 2003 that at least 10 of its workers were aware Branch possessed stolen Lockheed documents during his tenure at Boeing. Yet Boeing continues to insist that the papers were not used to determine the pricing it offered the Air Force in 1998. Meanwhile, Lockheed is pressing a civil racketeering suit that claims Branch's delivery of documents was part of a "pattern and practice by Boeing to engage in economic espionage" to win government contracts. By bringing its case under racketeering statutes, which are more often applied to organized-crime cases, Lockheed can seek triple damages if it wins. Lockheed has not specified any damages, though it claims simply developing the Atlas V cost $1 billion. A trial wouldn't begin before 2006. To prevail, Lockheed must show Boeing is a "corrupt organization" with a pattern of illegal behavior. Toward that end, Lockheed is seeking to demonstrate that Boeing has repeatedly used stolen trade secrets to win government contracts. Lockheed's civil suit cites other cases in which Boeing has been sanctioned by the government for possessing a competitor's trade secrets, most notably Raytheon documents related to a competition to build a missile that would destroy enemy warheads in flight. Boeing was forced to withdraw from the competition in December 1998 when the Air Force discovered that the company had improperly obtained and disseminated Raytheon data. And the Darleen Druyun scandal that erupted in December 2003 unexpectedly provided additional material for Lockheed investigators seeking to establish a pattern of Boeing improprieties. The former Air Force procurement official was hired by Boeing and then fired 11 months later, along with Boeing Chief Financial Officer Michael Sears. Both have pleaded guilty to holding improper job negotiations while Druyun was at the Air Force. Significantly for Lockheed's case, Druyun has admitted giving Boeing preferential treatment in the award of more than $5 billion of Air Force contracts in return for jobs for herself and members of her family. She also acknowledged that while negotiating Boeing's proposal to lease 100 767 refueling tankers to the Air Force, she gave Boeing "what at the time she considered to be proprietary pricing data supplied by another aircraft manufacturer," according to the Justice Department. Airbus, the European airplane maker, was bidding against Boeing on the tankers at the time. Lockheed made an even graver allegation in November when it asked the court in Florida to allow it to file evidence that it claims demonstrates Druyun gave Boeing Chairman Harry Stonecipher and IDS chief Jim Albaugh insights into the launch prices Lockheed had proposed during the 1998 EELV competition. Boeing has filed a that accuses Lockheed of overstating Branch's conduct. It calls the Lockheed suit "an opportunistic attempt to use the acknowledged facts surrounding the Branch incident to inflict reputational and competitive harm upon Boeing." And Boeing flatly denies that Druyun played any role in the company's EELV bidding. Battling perception Just engineers bringing samples of their work from job to job? When Stonecipher replaced Phil Condit as CEO in 2003 after the firings of Druyun and Sears, he said his top priority was "dealing with this perception that we're a bunch of crooks." That task is likely to remain on Stonecipher's "to-do" list for some time, because the outcomes of the various investigations triggered by Branch are a long way off. Since Lockheed filed its racketeering suit in 2003, Boeing has conducted several more searches for Lockheed data in its employees' files and computers. For instance, one ex-Lockheed engineer, Donald Deming, turned over more than 11,000 pages of Atlas V material he had brought with him when he joined Boeing. Another, Dean Farmer, had 24,000 pages dealing with Lockheed satellite programs. Boeing says the incidents are harmless cases of engineers innocently bringing their own work papers from one job to another. But Lockheed has used each of these incidents to expand the scope of its racketeering suit, and the U.S. Attorney is expected to investigate each Boeing worker who improperly held or used Lockheed data. A source close to the investigations indicated Lockheed believes the number could reach as high as 20 to 25 Boeing workers. David Bowermaster: dbowermaster@s... 10548 From: James M. Atkinson Date: Mon Jan 10, 2005 0:07pm Subject: Computer crime to cost exec $27,000 Computer crime to cost exec $27,000 Date: January 09, 2005 Source: NOLA.com http://www.nola.com/ By: Mary Swerczek A Luling man who was accused of digitally spying on his former company has been sentenced to home imprisonment and must pay $27,000 for breaking into the company's computer system, the U.S. attorney's office said. David W. Avgikos, 42, was sentenced Wednesday by U.S. District Judge Lance M. Africk to six months home detention with electronic monitoring and four years probation. Avgikos also must pay Turbo Squid Inc. $17,000, the amount it cost the company to secure its computer system. After Avgikos pays the restitution, he also must pay a $10,000 fine. He could not be reached for comment Friday. Avgikos had been an owner of Turbo Squid, a company that sells three-dimensional images and software online, and left after he had differences with others at the company, Assistant U.S. Attorney Tony Gordon Sanders said. While he was still at Turbo Squid, Avgikos created passwords to access the company's database and Turbo Squid's bank account maintained by Whitney National Bank, Sanders said. As head of Digimation, a company that also sells 3-D images over the Internet, Avgikos accessed those databases to spy on his former company's movements and their finances, Sanders said. The FBI began investigating after Turbo Squid found the security breech. Avgikos was indicted by a federal grand jury and pleaded guilty Sept. 22 of last year. Turbo Squid's CEO, Andy Wisdom, wouldn't comment Friday. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10549 From: James M. Atkinson Date: Mon Jan 10, 2005 5:01pm Subject: Little cloak, less dagger http://www.sptimes.com/2005/01/09/Perspective/Little_cloak__less_da.shtml Little cloak, less dagger An ex-CIA agent talks about the real life of a spy and why she left the agency. By BILL ADAIR, Times Washington Bureau Chief Published January 9, 2005 Lindsay Moran, 35, wrote about her experiences with the CIA in "Blowing My Cover: My Life as a CIA Spy." Lindsay Moran decided she wasn't cut out to be a spy. She was drawn to the CIA by the cloak-and-dagger image and a sense of patriotism. She survived grueling training at "the Farm," the agency's famous boot camp, and ended up in Macedonia as a case officer, recruiting foreign agents to spy for the United States. But she quit after five years, unhappy with the CIA's Cold War culture, its sluggish response to terrorism and the heavy demands on her personal life. Moran, 35, has written about her experiences in a surprisingly funny book called Blowing My Cover: My Life as a CIA Spy. She spoke last week with Times Washington Bureau chief Bill Adair. Here is an edited version of that interview: Adair: Your basic cover was that you were an American diplomat. But you also pretended to be a travel writer, right? Moran: Generally you are left to make up your own cover story, which I actually think is good. It enables you to form an alias that is comfortable to you. I had always been a writer of sorts and enjoyed writing, so (being a travel writer) felt comfortable to me. Was it hard to remember who you were at any given moment? Yes it was. That was the biggest stress for me. While I was traveling, I would repeat to myself what my name was, what my birthday was. What could you tell your friends and family about your job? The agency kind of leaves it up to you to make those decisions. Some people don't tell anyone. They don't even tell anyone in their immediate family. Other people tell everyone - and that can be a problem. My mother, my father, my brother knew that I was working at the agency . . . and that I was overseas ostensibly as a diplomat. Your training at the Farm made the job look so sexy. But when you finally got overseas, it didn't seem nearly as exciting. Why? We were all aware that training didn't have a lot of relevance on what our jobs would be. It was more of a confidence builder or an Outward Bound sort of thing. Actually being a spy is a lot more banal. You are not crashing your car through barriers; you are not jumping out of planes. You are basically preying on people you think have vulnerabilities. That means spending a lot of time with people you might think are losers. I tried to target people that I thought would be interested in working for the U.S. out of ideological inspiration. But the reality of espionage is that most people do it for the money. Your job reminded me of selling Amway. You were recruiting these people, trying to build your team, paying them and buttering them up. That's a great analogy. The agency is a little bit cultish. You have to believe in what you're selling. When I got to the point where I felt like I didn't really have confidence in what I was selling, it made it 10 times more difficult for me to go out and sell. I could see why people at the agency are very nostalgic for the Cold War. That was a time when everything was so clear-cut. We were the good guys, (the Soviets) were the bad guys, and everybody really did believe in what we were selling. What about the mission didn't you believe in? I am a very patriotic person and have always believed that, no matter the faults with the American system of government, it's still the absolute best that there is. But on a personal level, it was hard for me to make an argument to people that I was targeting (that they would benefit from spying for the United States). You said the job left you "desperately lonely." Why? I cut off most of my friendships outside the agency. A friendship is obviously affected when, on some fundamental level, you are lying all the time. And that's what I was doing in all my relationships. I became increasingly uncommunicative and insular. The agency does become your family in a way. Those are the only people who know what you're doing and those are the people that you can talk to. But by the same token, it's a paranoid and secretive environment and nobody really trusts anybody else. So it's a big family, but a dysfunctional family because everybody is sort of jockeying for their own position and you all know that the rest of you are all liars. You describe lots of waste and excess - handing out $100 bills to informants who give worthless or inaccurate information. Is the CIA spending our money wisely? I don't think so. One of my personal beefs, both as a former CIA employee but also as a citizen, is that the intelligence budget remains classified, and the agency claims that it's classified because to reveal that information would be some kind threat to national security. My feeling is the threat to national security is having an intelligence agency that is not accountable for the, perhaps, $40-billion that it gets a year. There is incredible waste at the agency. One friend who worked at the agency told me that, at the end of the year, everybody got a free Palm Pilot. The deal was that they had this money they hadn't used. But they wanted to use it so that the following year, they could still get the same amount of money. Stuff like that, I'm sure, happens everywhere, but in the wake of Sept. 11, which was such a devastating intelligence failure, you would think there would be a lot more scrutiny on how money was spent. Is it true that when you paid cash to a foreign agent, you had to get them to sign a receipt? Yeah. (She laughs.) It's kind of funny that you have to cross your t's and dot your i's in that way. But at the end of the day, it's still government funds and, even if they sign it Mickey Mouse, you've got to get some sort of receipt. Why did you ultimately leave? I was in Russian language training, and we started this buildup to go to war. I wasn't an Iraqi expert, I wasn't a WMD expert. But it seemed kind of crazy that we were going to war. (Then) I was taken out of language lessons right as the war was starting and put in Iraqi Operations - not in Iraq, because we didn't have anyone in Iraq then, but in Headquarters. I thought, this is good, because now I'm going to see why we're going to war. I was really astounded. The agency tends to be a really hawkish, conservative environment. But I couldn't find anyone there who was gunning for this war. Everybody who was in the agency knew we were already really spread thin by Afghanistan. We were sending every yahoo and his brother to Kabul. And all of a sudden, we were going to start this other initiative in Iraq. The agency didn't have the people. Even though I'm critical of the agency, I'm really protective of it in terms of being portrayed as having provided the president faulty intelligence. When we were first going into Baghdad and it wasn't a cakewalk, I said to one of the heads of Iraqi Operations, "Did we say this was going to be a cakewalk?" He said, "No, we were very explicit with the administration that this is a clan society, it's going to break down." It's not going to be easy to go in there and set up a democracy, as the administration seemed to be advocating. Having very conflicted feelings about the war - my brother was a fighter pilot in the war - what I saw was that I had joined this organization to serve my country. And over the course of the five years I was there, I realized that you end up serving the organization over your country. And once I realized that I didn't know who the CIA was serving I just decided I didn't want to be a part of it any more. It seemed like there was a personal side to your departure, too. When I met the man who became my husband, he was such an example to me of someone who lived by his own terms. It reminded me who I had been before I joined the agency. It was so refreshing and relaxing to actually just be myself. In the agency, I was very reticent to speak my mind - as almost everybody was - because people are so distrustful and ready to jump on you. Plus, I was virtually living like a double or triple life. You were required to submit your manuscript to the CIA before it could be published, to make sure it did not reveal classified information. Tell me about that. One of the persons on the review board put it to me this way. He said, if you want to write everyone at the CIA is a drunk, you can write that because it might be true or it might not be true. But it's not classified information. I think there is a misperception that a lot of people have that when you join the agency, you sign away your right to ever say anything. Certainly there is the secrecy agreement, which is a very serious thing. I took it seriously. But ultimately, unless they can prove that what you're writing is classified or is in some way a threat to national security, they can't keep you from expressing your opinion or telling about your experiences. Would you recommend the CIA as a career? You know, after all that's been said and done, I probably still would. If you can hack the lying and the leading a double life and all the sacrifices you make, it's not a bad life. You're living overseas, you're probably doing well financially and there's always that reassurance you have that you are doing something that very few people in the world will ever be able to do. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10550 From: G P Date: Mon Jan 10, 2005 11:02pm Subject: Re: Vonage/VoIP Skype is in fact heavily encrypted, and functions as a peer-to-peer VoIP system. It can't really be considered VoIP in the sense that it is not compatible with the other standards and protocols, such as SIP and Asterisk's IAX. Skype was initially designed as a P2P voice communications system, but now they are going to be offering Skype-to-landline calls in the immediate future, with support for lots of different PDAs and GPRS-enabled cellphones. Skype is a neat concept, although there have been some security flaws in the application itself (leading to system compromise via buffer overflow attacks on the local listening service). Skype could very well replace the conventional telco, the vocoder they use is very high quality (better than a regular landline), and they've partnered I think with Siemens to produce a low cost and simple USB gadget that turns your USB port into an RJ11 POTS line so you can plug a cordless phone or whatever into it. --- sewellr@i... wrote: > > > > > > > Am I mistaken: I understood that Skype (another VoIP > service) IS encrypted > and thus much harder, if not impossible, to hack > compared to Vonage or > Pulver or... > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10551 From: G P Date: Mon Jan 10, 2005 11:06pm Subject: Wackenhut founder dies http://www.washingtonpost.com/wp-dyn/articles/A54899-2005Jan6.html By Matt Schudel Washington Post Staff Writer January 7, 2005 George R. Wackenhut, the founder of a global security company that has guarded U.S. embassies, nuclear power plants and the trans-Alaska oil pipeline as well as neighborhood malls and countless private homes, died Dec. 31 of a heart ailment in Vero Beach, Fla. He was 85. A hard-nosed businessman who began his career as an FBI agent tracking down counterfeiters and check forgers, Mr. Wackenhut capitalized on the nation's growing concern about corporate and personal security as he expanded his Florida-based company from a four-man operation in 1954 to a multibillion-dollar corporation. In 1984, he launched a subsidiary to design and manage jails and detention centers for the burgeoning private prison market in the United States and abroad. In time, Wackenhut Corp. became the nation's second-largest private prison operator. When Mr. Wackenhut sold his company to a Danish firm in 2002, it operated in 54 countries and had $2.8 billion in revenue. Mr. Wackenhut was an outspoken political conservative with ties to powerful Republicans and high-ranking leaders of the military, FBI and CIA. His office, with chairs carved in the shape of elephants, reflected his political leanings. Frequent rumors that his company was in the employ of the CIA were never substantiated, but Mr. Wackenhut, who was obsessive about high-tech security gadgets in his private life, seemed to relish the suggestion. Several of his senior executives were, in fact, former CIA operatives, and his company's board of directors included former FBI director Clarence Kelly, former National Security Agency director Bobby R. Inman, and former Defense secretary and deputy CIA director Frank Carlucci. On rare occasions, his company's clandestine work did land in the headlines. In 1991, a U.S. House committee investigated charges that a Wackenhut executive, working for a consortium of oil companies, illegally spied on a whistleblower exposing environmental damage caused by the oil industry. The executive, who had also discussed trying to implicate a California congressman in his sting, resigned immediately after a meeting with Mr. Wackenhut. Wackenhut-operated prisons have had problems as well. In 1999, the company lost a $12 million annual contract to run a jail in Texas when several Wackenhut guards were indicted for having sex with female inmates. Nonetheless, Mr. Wackenhut cultivated an image of probity, toughness and precise military order. His teak-and-granite office was spotless, and he kept a barber's chair in his private bathroom to avoid leaving the office for a haircut. George Russell Wackenhut grew up in Upper Darby, Pa., outside Philadelphia. An outstanding athlete, he was a professional soccer goalie with the Philadelphia Nationals in his youth. He graduated from what is now West Chester University in Pennsylvania. Stationed in Hawaii with the Army Corps of Engineers, Mr. Wackenhut was present at the Japanese attack on Pearl Harbor on Dec. 7, 1941. He recalled that he was so close to a Japanese warplane that he could see the face of the pilot. After serving in the Pacific, he moved to Baltimore, where he received a master's degree in education from Johns Hopkins University and taught classes in physical education and health. In 1951, Mr. Wackenhut joined the FBI as a special agent in Indianapolis and Atlanta, resigning in 1954 to launch a company in Coral Gables, Fla., with three other former agents. At one point, they had to pass the hat to meet payroll, and the company's total assets amounted to $1.56. After early struggles -- including a fistfight between Mr. Wackenhut and one of his partners -- he took sole control of the company in 1958, naming it for himself. After working all day in the office, he sometimes worked as a security guard at night. By 1964, he had contracts to guard the Kennedy Space Center in Florida, as well as the Atomic Energy Commission's nuclear test site in Nevada. He branched out to include food service for prisons and to provide protection for companies going through labor strikes. The core of his business, though, was providing security guards to watch out for criminal activity. Ironically, his company moved from the Miami suburb of Coral Gables to Palm Beach Gardens, Fla., in part because Miami's high crime rate made it difficult to attract good workers. In 1994, an 800-page biography of Mr. Wackenhut, called "The Quiet American," [1] was published. When he sold his company for $570 million in 2002, he owned more than 50 percent of its stock. Even with a tight profit margin of 2.5 percent, the company's earnings allowed Mr. Wackenhut to live lavishly in homes scattered throughout the country. Until he moved to Vero Beach nine years ago, his primary residence was a $10 million turreted mansion near Miami decorated with firearms and medieval suits of armor. His house was wired with infrared and laser sensors, closed-circuit television monitors and photo-cell surveillance and had private radios for his family. Survivors include his wife of 61 years, Ruth Wackenhut of Vero Beach, who was the company's secretary for many years; two children, Janis Ward and Richard Wackenhut; seven grandchildren; and three great-grandchildren. 10552 From: fjansgmxnet Date: Tue Jan 11, 2005 4:14am Subject: Re: Digital Cell phone scanning > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? Well, the tricks changed. In the digital world the estranged husband or the engaged investigator has to place a conventional bug in the cell phone of his wife. The best type of bugs I have seen are very small transmitters hidden in the accumlator pack of the cell phone, which could switched into a sleep mode to save power: Very fast to install and the victim feeds the bug with power in regular intervals whereever it goes. On Contras website (www.tetrascanner.com) there was a video from the German BSI showing this type of bug for a Motorola gsm phone. But I don't remember the exact link. The equipment to monitor digital cell phones at the air interfaces is expensive. Therefore I would expect it only at the "agency" level, if the folks don't know the current phone number you are using. Regards, Frank 10553 From: Tech Sec Lab Date: Tue Jan 11, 2005 11:36am Subject: List Member Craig...YOUR FAMOUS!!! :D Congrats! -Ois ********************** HEADLINE: Walls do have ears in industry BYLINE: BATHGATE Adrian BODY: Recent accusations made about the SIS spying on citizens has thrown up the question of espionage, something most Kiwis think belongs in the shadowy world of cold war movies. ADRIAN BATHGATE takes a look at what companies can do about the threat of bugs in the boardroom. Shaken, but not stirred. According to the experts, this is the response of many executives on being told they have been bugged. It's a scenario that's played out more often than you might think as about 3 to 5 per cent of "bug sweeps" turn up listening devices. Bugs can be planted for several reasons, say de-buggers. It may be competitors looking to assess what a company is up to, or it could be a party to negotiations, wanting to see what the opposition is thinking. Sometimes companies will sweep for bugs after a senior executive leaves, to make sure no secrets leave with them. Or perhaps a business partnership has fallen apart acrimoniously. Most companies are aware they have sensitive information, but not all would think of bugging as risk to them, says Craig Meldrum, the managing director of bug detecting firm Communications Security. "It's not the way most people get attacked. The high risk areas are things like documents rubbish or people selling secrets to competitors." Meldrum says his company detects devices in "about 3%" of the checks they do. Increasingly diverse technology has made catching the bugs that little bit harder, says Steve Willetts, managing director of Confidential Security Services. Advanced camera phones and advances in electronics means listening devices can either be more secretive or more blatant. For instance "hopping bugs", with a transmitter and a receiver which will constantly change frequency to attempt to foil detection. Willetts estimates his company has about a 5% hit rate with discovering bugs. "The proper way to do a sweep is if you're going to do the office, it's good to also do the home. Today, everybody takes work home." Meldrum says 80% of his firm's business is "precautionary". Large companies and government departments will have their headquarters "swept" for bugs every six or 12 months. Most of his clients are larger firms or those in "high value industries", such as financial institutions or lawyers. The most common form of bugging is via audio devices, usually in the boardroom or office, Meldrum says. "You don't have to enter a building to bug it," Willetts says. One of his checks is to the phone line entering a building which can be easily tapped. Devices can be planted in several ways by several people. Possibly they could be left during a visit, or someone could disguise themselves as a tradesman or cleaner. It can be surprisingly easy to gain access to many corporate head offices in New Zealand, the professionals say. It can range from a bug stuck with Blu-tack and "palmed" onto the bottom of the boardroom table. Or at the other end of the spectrum, someone could hire a professional with sophisticated method and equipment. There is no doubt the threat from espionage has changed, Meldrum says. The rise of the internet means a lot of information theft comes in the form of "hacking". "It doesn't mean that threat's gone away, because a lot of things are said that won't get written down." The problem, says Willetts, is people who plant devices often return to retrieve them, so there can be no confirmation that an office has been previously bugged. "If they've got access to it, it'll be in, do what they want it to, and it'll be gone again." According to the web, starting prices for counter-surveillance sweeps start at $ 250 per hour. Meldrum declined to go into the specifics of pricing, but says an organisation with a boardroom and six to 12 executives could be charged between $ 2000 and $ 5000. Willetts says his company will charge from around $ 250 an office. Bug sweeping involves using hi-tech equipment to conduct a "spectrum analysis" which can detect any transmission from very low to very high frequencies. A device called a non- linear junction detector can detect the presence of an electronic circuit, even in the absence of electricity. This can detect devices planted behind walls or inside false ceilings. Besides this, looking in all the usual places is a factor, Meldrum says. "A large proportion is actually physical search, crawling around the place." Some of New Zealand's larger companies spoken to by the Dominion Post all indicated the threat of espionage is something they take seriously. They were also united by being reluctant to divulge details of steps they take to combat the threat of spying. A spokesman for Carter Holt Harvey said the company did not comment on security matters. Fonterra also were unable to comment. A Lion Nathan spokesman said the company was confident it had the measures in place to combat any such incidents. One corporate that did not want to be named said it frequently checks for surveillance devices but has yet to turn anything up. Telecom spokesman John Goulter said the company takes the issue of security of information very seriously. Goulter says Telecom has a risk management team who look at threats to the company across a broad range of issues. "We have a number of policies and practices in place and we audit them against international benchmarks," he said. Goulter says this is an ongoing process and has been the focus of more attention over time. The idea of using covert surveillance devices is by no means a new one. Recent publicity over the alleged activities of the Security Intelligence Service has prompted former Labour Cabinet Minister Richard Prebble to say that during the Lange era in the 1980s, Government ministers were instructed to use payphones for confidential conversations. Allegations of bugging go right to the top, with a former British Cabinet minister alleging earlier this year that eavesdropping on the Secretary- General of the United Nations was a "tradition". New Zealand was alleged to be among countries shown transcripts of current Secretary-General Kofi Annan's phone calls. Then there's Watergate, perhaps the most famous bugging incident of them all. In 1972 five men were caught breaking into and bugging the offices of the Democrat Party at the Watergate Hotel in Washington. Republican president Richard Nixon was forced to resign in 1974 after secret tapes brought to light by the Washington Post showed Nixon had known about attempts to cover up the break-in for two years. Meldrum has been in the business with Communications Security for 20 years. The early days of "frantic corporate activity" of the mid-1980s, and early 1990s was the busiest period, he says. Business for his company has declined over time, Meldrum says, which is a function of the changing nature of our economy. "There are so few major corporates left in New Zealand compared to 10 years ago. Everything's a branch office now." But he is confident his services will always be required, pointing to the fact that most major companies and Government departments will de-bug their offices at least once a year. While the idea of espionage may be somewhat romanticised, debugging experts agree the threat is real, and some awareness is there. While the companies with sophisticated search devices do their periodical checks the best defence against espionage is not in high tech electronics, but vigilance of staff. "If somebody wants a conversation bad enough, and it's important enough, they're going to find a way to get it," Willetts says. Maybe it's time to check out where your nearest phone box is. 10554 From: Tech Sec Lab Date: Tue Jan 11, 2005 1:51pm Subject: IR Risk Comments? LENGTH: 597 words HEADLINE: LIGATT Issues Computer Security Alert; Computer Infrared Ports Can Be Used to Hack Into Your Computer DATELINE: Sep. 14, 2004; LOS ANGELES, CA; MARKET WIRE BODY: Laptops have increased business productivity in countless ways. No longer does an employee sit on an airplane content to watch a movie or read or a book. Many professionals are increasingly using travel time to finalize presentations or write memos to staff members or catch up with email after a busy day of meetings. How could this be a security issue? The example below illustrates such an occurrence. While traveling to a job site a LIGATT security team member was finishing a presentation on a flight and all of a sudden an icon popped up which notified her that she was attached to another person's computer via the infrared port. "Sure enough, the person sitting in the aisle next to me was on his laptop. Another few minutes passed and his head popped up and he started glancing around -- he had also just realized that our computers were now connected and communicating," says LIGATT security team member Merike Kaeo. The good news is that Microsoft has been careful in deploying appropriate defaults so that it would not be easy for someone to maliciously send you a virus or worm. Amazingly enough, little attention is paid to the infrared port that comes standard with most laptops on the market. As a method of research LIGATT security team members walked into a Borders bookstore where students were studying and placed our PDA next to a laptop with infrared port. We wrote a script that would copy all of the files from the "My Documents" folder. Our PDA running Windows CE connected to the infrared port and began copying the files. After a period of time we were able to gain entry into two out of ten computers and started copying files. We then showed potential victims how to go into Windows and turn on security for infrared port. Once files are received on PDA the files can be emailed to another destination. This could be used in an industrial espionage situation. How do you protect yourself? The first step in the process is to make Windows aware of your computer's infrared port. If you're running Windows on a notebook PC with a built-in infrared port, then Windows will probably detect the port automatically. You can verify this by going into the Control Panel and double-clicking on the System icon. When you do, you'll see the System Properties sheet. Select the Hardware tab and click the Device Manager button. If Windows recognizes your infrared port, there will be a category within the Device Manager called Infrared Devices. If you expand the Infrared Devices category, you'll see the infrared port. 10555 From: Michael Puchol Date: Tue Jan 11, 2005 4:16pm Subject: Re: IR Risk Jeeez...this vulnerability has existed ever since IrDA was invented. They should have done some homework before issuing a "security alert". For starters, a lot of laptops nowadays don't even have IrDA ports, as WiFi and Bluetooth are taking over. Security-conscious admins will disable IrDA altoghether. Sync/data to cellphones can be done with serial and more commonly USB cables, so no need for IrDA. Also notice how IR is less and less common in cellphones, and some PDAs are dropping it too. In all, a well-trodden subject. Best regards, Mike Tech Sec Lab wrote: > Comments? > > > LENGTH: 597 words > > HEADLINE: LIGATT Issues Computer Security Alert; > Computer Infrared Ports Can Be Used to Hack Into Your Computer > > DATELINE: Sep. 14, 2004; LOS ANGELES, CA; MARKET WIRE > > BODY: > Laptops have increased business productivity in countless ways. No longer > does an employee sit on an airplane content to watch a movie or read or a > book. Many professionals are increasingly using travel time to finalize > presentations or write memos to staff members or catch up with email after a > busy day of meetings. > > How could this be a security issue? The example below illustrates such an > occurrence. > > While traveling to a job site a LIGATT security team member was finishing a > presentation on a flight and all of a sudden an icon popped up which > notified her that she was attached to another person's computer via the > infrared port. "Sure enough, the person sitting in the aisle next to me was > on his laptop. Another few minutes passed and his head popped up and he > started glancing around -- he had also just realized that our computers were > now connected and communicating," says LIGATT security team member Merike > Kaeo. > > The good news is that Microsoft has been careful in deploying appropriate > defaults so that it would not be easy for someone to maliciously send you a > virus or worm. Amazingly enough, little attention is paid to the infrared > port that comes standard with most laptops on the market. > > As a method of research LIGATT security team members walked into a Borders > bookstore where students were studying and placed our PDA next to a laptop > with infrared port. We wrote a script that would copy all of the files from > the "My Documents" folder. Our PDA running Windows CE connected to the > infrared port and began copying the files. After a period of time we were > able to gain entry into two out of ten computers and started copying files. > We then showed potential victims how to go into Windows and turn on security > for infrared port. Once files are received on PDA the files can be emailed > to another destination. This could be used in an industrial espionage > situation. > > How do you protect yourself? The first step in the process is to make > Windows aware of your computer's infrared port. If you're running Windows on > a notebook PC with a built-in infrared port, then Windows will probably > detect the port automatically. You can verify this by going into the Control > Panel and double-clicking on the System icon. When you do, you'll see the > System Properties sheet. Select the Hardware tab and click the Device > Manager button. If Windows recognizes your infrared port, there will be a > category within the Device Manager called Infrared Devices. If you expand > the Infrared Devices category, you'll see the infrared port. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10556 From: James M. Atkinson Date: Tue Jan 11, 2005 5:18pm Subject: Ruling gives cops leeway with GPS http://timesunion.com/AspStories/story.asp?storyID=322152 Ruling gives cops leeway with GPS Decision allows use of vehicle tracking device without a warrant By BRENDAN LYONS, Staff writer First published: Tuesday, January 11, 2005 In a decision that could dramatically affect criminal investigations nationwide, a federal judge has ruled police didn't need a warrant when they attached a satellite tracking device to the underbelly of a car being driven by a suspected Hells Angels operative. The ruling by U.S. District Judge David N. Hurd clears the way for a federal trial scheduled to begin next month in Utica in which seven alleged Hells Angels members and associates, including several from the Capital Region, face drug-trafficking charges. The use of satellite tracking devices has stirred controversy and Hurd's ruling differs from a decision last spring by a Nassau County Court judge, who decided police needed a warrant when they used the technology to follow a burglary suspect. The biker case broke open here last year with a series of raids and arrests across upstate New York. The case began in Utica, but was expanded to include an organized crime task force that spent more than a year building a methamphetamine-trafficking case against a group of alleged outlaw bikers from Troy to Arizona. During surveillance of the group, detectives attached a global positioning satellite device to a vehicle driven by Robert P. Moran Jr., an Oneida County attorney and Hells Angels associate with a law office in Rome. They put the device on Moran's car for two days in July 2003 after he returned from a one-day trip to Arizona, where police say he purchased a large quantity of methamphetamine. Over those two days, Moran drove across New York state and allegedly made drug deals with suspected Hells Angels members in places such as New York City and Troy, according to court records. Hurd opined that authorities wouldn't need a warrant had they decided to follow Moran, so using a GPS device was merely a simpler way to track his car "as it traveled on the public highways," he wrote. "Moran had no expectation of privacy in the whereabouts of his vehicle on a public roadway. Thus, there was no search or seizure and no Fourth Amendment implications in the use of the GPS device." Hurd's ruling follows a line of reasoning that's widely supported by many law enforcement agencies. Police contend using tracking devices is no different than if they followed a suspect's vehicle in their own cars or by using helicopters. Kevin Mulroy, Moran's attorney, said the issue, which has brought conflicting rulings across the nation, is unsettling. "I think it's something the Supreme Court of the United States is going to have to hear," said Mulroy, a Syracuse attorney who was formerly an Onondaga County Court judge and assistant prosecutor. "One would think that before the police could install devices on your property, to monitor your movements, they would need a court order." A similar controversy arose in Washington two years ago, when that state's Supreme Court determined police had the right to attach a satellite tracking device to a murder suspect's car, but only after obtaining a warrant. Detectives attached a GPS device to the man's car for almost three weeks. When they downloaded the data, it indicated he had driven to an isolated area north of Spokane. Police searched the area and found the body of the man's 9-year-old daughter. He later was convicted of her murder, and the verdict was upheld. GPS devices are increasingly becoming a tool for law enforcement. Still, their use has been controversial because police agencies are not routinely obtaining court orders to install the devices, which rely on orbiting satellites and cellular phone networks to pinpoint their target. In many states, law enforcement agencies also are using them for less surreptitious missions, such as tracking sex offenders and parolees who are enrolled in electronic monitoring programs. It's not clear what effect Hurd's decision will have on their use, but it's apparently the first federal ruling regarding GPS devices and the need for search warrants. Assistant U.S. Attorney David Grable, who is prosecuting Moran and the others, did not return a telephone call for comment. The use of GPS devices by police most recently made national news in the Laci Peterson case. Scott Peterson, the Modesto, Calif., woman's husband, was convicted of murdering her on Christmas Eve 2002. In that case, police obtained a court order to attach tracking devices to three vehicles driven by Peterson, who drove to a waterfront near where the bodies of his wife and the baby boy she was carrying were later found. While the GPS data was admitted in the Peterson case, courts across the country are tackling the issue as defense lawyers challenge their reliability and whether police have a right to install them without a warrant. Similar technology helps police track cellular telephones, which also are being used by police to find fugitives and others. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- From: James M. Atkinson Date: Thu Jan 10, 2002 9:42pm Subject: You Might Be A Redneck If (2002 Edition) You Might Be A Redneck If (2002 Edition) You take your dog for a walk and you both use the same tree. You can entertain yourself for more than an hour with a fly swatter. Your property has been mistaken for a recycling center. Your boat has not left the driveway in 15 years. You burn your yard rather than mow it. You think the Nutcracker is something you did off the high dive. The Salvation Army declines your mattress. Your entire family sat around waiting for a call from the governor to spare a loved one. You offer to give someone the shirt off your back and they don't want it. You have the local taxidermist on speed dial. You come back from the dump with more than you took. You keep a can of Raid on the kitchen table. Your wife can climb a tree faster than your cat. Your grandmother has "Ammo" on her Christmas list. You've been kicked out of the zoo for heckling the monkeys. You think a subdivision is part of a math problem. You've bathed with flea and tick soap. You've been involved in a custody fight over a hunting dog. Your kids take a siphon hose to show and tell. You think a hot tub is a stolen indoor plumbing fixture. You took a fishing pole to Sea World. You go to the stock car races and don't need a program. You know how many bales of hay your car will hold. You have a rag for a gas cap. Your father executes the "Pull my finger" trick during Christmas dinner. Your house doesn't have curtains but your truck does. You wonder how service stations keep their restrooms so clean. You can spit without opening your mouth. You consider your license plate personalized because your father made it. Your lifetime goal is to own a fireworks stand. You sit on your roof at Christmas time hoping to fill your deer quota. You have a complete set of salad bowls and they all say Cool Whip on the side. The biggest city you've ever been to is Wal-Mart. Your working TV sits on top of your non-working TV. You thought the Unibomber was a wrestler. You've used your ironing board as a buffet table. You think a quarter horse is that ride in front of K-Mart. Your neighbors think you're a detective because a cop always brings you home. A tornado hits your neighborhood and does a $100,000 worth of improvement. You've used a toilet brush as a back scratcher. You've asked the preacher "How's it hangin'?" You missed 5th grade graduation because you had jury duty. You think fast food is hitting a deer at 65 mph. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4504 From: Shawn Hughes Date: Thu Jan 10, 2002 11:58pm Subject: Re: CCS/D.Robinson&Steve You know, I was going to comment on what Mr. Robinson stated. Then, I read Mr. Uhrig's response (I'm on digest, sometimes it runs late.) I started in computers before pc's had hard drives. However, in the years of pine, elm, irc, and all these new listservs, I have NEVER read such a thorough, complete, and utterly resounding response. No stone left unturned, or flung. Not even room for a cogent response. However, to defend the radio shack of surveillance/cs (ccs), this Robinson fellow has got to be a trouble-starting troll. What other reason would he have to make the statements he made? Shawn 4505 From: David Alexander Date: Fri Jan 11, 2002 9:21am Subject: Re: attacking CCS Steve, I just read your comprehensive demolition of David Robinson. Very, very well said sir. I just wish I could figure out how to send you a standing ovation from a 70,000 seater stadium, because that's what you deserve for having the guts to say what most people were thinking. We need more people like you who can expose the charlatans and con artists to give the rest of us a chance. Very best wishes and have a good weekend. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4506 From: Hawkspirit Date: Fri Jan 11, 2002 11:04am Subject: Theory (brought to mind by Comsec C3I discussion From: John McCain Using a TDR or SA, we look at transients (since the dynamic is their "steady state"), but do you carefully observe the first pulse of that TDR trace to see what effect the circuit under test has on the TDR instrument? Or, do you just adjust magnitude to make it look "normal" and start looking at returns? I suspect those transients are sometimes telling us things that we don't hear. Am I off base here. Do others not fall into this trap? Any thoughts? JohnM John, The first large pulse is the sending pulse and it's wave form is not changed by the line parameters. At least to the best of my knowledge/experience. Transients are really important in the area of detecting frequency hopping and spread spectrum transmitters, On an aside, in 1968 I was designing recording studio equipment in Hollywood. The bandwidth of frequency response of professional audio in those days was about out to 18k. I designed equipment at that time with high speed opamps that would pass 60k square waves. When I presented my equipment at the audio engineering convention in New York all the engineers from other companies would come to my booth ask why bother having extended bandwidth if the human hearing goes only to 18k. The answer is that the human ear perceives high frequency transients as holes in the complex waves that it can perceive in the 30hz to 18khz hearing range. Within a year all professional audio equipment had bandwidths of at least 60k. Best, Roger 4507 From: Hawkspirit Date: Fri Jan 11, 2002 11:18am Subject: Re: Theory (brought to mind by Comsec C3I discussion) From: "James M. Atkinson" "What I am in interested in the electrical behavior of a line during the loop relay seizing the line, and releasing it, and more specifically the "overshoot" areas of the signal. I am also interested in the frequencies that appear right at the moments of making, and then of breaking the line." Jim, Could you amplify on this, what kind of line behavior, in what form of result, would indicate what form of intercept? Thanks, Roger 4508 From: Steve Uhrig Date: Fri Jan 11, 2002 11:20am Subject: Creative assistance needed Hi all, I'm asking here because this list is now approximately 1200 members strong, and this is somewhat of an appropriate place to pose a request. Beginning in May, I will be publishing a monthly column in Police & Security News Magazine with questions and answers on surveillance and related technical investigation technology, to include TSCM. Readers of the magazine will ask questions of me by email, and I will answer several selected questions each month and print the questions and answers in the magazine. Here's what I need: > A name for the column ! Unfortunately I cannot solicit subscriptions to the magazine as it is controlled distribution to law enforcement only. Please feel free (per Jim, owner of this list) to post suggestions here to the list. That may encourage other suggestions and avoid redundancy. I'll select one or two of my favorites from those submitted here, and run them by the editor of the magazine. If your name is selected, I'll compensate you in some way via my used equipment page or something similar. The only one I've thought of so far, and I am not creative, is 'Everything you wanted to know about surveillance technology, but didn't know who to ask'. Feel free to reply to me directly if you do not want your name to appear on the list. Otherwise, please post your reply to the list. Note to do that, you can't merely reply to this message or your reply will come to me, not to the list (this measure was instituted for security reasons some time back). Address any suggestions to TSCM-L@yahoogroups.com. Picking names for products is one of the more difficult tasks in engineering. Same thing with newsletters and columns. I do not have a creative bone in my body. Can't draw stick figures. Thanks all. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4509 From: William Knowles Date: Fri Jan 11, 2002 11:37am Subject: Re: Creative assistance needed On Fri, 11 Jan 2002, Steve Uhrig wrote: Hello Steve & All! I haven't had enough Red Bull yet, but off the top of my mind comes... Off The Wire! Cheers! William Knowles wk@c... > I'm asking here because this list is now approximately 1200 > members strong, and this is somewhat of an appropriate place to > pose a request. > > Beginning in May, I will be publishing a monthly column in > Police & Security News Magazine with questions and answers on > surveillance and related technical investigation technology, to > include TSCM. Readers of the magazine will ask questions of me > by email, and I will answer several selected questions each > month and print the questions and answers in the magazine. > > Here's what I need: > > > A name for the column ! > > Unfortunately I cannot solicit subscriptions to the magazine as > it is controlled distribution to law enforcement only. > > Please feel free (per Jim, owner of this list) to post > suggestions here to the list. That may encourage other > suggestions and avoid redundancy. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4510 From: Steve Whitehead Date: Fri Jan 11, 2002 0:59pm Subject: France 'spied on food whistleblower' "A scientist who suggested that the French food industry was cashing in by over-salting products, claims he was spied on by France's security services. Pierre Meneton said in a report to the government that excessive use of salt could be blamed for 75,000 heart attacks each year, a third of which were fatal. Yet the food industry deliberately opposed cutting back on the salt as it benefited from the sale of soft drinks to parched customers, he alleged. The latest issue of Le Point magazine claims France's security agency put him under surveillance once the report was completed. It says spies from the agency placed bugs on his office phone, intercepted calls to his mobile phone and monitored his relatives, friends and colleagues. The report is denied by the French Interior Ministry, the security agency - the Renseignements Generaux (Central Directorate of General Information) - and the French police. 'Security threat' "I noticed that it was from the time that we wanted to hand the file to AFSSA (the French Food Safety Agency) in 2000 that we started to have problems," Mr Meneton told La Chaine Info television. "It is surprising for a researcher who works for a public research institute that public authorities would take such a measure when one tries to improve a public health problem." His report said that a 30% cut in food salting would hit water and soft drinks sales by $5.4bn a year. Le Point says the Interior Ministry classified him as a level-two threat to national security on a par with foreign spies and terrorists. Salt risk Mr Meneton's report to AFSSA was carried in Le Point in February 2001. A month later, AFSSA said it backed reductions on salt levels in food. Sodium is one of salt's major constituents and has been linked to high blood pressure, strokes and heart attacks. But companies say salt is used not only to help taste, but as a preservative and to improve texture" Full Story at http://news.bbc.co.uk/hi/english/world/europe/newsid_1753000/1753433.stm Steve Whitehead TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 4511 From: Aimee Farr Date: Fri Jan 11, 2002 4:34pm Subject: Scum, etc. Many of your vendor gripes fall into deceptive advertising and deceptive trade practice territory -- state and federal. In five-stars. Other pressure groups have been extremely successful. ~Aimee http://www.newsbytes.com/news/02/173556.html FTC Taking 'Seriously' Request To Probe Firearms Sites By Robert MacMillan, Newsbytes WASHINGTON, D.C., U.S.A., 10 Jan 2002, 11:08 AM CST The Federal Trade Commission today acknowledged it has received a written request from a new gun-safety organization asking the agency to expand its post-Sept. 11 probe of false and misleading Web advertising claims to include firearms Web sites. The agency said today it is giving the matter "serious consideration." [...] 4512 From: James M. Atkinson Date: Fri Jan 11, 2002 5:07pm Subject: Re: Theory (brought to mind by Comsec C3I discussion) At 9:18 AM -0800 1/11/02, Hawkspirit wrote: >From: "James M. Atkinson" > >"What I am in interested in the electrical behavior of a line during >the loop relay seizing the line, and releasing it, and more >specifically the "overshoot" areas of the signal. >I am also interested in the frequencies that appear right at the >moments of making, and then of breaking the line." > >Jim, Could you amplify on this, what kind of line behavior, in what form of >result, would indicate what form of intercept? Thanks, Roger Sure, First I apply a slowly increasing resistance to the line until I seize the line. I repeat this several times until I have a fairly good calculation of the amount of current i need to get flowing to size the line, and the delay between the current draw and the seizure. I then sync my TDR to the circuit so that I start pounding the line with TDR pulse as I approach the seizing current. I then disregard the TDR pulses gathered just prior to the seize so that I am actually looking at TDR pulses during the zero crossing (when it should be really quiet). I can usually grab several hundred usable "pings" during the transition period, and have found it helpful for each "ping" to have a slightly offset rise/fall time or pulse width. The whole goal is to force a predictable zero crossing, and shoot pings into the line during the zero crossing. I start with a 5 pico second ping (using a high energy 90 volt tunnel diode), and slowly increase the rise time and/or pulse width to several milliseconds as I look down the line. I am not using a "sampling" circuit, but actually digitizing and capturing the TDR wave forms directly into a laptop in real time. This way I can see "mouse feces" laying against the wire, and can see any kind of resistive, inductive, or capacitive breach with some extreme resolution. The further down the line I am looking the less the resolution and the wider the pulses. If I can get two lines on the same cable I can ping on one line, and listen to the crosstalk of the signal on the other pair, I can also split the pairing and shoot them that way as well (while in transition). Either way the goal is to locate where the twisting of the pair has been compromised, and not just look for resistive faults. Most sweep methods are obsessed with finding resistive devices in series with the line, or some variation thereof. Sadly, the methods used to find resistive devices are worthless in finding something that is capacitively or inductively isolated (most professional eavesdropping devices are 10-40+ megaohms of impedance, or isolated in such a way that a regular TDR is worthless). The "virgin pair' vs "split pair" TDR will find any kind of inductive coupling on the line (of more then one loop), but you have to do it during the zero crossing. Inductive loading of less then one loop (such as in the case of a linear ferrite pickup) your going to have sweep more then the two wires your looking at (you need a total of four conductors, plus a good ground). Crosstalk analysis will detect any kind of separation or disturbance of the pairs of more then a mm, or even disturbance of the wire insulation (but you have to do it during the zero crossing). It's also helpful to "listen in" to the line with both an audio amp, AND a spectrum analyzer. After you have performed your regular non alerting phone sweep... disconnect the load (or phones), then "listen" to the line with a high impedance audio amp (like Kaisers 1059 or Alan's uAmp), then slowly tune something like the SCD-5 across the line. Next connect your AUDIO (100 Hz to about 10 kHz) spectrum analyzer to the line (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of control or command tones such as DTMF-C, 2100 Hz, etc (typically appearing as crosstalk). Then switch your your RF spectrum analyzer (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of RF present on the line. Hint: if someone attaches a transmitter to the line some of the RF will bleed back over the line and you will be able to see it.... however your going to have to "tune" the line to see it reliably. The determine how much current draw you need to seize the line card (remember the phone system works on current draw, not voltage) and bounce some TDR pulses down the line during the zero crossings to see what a regular wet line TDR might miss. The key in all of this is your ability to match the impedance of the line during the transition. This is not just a case of "cranking up the voltage", but one of "tuning up the TDR circuit" though a variable capacitor/varistor and resistor/inductor. You want a near perfect coupling between the TDR (or pulse generator) and the line. To look at it another way, consider that the line is an antenna, and you want a perfect impedance match between a radio, the feed line, and the antenna so you can maximize the signal your giving off or collecting. If you simply crank up your transmit power, but have a bad feed line all you will end of doing is heating up some wire. On the other hand if the feed line has a near perfect match to the radio, and the antenna has a near perfect mach to the feed line all kinds of wonderful things can be done. If you go one step further and fiddle with the antenna and use it at its precise resonant frequency you can work the world with just a small amount of power. Along the same lines if you filter out all the thunder-lizards, tune up your antenna, use good feed lines, and have a good LNA on the antenna you can hear extremely low poer things many thousands of miles away. Now, we take this and apply it to sweeping phone lines: First we find the "quietest time" on the line, which is during the transition point (the loop voltage and dial tone is our thunder lizard). Next we match the impedance of our TDR to the line impedance. Then we "tune" the line by bouncing TDR pulses down the line (with various pulse widths and rise times) while we tweak a capacitor/varactor for clean return (sort of like adjusting an SWR meter). The end result is a super precise series of pulses, clean TDR wave forms, and the exact position of anomalies along the line (including mouse feces touching the line). -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4513 From: James M. Atkinson Date: Fri Jan 11, 2002 4:00pm Subject: Re: Creative assistance needed How about these: "The Straight Poop" "Crow Whisperings" "Yoda Speaks" "Wizards Corner" "The Teachings of Obi Wan Uhrig" "Teachings of the Black Bag" ;-) -jma At 12:20 PM -0500 1/11/02, Steve Uhrig wrote: >Hi all, > >I'm asking here because this list is now approximately 1200 >members strong, and this is somewhat of an appropriate place to >pose a request. > >Beginning in May, I will be publishing a monthly column in >Police & Security News Magazine with questions and answers on >surveillance and related technical investigation technology, to >include TSCM. Readers of the magazine will ask questions of me >by email, and I will answer several selected questions each >month and print the questions and answers in the magazine. > >Here's what I need: > >> A name for the column ! > >Unfortunately I cannot solicit subscriptions to the magazine as >it is controlled distribution to law enforcement only. > >Please feel free (per Jim, owner of this list) to post >suggestions here to the list. That may encourage other >suggestions and avoid redundancy. > >I'll select one or two of my favorites from those submitted >here, and run them by the editor of the magazine. If your name >is selected, I'll compensate you in some way via my used >equipment page or something similar. > >The only one I've thought of so far, and I am not creative, is >'Everything you wanted to know about surveillance technology, >but didn't know who to ask'. > >Feel free to reply to me directly if you do not want your name >to appear on the list. Otherwise, please post your reply to the >list. Note to do that, you can't merely reply to this message or >your reply will come to me, not to the list (this measure was >instituted for security reasons some time back). > >Address any suggestions to TSCM-L@yahoogroups.com. > >Picking names for products is one of the more difficult tasks in >engineering. Same thing with newsletters and columns. I do not >have a creative bone in my body. Can't draw stick figures. > >Thanks all. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4514 From: James M. Atkinson Date: Fri Jan 11, 2002 11:43pm Subject: Boss hid spy camera http://www.theadvertiser.news.com.au/common/story_page/0,5936,3569734%255E421,00.html Boss hid spy camera By CHRISTINE CAULFIELD 11jan02 A FACTORY owner installed a video camera in female change rooms to spy on his staff for sexual gratification, a court heard yesterday. Peter Taylor, 50, set up the surveillance camera in a ceiling fan directly above the only female toilet in his car detailing shop. But defence counsel Nicola Gobbo told the Ballarat Magistrates' Court Mr Taylor suspected the staff at Southern Vehicle Enhancements, at Delacombe, were lazing around in the change room. She said Mr Taylor's intention was to monitor staff productivity, and to ensure none were using or dealing drugs on the premises. Magistrate Paul Grant said he could see no need to mount the camera above the toilet if Mr Taylor's aim was to check staff were working. Mr Grant said, on the evidence, it seemed more likely Mr Taylor derived some sexual pleasure from watching staff in the toilet. "It seems to me there is only one thing this person is trying to achieve, and that is to view people," Mr Grant said. In response to Ms Gobbo's claim that her client did not install the camera for some sinister sexual reasons, Mr Grant said: "It seems to me it was". Ms Gobbo said her client, who has also settled a civil suit over the matter, was anxious his staff did not have to give evidence in a criminal court. She said he did not want them to be subject to cross-examination, potentially causing them further distress. But Mr Grant said if Mr Taylor suspected the women were using or dealing drugs in the change room, they had a right to defend themselves. Mr Taylor, of Wiltshire Lane, Sebastopol, has been charged with installing and using a surveillance device and possessing an unregistered firearm, which was also found in the ceiling. The case has been adjourned to February 13. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4515 From: Steve Uhrig Date: Sat Jan 12, 2002 0:05am Subject: NSA Crypto museum reopening NSA MUSEUM OPEN AGAIN FOR VISITORS: The National Cryptologic Museum has opened to the public again on 13 December but for only on weekdays 9 to 4 as before: no Saturday hours. They are expecting to be open on Saturdays again this spring. Happy New Year! [Jack Ingram, NSA Curator] =========================== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4516 From: Steve Uhrig Date: Sat Jan 12, 2002 0:13am Subject: Hi-res commercial satellite http://news.bbc.co.uk/hi/english/sci/tech/newsid_1755000/1755356. stm Worth a read. Impressive. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4517 From: Date: Sat Jan 12, 2002 5:23am Subject: Steve Uhrig Column Name. -----BEGIN PGP SIGNED MESSAGE----- My suggestion is: Www.swssec.com Hardware Intel. Counter-intel. Q and A Hosted by Steve Uhrig -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wlwEARECABwFAjxAHFwVHGRhZW1vbjdAaHVzaG1haWwuY29tAAoJEIqGlhRaN0MTjHQA oINlJfqqrFe36CY1SeUsn8A2pselAJ9hge7ce7XSqEyRjOsnabN9az382Q== =OlJH -----END PGP SIGNATURE----- 4518 From: James M. Atkinson Date: Sat Jan 12, 2002 11:34am Subject: How Many Dogs Does It Take HOW MANY DOGS DOES IT TAKE TO CHANGE A LIGHT BULB? Golden Retriever: The sun is shining, the day is young, we've got our whole lives ahead of us, and you're inside worrying about a stupid burned out bulb? Border Collie: Just one. And then I'll replace any wiring that's not up to code. Dachshund: You know I can't reach that stupid lamp! Rottweiler: Make me. Lab: Oh, me, me!!!! Pleeeeeeze let me change the light bulb! Can I? Can I? Huh? Huh? Huh? Can I? Malamute: Let the Border Collie do it. You can feed me while he's busy. Jack Russell Terrier: I'll just pop it in while I'm bouncing off the walls and furniture. Poodle: I'll just blow in the Border Collie's ear and he'll do it. By the time he finishes rewiring the house, my nails will be dry. Cocker Spaniel: Why change it? I can still pee on the carpet in the dark. Doberman Pinscher: While it's dark, I'm going to sleep on the couch. Boxer: Who cares? I can still play with my squeaky toys in the dark. Mastiff: Mastiffs are NOT afraid of the dark. Chihuahua: Yo quiero Taco Bulb. Irish Wolfhound: Can somebody else do it? I've got this hangover. Pointer: I see it, there it is, there it is, right there. Greyhound: It isn't moving. Who cares? Australian Shepherd: First, I'll put all the light bulbs in a little circle.... Old English Sheep Dog: Light bulb? I'm sorry, but I don't see a light bulb. Hound Dog: ZZZZZZZZZzzzzzzzzz Cairn Terrier: I'll bet there's a light bulb in a hole in the back yard. I can get it, I can get it. Bichon Frise: Check the pedigree: "...Non-working breed" -- Now, fluff my pillow. Cat: Dogs do not change light bulbs. People change light bulbs. So the question is: how long will it be before I can expect light? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4519 From: Miguel Puchol Date: Sat Jan 12, 2002 0:38pm Subject: Steve's column name Hi Steve, A few suggestions... "The Wired Guy" "1984" <= Maybe not all will get this one on the first issue... "Intel scene" All the best, Mike 4520 From: Jordan Ulery Date: Sat Jan 12, 2002 4:50pm Subject: Name Perhaps a little more formal under Order of the Court or Technical Surveillance Black Box [Non-text portions of this message have been removed] 4521 From: Information Date: Sat Jan 12, 2002 2:18pm Subject: Re: Steve's column name How about Now Hear This! Regards, Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com http://www.cybercrimeinternational.com 2002 SUPER CONFERENCE - ROYAL SONESTA HOTEL - NEW ORLEANS, LA - AUGUST 20-24, 2002 -http://www.intersurf.com/~nosuper/index.html ----- Original Message ----- From: "Miguel Puchol" To: Sent: Saturday, January 12, 2002 11:38 AM Subject: [TSCM-L] Steve's column name 4522 From: Hawkspirit Date: Sat Jan 12, 2002 10:23pm Subject: Equipment Interesting equipment website http://www.fuhs.de/en/products/fsc3000.asp 4523 From: Hawkspirit Date: Sat Jan 12, 2002 11:37pm Subject: Teddy Cam Watch out for Teddy for he be watch'n you! http://www.lacasadelespia.com/detalle.asp?det=93 4524 From: Hawkspirit Date: Sat Jan 12, 2002 11:40pm Subject: Cellular Scramblers Anyone know how effective these scramblers are? CELLULAR SCRAMBLER SPECIFICATIONS Circuit size: 50 mm ¥ 35 mm ¥ 5 mm Audio range: 300 up to 3000 Hz Telephone lines: Cellular Consumption: 5 Vdc, 80 mA of the battery Stand-by consumption: 5 Vdc, 80 mA of the battery Selling Price: $5800 Prod. Code: HS-7000 Security level: III ( High security) Hop rate: up to 150 times per second Purchase only on request The cellular scrambler offers a universal security solution for conversations carried out in cellular phones. The cellular scrambler comes in a Star Tac. The circuit inside the cell phone provides nivel III voice security. Level III, that uses the same frequency alteration principle than levels I and III, provides the highest security level, hopping from one code to the other 150 times per second, 9000 per minute. This high frequency hop rate offers protectiona against virtually all determined listeners. Each scrambler is installed in the Star Tac and the scrambler will function only in the case that the two devices that are communicating have the same scrambling system, which is called "Point to Point?. The scrambler adds negligible weight and no size to the phone and is activated when the user enters a code on the phone's keypad. A red LED indicator confirms that communication is secure. The PX40's low power consumption maximizes talk time on each portable phone. This scrambling system is used by top entities and companies, where nowadays information is the most valuable asset. These cellular scramblers are sold only by pairs. Features and benefits: Portable Security - provides much needed security to highly accessible portable phone conversations. The activated module offers a defense system against a variety of interested parties. ? Low Power Requirements - offers little additional drain upon the portable phone's battery; thus, allowing the phone to perform and operate at its optimum level. ? Internally Embedded - allows sophisticated voice security to be added without cumbersome external devices. ? Optional Security Levels - offer varying levels of security to meet the specific privacy needs of a variety of end users. ? Keypad Activation - allows the portable phone user to activate security by simply entering a code on the phone's keypad. A red LED indicator confirms that communication is secure. ? Voice Quality - delivers recovered audio which is clear and natural sounding, while providing coded audio which is virtually indecipherable by unwanted listeners. This is the best scrambler offered in the market and its purchase is only on request.For further information, see our product in: http://www.lacasadelespia.com/detalle.asp?det=137 4525 From: Hawkspirit Date: Sat Jan 12, 2002 11:44pm Subject: CELLULAR DETECTOR Another interesting product MICRO-CELLULAR DETECTOR Detection range: 5 Mhz - 2.6 Ghz Energy supply: A23 / 12 volts alkaline battery Antenna: flexible gel Duration: 20 hrs Stand by Selling Price: $420 Prod. Code: HS-7020 The Micro- Detector is an electronic device capable of detecting risky 5 mhz to 2.5 ghz radio frequencies within reach ( hidden transmissions of your conversations) created by your cellular telephone. This unit can be carried on the body or placed on the desk, always near the cellular phone, so that if the cellular phone emits a hidden transmission of your conversation, when it is in stand-by mode ( when it should not transmit data), the Micro- Detector will adopt the RF emitted by the cellular phone and will automatically start to vibrate silently. This is an equipment that can detect and alert you about the most simple to the most sofisticated tappings of cellular telephones as intruder microphones. NOTE: When the batteries of cellular telephones are removed during meetings, this is no guarantee that the conversation that is taking place is not being transmitted to a third party, since with today?s technology it is very easy to place a microphone that transmitts at a distance of up to 500 m. With the Micro- Detector you are able to confirm, after you have removed the batteries, that no cellular phone is transmitting a confidential conversation to another place that is not within the environment where the meeting is taking place; if this is the case, the device will start to vibrate on the table alerting the user that no confidential issues should be discussed in that meeting.For further information, see our product in: http://www.lacasadelespia.com/detalle.asp?det=73 4526 From: James M. Atkinson Date: Sun Jan 13, 2002 0:33am Subject: Re: Cellular Scramblers Virtually worthless, and for all practical purposes a scam. The people trying to market the bloody thing don't seem to realize that cell phones do not hot, and voice level encryption does not result in frequency hopping. -jma At 9:40 PM -0800 1/12/02, Hawkspirit wrote: >Anyone know how effective these scramblers are? > >CELLULAR SCRAMBLER > > > >SPECIFICATIONS >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm >Audio range: 300 up to 3000 Hz >Telephone lines: Cellular >Consumption: 5 Vdc, 80 mA of the battery >Stand-by consumption: 5 Vdc, 80 mA of the battery > >Selling Price: $5800 >Prod. Code: HS-7000 > > > >Security level: III ( High security) >Hop rate: up to 150 times per second > >Purchase only on request > >The cellular scrambler offers a universal security solution for >conversations carried out in cellular phones. The cellular scrambler comes >in a Star Tac. >The circuit inside the cell phone provides nivel III voice security. Level >III, that uses the same frequency alteration principle than levels I and >III, provides the highest security level, hopping from one code to the >other 150 times per second, 9000 per minute. This high frequency hop rate >offers protectiona against virtually all determined listeners. >Each scrambler is installed in the Star Tac and the scrambler will function >only in the case that the two devices that are communicating have the same >scrambling system, which is called "Point to Point?. The scrambler adds >negligible weight and no size to the phone and is activated when the user >enters a code on the phone's keypad. A red LED indicator confirms that >communication is secure. The PX40's low power consumption maximizes talk >time on each portable phone. >This scrambling system is used by top entities and companies, where >nowadays information is the most valuable asset. > >These cellular scramblers are sold only by pairs. > >Features and benefits: >Portable Security - provides much needed security to highly accessible >portable phone conversations. The activated module offers a defense system >against a variety of interested parties. >? Low Power Requirements - offers little additional drain upon the portable >phone's battery; thus, allowing the phone to perform and operate at its >optimum level. >? Internally Embedded - allows sophisticated voice security to be added >without cumbersome external devices. >? Optional Security Levels - offer varying levels of security to meet the >specific privacy needs of a variety of end users. >? Keypad Activation - allows the portable phone user to activate security >by simply entering a code on the phone's keypad. A red LED indicator >confirms that communication is secure. >? Voice Quality - delivers recovered audio which is clear and natural >sounding, while providing coded audio which is virtually indecipherable by >unwanted listeners. >This is the best scrambler offered in the market and its purchase is only >on request.For further information, see our product in: >http://www.lacasadelespia.com/detalle.asp?det=137 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4527 From: Tom Lusk Date: Sat Jan 12, 2002 1:59pm Subject: RE: Creative assistance needed Mybe "Bugs and Thugs"? Cheers, Tom -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Friday, January 11, 2002 12:21 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Creative assistance needed Hi all, I'm asking here because this list is now approximately 1200 members strong, and this is somewhat of an appropriate place to pose a request. Beginning in May, I will be publishing a monthly column in Police & Security News Magazine with questions and answers on surveillance and related technical investigation technology, to include TSCM. Readers of the magazine will ask questions of me by email, and I will answer several selected questions each month and print the questions and answers in the magazine. Here's what I need: > A name for the column ! Unfortunately I cannot solicit subscriptions to the magazine as it is controlled distribution to law enforcement only. Please feel free (per Jim, owner of this list) to post suggestions here to the list. That may encourage other suggestions and avoid redundancy. I'll select one or two of my favorites from those submitted here, and run them by the editor of the magazine. If your name is selected, I'll compensate you in some way via my used equipment page or something similar. The only one I've thought of so far, and I am not creative, is 'Everything you wanted to know about surveillance technology, but didn't know who to ask'. Feel free to reply to me directly if you do not want your name to appear on the list. Otherwise, please post your reply to the list. Note to do that, you can't merely reply to this message or your reply will come to me, not to the list (this measure was instituted for security reasons some time back). Address any suggestions to TSCM-L@yahoogroups.com. Picking names for products is one of the more difficult tasks in engineering. Same thing with newsletters and columns. I do not have a creative bone in my body. Can't draw stick figures. Thanks all. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4528 From: Miguel Puchol Date: Sun Jan 13, 2002 3:54am Subject: Re: Creative assistance needed Well, don't laught too hard but.... > "The Teachings of Obi Wan Uhrig" In reference to this: http://www.thesmokinggun.com/archive/obiwan1.shtml Makes you wonder :-) Cheers, Mike 4529 From: Miguel Puchol Date: Sun Jan 13, 2002 4:05am Subject: Re: Cellular Scramblers Well, looks to me like an overpriced Transcrypt board, which true, does inversion scrambling with rapidly hopping patterns, which could be OK for your average listener - but don't bet your life on it. In any case, it is VERY expensive, the best Transcrypt board you can buy commercially will set you back less than $1000, and you'll need an end-user certificate to get it. I don't know the price of the DES board, but I don't imagine it running past the $1k mark too much. I like the "purchase on request" part, how could I purchase if it wasn't on request? They have mind readers that work over IP nets now? Ahem, just another spy shop.....same oppinion goes for your second message. For more info, http://www.transcryptsecure.com/products/lmr_security.html MHO, all the best, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Sunday, January 13, 2002 6:40 AM Subject: [TSCM-L] Cellular Scramblers > Anyone know how effective these scramblers are? > > CELLULAR SCRAMBLER > > > > SPECIFICATIONS > Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > Audio range: 300 up to 3000 Hz > Telephone lines: Cellular > Consumption: 5 Vdc, 80 mA of the battery > Stand-by consumption: 5 Vdc, 80 mA of the battery > > Selling Price: $5800 > Prod. Code: HS-7000 > > > > Security level: III ( High security) > Hop rate: up to 150 times per second > > Purchase only on request > > The cellular scrambler offers a universal security solution for > conversations carried out in cellular phones. The cellular scrambler comes > in a Star Tac. > The circuit inside the cell phone provides nivel III voice security. Level > III, that uses the same frequency alteration principle than levels I and > III, provides the highest security level, hopping from one code to the > other 150 times per second, 9000 per minute. This high frequency hop rate > offers protectiona against virtually all determined listeners. > Each scrambler is installed in the Star Tac and the scrambler will function > only in the case that the two devices that are communicating have the same > scrambling system, which is called "Point to Point?. The scrambler adds > negligible weight and no size to the phone and is activated when the user > enters a code on the phone's keypad. A red LED indicator confirms that > communication is secure. The PX40's low power consumption maximizes talk > time on each portable phone. > This scrambling system is used by top entities and companies, where > nowadays information is the most valuable asset. > > These cellular scramblers are sold only by pairs. > > Features and benefits: > Portable Security - provides much needed security to highly accessible > portable phone conversations. The activated module offers a defense system > against a variety of interested parties. > ? Low Power Requirements - offers little additional drain upon the portable > phone's battery; thus, allowing the phone to perform and operate at its > optimum level. > ? Internally Embedded - allows sophisticated voice security to be added > without cumbersome external devices. > ? Optional Security Levels - offer varying levels of security to meet the > specific privacy needs of a variety of end users. > ? Keypad Activation - allows the portable phone user to activate security > by simply entering a code on the phone's keypad. A red LED indicator > confirms that communication is secure. > ? Voice Quality - delivers recovered audio which is clear and natural > sounding, while providing coded audio which is virtually indecipherable by > unwanted listeners. > This is the best scrambler offered in the market and its purchase is only > on request.For further information, see our product in: > http://www.lacasadelespia.com/detalle.asp?det=137 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4530 From: Steve Uhrig Date: Sun Jan 13, 2002 10:34am Subject: Re: Cellular Scramblers Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > Anyone know how effective these scramblers are? Will only work on analog. It is extremely difficult to get any sort of privacy beyond simple inversion working on cellular. Go to CDMA and you're safe from virtually anything not covered by a Title III court order served on the service provider. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4531 From: A Grudko Date: Sun Jan 13, 2002 3:02am Subject: Re: Cellular Scramblers - Original Message - >> Anyone know how effective these scramblers are? I don't know the product but I don't know of any space inside a Motorolla Star-Tac, never mind 50 mm x 35 mm x 5 mm. Perhaps the US model is different to ours. The terminology used sounds like techno-babble, but if fairness, this can happen innocently. I used to be the agent here for Cony and I termed their instruction manuals 'Janglish' - Japanese English, translated litterally from a dictionary. I re-wrote some of their manuals for them. I would expect a large company offering a serious product to have a decently worded technical discription. That's also a heck of a price to pay - especially if in fact all it does is light an LED up! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" 4532 From: A Grudko Date: Sun Jan 13, 2002 3:24am Subject: Re: Creative assistance needed - Original Message - > The only one I've thought of so far, and I am not creative, is > 'Everything you wanted to know about surveillance technology, > but didn't know who to ask'. Mmmm - doesn't really roll off the tongue... I've had a few articles published and non technical people might read past 'TSCM 101' - using a layman's term like 'bug' will attract readers. Some of the tiles I've used include: A Plague of Bugs Who's Bugging You? To Bug or Not To Bug? (feel free to use them) or how about: The Sweeper The Sweeper Speaks Bugland Wired The Receiver Detection and Deception Or a bit more off the wall: Bug Off! Sex, Lies and Audio Tape Where's Mike's Mike? Mikes, Cameras, Action! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 5:59pm Subject: Re: A Public Thank You Bob (and other list members), All to often TSCM'ers tend to be isolated, and even between government TSCM'ers there was/is little or no communications between them outside of their own agency (sad, but true). The list was founded to help facilitate communications between TSCM people who tend to be scattered all over the world. So long as the subject related to TSCM, TSCM related news, TSCM equipment, the occasional quip of humor, and related information it is OK to post it to the list. If you have questions about doing business with a TSCM firm, or a firm selling/buying TSCM gear such queries are also OK for the list. Of course classified information needs to be kept off the list, but in reality only a very, very tiny portion or sliver of TSCM actually involves even remotely classified materials. -jma At 6:18 PM -0500 1/11/01, 1RCM wrote: >Hi List, > >Last week I posted with a request to be contacted off-list by any list >member in the Boise, Idaho area. To make a long story short, I had stumbled >across a very good deal on a piece of TSCM test equipment but I was very >hesitant to send the asking price for something unseen to someone unknown. I >was contacted back by list member Mike Arnell. Mike was of great assistance >in allowing me to close the deal in a manner that I felt quite comfortable >with. And for that I would like to thank him very much. > >I chose to thank Mike publicly on the list as well as privately off-list for >a reason. This list, like most others, sees its periods of negativity >spawned by arguments, disgruntled posters, mis-information, etc., etc. But >it also sees more than its fair share of that which I assume that it was >originally founded for: the sharing of TSCM-related information, thoughts >and ideas. I have no idea whether or not when the list was founded the >moderator envisioned its usage for 'blind' business contacts or the >requesting of 'professional favors'. But I for one found it very beneficial >for just that purpose. And so, as long as the moderator does not disapprove, >I would not hesitate to recommend to any list member that if he/she has a >problem, concern or issue that another list member in a specific area might >be able to help with - then simply put out the feeler. Of course remember to >request the return contact and conduct your business off-list, but don't >hesitate to give that first 'call for help' via a posting on the list a try! > >Bob Motzer -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2283 From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 6:06pm Subject: Re: Fw: ARROGRANCE [ships passing in the night] At 1:27 PM -0500 1/11/01, MACCFound@a... wrote: > In a message dated 1/11/01 8:48:38 AM Pacific Standard Time, >secdep@v... writes: > > << Transcript of an actual radio conversation which took place during > October 1995 between a USN War Ship sailing off the coast of > Newfoundland and the Canadian authorities. >> > > > Sounds like an "urban legend" to me. Actually I think it falls under the header of [humor]... it's a story i have heard dozens of times, and in dozens of variations, but it is always funny and is worthy of re-telling periodically. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2284 From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 6:42pm Subject: System of Signals Emission Classification WARC-79, the World Administrative Radio Conference that rewrote many of the world's radio regulations, adopted a new system of emission classification. The traditional A (Amplitude), F (Frequency), and P (Pulse) was intuitive, but limited and clumsy when dealing with new modes. The world's radio bodies, including the FCC, gradually phased in the new system until today it completely replaces the old one. The formula for the new designations, loosely from ITU radio regulations 264 through 273, and Appendix 6, Part A, is: [BBBB]MNI[DM], where [] means optional when writing emission specs. [BBBB] = Necessary Bandwidth (shown in FCC records, but is often omitted elsewhere) Uses a letter and three numbers. The letter goes where the decimal point should be placed, and denotes a magnitude: H Hz K kHz M MHz G GHz Some common bandwidths are: 400 Hz 400H 2.4 kHz 2K40 12.5 kHz 12K5 6 MHz 6M00 M = Modulation Type N None A AM (Amplitude Modulation), double sideband, full carrier H AM, single sideband, full carrier R AM, single sideband, reduced or controlled carrier J AM, single sideband, suppressed carrier B AM, independent sidebands C AM, vestigial sideband (commonly analog TV) F Angle-modulated, straight FM G Angle-modulated, phase modulation (common; sounds like FM) D Carrier is amplitude and angle modulated P Pulse, no modulation K Pulse, amplitude modulation (PAM, PSM) L Pulse, width modulation (PWM) M Pulse, phase or position modulation (PPM) Q Pulse, carrier also angle-modulated during pulse W Pulse, two or more modes used X All cases not covered above N = Nature of modulating signal 0 None 1 Digital, on-off or quantized, no modulation 2 Digital, with modulation 3 Single analog channel 7 Two or more digital channels 8 Two or more analog channels 9 Composite, one or more digital channel, one or more analog X All cases not covered above I = Information type N None A Aural telegraphy, for people (Morse code) B Telegraphy for machine copy (RTTY, fast Morse) C Analog fax D Data, telemetry, telecommand E Telephony, voice, sound broadcasting F Video, television W Combinations of the above X All cases not covered above [DM] = additional details, not used by FCC, optional elsewhere D = Detail RTTY/modems: A Two condition code, differing numbers or durations (Morse) B Two condition code, same number and duration, no error check C Two condition code, same num & dur, error check D Four condition code, 1 or more bits per condition E Multi condition code, 1 or more bits per condition F Multi condition code, conditions may combine Audio: G Broadcast quality (mono) H Broadcast quality (stereo/multichannel) J Commercial quality K Commercial quality, analog freq inversion or band scrambling L Commercial quality, FM pilot tone (i.e. Lincomprex) Video: M Monochrome N Color W Combination X All cases not covered above M = Multiplex type N None C Code division F Frequency division T Time division W Combination of above X All other types ----------------------------------------------------------------------- Converting Between Old & New Systems ----------------------------------------------------------------------- USE OLD NEW Pure carrier A0,F0 N0N Morse telegraphy (by ear) A1 A1A Modulated CW Morse A2 A2A AM voice A3 A3E SSB, suppressed carrier A3J J3E SSB, reduced carrier A3R R3E SSB, full carrier A3H H3E Television A5 C3F RTTY (F.S.K.) F1 F1B RTTY (A.F.S.K.) F2 F2B FM voice (Narrowband) F3 F3E, 20K0F3E Packet Data/Teleprinters with Audio Sub-Carrier 20F2 20K0F2B Data with Audio Sub-carrier 3F2 3K00F2D 6F2 6K00F2D 20F2 20K0F2D Analog Voice 20F3 20K0F3E Digital Voice 20F3Y 20K0F1E Digital Facsimile without Audio Sub-Carrier 20F4 20K0F1C Digital Facsimile with Audio Sub-Carrier 20F4 20K0F2C Analog Facsimile 20F4 20K0F3C Composite of Digital & Analog Information 3F9 3K00F9W 6F9 6K00F9W 20F9 20K0F9W Packet Data/Teleprinters without Audio Sub-Carrier 20F9Y 20K0F1B Digital Data 20F9Y 20K0F1D LAND MOBILE EMISSIONS MICROWAVE EMISSIONS old new old new old new A0 N0N P0 P0N F9 F8W (If bw is less than A1 A1A P9 P0N 50 convert to F2D) A3 A3E A2J J2B F9Y F7W (If bw is less than A3J J3E A3H H3E 50 convert to F2D) A7J J8W A9J J9W F3 F3E A9 A9W P1 P1D A9Y A7W A9Y A1D F2Y F2D A5 A3F F0 N0N A0H H0N A9 A8W F1 F1B A7 A8D A5C C3F F2 F2D F7 F8D F2 F2D F3 F3E F5 F3F F3Y F1E F4 F3C F9 F9W F9Y F1D A2H H2D A2 A2D ---------------------------------------------------------------------- And here is the relevant section of FCC rules: ---------------------------------------------------------------------- From General Docket No. 80-739 Section 2.201 Emission, modulation, and transmission characteristics. The following system of designating emission, modulation, and transmission characteristics shall be employed. (a) Emissions are designated according to their classification and their necessary bandwidth. (b) A minimum of three symbols are used to describe the basic characteristics of radio waves. Emissions are classified and symbolized according to the following characteristics: (1) First symbol - type of modulation of the main carrier; (2) Second Symbol - nature of signal(s) modulating the main carrier; (3) Third symbol - type of information to be transmitted. NOTE: A fourth and fifth symbol are provided for additional information and are shown in Appendix 6, Part A of the ITU Radio Regulations. Use of the fourth and fifth symbol is optional. Therefore, the symbols may be used as described in Appendix 6, but are not required by the Commission. (c) First Symbol - types of modulation of the main carrier: (1) Emission of an unmodulated carrier N (2) Emission in which the main carrier is amplitude- modulated (including cases where sub-carriers are angle modulated): - Double-sideband A - Single-sideband, full carrier H - Single-sideband, reduced or variable level carrier R - Single-sideband, suppressed carrier J - Independent sidebands B - Vestigial sideband C (3) Emission in which the main carrier is angle-modulated: - Frequency modulation F - Phase modulation G NOTE: Whenever frequency modulation "F" is indicated, Phase modulation "G" is also acceptable. (4) Emission in which the main carrier is amplitude and angle-modulated either simultaneously or in a pre- established sequence D (5) Emission of pulses:* - Sequence of unmodulated pulses P - A sequence of pulses: - Modulated in amplitude K - Modulated in width/duration L - Modulated in position/phase M - In which the carrier is angle-modulated during the period of the pulse Q - Which is a combination of the foregoing or is produced by other means V (6) Cases not covered above, in which an emission consists of the main carrier modulated, either simultaneously or in a pre-established sequence, a combination of two or more of the following modes: amplitude, angle, pulse W (7) Cases not otherwise covered X *Emissions where the main carrier is directly modulated by a signal which has been coded into quantizied form (e.g., pulse code modulation) should be designated under (2) or (3). (d) Second Symbol- nature of signal(s) modulating the main carrier: (1) No modulating signal 0 (2) A single channel containing quantized or digital information without the use of a modulating sub- carrier, excluding time-division multiplex 1 (3) A single channel containing quantized or digital information with the use of a modulating sub-carrier, excluding time-division multiplex 2 (4) A single channel containing analogue information 3 (5) Two or more channels containing quantized or digital information 7 (6) Two or more channels containing analogue information 8 (7) Composite system with one or more channels containing quantized or digital information, to-gether with one or more channels containing analogue information 9 (8) Cases not otherwise covered X (e) Third Symbol - type of information to be transmitted: (1) No information transmitted N (2) Telegraphy - for aural reception A (3) Telegraphy - for automatic reception B (4) Facsimile C (5) Data transmission, telemetry, telecommand D (6) Telephony (including sound broadcasting) E (7) Television (video) F (8) Combination of the above W (9) Cases not otherwise covered X (f) Type B emission: As an exception to the above principles, damped waves are symbolized in the Commission's rules and regulations as type B emission. The use of type B emissions is forbidden. (g) Whenever the full designation of an emission is necessary, the symbol for that emission, as given above, shall be preceded by the necessary bandwidth of the emission as indicated in Section 2.202 (b) (1). Section 2.202 Bandwidths. (b) Necessary bandwidths. (1) The necessary bandwidth shall be expressed by three numerals and one letter. The letter occupies the position of the decimal point and represents the unit of bandwidth. The first character shall be neither zero nor K, M or G. - -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2285 From: Shawn Hughes Date: Fri Jan 12, 2001 9:01am Subject: damped waves? >(f) Type B emission: As an exception to the above principles, damped waves >are symbolized in the Commission's rules and regulations as type B >emission. The use of type B emissions >is forbidden. kay, what is a 'damped wave'? Why would they want to forbid it? What would one look like on a spec an? Shawn [Non-text portions of this message have been removed] 2286 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:33am Subject: Lamaze Class The room was full of pregnant women and their partners, and the Lamaze class was in full swing. The instructor was teaching the women how to breathe properly, along with informing the men how to give the necessary assurances at this stage of the plan. The teacher then announced, "Ladies, exercise is good for you. Walking is especially beneficial. And, gentlemen, it wouldn't hurt you to take the time to go walking with your partner!" The room got quiet. Finally, a man in the middle of the group raised his hand. "Yes?" replied the teacher. "Is it all right if she carries a golf bag while we walk?" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2287 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:36am Subject: Computer Terms for Southerners Computer Terms for Southerners "Keyboard" ----- Place to hang your truck keys. "Window" ----- Place in the truck to hang your guns. "Floppy" ----- When you run out of Polygrip. "Modem" ----- How you got rid of your dandelions. "ROM" ----- Delicious when you mix it with coca cola. "Byte" ----- First word in a kiss-off phrase. "Reboot" ----- What you do when the first pair gets covered with barnyard stuff. "Network" ----- Activity meant to provide bait for your trot line. "Mouse" ----- Fuzzy, soft thing you stuff in your beer bottle in order to get a free case. "LAN" ----- To borrow as in, "Hey Bubba! LAN me yore truck." "Cursor"----- What some guys do when they are mad at their wife and/or girlfriend. "Bit" ----- A wager as in, "I bit you can't spit that watermelon seed across the porch longways." "Digital Control" ----- What yore fingers do on the TV remote. "Packet"----- What you do to a suitcase or Wal-Mart bag before a trip. "Hard drive" ----- Trying to climb a steep, muddy hill with 3 flat tires and pulling a trailer load of fertilizer. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2288 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:39am Subject: Native New Yorkers What would you call it when a Native New Yorker has one arm shorter than the other? A speech impediment. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2289 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:44am Subject: Assorted Tidbit of Wisdom and Such THE INTERNET ~~~~~~~~~~~~ Customer: I'm trying to connect to the Internet with your CD, but it just doesn't work. What am I doing wrong? Tech Support: OK, you've got the CD in the CD drive, right? Customer: Yeah.... Tech Support: And what sort of computer are you using? Customer: Computer? Oh no, I haven't got a computer. It's in the CD player and all I get is weird noises. Listen..... Tech Support: Aaaarrrrgggghhhh!!! THE DOCTOR'S DAUGHTER ~~~~~~~~~~~~~~~~~~~~ On the way to preschool, the doctor had left her stethoscope on the car seat, and her little girl picked it up and began playing with it. "Be still, my heart," thought the doctor, "my daughter wants to follow in my footsteps!" Then the child spoke into the instrument, "Welcome to McDonald's. May I take your order?" COMPUTER CONFUSION ~~~~~~~~~~~~~~~~~~ Don was on duty in the main computer lab on a quiet afternoon. He noticed Putty Duh sitting in front of one of the workstations with his arms crossed across his chest, staring at the screen. After about 15 minutes he noticed that Putty was still in the same position, only now he was impatiently tapping his foot. Finally, Don approached Putty and asked if he needed help. He replied, "It's about time! I pressed the F1 button over twenty minutes ago!" HAIR LOSS ~~~~~~~~~ Sabra was eating breakfast one morning and got to thinking about things. "Mommy, mommy, why has daddy got so few hairs on his head?" she asked her mother. "He thinks a lot," replied her mother, pleased with herself for coming up with a good answer to her husband's baldness. Or she was until Sabra thought for a second and asked, "So why do you have so much hair?" TRUTHS ~~~~~~ * Raising teenagers is like nailing JELLO to a tree. * There is always a lot to be thankful for if you take time to look for it. For example, I am sitting here thinking how nice it is that wrinkles don't hurt. * The best way to keep kids at home is to make the home a pleasant atmosphere and let the air out of their tires. * Car sickness is the feeling you get when the monthly car payment is due. * Families are like fudge... mostly sweet with a few nuts. * Laughing helps. It's like jogging on the inside. * My mind not only wanders, sometimes it leaves completely. * If you can remain calm, you just don't have all the facts. WHY IS IT? ~~~~~~~~~~ Why is it that if someone tells you that there are 1 billion stars in the universe you will believe them, but if they tell you that a wall has wet paint you will have to touch it to be sure? -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2290 From: Date: Fri Jan 12, 2001 6:19am Subject: warrantless searches of computers for L.E. covered here http://www.cybercrime.gov/searchmanual.htm The U.S. Department of Justice this week published new guidelines for police and prosecutors in cases involving computer crimes. The 500 KB document includes a bevy of recent court cases and covers new topics such as encryption, PDAs and secret searches. It updates a 1994 manual, which the Electronic Privacy Information Center had to file a Freedom of Information Act request to obtain. No need to take such drastic steps this time: The Justice Department has placed the report on its cybercrime.gov site. 2291 From: Talisker Date: Fri Jan 12, 2001 11:18am Subject: Virus Alert - Humour I saw this and thought I'd pass it on :o) >you have just received the "Kansas Virus" As we ain't got no programming >experience, this virus works on the honor system. Please delete all the >files from your hard drive and manually forward this virus to everyone on >your mailing list. >Thanks for y'all for cooperating, >University of Kansas Computer Engineering Dept. No offence intended to anyone from Kansas Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 2292 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 11:44am Subject: Chicago Cops' Spying Curbs Eased Chicago Cops' Spying Curbs Eased http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,667737,00.html Friday January 12, 2001 4:40 am CHICAGO (AP) - Police can more easily monitor criminals after a federal appeals court on Thursday lifted restrictions imposed on the Chicago force two decades ago to stop mistreatment of Communists and other suspected subversives. Among the changes under the ruling: police will be allowed to investigate people photographed near crime scenes, keep records of suspects' gang affiliations and keep files on known associates of organized crime figures. The city's ``Red Squad,'' established in the 1920s, was designed to keep tabs on radical groups then viewed as enemies of the state. But over 50 years it also began keeping files on critics of City Hall. A 1981 agreement with the federal government required the police department to stop interfering with freedom of expression and to stop several types of intelligence-gathering. Thursday's decision leaves intact prohibitions against police harassment or retaliation against freedom of expression. The department must conduct an audit to see that it is in compliance with the decree and a federal court will continue to have oversight under the decision. But the 7th U.S. Circuit Court of Appeals ruling said the restrictions should be lifted because police were no longer interested in harassing people who had unpopular views. ``The culture that created and nourished the Red Squad has evaporated,'' the court said. ``The city does not want to resurrect the Red Squad. It wants to be able to keep tabs on incipient terrorist groups.'' ``Every major city in the United States is allowed to collect this kind of intelligence data,'' said police Superintendent Terry Hillard. ``We will continue to respect First Amendment rights while using the investigative tools to responsibly fight crime.'' The American Civil Liberties Union expressed dismay that the restrictions were lifted. ``We respectfully disagree with the 7th Circuit that they hampered the Chicago police from conducting effective law enforcement,'' spokesman Edward Yohnka said. =================================== Court upends spying rules imposed on Chicago cops http://www.chicago.tribune.com/news/metro/chicago/article/0,2669,ART-49184,FF.html By Matt O'Connor and Gary Washburn Tribune Staff Writers January 12, 2001 Restrictions on Chicago police because of their infamous Red Squad that spied on political activists in the 1960s and 1970s have left police "helpless" to combat terrorist groups and should be eased, a federal appeals court ruled Thursday. Lawyers for the city and Police Department hailed the decision, saying it will allow officers to provide surveillance of hate groups, photograph and videotape public demonstrations and share information with police across the country in monitoring suspected terrorists. Under a federal consent decree in effect for the last two decades, the city said its efforts to investigate gangs, terrorism and demonstrations had been hampered by requirements it first must have a reasonable suspicion of criminal activity. In its ruling, a three-judge panel of the 7th Circuit U.S. Court of Appeals said the onerous decree "renders the police helpless to do anything to protect the public" against terrorism. "The decree impedes efforts by the police to cope with the problems of today because earlier generations of police coped improperly with the problems of yesterday," said the opinion, written by Richard A. Posner, until recently chief judge. Judges William J. Bauer and Frank H. Easterbrook concurred. The ruling overturns a decision for the decree by former U.S. District Judge Ann Williams, who now sits on the 7th Circuit bench. Richard Gutman, an attorney for the lead plaintiff, Alliance to End Repression, who has been involved in the litigation from its inception in 1974, fears a return to the police tactics of the Red Squad, the intelligence-gathering unit that spied on, infiltrated and harassed a variety of political groups as far back as the 1920s. In its heyday in the 1960s, the special police detail was set up to watch over possibly violent anti-Vietnam War activists, but it quickly expanded to include spying on church organizations, community activists and opponents of Mayor Richard J. Daley's administration. "For all practical purposes, it eliminates any restrictions on political spying and it would permit the city to re-create the Red Squad," Gutman said. "So far as I'm concerned, the consent decree is dead." The ACLU of Illinois, another plaintiff in the lawsuit, disagreed with the court's finding that the limitations "hampered the city's ability to engage in effective law enforcement," said spokesman Edwin Yohnka. The plaintiffs said they haven't decided if they would ask the court to reconsider its decision or appeal to the U.S. Supreme Court. Lawyers for the city and the Police Department as well as the court ruling emphasized that the consent decree is being modified, not eliminated. Audits of the department's conformance with the decree won't be altered, making it more difficult for constitutional violations to go undetected, the court said. Thomas Needham, the Police Department's chief of staff, said he has been instructed by Supt. Terry Hillard to meet with city attorneys and come up with written procedures on how to conduct these investigations. Hillard wants to take "a cautious, go-slow approach," Needham said. "He wants this studied carefully." Mara Georges, the city's corporation counsel, said the court decision simply "unties the hands of the Chicago Police Department and allows it to engage in the kind of routine police work that every other police department does." Deputy Corporation Counsel Lawrence Rosenthal, who led the fight to ease the restrictions, acknowledged "very serious misconduct gave rise" to the consent decree. But from the start, the decree was "extremely restrictive," he said. Citing a recent example of how it hamstrung police efforts, Rosenthal pointed to white supremacist Benjamin Smith, whose two-state shooting spree over the 4th of July weekend in 1999 killed two, including former Northwestern University basketball coach Ricky Byrdsong, and wounded nine. When Smith had passed out inflammatory leaflets, Rosenthal said, "we couldn't even keep the leaflets, much less gather intelligence about who this guy was and what he was up to." "If somebody paints a swastika in Rogers Park, we have no idea what hate groups are operating in Rogers Park," Rosenthal said. "That is why we almost never solve those crimes. If you don't have a notion of what people you ought to be interviewing, you are not going to solve the crime." The court perceived a greater threat if the police couldn't keep tabs on terrorist groups. "Until the group goes beyond the advocacy of violence and begins preparatory actions that might create reasonable suspicion of imminent criminal activity, the hands of the police are tied," the decision said. "And if the police have been forbidden to investigate until then, if the investigation cannot begin until the group is well on its way toward the commission of terrorist acts, the investigation may come too late to prevent the acts or to identify the perpetrators." Plaintiffs' lawyers pointed out that Williams and U.S. Magistrate Judge Edward Bobrick concluded the decree in no way restricted Chicago police from investigating criminal activity. Gutman said one Chicago police sergeant who was a veteran of 15 years on the Counter-Terrorism Task Force said in a deposition the consent decree never stopped him from pursuing what he wanted to pursue. Gutman said the city in court filings indicated it wanted to investigate the extremist beliefs of individuals who aren't suspected of criminal activity. "They're going to be defining who's extremist," he said. "They can spy on anybody they want." Mayor Richard M. Daley began a campaign to lift the restrictions more than a decade ago. His administration believed the court might lift the limits if the city demonstrated a solid record of compliance. The city abided by the terms of the decree even though it hamstrung police, city officials declared Thursday. The court also concluded that the limits had worked. "The culture that created and nourished the Red Squad has evaporated," the court found. "The consent decree has done its job." =================================== Police spying rules eased http://www.suntimes.com/output/news/red12.html January 12, 2001 BY FRAN SPIELMAN AND STEVE WARMBIR STAFF REPORTERS Chicago police should have more freedom to investigate terrorist and hate groups because threats from them are more pressing than past police spying abuses, a federal appeals court ruled Thursday. In a controversial decision, the 7th Circuit Court of Appeals agreed to the city's request to modify a 1981 consent decree that had reined in the Chicago Police Department's notorious Red Squad. The unit spied on, infiltrated and harassed political groups. Under the consent decree, police could not start spying on a group until they had a reasonable belief a crime was occurring. But with a terrorist or hate group, "if the investigation cannot begin until the group is well on its way toward the commission of terrorist acts, the investigation may come too late to prevent the acts or to identify the perpetrators," Appellate Court Judge Richard Posner wrote. "The decree impedes efforts by the police to cope with the problems of today because earlier generations of police coped improperly with the problems of yesterday." Police and city officials praised the decision, while civil rights groups said it gutted an important safeguard. "I think it's a significant setback for these guidelines that have been in place protecting the people of Chicago these many years," ACLU spokesman Ed Yohnka said. The ACLU is considering an appeal. Tom Needham, chief of staff for police Supt. Terry Hillard, called the decision "a tremendous victory for common sense." "Less than 5 percent of the people currently on the police department were on the job when the city entered into this consent decree," Needham said. "There's a whole new generation of younger, better-educated police officers who can't even understand why we have these restrictions that other law enforcement agencies don't have. It's a historical relic." The ruling was a resounding victory for Mayor Daley, who has spent four years trying to modify the consent decree, which he contends "ties the hands" of police. As recently as last fall, violence in the Middle East prompted a Rogers Park rabbi to come under gunfire and Jewish pedestrians to be victimized by a slingshot attack. Daley said it was an example of how the court order had hamstrung police attempts to combat hate crimes. The rabbi's attackers are still at large. Currently, the police department is prohibited from retaining intelligence files, but now it will be able to create comprehensive databases on terrorist and hate groups. Hillard has asked his staff to put together a committee to determine how internal orders and procedures should be rewritten. The modified consent decree is expected to be written by U.S. District Judge Joan Gottschall at the appellate court's direction. Gottschall recently rejected claims by protesters that police violated the consent decree by spying on them during the 1996 Democratic National Convention. Corporation Counsel Mara Georges stressed the decree is not being scrapped. Chicago police still won't be permitted to gather intelligence to harass, intimidate or prohibit activities protected by the First Amendment. And the police will still be subject to court-monitored annual audits. "It's an entirely different atmosphere now. The city has been able to show that, for two decades, police have not engaged in such conduct." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2293 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 4:54pm Subject: Cuba's spy network revealed Published Friday, January 12, 2001, in the Miami Herald Cuba's spy network revealed http://www.miamiherald.com/content/today/news/dade/digdocs/057047.htm BY GAIL EPSTEIN NIEVES gepstein@h... Cuba's foreign intelligence agency devotes an entire department to infiltrating exile groups and another department to getting inside the FBI, CIA, State Department and other U.S. governmental agencies, an expert in Cuban spy matters testified Thursday. Stuart Hoyt Jr., a retired FBI agent, unraveled the hierarchy of Cuba's intelligence services from ``Commander in Chief'' Fidel Castro on down. His testimony provided some context for jurors in the Cuban spy trial, who every day read or hear another acronym related to Cuban intelligence. None of the jurors is Cuban- American, so they probably would not be expected to know that the Directorate of Intelligence, or DI, is Cuba's main foreign espionage agency. Within the DI are eight departments, all of which start with the letter M followed by a Roman numeral, said Hoyt, who retired from the FBI in 1994 after 24 years of foreign counter-intelligence work, first against the Soviet Union and later against Cuba. Hoyt was assigned to field offices in New York, Boston, San Juan and Washington, D.C., and for three years he supervised the agency's anti-Cuba efforts. He still works under contract with the FBI. Hoyt named the intelligence departments as follows: MX is the office of the DI's chief, Brig. Gen. Eduardo Delgado Rodriguez. The indictment in this case used the code ``MX'' for the Havana chief who directed the accused spies to gather information that allegedly helped Cuban MiG warplanes shoot down and kill four Brothers to the Rescue pilots in 1996. MI is responsible for infiltrating U.S. government agencies. MIII collects and analyzes all information coming into the DI. MV supports ``illegal'' intelligence officers, or those who enter the U.S. illegally. ``Legal officers'' arrive legally and operate in official diplomatic missions, including M15, the Cuban mission to the United Nations in New York City; M2, the Cuban embassy in Mexico City; and M6, the Cuban embassy in Madrid. MIX is ``active measures,'' which refer to the use of disinformation, threats and violence to discredit enemies or otherwise influence someone's actions. MXI monitors phone calls and airplane radio communications. MXV handles communications between Havana and agents in the United States. MXIX infiltrates ``counter-revolutionary'' Cuban exile groups that oppose the Castro regime. Cuba has another group with a name similar to the DI but with a very different function. The Directorate of Counter Intelligence, called CI, works within Cuba handling ``internal control to ensure people don't speak out against the government,'' Hoyt said. Both the DI and the CI are part of the Ministry of the Interior, MINIT, one of the two most powerful ministries, or departments, in the Cuban government. The second is the Ministry of the Revolutionary Armed Forces, MINFAR, or the Cuban military, Hoyt said. The five men on trial are accused of spying for Cuba as part of La Red Avispa, the Wasp Network, whose members allegedly tried to penetrate U.S. military installations and Cuban exile groups. Hoyt said the network used typical spying techniques, including writing secrets on water-soluble paper that could quickly be destroyed. Jurors saw four such papers. The network also used ``compartmentalization,'' or limiting each person's knowledge, so that ``in case one is arrested, he will not be able to identify the other.'' The accused spies also communicated with beepers and pay phones, used counter-surveillance measures, post office boxes, fake documents and concealment devices, he said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2294 From: St. Clair, James Date: Fri Jan 12, 2001 8:39am Subject: FW: CellPhone in luggage allegedly scrambles avionics CellPhone in luggage allegedly scrambles avionics: Mobile phone brings down Slovenian airplane By Kieren McCarthy, The Register, 01/11/2001 http://www.theregister.co.uk/content/5/15995.html According to Reuters, a Slovenian airplane had to make an emergency landing on Tuesday because a ringing mobile phone had corrupted an electronics system and caused a fire-on-board light to switch on. Adria Airways admitted the plane bound for Sarajevo turned back shortly after take-off and made an emergency landing in Ljubljana. The airline said it had been caused by a phone in the luggage compartment that had been left on. Now, we can take this one of three ways. Either we should be extremely grateful to airlines' anal rules that stop you using mobiles and loads of other electrical equipment (note that laptops are alright because business customers make airlines profitable), thereby making the flight even more depressing and uncomfortable. Or, we should be very, very concerned about getting onto an Adria Airways plane in the future. Or, we should stop using our mobile phones very soon because if they can disrupt electrical systems while in a suitcase while in a hold - just imagine what they're doing to your brain. Æ 2295 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 9:26pm Subject: Secrets and Lies January 12, 2001 Secrets and Lies http://thestandard.com/article/display/0,1151,21428,00.html Clinton recently appointed a national counterintelligence executive. But will protecting national secrets only create more leaks? By Richard Martin Two weeks ago, as one of his last acts in office, President Clinton created a position ñ "national counterintelligence executive" ñ with a broad mission to identify potential security threats and beef up protection for national secrets deemed vital to the security of the U.S. Coming after the bungled FBI investigation at the Los Alamos National Laboratory, this lame-duck maneuver is designed to combat a largely vaporous menace. It bears the fingerprints of FBI Director Louis Freeh, who as chairman of the proposed National Counterintelligence Board of Directors would select and oversee the secrecy czar. The directive also follows years of thwarted efforts by Congress to enact a law resembling Britain's notorious Official Secrets Act. Technology and business leaders should press the new Bush administration to reverse it forthwith. If there's one lesson that American companies have learned from the economic boom of the past decade it's that the free flow of information in any system ñ whether it's an internal network, a far-flung multinational corporation, a market or a government ñ benefits all parts of the system. Transparent markets function better than closed ones, as travel agents and stockbrokers are finding out. And transparent governments outlive secretive ones: "There seems to be no doubt," wrote former Sen. Daniel Patrick Moynihan in his foreword to the 1997 report from the Commission on Protecting and Reducing Government Secrecy, "that the Soviet Union deteriorated not least because the responsible actors rarely really knew what was going on." Unfortunately, the culture of secrecy that took hold in Washington after World War II did not evaporate with the end of the Cold War. Intelligence spending rose 120 percent between 1980 and 1996, a period when defense spending increased 40 percent. Today there are some 3 million people, inside and outside the federal government, with the authority to classify information as "Top Secret." But recent intelligence foul-ups, including the Los Alamos fiasco, prove that that expansion has not resulted in increased security. That's because of a paradox long understood by students of counterintelligence: The more secrets there are, the less secure they are. "Unless secrecy is reduced," wrote Moynihan, "it cannot be protected." Centralizing the government's counterintelligence efforts is a good idea. (One of the main recommendations of the 1997 secrecy commission was to rationalize procedures for classifying government information and to create a National Declassification Center.) Appointing a new secrecy czar to make the U.S. government more opaque, rather than less, is a lousy one. Ironically, in November, Clinton vetoed the Intelligence Authorization Act, which contained a provision to make any unauthorized disclosure of classified information a felony. Among other things, the law would have reversed the Supreme Court's historic decision in the Pentagon Papers case, which affirmed that freedom of the press and the public's right to know outweigh the specific crime of divulging government secrets. In vetoing the intelligence bill, Clinton quoted Justice Potter Stewart's opinion in that case: "The only effective restraint on executive policy in the areas of national defense and international affairs may lie in an enlightened citizenry." In other words, more secrecy only begets ignorance. And knowledge is always better than ignorance. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2296 From: Andre Holmes <1ach@g...> Date: Sat Jan 13, 2001 8:00am Subject: Re: FW: CellPhone in luggage allegedly scrambles avionics We should be very concerned about getting onto a Airways plane in the future. Lesson learned= after reading the post I could only conclude: 1 The Slovenian Airplane was rigged in such away that if there is any transmitting on board then it had better be from the transceiver in the cockpit. 2 There is a good likely hood that a frequency registering instrument was wired to the lights and or warning system of the airplane. 3 Electrical power to the airplane is generated from a generator which is mounted under the Jet Engines. All cables are shielded from heat,oil,water,vibration etc meaning nothing should be able to penetrate the shielding. The cables from the generator is routed to a box on the side of the Engine its a distribution center, from there the wire routes can go every where needed. 4 The airliner feels safer to turn the plane around to locate the source of the xmitter or bomb in the hopes of lowering liability. ----- Original Message ----- From: "St. Clair, James" To: Sent: Friday, January 12, 2001 9:39 AM Subject: [TSCM-L] FW: CellPhone in luggage allegedly scrambles avionics CellPhone in luggage allegedly scrambles avionics: Mobile phone brings down Slovenian airplane By Kieren McCarthy, The Register, 01/11/2001 http://www.theregister.co.uk/content/5/15995.html According to Reuters, a Slovenian airplane had to make an emergency landing on Tuesday because a ringing mobile phone had corrupted an electronics system and caused a fire-on-board light to switch on. Adria Airways admitted the plane bound for Sarajevo turned back shortly after take-off and made an emergency landing in Ljubljana. The airline said it had been caused by a phone in the luggage compartment that had been left on. Now, we can take this one of three ways. Either we should be extremely grateful to airlines' anal rules that stop you using mobiles and loads of other electrical equipment (note that laptops are alright because business customers make airlines profitable), thereby making the flight even more depressing and uncomfortable. Or, we should be very, very concerned about getting onto an Adria Airways plane in the future. Or, we should stop using our mobile phones very soon because if they can disrupt electrical systems while in a suitcase while in a hold - just imagine what they're doing to your brain. Æ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2297 From: Jonathan D. Alvord Jr. Date: Fri Jan 12, 2001 10:29pm Subject: pgp encryption Just something I thought worthy of discussion!! Anyone else know about this ?? heimdall58@h... Found this while surfing the web. [Note: there are many commercial programs available which may provide additional features not found in PGP 5.5, such as automatic encryption of an entire drive. A review of some of these programs for Windows 95 can be found in the cryptome. I have been advised that the Triple DES algorithm is probably the most secure.] For those who are not familiar with it, I would like to briefly describe encryption and how it works, and then suggest how the freeware program pgp could be used to encrypt an internet mailing list, so that third parties would not be able to decode and read messages broadcast within a private group. As far as I know, no one is using pgp to encrypt a mailing list at this time - but it's easy to do so, and a foolproof way to prevent big brother wannabies in spy agencies from sticking their noses where they don't belong -- politics. If this is beginning to sound like a conspiracy theory, then a few historical references are in order. The FBI performed over 10,000 illegal black bag jobs (break-ins to gather intelligence) during the cointelpro period of the sixties and seventies, and most of those were for political purposes. Fighting communism, fighting the Black Panthers and the American Indian Movement, the murders of Martin Luther King and Malcolm X -- there are many examples of the use of surveillance and counter- intelligence for political purposes, the shameful underside and shadow of twentieth century American politics. Today, with almost everyone going online, even ordinary people are taking great risks in their personal conversations, because email can be so easily intercepted and cataloged. And it's not just a rogue law enforcement officer we have to be afraid of; the APEC scandal provides a perfect example of the unethical use of our intelligence community for commercial purposes, and in that case, for the purpose of campaign finance. Well, if someone wants to read my email, they're going to have to get a warrant to steal my computer. Without the private key I keep on my hard drive (which itself is password protected), even an acre of cray computers at Fort Meade couldn't crack my code. That's how powerful this technology is. Louie the Freeh and other top cops have tried to make this illegal, but it is not illegal, at least in the U.S. [There may be countries where the use of unlimited strength crypto is illegal, however. These programs may be considered to be weapons of war, due to the historical importance of secret codes in wars.] You don't need to have any secrets to need encryption. One good reason to use encryption is the NSA database of private email (and etc), which can be searched for keywords, just like dejanews is used by regular folks, to search through public usenet posts. By keying in on your email address and name as keywords, anyone with access to their system could read all your incoming and outgoing email (all the mail, from day one) as well as all the emails in which someone else mentions your name. A search on your name would probably turn up things other people have said about you that you don't even know about. OK, let's discuss pgp. PGP, which stands for Pretty Good Privacy, is a freeware program available for IBM, Mac, and Unix computers at http://www.pgp.com/products/personal/products.cgi. Older versions and newer versions of pgp seem to be incompatible, and people with older versions need to update to version 5.5 to stay current. When the program installed itself on my Windows 95 machine, it generated a pair of keys. A key is a long sequence of characters generated by complex mathematical formulas. The two keys generated by the formulas have a mathematical relationship to each other, and pgp can tell that they are a pair by applying its equations - the puzzle is solved! One of the keys is public and the other is private. You give key away to your friends, and you keep the other one for yourself. The private key is never given to anyone else. Then the only way a third party would be able to decode messages encrypted to you would be to get a hold of your private key - and they would have to steal your computer for that. If this ever happens to you, remember to tell your lawyer about the Steve Jackson Games case, which set a precedent for the legal grounds required for a federal agency to confiscate a person's computer. The private key on your computer requires a password to use, which should be something you can remember and don't need to write down. If they have your computer, they can probably hack this password, but it would require serious effort. Some people encrypt everything on their computer and keep the key on a floppy disk. That would be the safest way to go. Then they would need to steal the floppy disk -- does this sound like James Bond yet? Let's say you want to send me an encrypted message. You will need to have my public key. You may have seen people who post on the internet with signatures like BEGIN PGP PUBLIC KEY BLOCK, then a lot of characters in a row, then END PGP PUBLIC KEY BLOCK. This public key is public information, and providers are beginning to archive them for their customers. A public key is used by other people to encrypt a message that only you can decode, using the private key that is the other half of the pair. Once someone encrypts a message to you, they can't decrypt it and read it afterwards, because they don't have the private key. That's how pgp works. Now, for me to send an encrypted reply to your message, I need your public key. I encrypt my message with your public key, paste it into an email message, and you will be able to decode it with your private key. We would use four keys to have this conversation. As I mentioned, they are automatically generated by the pgp program, and you just select "encrypt contents of clipboard" and "decrypt contents of clipboard" from a menu in pgp and select the proper keys from a list the program keeps, like a telephone directory. Apparantly, the way to crack encrypted messages is to use the formulas in pgp and try every combination to see if it works. But with this particular program (pgp), each key is so long that it would be an astronomical computer problem to try every combination. Many nonsense plaintext solutions are generated by shotgun type approaches, and a computer can't determine if it has a correct answer unless it can verify that the syntax of the message is gramatically correct; this is not easy, and even gramatically correct solutions could be found randomly, which have no relation to the real message. It's the same idea as a million monkeys (or more) with typewriters producing a Bible by accident. Imagine how many guesses an acre of cray computers could make in just one moment. Imagine the late Carl Sagan telling you how big the universe is - there must be a huge number of possible pgp keys. When they talk about unlimited strength crypto, they mean programs that can overpower supercomputers using trial and error methods, simply by using very long keys. Obviously, longer keys are harder to guess than shorter ones. Without getting any more technical, that is the basic idea of pgp. A numerical sequence is used to scramble your message, and a corresponding sequence, which is mathematically related to it, is used to unscramble it. The sequences used are too long to make guessing practical, even by the most powerful networks of computers. I have an idea for how to use pgp to encrypt a mailing list. Members of a mailing list all have to be able to read the messages on the list. In pgp terms, everyone needs to use the same public key to encrypt messages for the list, and everyone uses the same private key to read them. So everyone needs to have copies of the same "master keys" for the list. Here's how it would work. First, a group of people all download a copy of pgp and get it working on their machines. PGP is available for IBM, Mac, and Unix, and the members can have a mixture of these different operating systems. Each person will generate a pair of keys, public and private - that's part of the installation. After reading this story, you're now familiar with pgp, and your friends will undoubtedly expect you to take the lead as organizer of the mailing list. The first thing for you to do is to generate another pair of keys - these will be the master keys. Next, send copies of both of keys to everyone on the list, using your newfound encryption technology. Sending keys in the mail may sound like a dangerous idea, but because your friends all have their own sets of keys, you can *italics* use their personal public keys to encrypt the master keys for the list *end italics* and send the master keys securely to each of the members. Now everyone has an identical pair of master keys, and they've never even met face to face. These keys are in addition to their own personal keys, which they can use for personal encrypted mail. Emails sent to the mailing list are encrypted by the public master key and broadcast to the list members, who use the private master key to decode them. This is a perfect information security system, as long as no one's computer gets bagged. Our private communications are none of the government's business. Of course, the legality of using encryption depends upon what it is you're encrypting. This is a technology that can be used for all kinds of criminal purposes. But at the same time, it protects us from criminal acts by unethical people in positions of power in our government. That's a compromise I am willing to make. Paul Wolf _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com 2298 From: Paolo Sfriso Date: Sat Jan 13, 2001 8:31am Subject: Re: Cellphone in lugagge allegedly scrambles avionics. In Italy (and I think in some other EU countries too) it is a criminal offence to keep your cellphone activated during a commercial flight. At take-off and landing a standard "cellphones off/on" warning is given over the plane's PA system. In fact, GSM cellphones do disturb (even when idle and give their "here I am" transmittion burst") a number of electronic systems. You can typically "hear" a call arriving on your GSM cellphone by the rasping noise that enters your phone, PC, stereo system, etc. I assisted on a case a couple of years ago where a GSM/GPS bug had been planted by the Carabinieri CID in a hold-up gang's car and one of the suspects says, after hearing the "hear I am " rasp interfere with the car's stereo, "Sh** I sure hope this noise comes from one of our cellphones and not some big planted in the car"...You can imagine the surveillance team's reaction... Analog cellphones (such as E-TACS) dont seem to disturb nearby electronics. Have a nice weekend. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 (0)335 5257308 paulsfriso@t... 2299 From: William Knowles Date: Sun Jan 14, 2001 2:48am Subject: Re: pgp encryption On Fri, 12 Jan 2001, Men in with black helicopters working with the Greys made Jonathan D. Alvord Jr. write: > Just something I thought worthy of discussion!! Anyone else know about this > ?? heimdall58@h... > > Found this while surfing the web. > > [Note: there are many commercial programs available which may > provide additional features not found in PGP 5.5, such as > automatic encryption of an entire drive. A review of some of > these programs for Windows 95 can be found in the cryptome. I > have been advised that the Triple DES algorithm is probably the > most secure.] Currently PGP 7.0 is the most recent commercial release of PGP. > For those who are not familiar with it, I would like to briefly > describe encryption and how it works, and then suggest how the > freeware program pgp could be used to encrypt an internet mailing > list, so that third parties would not be able to decode and read > messages broadcast within a private group. > > As far as I know, no one is using pgp to encrypt a mailing list at > this time - but it's easy to do so, and a foolproof way to prevent > big brother wannabies in spy agencies from sticking their noses > where they don't belong -- politics. If this is beginning to > sound like a conspiracy theory, then a few historical references > are in order. Actually there are quite a few lists using PGP for a mailing list, and you can install a program to make this eaiser. PGPdomo: pgpdomo is a set of replacement programs for Majordomo version 1.93 that allows you to perform PGP encrypted administration and distribution of encrypted messages on selected lists while still retaining (mostly) normal operation of your cleartext lists. Unless you're checking the backround of everyone signing up for your publically available mailing list, all PGP would do is keep curious onlookers of the mail in transit from looking at your messages, PGP won't stop a FBI agent from submitting a PGP key and signing onto your list. > Well, if someone wants to read my email, they're going to have to > get a warrant to steal my computer. Warrants? We don't need no STINKING WARRANTS! http://www.cybercrime.gov/searchmanual.htm > Without the private key I keep on my hard drive (which itself is > password protected), even an acre of cray computers at Fort Meade > couldn't crack my code. That's how powerful this technology is. Acre of Cray computers? Maybe less then 100 square feet of would crack your message, But if we have your computer whole, intact, and not blown in a million pieces from a chunk of RDX next to your harddrive, Then maybe a couple of Pentium class workstations because it all falls down to the quality of your passphrase, which for the most part are less than 8-10 characters long and usually in plaintext with no special cH@RaC73r$ to slow down the process of cracking the passphrase. > OK, let's discuss pgp. PGP, which stands for Pretty Good Privacy, > is a freeware program available for IBM, Mac, and Unix computers > at http://www.pgp.com/products/personal/products.cgi. I point people towards: http://www.pgpi.org/ for PGP and GPG information. > Older versions and newer versions of pgp seem to be incompatible, > and people with older versions need to update to version 5.5 to > stay current. PGP is available for many different platforms, including Unix, MS-DOS, Windows 3.x, 95, 98, & NT, 2000, BeOS, OS/2, Macintosh, Amiga, Newton, Atari Psion, and even Palm. I have one client that is so paranoid about PGP that he changes his PGP keys as often as he changes his underwear (1-2 times a day) and generates keys on a HP200LX. I tell people that PGP is secure enough for 95% of the world's prying eyes, That the other 5% is the world's various governments, intelligence agencies, and larger corporations that have the way and the means to find out what that encrypted message says in plaintext. Think I'm kidding? http://www.eff.org/descracker.html To prove the insecurity of DES, EFF built the first unclassified hardware for cracking messages encoded with it. On Wednesday, July 17, 1998 the EFF DES Cracker, which was built for less than $250,000, easily won RSA Laboratory's "DES Challenge II" contest and a $10,000 cash prize. It took the machine less than 3 days to complete the challenge, shattering the previous record of 39 days set by a massive network of tens of thousands of computers. The research results are fully documented in a book published this week by EFF and O'Reilly and Associates, entitled "Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design." Its a good rule of thumb not to trust any encryption program that wasn't written by someone that hasn't done years of cryptoanalysis, and Phil Zimmermann isn't one of those guys I really trust his software with my life, Zimmermann was an anti-war/nuclear protester. On the other hand, the NSA is having a hard time retaining their personal and losing quite a few to the private sector, and if I felt I needed an encryption program that strong, I would be recruiting around the Fort George G. Meade campus. :) Sorry to rail on about off this, I'm a little hungover from a night of sake and sushi, and I have to redo a Powerpoint presentation for a talk next week. :) Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2300 From: 1RCM <1RCM@M...> Date: Sun Jan 14, 2001 9:33am Subject: What would YOU do? Hi List, Let's see if we can't spawn some creative debate here. Many on this list have run across these type instances which fall right in that blurry area somewhere between standing on true ethics and paying the bills. What do YOU do?? Ah yes, before you consider both scenarios think back to all of the debate that has taken place on this list over the past year relating to professionals vs. charlatans; just what constitutes performing a proper sweep; enlightening a potential client; fees vs. services performed; etc., etc. Then respond honestly! Scenario #1 ..... You are contacted by a potential client who feels that he/she has reason to have a sweep done. During the discussion that follows you are convinced that a sweep is legitimately needed, but also that the potential client does not have the foggiest idea of what is involved. And so you do a bit of education before you quote a fee. At the end of the discussion the client states that he/she fully understands what you have explained but has reached this decision: "Instead of the 6 hours that you quoted I want you to do the best that you can in 2 hours with your fee being reduced accordingly. I understand what you have explained to me and I accept the fact that I will be receiving less than what you recommend - but as the client that's my decision to make". Now remember that the office copy machine needs repair and you could use those few extra $$$'s to buy that new piece of equipment you want - all to the tune of about what you would make doing this 'mini-sweep'; the location is only 15 minutes from your office; you are satisfied that the client is making an 'informed decision'; and you have absolutely nothing work-wise going on the next day. What would YOU do??? Scenario #2 ...... You are contacted by a PI firm regarding handling a referral job. After a discussion regarding your services, fees and recommendations they want you to do: " a check of a hotel meeting room for transmitters and a quick look-around with a flashlight - bring just your sp ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us you have that you want to use, and your flashlight - we want this done very low-keyed. And you will only have about an hour alone in the room". After explaining your feelings regarding doing 'proper' sweeps the PI that you are talking to states emphatically that it is he who has been retained to look after the best interests of the client; no, you may not speak with the client; he is making his request based upon an investigation that he is conducting for the client; and yes, it is his neck on the line and not yours as the client will not know who you are. However, at the end of this discussion you are not really sure whether or not the PI fully understands what you had attempted to explain to him regarding TSCM and you have this lingering feeling that he is to a high degree basing his request on what he is willing to pay out of his billable fee for your services. But still, he is offering a decent buck for the work that you will actually have to do. Same conditions exist for this one as for the scenario above. What do YOU do???? Respond or not; do it on or off list; included your name or be anonymous - your choice. I'm not trying to embarrass anyone or to pry. I have my own reasons for posing these questions. But I truly believe that the diverse answers - and accompanying debate - that hopefully will be generated can benefit us all. Bob Motzer 1RCM@M... 2301 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 10:46am Subject: Re: What would YOU do? At 10:33 AM -0500 1/14/01, 1RCM wrote: >Hi List, > >Let's see if we can't spawn some creative debate here. Many on this list >have run across these type instances which fall right in that blurry area >somewhere between standing on true ethics and paying the bills. What do YOU >do?? Ah yes, before you consider both scenarios think back to all of the >debate that has taken place on this list over the past year relating to >professionals vs. charlatans; just what constitutes performing a proper >sweep; enlightening a potential client; fees vs. services performed; etc., >etc. Then respond honestly! >Scenario #1 ..... You are contacted by a potential client who feels that >he/she has reason to have a sweep done. During the discussion that follows >you are convinced that a sweep is legitimately needed, but also that the >potential client does not have the foggiest idea of what is involved. And so >you do a bit of education before you quote a fee. At the end of the >discussion the client states that he/she fully understands what you have >explained but has reached this decision: "Instead of the 6 hours that you >quoted I want you to do the best that you can in 2 hours with your fee being >reduced accordingly. I understand what you have explained to me and I accept >the fact that I will be receiving less than what you recommend - but as the >client that's my decision to make". > >Now remember that the office copy machine needs repair and you could use >those few extra $$$'s to buy that new piece of equipment you want - all to >the tune of about what you would make doing this 'mini-sweep'; the location >is only 15 minutes from your office; you are satisfied that the client is >making an 'informed decision'; and you have absolutely nothing work-wise >going on the next day. What would YOU do??? I would politely explain to the client that he is wasting my time, and would tell him to call me when he is finished playing games and wants to deal with reality. While you may think this is shocking the potential client will actually be more impressed that you stuck with your guns. Sure you may not get THIS projects, but you will probably get future projects from him. I would tell him that it will take a minimum or 4 hours for any TSCM project, and that I can do the job in a minimum of hours or not at all. Two hours would give me just enough time to unload the truck, set up for the first test, and then reload it with no time to actually turn the equipment on. It is a case of the client just being too cheap, and trying to manipulate how you apply your skills. At no time has he indicated that your time on target is restricted, or that there is some legitimate reason why you can get such limited time. It is a very slippery slope when you bow in to the pressures and influence of HOW you perform your job. >Scenario #2 ...... You are contacted by a PI firm regarding handling a >referral job. After a discussion regarding your services, fees and >recommendations they want you to do: " a check of a hotel meeting room for >transmitters and a quick look-around with a flashlight - bring just your sp >ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us >you have that you want to use, and your flashlight - we want this done very >low-keyed. And you will only have about an hour alone in the room". After >explaining your feelings regarding doing 'proper' sweeps the PI that you are >talking to states emphatically that it is he who has been retained to look >after the best interests of the client; no, you may not speak with the >client; he is making his request based upon an investigation that he is >conducting for the client; and yes, it is his neck on the line and not yours >as the client will not know who you are. However, at the end of this >discussion you are not really sure whether or not the PI fully understands >what you had attempted to explain to him regarding TSCM and you have this >lingering feeling that he is to a high degree basing his request on what he >is willing to pay out of his billable fee for your services. But still, he >is offering a decent buck for the work that you will actually have to do. Simple... he pays for a minimum of four hours at the full base rate, but get only one on hour on target. If he is unwilling to pay for the four hours then you politely refuse to help him. If there is a legitimate reason why you can only get limited access to the area then you work with what you have, in the amount of time you have. I would however, encourage the PI to allow full access to the hotel room 4 hours in advance, encourage In-Place monitoring during the actual meeting, and would encourage him to obtain control of all nearby rooms for the duration of the meeting. The second situation is similar to the first, but you are more likely for the PI to relent and let you have the room for at least four full hours or more. If you only have an hour on target, then you only have an hour on target. But by adopting the "I don't leave my house for anything less then 4 billable hours" you will find the client will let you do your job in a professional manner, and on your terms. It's a bit like me telling my dentist how to perform a root canal, and requiring it to be finished in 120 seconds. >Same conditions exist for this one as for the scenario above. What do YOU >do???? It's not the same conditions, but close. If there is a legitimate reason that is one thing, but if it is a case of the client simply being to cheap then you should walk away. >Respond or not; do it on or off list; included your name or be anonymous - >your choice. I'm not trying to embarrass anyone or to pry. I have my own >reasons for posing these questions. But I truly believe that the diverse >answers - and accompanying debate - that hopefully will be generated can >benefit us all. > > >Bob Motzer >1RCM@M... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2302 From: factfind Date: Sun Jan 14, 2001 11:34am Subject: Re: What would YOU do? It strikes me that this question requires an answer which may seem simplistic but I believe it reflects the approach taken by most people on this list. The practice of ethical business whether by TCSM practioners or PI's or Lawyers (no jokes now) should not be a matter of "situational ethics" You have invested time and money in your experience and training. No one knows better the value of your services than you. Price services and products accordingly. Do the right thing, both for yourself and our profession. Be fair, but then you knew that. Fraternally Dave ----- Original Message ----- From: "1RCM" <1RCM@M...> To: "TSCM List - Post" Sent: Sunday, January 14, 2001 10:33 AM Subject: [TSCM-L] What would YOU do? > Hi List, > > Let's see if we can't spawn some creative debate here. Many on this list > have run across these type instances which fall right in that blurry area > somewhere between standing on true ethics and paying the bills. What do YOU > do?? Ah yes, before you consider both scenarios think back to all of the > debate that has taken place on this list over the past year relating to > professionals vs. charlatans; just what constitutes performing a proper > sweep; enlightening a potential client; fees vs. services performed; etc., > etc. Then respond honestly! > > Scenario #1 ..... You are contacted by a potential client who feels that > he/she has reason to have a sweep done. During the discussion that follows > you are convinced that a sweep is legitimately needed, but also that the > potential client does not have the foggiest idea of what is involved. And so > you do a bit of education before you quote a fee. At the end of the > discussion the client states that he/she fully understands what you have > explained but has reached this decision: "Instead of the 6 hours that you > quoted I want you to do the best that you can in 2 hours with your fee being > reduced accordingly. I understand what you have explained to me and I accept > the fact that I will be receiving less than what you recommend - but as the > client that's my decision to make". > > Now remember that the office copy machine needs repair and you could use > those few extra $$$'s to buy that new piece of equipment you want - all to > the tune of about what you would make doing this 'mini-sweep'; the location > is only 15 minutes from your office; you are satisfied that the client is > making an 'informed decision'; and you have absolutely nothing work-wise > going on the next day. What would YOU do??? > > Scenario #2 ...... You are contacted by a PI firm regarding handling a > referral job. After a discussion regarding your services, fees and > recommendations they want you to do: " a check of a hotel meeting room for > transmitters and a quick look-around with a flashlight - bring just your sp > ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us > you have that you want to use, and your flashlight - we want this done very > low-keyed. And you will only have about an hour alone in the room". After > explaining your feelings regarding doing 'proper' sweeps the PI that you are > talking to states emphatically that it is he who has been retained to look > after the best interests of the client; no, you may not speak with the > client; he is making his request based upon an investigation that he is > conducting for the client; and yes, it is his neck on the line and not yours > as the client will not know who you are. However, at the end of this > discussion you are not really sure whether or not the PI fully understands > what you had attempted to explain to him regarding TSCM and you have this > lingering feeling that he is to a high degree basing his request on what he > is willing to pay out of his billable fee for your services. But still, he > is offering a decent buck for the work that you will actually have to do. > > Same conditions exist for this one as for the scenario above. What do YOU > do???? > > Respond or not; do it on or off list; included your name or be anonymous - > your choice. I'm not trying to embarrass anyone or to pry. I have my own > reasons for posing these questions. But I truly believe that the diverse > answers - and accompanying debate - that hopefully will be generated can > benefit us all. > > > Bob Motzer > 1RCM@M... > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2303 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 2:17pm Subject: Re: pgp encryption [snip] > > Without the private key I keep on my hard drive (which itself is >> password protected), even an acre of cray computers at Fort Meade >> couldn't crack my code. That's how powerful this technology is. > >Acre of Cray computers? Maybe less then 100 square feet of would crack >your message, But if we have your computer whole, intact, and not >blown in a million pieces from a chunk of RDX next to your harddrive, >Then maybe a couple of Pentium class workstations because it all falls >down to the quality of your passphrase, which for the most part are >less than 8-10 characters long and usually in plaintext with no >special cH@RaC73r$ to slow down the process of cracking the >passphrase. You really do not need a computer any larger then one of the cube "dorm" refrigerators about two foot cubical, but it depends on the size of the key that the target is using (the longer and more complex the key, the more horsepower you need). Also, if the investigator or espionage practitioner has any kind of physical access to the original computer the task or other "comprising fragments" the decrypt becomes several orders of magnitude simpler. [snip] >I have one client that is so paranoid about PGP that he changes his >PGP keys as often as he changes his underwear (1-2 times a day) and >generates keys on a HP200LX. [snip] If your client is serious about security he will not use PGP, any other other method of public key encryption, or any encryption methodology generally available to the public. >I tell people that PGP is secure enough for 95% of the world's prying >eyes, That the other 5% is the world's various governments, >intelligence agencies, and larger corporations that have the way and >the means to find out what that encrypted message says in plaintext. PGP is only appropriate when you want to protect the materials from someone who is an amateur, and is not at all appropriate for protecting materials where a professional spy may have an interest in obtaining. [snip] >Its a good rule of thumb not to trust any encryption program that >wasn't written by someone that hasn't done years of cryptoanalysis, >and Phil Zimmermann isn't one of those guys I really trust his >software with my life, Zimmermann was an anti-war/nuclear protester. [snip] Good point, but using strong encryption algorithms is only part of the security equation, and any weakness in ANY SEGMENT can render all other segments completely worthless. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2304 From: Steve Uhrig Date: Sun Jan 14, 2001 3:42pm Subject: Re: What would YOU do? Once upon a midnight dreary, 1RCM pondered, weak and weary: > Scenario #1 ..... You are contacted by a potential client who > feels that he/she has reason to have a sweep done. During the > discussion that follows you are convinced that a sweep is > legitimately needed, but also that the potential client does not > have the foggiest idea of what is involved. This is fairly common. > And so you do a bit of education before you quote a fee. At > the end of the discussion the client states that he/she fully > understands what you have explained but has reached this > decision: "Instead of the 6 hours that you quoted I want you > to do the best that you can in 2 hours with your fee being > reduced accordingly. My answer: "I quoted the time I expect it will take to do the job properly, and my fee to do it. If you cannot agree to both, I am sorry, I cannot help you." > but as the client that's my decision to make". And if you miss something which later comes back to bite you in the ass, can you hide behind this? The client will deny ever saying it. Sometimes you have to protect these people from themselves. > Now remember that the office copy machine needs repair and you > could use those few extra $$$'s to buy that new piece of > equipment you want - all to the tune of about what you would make > doing this 'mini-sweep'; the location is only 15 minutes from > your office; you are satisfied that the client is making an > 'informed decision'; and you have absolutely nothing work-wise > going on the next day. What would YOU do??? The client IS NOT making an informed decision. The client is making a decision based on fiscal considerations. As far as trying to make excuses for taking his or her money anyway, when you know you will not be doing the job properly, that makes you a whore and no different from the rest of the TSCM scum pretenders. Your financial situation should not make any difference in your ethics. If you have any. > Scenario #2 --- And you will only have about an hour alone in the > room". After explaining your feelings regarding doing 'proper' > sweeps the PI that you are talking to states emphatically that it > is he who has been retained to look after the best interests of > the client; no, you may not speak with the client; he is making > his request based upon an investigation that he is conducting for > the client; and yes, it is his neck on the line and not yours as > the client will not know who you are. Same answer as #1. I have quoted the time and cost it will take to do the job properly. I only accept work where I am able to do my job properly. If this is unacceptable, find yourself another sweeper. Then give them CCS' phone number. If I cannot speak with the client, I will not accept the assignment. Someone has something to hide. The PI will not have enough info for me to even know what I am facing technically. I have to talk to the client directly. That is one of my litmus tests. If that is a problem, find another sweeper. When I do talk to the client, I am perfectly willing to do so under the PI agencies' name. I do not have an identity problem like a lot of those guys do. I am not another PI and will not steal their client. If they can't trust me to speak to the client, they shouldn't be hiring me. Whose neck will be on the line if you miss something? I guarantee the PI will be the Teflon Don, and it will be you making excuses and trying to justify why you accepted a job you admitted you could not do properly. It is YOUR job to look out for the ultimate client's best interests. You need a certain amount of info to be able to do that. If something can go wrong, and things do, you can be sure you will be living in the valley and you'd better have your bases covered. All these PIs and clients can come and go. You have to live with yourself and whatever reputation you develop. You want to develop the reputation for being absolutely ethical and not willing to compromise your ethics, your fee or your (ultimate) client's best interests. Both scenarios you described would cause me to invite the PI or whomever to lose my phone number, if they are unwilling to let me do my job the way I know it needs to be done. I think you know this, and it does make for interesting discussion. First rule of sweeping is money up front. Second rule is always CYA (Cover Your Ass). You will be surprised how few friends and how many adversaries you will have if something goes wrong. Don't expect anyone else, like PI middlemen, to take a bullet for you. If I feel uncomfortable, even hold harmless agreements will not change that feeling. Just don't let situations develop where you have to compromise your ethics or your fees, or your the end user's best interests. And if you feel uncomfortable about a situation, trust your instincts and pass it by. Not worth it. Street smarts have kept a lot of us alive. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2305 From: Nick Robson Date: Sun Jan 14, 2001 4:08pm Subject: Re: What would you do. Here is another scenario for discussion. This happened to me. A very large multinational accounting firm asked me to write them a report stating that they were clean. They wanted no sweep done and were willing to pay reasonably for the report. -- ************************* The Security Centre Ltd ************************** *************Grand Cayman, Cayman Islands, British West Indies************** 2306 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 4:26pm Subject: Re: What would you do. At 5:08 PM -0500 1/14/01, Nick Robson wrote: >Here is another scenario for discussion. This happened to me. > >A very large multinational accounting firm asked me to write them a report >stating that they were clean. They wanted no sweep done and were willing to >pay reasonably for the report. Explain to the person at the large multinational accounting firm that you are not a whore, and that they should spend their money elsewhere. Additionally, you should document the incident, and write a "memo for record" that you have signed and notarized in case the guy tries anything cute in the future. If you have had previous contact with the company you may find it prudent to inform senior management and their legal department in writing of the incident. Such a request is obviously fraudulent, and as such is strictly taboo. Of course the person who made the request may simply be trying to test your ethics, or perhaps not... but watch it either way. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2307 From: Miguel Puchol Date: Sun Jan 14, 2001 5:12pm Subject: RV: What would YOU do? Bob & list, I will try to give an inbetween point here, although I agree more with what James has expressed in his message - if you know what you're doing is a waste of your time and your client's money, then better not take the job. Picture scenario #1, and after a couple of days, the costumer calls you to say that he has been bugged with a high grade bug that you didn't (and quite possibly couldn't given the time allowed) detect, and this has caused an important leak of information, etc. etc. Then, your costumer will start to tell anyone within hearing distance what a con you are, and so on, and news travel fast. Result: your reputation and good name tarnished. The inbetween point I wanted to make is: why not offer different 'grades' of sweep, depending on the level of the threat? If your costumer is willing to discuss the type of information he's protecting, you can estimate - approximately - the level of risk and likelyhood of advanced bugging techniques being used, and plan a sweep accordingly. Then, get your costumer to sign a document to the tune of 'I have been informed that, given the risk level assesed, a sweep lasting X hours using Z equipment is needed to minimize to a good extent the risk of interception of confidential information. I hereby state that I assume the risk of a sweep being performed which does not meet the required level, and understand the implications' etc. etc. (A lawyer may come in handy here) This is just an idea, it may not fall well with purists, and each one of us should set his own standards regarding this point. James states a minimum of 4 hours, and I understand that it's a very light sweep. In some countries, one hour or two may be enough, as eavesdropping is not so technologically advanced - given the same level of 'risk'. Well, that's my oppinion, and like everyone else, I have a nose too :-)) All the best, Mike > -----Mensaje original----- > De: 1RCM [mailto:1RCM@M...] > Enviado el: domingo, 14 de enero de 2001 16:34 > Para: TSCM List - Post > Asunto: [TSCM-L] What would YOU do? > > > Hi List, > > Let's see if we can't spawn some creative debate here. Many on this list > have run across these type instances which fall right in that blurry area > somewhere between standing on true ethics and paying the bills. > What do YOU > do?? Ah yes, before you consider both scenarios think back to all of the > debate that has taken place on this list over the past year relating to > professionals vs. charlatans; just what constitutes performing a proper > sweep; enlightening a potential client; fees vs. services performed; etc., > etc. Then respond honestly! 2308 From: Rick Hofmann - MICROSEARCH Date: Sun Jan 14, 2001 5:41pm Subject: E.S.I. telephone instruments During an inspection yesterday one of two telephone instruments was passing room audio while on hook. This is an E.S.I. telephone system. The instruments are model EKT-A, and the KSU is a model number IVX (letters, not roman numerals). The instrument was left in place with the idea of passing false information. When the instruments are eventually replaced I will examine them both in an attempt to locate any modifications. I will pass on the information to this list. In the mean time, any information about E.S.I. telephones would be appreciated. Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 2309 From: Steve Uhrig Date: Sun Jan 14, 2001 6:18pm Subject: Re: What would you do? Once upon a midnight dreary, Nick Robson pondered, weak and weary: > Here is another scenario for discussion. This happened to me. > A very large multinational accounting firm asked me to write > them a report stating that they were clean. They wanted no > sweep done and were willing to pay reasonably for the report. What is there to discuss? You are an honest man, and as such would have denied their request. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2310 From: Hoffman Date: Sun Jan 14, 2001 8:03pm Subject: Re: What would YOU do? > > Ah yes, before you consider both scenarios think back to all > > of the debate that has taken place on this list over the past > > year relating to professionals vs. charlatans; just what > > constitutes performing a proper sweep; enlightening a > > potential client; fees vs. services performed; etc., > > etc. Then respond honestly! > > blurry area somewhere between standing on true ethics > > and paying the bills. What do ------------------------------- A. Hoffman replies: I don't believe "ethics", in the sense that I use the word, has much bearing on the matter. It's a pure business decision. (1) Is it economically profitable to perform the service for the client for such a trivial fee which borders on break-even? (2) Will it negatively impact your reputation? (3) How will it hurt your reputation; does this client have connections in the corporate community from whence you derive your work? (4) Is there a realistic liability which you may incur if it is found at a later time that the technician did not locate a threat? (5) Last on my list is my personal ethics regarding the matter. There's something to be said for having pride in ones work and being noble by trying to be the absolute best at what you do....but more often than not....such beliefs are purely a figment of ones own imagination; and it leads to extremely big ego complexes when people become overly self-righteous about their abilities and their so-called "reputation". I say, just bury the client in a half inch of paperwork; which if your a thorough businessman; thats probably what you should be doing already. You should have dozens of checklists; forms; summaries; client reports which fully detail every aspect of the sweep or other security services your may perform. Included on the forms should be the equipment you used, serial numbers, when your units were calibrated; what range of frequencies were swept; what telephones were analyzed, if any. In addition, there should be a half dozen standard forms which the client should be signing which fully explains that in no way is the customer entitled to "getting results" (as private investigators are always fond of saying "their being payed for their time, not based on undetermined outcomes or results..") Nothing wrong with pride in ones work; but the question is.... Who's interest are you REALLY serving best?... The clients, or your own ego? If a customer wants or NEEDS work done.... even if they want a half-assed job.. "IF" it pay's; and if you need the money; then why not do it? If you refuse to do the job; then your not really serving your customers needs. Yes, you might know better than them... and you might not be serving their "best interest", but in some cases, something is better than nothing; even a half-assed job. I speak in this matter as a businessman; a white collar worker; and a blue collar worker who has been involved in a half dozen unique fields of service work. Like the Rolling Stones song, "You can't always get what you want." Many times I have had to "swallow my pride", and do jobs for customers which I did not feel felt met my personal criteria.... I didn't particularly like what the customer suggest to me... but in the end; I realized I was there not exclusively to feed my own ego, but to serve the customers needs... and if they want it. Give it to them. It's money in your pocket. 2311 From: Steve Uhrig Date: Sun Jan 14, 2001 9:06pm Subject: Re: What would YOU do? Once upon a midnight dreary, Hoffman pondered, weak and weary: > I don't believe "ethics", in the sense that I use the word, > has much bearing on the matter. It's a pure business > decision. There unfortunately are a number of "TSCM practitioners" who feel the same way. > There's something to be said for having pride in ones work and > being noble by trying to be the absolute best at what you > do....but more often than not....such beliefs are purely a > figment of ones own imagination; They may be figments of *your* imagination. Having pride in one's work and trying to be the absolute best at what you do is a sign of a quality practitioner. Some of us strive for that constantly. What do you propose -- strive to be mediocre? > If a customer wants or NEEDS work done.... even if they want > a half-assed job.. "IF" it pay's; and if you need the money; > then why not do it? > if they want it. Give it to them. It's money in your pocket. Why is this not the definition of a whore? What does YOUR need for money have to do with whether you do an honest job or not? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: J. Oquendo Date: Tue Jan 11, 2005 2:24pm Subject: RE: IR Risk I ran into this scenario a while back and offered it to a compsecurity list I am on. Here is the original message: /// http://securityfocus.com/archive/82/383110/2004-11-26/2004-12-02/1 Figured I would send this to the vuln-dev list after rambling on about it on a firewalls list, so apologies to those who see this as a cross-post dupe. [RECENTLY] I ran across what I believe is an irftp based worm. While cleaning two laptops one day (one connected to a secure VLAN the other not connected), I noticed the connected machine flash its irftp sensor and task manager showed it was running. Few seconds later the connected machine stopped beeping, the disconnected one started, and it too showed irftp sessions. After checking around the premises for infrared *anything*, I dug up all I could from both machines. The disconneted machine had already been cleaned, and the connected one was infected with all sorts of SDBOT worms, Spyware, *crapware*foo*. Something to think about if you're sitting in the park one day disconneted from any network and someone's infected machine sends you via IRFTP some crap. irftp C:\evil_at_script \\victim\C:\WINDOWS\run_me Where some at script would run something like: net user luzer something /ADD /FULLNAME:"Admin Account" /COMMENT:"Admin" /h I'm almost positive something like this is what happened. I believe its possible to have that machine run whatever you would want it to, and since IRFTP has no authentication (that I know of) what is needed to perform such nonsense. A machine name, share name, not that big of a deal. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How a man plays the game shows something of his character - how he loses shows all" - Mr. Luckey 10558 From: James M. Atkinson Date: Tue Jan 11, 2005 5:54pm Subject: Moran: 'It's a dirty business' http://www.cnn.com/2005/US/01/11/spy.life/index.html Moran: 'It's a dirty business' (CNN) -- Lindsay Moran read "Harriet the Spy" as a girl and dreamed of growing up to join the CIA. After graduating from Harvard, she did just that. In her new book, "Blowing My Cover: My Life as a CIA Spy," Moran shows readers the real world of espionage is quite different from the Hollywood version. CNN national security correspondent David Ensor spoke with Moran about her career as a spy. ENSOR: What made you decide to apply to the CIA? MORAN: It had been a lifelong dream of mine. I grew up reading this series of books called "Harriet the Spy," and I just thought they were the neatest things and Harriet was the neatest little girl, and she had a spy kit and would spy on everybody. And I sort of modeled my early life after Harriet the Spy, and my fascination with espionage never really went away as I was a teenager and went to college -- it kind of always remained there in the back of my head. ENSOR: Tell us a little about the training. MORAN: We jumped out of planes and drove cars real fast. ... A lot of it essentially was training people to have social skills. We went down and lived at the CIA's facility, "the Farm" for several months, and we lived on this alternative reality with a fake country, a number of fake countries and fake heads of state, and we were expected to sort of embrace this alternative reality and live and breathe it as if it was true. ENSOR: Was the training useful for what you subsequently did as an officer? MORAN: Some aspects of the training were useful, and some aspects of the training that probably weren't useful to me were useful to other people. A lot of the training about detecting surveillance, being able to tell if you're being followed. ... And while it's not difficult, it does take a lot of practice to sort of become uber-aware of everything going on around you, and being able to take notes while you're driving, at the same time looking around. And also at the same time trying to appear natural, so that if you are being followed the person following you doesn't perceive that you know you're being followed. ENSOR: Hollywood presents the career you had as an enormously glamorous and dangerous profession. Is it? MORAN: It's not nearly as glamorous as it's portrayed in Hollywood -- the career of being a spy -- and that was kind of eye opening to realize. You know, certainly I didn't expect it to be James Bond to a T, but at the end of the day the CIA is a lot of people in sensible shoes sitting in cubicles, and that's kind of a reality that's probably a shock to a lot of people like me who come into the agency expecting something more glamorous. ... I've heard my book compared to the real-life "Alias" and I tend to think of it as the "anti-Alias." ENSOR: What's dirty about the business? MORAN: It's a dirty business because you're lying to people and you're using them, and that's what your job is. That's the reality of being a spy. You're not befriending people because you like them, or because you want to be friends with them, you think that they have some information that will be of value to the U.S. government. ENSOR: Do you think it's an organization that is broken? MORAN: I guess I do. I don't have the answers as to how the agency can adequately infiltrate terrorist networks or combat terrorism. I think that's an incredibly difficult question, but they certainly seem to be dragging their feet on addressing what is the most pressing issue for them as an organization and for us as a country, which is how do we get into these, how do we get information, how do we gather human intelligence on these terrorist networks. I feel that the agency has been incredibly slow to respond or change either its management style or its training or even the type of people that it recruits in order to combat that threat. ENSOR: Do you think Porter Goss might change it in a good way? MORAN: No. I would have been the first one to advocate changes at the agency on the heels of George Tenet's resignation. It doesn't seem to me -- and now I'm speaking obviously from an outsider's perspective -- that Porter Goss is taking the agency in a good direction. And from what I understand, he's sort of hunkering down, blaming a lot of leaks from within the agency to the press on problems the agency is having. I think what's going to occur is it will again become an organization that rather than trying to excise its warts will try to cover them up. ENSOR: What kind of an impact did having a secret career like this have on your personal life? MORAN: It's hard to lie to pretty much everybody who's important to you. My immediate family knew that I worked at the CIA but that was all they knew. They certainly had no idea what I was actually doing and probably would have been horrified if they did. So I ended up cutting off a lot of relationships with both friends and, to a certain extent, family members too as I became an increasingly insular person. ENSOR: Do you believe in espionage? MORAN: I still believe in the organization, I believe that it's necessary. Every country is going to have a spy service and ours should be the best. You know we're the last remaining superpower, we should have one of the best spy services there is and we don't. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10559 From: G P Date: Tue Jan 11, 2005 6:49pm Subject: Re: Ruling gives cops leeway with GPS Absolute insanity. > http://timesunion.com/AspStories/story.asp?storyID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device > without a warrant > > By BRENDAN LYONS, Staff writer 10560 From: Greg Horton Date: Tue Jan 11, 2005 9:26pm Subject: Re: Ruling gives cops leeway with GPS G P wrote: > Absolute insanity. > I am not so sure about that. In California, you don't need a warrant to put a tracker on unless you hardwire it to the vehicle. So instead of fielding a six man surveillance team for thousands of dollars and maybe a helo or plane, you do the same thing for pennies. You are going to follow the suspect anyway, why not do it in a way that saves the taxpayer a heap o' money? Greg 10561 From: Agent Geiger Date: Wed Jan 12, 2005 0:40am Subject: Re: Ruling gives cops leeway with GPS Yeah, that freedom thing is so expensive these days. --- "James M. Atkinson" wrote: > > > http://timesunion.com/AspStories/story.asp?storyID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device > without a warrant > > By BRENDAN LYONS, Staff writer > First published: Tuesday, January 11, 2005 > > In a decision that could dramatically affect > criminal investigations > nationwide, a federal judge has ruled police didn't > need a warrant when > they attached a satellite tracking device to the > underbelly of a car being > driven by a suspected Hells Angels operative. > > The ruling by U.S. District Judge David N. Hurd > clears the way for a > federal trial scheduled to begin next month in Utica > in which seven alleged > Hells Angels members and associates, including > several from the Capital > Region, face drug-trafficking charges. > > The use of satellite tracking devices has stirred > controversy and Hurd's > ruling differs from a decision last spring by a > Nassau County Court judge, > who decided police needed a warrant when they used > the technology to follow > a burglary suspect. > > The biker case broke open here last year with a > series of raids and arrests > across upstate New York. The case began in Utica, > but was expanded to > include an organized crime task force that spent > more than a year building > a methamphetamine-trafficking case against a group > of alleged outlaw bikers > from Troy to Arizona. > > During surveillance of the group, detectives > attached a global positioning > satellite device to a vehicle driven by Robert P. > Moran Jr., an Oneida > County attorney and Hells Angels associate with a > law office in Rome. They > put the device on Moran's car for two days in July > 2003 after he returned > from a one-day trip to Arizona, where police say he > purchased a large > quantity of methamphetamine. > > Over those two days, Moran drove across New York > state and allegedly made > drug deals with suspected Hells Angels members in > places such as New York > City and Troy, according to court records. > > Hurd opined that authorities wouldn't need a warrant > had they decided to > follow Moran, so using a GPS device was merely a > simpler way to track his > car "as it traveled on the public highways," he > wrote. "Moran had no > expectation of privacy in the whereabouts of his > vehicle on a public > roadway. Thus, there was no search or seizure and no > Fourth Amendment > implications in the use of the GPS device." > > Hurd's ruling follows a line of reasoning that's > widely supported by many > law enforcement agencies. Police contend using > tracking devices is no > different than if they followed a suspect's vehicle > in their own cars or by > using helicopters. > > Kevin Mulroy, Moran's attorney, said the issue, > which has brought > conflicting rulings across the nation, is > unsettling. > > "I think it's something the Supreme Court of the > United States is going to > have to hear," said Mulroy, a Syracuse attorney who > was formerly an > Onondaga County Court judge and assistant > prosecutor. "One would think that > before the police could install devices on your > property, to monitor your > movements, they would need a court order." > > A similar controversy arose in Washington two years > ago, when that state's > Supreme Court determined police had the right to > attach a satellite > tracking device to a murder suspect's car, but only > after obtaining a warrant. > > Detectives attached a GPS device to the man's car > for almost three weeks. > When they downloaded the data, it indicated he had > driven to an isolated > area north of Spokane. Police searched the area and > found the body of the > man's 9-year-old daughter. He later was convicted of > her murder, and the > verdict was upheld. > > GPS devices are increasingly becoming a tool for law > enforcement. Still, > their use has been controversial because police > agencies are not routinely > obtaining court orders to install the devices, which > rely on orbiting > satellites and cellular phone networks to pinpoint > their target. In many > states, law enforcement agencies also are using them > for less surreptitious > missions, such as tracking sex offenders and > parolees who are enrolled in > electronic monitoring programs. > > It's not clear what effect Hurd's decision will have > on their use, but it's > apparently the first federal ruling regarding GPS > devices and the need for > search warrants. > > Assistant U.S. Attorney David Grable, who is > prosecuting Moran and the > others, did not return a telephone call for comment. > > The use of GPS devices by police most recently made > national news in the > Laci Peterson case. Scott Peterson, the Modesto, > Calif., woman's husband, > was convicted of murdering her on Christmas Eve > 2002. In that case, police > obtained a court order to attach tracking devices to > three vehicles driven > by Peterson, who drove to a waterfront near where > the bodies of his wife > and the baby boy she was carrying were later found. > > While the GPS data was admitted in the Peterson > case, courts across the > country are tackling the issue as defense lawyers > challenge their > reliability and whether police have a right to > install them without a > warrant. Similar technology helps police track > cellular telephones, which > also are being used by police to find fugitives and > others. > > > > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10562 From: G P Date: Wed Jan 12, 2005 6:16am Subject: Re: Ruling gives cops leeway with GPS Because anybody and everybody can now fix up your car with a GPS unit, without fear of civil or criminal prosecution. This court precedent puts very dangerous technology into the hands of the proletariat, without any form of checks and balances. Wait until somebody wires up your wife's car for sound, and you'll have a slightly different opinion about tracking technology. --- Greg Horton wrote: > > > G P wrote: > > > Absolute insanity. > > > I am not so sure about that. In California, you > don't need a warrant to > put a tracker on unless you hardwire it to the > vehicle. So instead of > fielding a six man surveillance team for thousands > of dollars and maybe > a helo or plane, you do the same thing for pennies. > You are going to > follow the suspect anyway, why not do it in a way > that saves the > taxpayer a heap o' money? > > Greg > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10563 From: G P Date: Wed Jan 12, 2005 6:18am Subject: New Homeland Security Nomination http://seattletimes.nwsource.com/html/nationworld/2002148439_homeland12.html "Chertoff headed the Justice Department's criminal division at the time of the attacks, and helped develop the USA Patriot Act, which greatly expanded the government's surveillance and detention powers. His role in crafting that law, a measure that has become a flash point for civil libertarians, is expected to bring sharp questioning in Senate confirmation hearings. The American Civil Liberties Union said yesterday that as an architect of the act, Chertoff seemed to view the Bill of Rights 'as an obstacle to national security rather than a guidebook for how to do security properly.'" 10564 From: fjansgmxnet Date: Wed Jan 12, 2005 5:00am Subject: Re: Ruling gives cops leeway with GPS --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > G P wrote: > You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? That's the point. If it costs a heap of money, they will follow only the real suspects of mayor crime offences. If it costs pennies, they will track or follow inconvenient citizens. If they want to follow the real suspects of mayor crime offences, they will get a warrant everywhere. This is only a problem, if they haven't any substantial leads. But why should they follow then, because of their preconceptions? (I am sure that they will not public the events, if their preconceptions failed.) Regards, Frank 10565 From: littledog Date: Tue Jan 11, 2005 11:10pm Subject: Re: Ruling gives cops leeway with GPS What about when these registered confidential informers do all this tracking, bugging, eavesdropping, and knotholing for no other reason than personal ones, and have always done so?> -----Original Message----- > From: Greg Horton [mailto:sgtpelon@e...] > Sent: Tuesday, January 11, 2005, 8:13 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Ruling gives cops leeway with GPS > > > > G P wrote: > > > Absolute insanity. > > > I am not so sure about that. In California, you don't need a warrant to > put a tracker on unless you hardwire it to the vehicle. So instead of > fielding a six man surveillance team for thousands of dollars and maybe > a helo or plane, you do the same thing for pennies. You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? > > Greg > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10566 From: G P Date: Wed Jan 12, 2005 9:58am Subject: Quotable quote "The most powerful clique in these elitist groups have one objective in common - they want to bring about the surrender of the sovereignty and national independence of the United States. To achieve this new [international] federalism, the United States must submerge its national sovereignty to a new political order. In my view, [the CFR] represents a skillful, coordinated effort to seize control and consolidate the four centers of power - political, monetary, intellectual, and ecclesiastical." - Admiral Chester Ward, 16-year veteran of the Council on Foreign Relations 10567 From: Tech Sec Lab Date: Wed Jan 12, 2005 10:56am Subject: Boston Scientific denies espionage will hit Irish plant http://www.ocean-research.net/modules.php?name=News&file=print&sid=17 Who says nothing exciting happens in the west of Ireland! :D 10568 From: Date: Wed Jan 12, 2005 8:59am Subject: Re: Ruling gives cops leeway with GPS You still need a warrant to monitor the vehicle if it goes on private property; just don't need one (right now) to monitor while on public roads. Doesn't sound like a "freedom" issue to me! Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217) 524-6079 office (217) 467-4211 pager (217) 836-0919 mobile 10569 From: Michael Hammer Date: Wed Jan 12, 2005 9:00am Subject: Re: Ruling gives cops leeway with GPS On Tue, 11 Jan 2005 19:26:56 -0800, Greg Horton wrote: > > > I am not so sure about that. In California, you don't need a warrant to > put a tracker on unless you hardwire it to the vehicle. So instead of > fielding a six man surveillance team for thousands of dollars and maybe > a helo or plane, you do the same thing for pennies. You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? > > Greg > By that logic, I should just be able to break into (and wipe out) an internet host that is being used to do bad things. We will get it shut down/confiscated anyways by going through the legal steps so why not just cut to the chase. As tempting as that may be, I understand the reasons we have limitations. Just because something can be done doesn't mean it should be done. Requiring a court order is a check/balance on the activities involved. Mike 10570 From: littledog Date: Wed Jan 12, 2005 10:32am Subject: Re: Re: Ruling gives cops leeway with GPS I agree with you completely Frank. I now know what I am, an inconvenient citizen..Littledog> -----Original Message----- > From: fjansgmxnet [mailto:fjans@g...] > Sent: Wednesday, January 12, 2005, 4:46 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: Ruling gives cops leeway with GPS > > > > > --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > > > G P wrote: > > You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > That's the point. If it costs a heap of money, they will follow only > the real suspects of mayor crime offences. If it costs pennies, they > will track or follow inconvenient citizens. > > If they want to follow the real suspects of mayor crime offences, > they will get a warrant everywhere. This is only a problem, if they > haven't any substantial leads. But why should they follow then, > because of their preconceptions? (I am sure that they will not public > the events, if their preconceptions failed.) > > Regards, > Frank > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10571 From: Craig Meldrum Date: Wed Jan 12, 2005 1:11pm Subject: Re: List Member Thanks Ois. As usual there is a flurry of media interest when some politician thinks they have been bugged and everyone jumps on the bandwagon for a day or two. I don't even know why they bothered to interview me, the article was almost a copy of one written 10 years ago after another such "scandal." Another minute to add to the accumulating 15 mins! Cheers Craig > Message: 2 > Date: Tue, 11 Jan 2005 17:36:21 -0000 > From: "Tech Sec Lab" > Subject: List Member > > Craig...YOUR FAMOUS!!! > > :D > > Congrats! > > -Ois 10572 From: Agent Geiger Date: Wed Jan 12, 2005 3:25pm Subject: Re: Ruling gives cops leeway with GPS Excuse me, but that is nonsense. OK, I will shut off the GPS while he cuts through that private drive. I just first have to run the coordinates through my GIS database then delete that info out before I use it in court. I am a commissior for my local government, and I see this trivial splitting of hairs thing done all the time. I wish LE and gov't officials would remember that little oath that we ALL took to uphold the Constitution from ALL enemies, foreign and DOMESTIC. I guess I need to keep a GPS jammer on me at all times, to block not only my cell phonem, but any potential LE from protecting me from myself. --- sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if > it goes on private > property; just don't need one (right now) to monitor > while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10573 From: G P Date: Wed Jan 12, 2005 6:11pm Subject: Re: Ruling gives cops leeway with GPS Bravo, it's hopeful to see that everyone hasn't gone completely mad just yet. --- Agent Geiger wrote: > > Excuse me, but that is nonsense. OK, I will shut > off > the GPS while he cuts through that private drive. I > just first have to run the coordinates through my > GIS database then delete that info out before I use > it in court. > > I am a commissior for my local government, and I see > this trivial splitting of hairs thing done all the > time. I wish LE and gov't officials would remember > that little oath that we ALL took to uphold the > Constitution from ALL enemies, foreign and DOMESTIC. > > I guess I need to keep a GPS jammer on me at all > times, to block not only my cell phonem, but any > potential LE from protecting me from myself. 10574 From: G P Date: Wed Jan 12, 2005 6:55pm Subject: speaking of GPS units Can the list members here that have experience with GPS trackers post some common installations that they've ran across? I would assume that unless using a unit with advanced correlation ability (such as reflected signals off of pavement etc), that the unit would have to be mounted with clear view of the sky and no obstructions. What are some common places for permanent installations, and where would you start looking first if you suspected a vehicle had a GPS tracking device installed? With this recent court ruling, would that also imply that cellular handsets planted in a vehicle would also be legal? With the Emergency 911 (E911) Act (no relation to Sept. 11, the bill was passed a year or so prior to the attacks), cellular telephones now must support geolocation capability up to a few meter resolution now. There would be no need for an elaborate GPS tracker if you could accomplish the same goal by wiring a cellphone into the vehicle (with the added benefit of a voice channel to listen in on conversations in the cockpit). Where would be the best place to mount one of them, and what would be the preferred technique for discovering one? Greg 10575 From: kondrak Date: Wed Jan 12, 2005 8:54pm Subject: Re: Ruling gives cops leeway with GPS Expect to see miscreant law-vultures, like divorce attys exploit this... At 07:16 1/12/2005, you wrote: >Because anybody and everybody can now fix up your car >with a GPS unit, without fear of civil or criminal >prosecution. This court precedent puts very dangerous >technology into the hands of the proletariat, without >any form of checks and balances. > >Wait until somebody wires up your wife's car for >sound, and you'll have a slightly different opinion >about tracking technology. > >--- Greg Horton wrote: > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you > > don't need a warrant to > > put a tracker on unless you hardwire it to the > > vehicle. So instead of > > fielding a six man surveillance team for thousands > > of dollars and maybe > > a helo or plane, you do the same thing for pennies. > > You are going to > > follow the suspect anyway, why not do it in a way > > that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10576 From: Hawkspirit Date: Wed Jan 12, 2005 9:15pm Subject: Re: Digital Cell phone scanning Monitoring is quite complicated. You would have to monitor the forward set-up channel from the cell site that the mobile would receive and the reverse set up channel reply. After the base station and the mobile hand shake and authenticate then the forward control channel assigns downlink and uplink traffic channel frequencies. These will change every time the mobile is handed off to a new cell site. Roger Date: Tue, 11 Jan 2005 10:14:02 -0000 From: "fjansgmxnet" Subject: Re: Digital Cell phone scanning > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? Well, the tricks changed. In the digital world the estranged husband or the engaged investigator has to place a conventional bug in the cell phone of his wife. The best type of bugs I have seen are very small transmitters hidden in the accumlator pack of the cell phone, which could switched into a sleep mode to save power: Very fast to install and the victim feeds the bug with power in regular intervals whereever it goes. On Contras website (www.tetrascanner.com) there was a video from the German BSI showing this type of bug for a Motorola gsm phone. But I don't remember the exact link. The equipment to monitor digital cell phones at the air interfaces is expensive. Therefore I would expect it only at the "agency" level, if the folks don't know the current phone number you are using. Regards, Frank -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 [Non-text portions of this message have been removed] 10577 From: James M. Atkinson Date: Wed Jan 12, 2005 9:54pm Subject: Did you hear the one about the two guys arrested for telling lawyer jokes? http://www.cnn.com/2005/LAW/01/12/lawyer.jokes.arrest.ap/index.html Pair arrested for telling lawyer jokes Men at courthouse cited for disorderly conduct HEMPSTEAD, New York (AP) -- Did you hear the one about the two guys arrested for telling lawyer jokes? It happened this week to the founders of a group called Americans for Legal Reform, who were waiting in line to get into a Long Island courthouse. "How do you tell when a lawyer is lying?" Harvey Kash reportedly asked Carl Lanzisera. "His lips are moving," they said in unison. While some waiting to get into the courthouse giggled, a lawyer farther up the line Monday was not laughing. He told them to pipe down, and when they did not, the lawyer reported the pair to court personnel, who charged them with disorderly conduct, a misdemeanor. "They just can't take it," Kash said of lawyers in general. "This violates our First Amendment rights." Dan Bagnuola, a spokesman for the Nassau County courts, said the men were "being abusive and they were causing a disturbance." He said he did not have the name of the lawyer who complained. Americans for Legal Reform monitors the courts and uses confrontational tactics to push for greater access for the public. The pair said that for years they have stood outside courthouses on Long Island and mocked lawyers. On Monday, however, Kash said he was due in court to answer a drunken driving charge from a year and a half ago. The men are due back in court on the disorderly conduct charge next month. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10578 From: James M. Atkinson Date: Wed Jan 12, 2005 10:38pm Subject: Are the glory days of electronic spying over≠or just beginning? Listening In Are the glory days of electronic spying over≠or just beginning? By Stephen Cass Submarines prowl the ocean floor, while ships above carefully skirt the limits of international waters. On dry land, guards patrol high fences surrounding acres of huge golf ball-shaped radar domes. In the skies, airplanes knife through the stratosphere, while higher up orbiting electronic ears listen to whispers from the planet below. They're all trolling a vast sea of electromagnetic signals in hopes of catching a terrorist plot in the making, a shady arms deal, economic intelligence, or a rogue nation building a weapon of mass destruction. This so-called signals intelligence, or Sigint, has been vital to the United States and its allies for decades. But, in the wake of 9/11 and the failure to capture Osama bin Laden, the shortcomings of the world's biggest interception system are apparent. The ships, planes, antennas, and satellites are the result of a triumph of Cold War engineering, designed to keep tabs on the Soviet Union and its allies. The question now is: how useful is the system against terrorists who know not to trust their satellite phones? How effective can it be in an age when almost untappable fiber-optic lines carry information at stupefying rates and cheap, off-the-shelf encryption systems can stump the most powerful supercomputers on earth? Given the veil of secrecy drawn by nations around their intelligence operations, these questions might seem unanswerable, but even top-secret agencies have to operate in the real world, making it possible to draw some conclusions. Those findings paint an intriguing picture of modern Sigint, in which the best way past a tough problem can be to solve a different one. Rather than the creation of ever more sensitive receivers or code-breaking computers, the hot areas of cloak-and-dagger information gathering include tapping fiber-optic cables (even at the bottom of the sea); using tiny bugging devices and old fashioned bribery, blackmail, and burglary to get at data before it has been encrypted; exploiting software flaws and poorly configured communications systems to bypass data-security measures; and automatically winnowing the vast amounts of intercepted communications. Big brother or white elephant? The old workhorse surveillance system described above is run by the United States≠with the United Kingdom, Canada, Australia, and New Zealand as junior partners≠under the secret 1947 UKUSA agreement. Often referred to as Echelon in the popular press, some fear it as the ultimate Big Brother: listening in on every telephone conversation, reading every e-mail, tracking every Web surfer around the globe. But these fears are greatly exaggerated, explains Gerhard Schmid, vice president of the European Parliament and rapporteur of a 2001 report to the parliament on the UKUSA system. Schmid notes an obvious fact that many seem to forget: only those communications that the system has access to in some way can be intercepted. "There is no special magic physics for secret services....The rest is movie stories, rumors, and nonsense," says Schmid. In effect, whether or not the Sigint system is of value boils down to a technical question: in the face of a telecommunications explosion that has brought e-mail, cellphones, beepers, instant messaging, fiber-optic cables, faxes, videoconferencing, and the World Wide Web to every corner of the globe, can the UKUSA intelligence agencies attain enough access to know what's going on? Of course, some communications are easier to access than others. Wireless communications in particular offer two key advantages≠you can intercept them without physically tapping into the target's communications system, and there is no way to detect that they have been intercepted. "Microwave, radio, telephone, walkie-talkie≠communications that are in the air are all interceptible by some sort of antenna in the right place," says Jeffrey T. Richelson, author of The U.S. Intelligence Community (Westview Press, Boulder, Colo., 1999). Much of the UKUSA system's physical assets around the world and orbiting above it are devoted to making sure there is an antenna in the right place. Listening posts of varying scale dot the earth≠including on top of every U.S. embassy. Many are attached to military installations, while some are operated remotely. Others are mobile, on navy ships and submarines and on specially modified planes such as the EP-3 that crash-landed in China in 2001. For decades these eavesdroppers provided much of the intelligence community's Sigint. But, for tactical and technical reasons, the well began to dry up at the start of the 1990s. The biggest tactical problem was that the Soviet Union's collapse kicked the legs out from under a monitoring network built up over decades. "There were some easy things about the Soviet Union," says James Bamford, author of Body of Secrets: Anatomy of the Ultra-Secret National Security Agency (Doubleday, New York, 2001). "The first one was you always knew where it was. You could invest a lot of money in a big listening post in Japan near Vladivostok because the Soviet navy was always going to be there." Apart from being easily located on a map, the USSR also generated a steady stream of routine radio and microwave transmissions to provide grist for the intelligence wheel. "It's completely different when you're going after sporadic miniwars and terrorism," says Bamford. The technical issues arose from the Internet-driven telecommunications explosion, the most serious consequence of which is the ever increasing shift toward fiber-optic-based international communications. The shift was due to the commercially attractive fact that one fiber can carry 128 times as much digital traffic as a satellite transponder≠over 240 000 channels, each carrying 64 kb/s. Breaking into Davy Jones's locker Before the widespread use of fiber-optic cables, geosynchronous satellite constellations such as Intelsat and the Russian-sponsored Intersputnik carried much of the international communications traffic. Such links can be comprehensively monitored by placing a receiving station in each satellite's transmission footprint. And thanks to the global range of the territories belonging to the UKUSA countries, exactly such a collection of stations was built, from Pine Gap in central Australia to Morwenstow in England and Sugar Grove in Virginia [see map]. In contrast, cables have to be tapped directly. While this is easy enough to do if the cable makes landfall in a territory controlled by a UKUSA country, someone has to visit the cable clandestinely if it doesn't, typically in a submarine. Fiber-optic cables are the toughest to crack: fibers don't radiate helpful electromagnetic fields (as did the old metal cables) that can be detected with an inductively coupled pick-up collar. Eavesdroppers first solved this problem by targeting the signal-boosting repeater stations strung along the cables. Early repeaters had to convert the signal from light into electricity and back again in order to amplify it, and in its electronic stage, the signal could be tapped externally in much the same way as a metal cable. But the development of erbium-doped fiber amplifiers, in which the signal is boosted without ever being converted into electricity, called for a new approach. In theory, it's easy to find out what's being transmitted along a fiber. "All you have to do is put a little bit of a bend in the fiber and look at the light that comes off it," says Jim Hayes, president of the Fiber Optic Association, a professional society for the industry. The signal loss in the fiber would be just a few tenths of a decibel, making the tap undetectable. "But practically," he adds, "it's not so easy." The problem, Hayes explains, is that, in a typical cable, the fiber in question is one of a dozen hair-thin strands of glass, which are embedded inside a laser-welded, hermetically sealed, 3-mm-diameter stainless steel tube. This tube is in turn covered by a few centimeters of reinforcing steel wire and cables carrying 10 kV of dc power, all at a depth of a couple of thousand meters. "It's not impossible≠but it certainly pushes the definition of practical," Hayes notes. The easiest interception technique is to open up one of the repeaters to get at the fibers, but, Hayes cautions, "the whole issue of resealing it is quite difficult because you have to do it perfectly." Parts must either be sourced from the manufacturer or duplicated exactly. Despite these challenges, "the U.S. has been reconfiguring the submarine USS Jimmy Carter for [fiber-optic tapping]," says Richelson. The Jimmy Carter, one of a new Seawolf class, is being extensively modified for a range of covert missions by the introduction of a new hull section, which will facilitate the use of remotely operated vehicles, surveillance equipment, and the transport of Navy Seals, the U.S. Navy's special operations warfare specialists. The sub is also being fitted with an advanced communications mast, which will allow it both to eavesdrop on radio signals and transmit information back to base. The Jimmy Carter should be fully operational by mid-2005 [see illustration]. Bond, James Bond But a big remaining challenge, according to John Pike, a defense expert and founder of GlobalSecurity.org, are fiber-optic cables that stay on land. "I think that one of the things that [Navy Seals] spend a fair amount of time doing is [going] ashore...and walking to the nearest land line," says Pike. "They were doing that in Iraq a decade ago." Pike believes that this may also be how fiber-optic communications in North Korea and other countries are monitored: "It's cat and mouse, we try to see how many taps we can put on [chief of state Kim Jong II's] fiber-optic network, and the Dear Leader runs around and tries to catch them." Another, more aggressive approach to the land-line problem is to force an opponent onto the airwaves. "One of the things the United States has been doing since the middle of 2002 is systematically taking apart Iraq's land-line communications with air strikes, to force them to communicate via channels that are more readily compromised," says Pike. Indeed, this may be the reason why U.S. Secretary of State Colin Powell was able to present incriminating Iraqi telephone conversations to the United Nations last February. When a more subtle approach than aerial bombardment is called for, agencies like the U.S. National Security Agency (NSA) and the Central Intelligence Agency (CIA) can call upon organizations such as the Special Collection Service (SCS), a joint NSA-CIA covert group headquartered in Beltsville, Md. "What this group does is the more surreptitious black-bag operations," explains Wayne Madsen, who previously worked at the NSA and is now a senior fellow at the Electronic Privacy Information Center (Washington, D.C.). Black-bag operations can include breaking into embassies or facilities of communications providers and stealing information or installing bugs. -------------------------------------------------------------------------------- "It's been extremely difficult to break Russian ciphers" -------------------------------------------------------------------------------- By bugging a computer or communications system, information can be captured before it's sent through a fiber-optic cable, author Bamford observes. A tiny microphone dropped into a keyboard can pick up the sound made by the keys as they are struck and transmit the sounds to a nearby receiver. Different keys, according to Bamford, "sound different≠each has a specific signature." Those signatures can be used to reconstruct what was typed. The SCS also allows the Sigint community "to be proactive, to go after information rather than sit and wait," explains Bamford. Another important SCS mission is to recruit people who work for targeted governments, like cryptographic clerks or systems administrators, to ensure access to sensitive information, such as cipher keys. When successful, such activities also allow the NSA to avoid another steep hurdle: encryption. Say what? The NSA claims to be the world's largest single employer of mathematicians and has always projected an image of being a code-breaking outfit par excellence, in the mold of the legendary British Bletchley Park, which succeeded in breaking the German Enigma and other ciphers during World War II. But these days, there may be some misdirection in that image. The NSA has "covered up some quite spectacular successes at breaking into cipher systems...by pretending that they were simply better at mathematics and computer science, whereas what was usually happening was some form of sabotage, blackmail, theft, corruption, or whatever," says Ross Anderson, a reader in security engineering at the University of Cambridge and cryptographic systems expert. (When contacted by Spectrum for this article, a spokesperson for the NSA said that it does not comment on operational matters.) NSA's code-breaking efforts began to run into serious trouble relatively early in the Cold War. According to Bamford, immediately after World War II the NSA captured German code-breaking machines that allowed them to read advanced teleprinter ciphers that the Soviets were using at the time. But because of a suspected spy, the Russians found out and in 1948 changed all their ciphers overnight. The next day became known as Black Friday, reports Bamford. "From that date on, it's been extremely difficult to break Russian ciphers. Most of what the NSA got, they got from occasional busts." A bust is a mistake in the implementation or operation of a cipher system. "Sometimes they don't know they're making a mistake. A clerk is typing away and all of a sudden the crypto system disengages," explains Bamford. This can give a code-breaker enough of an opening to be able to go back and read the entire message. The solution was to go around the problem. To divine Soviet diplomatic plans, the UKUSA agencies might track a meeting between a third-world diplomat and the Kremlin. When the diplomat sent a coded report back to the home government, the spooks would go after this target's weaker encryption. "Big governments like the United States and Russia use home-brewed [cipher systems]. But they've learned through 50 years of experience to do that well," says Brian Gladman, a former deputy director of the NATO Shape Technical Center who has worked with Government Communications Headquarters (GCHQ), the British equivalent of the NSA. "Smaller countries don't have that experience, and [when they] build home-brewed ciphers, they don't do very well." Countries≠including Middle Eastern nations≠have also purchased commercial cryptographic machines, but may not have always operated them properly. (There are also rumors that the NSA obtained the default keys to some units prior to delivery.) In any case, the rise of ubiquitous computer communications has allowed the emergence of widely available strong cipher systems, such as public key cryptography, which rely on mathematical functions that would take the greatest supercomputer on earth millennia to break. Initially, this caused something of a panic in intelligence circles and sparked the so-called crypto wars of the 1990s, when the U.S. government arrested Phil Zimmerman, the creator of one popular public key program, Pretty Good Privacy, and attempted to impose stringent export controls on cryptographic software. But the underlying mathematics was already freely circulating. Non-U.S. companies threatened to take over the expanding market for online security products and the government eventually relented. But even with theoretically unbreakable encryption available to anyone with Internet access, all is not lost for the code-breakers; once again the solution is to go around the problem. Nowadays, "exploits against cipher systems involve failures in design and implementation rather than in the underlying cryptographic algorithms," as during World War II, explains Anderson. The same kind of flaws and foul-ups≠buggy software, poorly configured systems≠that allow computer worms to wreak havoc on the Internet, combined with SCS-style activities, give agencies like the NSA a continuing window of access to the activities of rogue nations and the businesses they deal with. Indeed, the adoption of new telecommunications technologies has not been all bad for the intelligence agencies. Actually, the widespread deployment of cellphones in countries with historically underdeveloped communications infrastructures has made surveillance easier, especially of nongovernment targets, like terrorists. "There's more and more cellphone coverage, even in places like Pakistan," says Madsen. Pike agrees: "Incomes rose faster than land lines could be put in....Since so much of the economic activity in these emerging economies was focused in a few primary cities, it was relatively easy to overlay a cellphone system." And it is exactly these cities that are likely to host an eavesdropping U.S. embassy or consulate. Cell- and satellite phones can also reveal a caller's location. In cooperative countries, such information may be extracted directly from the cellphone network, while in other regions the location may be determined if multiple listening stations (possibly including satellites) can pick up the phone's transmissions. It was by pinpointing the origin of a satellite phone call that the United States determined the coordinates for the 1998 cruise missile attack on one of Osama bin Laden's camps in Afghanistan. Drowning in data But these successes in keeping 21st century communications an open book have just compounded the biggest issue of all: volume. "It's hard to comprehend the enormous increase in communications in the last 15 years....You're talking two million pieces of communication an hour from one listening post," says Bamford. More and more of the NSA's vast computer resources are devoted to simply storing and cataloging the torrent of raw Sigint that pours into its Fort Meade, Md., headquarters. The agency's ultimate problem is that there are just too many people on earth to monitor everyone. The only solution is to throw away as much as possible of the information as soon as possible after it's been collected. "The electrical engineers and computer scientists at NSA spend a lot of their time developing [automatic] filter systems," says Bamford. Strategies like focusing on telephone calls from a particular installation, searching for specific words and phrases in e-mails, or using voice recognition techniques [see "Getting the Message"] are all deployed in the hope of picking up a terrorist giving orders rather than someone arguing with their significant other. While it is unlikely that any government, army, or terrorist group will ever again have its plans as comprehensively exposed as the Nazi war machine's, Sigint should still be effective against specific targets≠but, as 9/11 and the search for Osama bin Laden prove, only as part of an integrated intelligence strategy that prevents it from turning a deaf ear. -------------------------------------------------------------------------------- To Probe Further The European Parliament's report on the Echelon eavesdropping network can be found online at http://www.europarl.eu.int/tempcom/echelon/rrechelon_en.htm. The National Security Agency's Web site (http://www.nsa.gov/) has information on its history and outreach programs. An open-source public key encryption application, Gnu Privacy Guard, can be found at http://www.gnupg.org/. -------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10579 From: Gregory Hicks Date: Wed Jan 12, 2005 2:16pm Subject: [IP] No expectation of privacy in public? In a pig's eye! (was: Ruling gives cops leeway with GPS) From: Michael Hammer Date: Wed, 12 Jan 2005 10:00:57 -0500 > On Tue, 11 Jan 2005 19:26:56 -0800, Greg Horton > wrote: > > > > > > I am not so sure about that. In California, you don't need a warrant to > > put a tracker on unless you hardwire it to the vehicle. So instead of > > fielding a six man surveillance team for thousands of dollars and maybe > > a helo or plane, you do the same thing for pennies. You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > > > Greg > By that logic, I should just be able to break into (and wipe out) an > internet host that is being used to do bad things. We will get it > shut down/confiscated anyways by going through the legal steps so why > not just cut to the chase. As tempting as that may be, I understand the > reasons we have limitations. > > Just because something can be done doesn't mean it should be done. > Requiring a court order is a check/balance on the activities involved. > > Mike This is also being discussed on Dave Farber's IP list... See the message below - Just because we *CAN* do something, does not mean we *SHOULD* do it... Regards, Gregory Hicks ------------- Begin Forwarded Message ------------- Date: Wed, 12 Jan 2005 14:46:47 -0500 Subject: [IP] No expectation of privacy in public? In a pig's eye! From: David Farber To: Ip Orwell was an amateur djf ------ Forwarded Message From: Lauren Weinstein Date: Wed, 12 Jan 2005 11:38:28 -0800 To: Cc: Subject: No expectation of privacy in public? In a pig's eye! Dave, It's time to blow the lid off this "no expectation of privacy in public places" argument that judges and law enforcement now spout out like demented parrots in so many situations. Technology has rendered that argument meaningless -- unless we intend to permit a pervasive surveillance slave society to become our future -- which apparently is the goal among some parties. It is incredibly disingenuous to claim that cameras (increasingly tied to face recognition software) and GPS tracking devices (which could end up being standard in new vehicles as part of their instrumentation black boxes), etc. are no different than cops following suspects. Technology will effectively allow everyone to be followed all of the time. Unless society agrees that everything you do outside the confines of your home and office should be available to authorities on demand -- even retrospectively via archived images and data -- we are going down an incredibly dangerous hole. I use the "slimy guy in the raincoat" analogy. Let's say the government arranged for everyone to be followed at all times in public by slimy guys in raincoats. Each has a camera and clipboard, and wherever you go in public, they are your shadow. They keep snapping photos of where you go and where you look. They're constantly jotting down the details of your movements. When you go into your home, they wait outside, ready to start shadowing you again as soon as you step off your property. Every day, they report everything they've learned about you to a government database. Needless to say, most people would presumably feel incredibly violated by such a scenario, even though it's all taking place in that public space where we're told that we have no expectation of privacy. Technology is creating the largely invisible equivalent of that guy in the raincoat, ready to tail us all in perpetuity. If we don't control him, he will most assuredly control us. --Lauren-- Lauren Weinstein lauren@p... or lauren@v... or lauren@p... Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, Fact Squad - http://www.factsquad.org Co-Founder, URIICA - Union for Representative International Internet Cooperation and Analysis - http://www.uriica.org Moderator, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com - - - > > ------ Forwarded Message > From: Gregory Hicks > Reply-To: Gregory Hicks > Date: Wed, 12 Jan 2005 09:42:03 -0800 (PST) > To: > Cc: > Subject: Ruling gives cops leeway with GPS > > Dave: > > For IP if you wish... > > http://timesunion.com/AspStories/storyprint.asp?StoryID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device without a warrant > > By BRENDAN LYONS, Staff writer > First published: Tuesday, January 11, 2005 > > In a decision that could dramatically affect criminal investigations > nationwide, a federal judge has ruled police didn't need a warrant when > they attached a satellite tracking device to the underbelly of a car > being driven by a suspected Hells Angels operative. > > [...snip...] > > All Times Union materials copyright 1996-2005, Capital Newspapers > Division of The Hearst Corporation, Albany, N.Y. > > ------ End of Forwarded Message ------------------------------------- You are subscribed as ghicks@c... To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ------------- End Forwarded Message ------------- ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10580 From: Nalesnik, Matthew Date: Wed Jan 12, 2005 9:16am Subject: Psychic Antennas http://www.newsmax.com/archives/ic/2005/1/12/91524.shtml Wednesday, Jan. 12, 2005 9:07 a.m. EST Yelsin Protected by 'Psychic' KGB Claiming that "Americans have created radiators of modulated signals, which control people's behavior thousands of kilometers from afar," Pravda.ru reports that former Russian President Boris Yeltsin was protected by a KGB unit who defended against "psychic" attacks. Yuri Malin, a former KGB officer, tells Pravda that "there was a special department in the structure of Russian secret services to protect top officials from malicious intentions of scientists and extrasensory individuals, who could create devices that were capable of affecting human psychology." Malin worked as a consultant of Boris Yeltsin's Federal Security Service, the successor to the KGB. Malin says that Putin does not "take much" interest in the unit. "There were such people in Boris Yeltsin's team, though. There was a special department, which was dealing with unconventional technologies to manipulate the human mind," he claims. Malin says the unit was formed when someone found an eavesdropping device in the house of a Russian government official. "It was actually not a microphone, but a directional antenna. Specialists concluded that the antenna had been installed in the office to exert a psychological influence on the president," he said. Malin says that in the early 90s there were about 20 institutes which developed a variety of extrasensory devices used by the security forces and others. During the Yeltsin years, Malin says the Russian goverment spent 500 million rubles on such programs. Apparently Yeltsin was very much in favor of the efforts. Malin recalled that security agents "could not let a button of Yeltsin's shirt disappear: it was believed that extrasensory individuals could put the evil eye on the president with the help of any little thing that Yeltsin owned." 10581 From: Lou Novacheck Date: Wed Jan 12, 2005 4:57pm Subject: Re: Ruling gives cops leeway with GPS HEAR! HEAR! Or, depending which side you're on SIEG HEIL! Agent Geiger wrote: Excuse me, but that is nonsense. OK, I will shut off the GPS while he cuts through that private drive. I just first have to run the coordinates through my GIS database then delete that info out before I use it in court. I am a commissior for my local government, and I see this trivial splitting of hairs thing done all the time. I wish LE and gov't officials would remember that little oath that we ALL took to uphold the Constitution from ALL enemies, foreign and DOMESTIC. I guess I need to keep a GPS jammer on me at all times, to block not only my cell phonem, but any potential LE from protecting me from myself. --- sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if > it goes on private > property; just don't need one (right now) to monitor > while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 10582 From: tali whacker Date: Wed Jan 12, 2005 5:21pm Subject: Re: Ruling gives cops leeway with GPS So when Mr. Smiths car drives onto Mr. Does driveway they'll record/use the data how? Will they say he traveled to on 01202004 Myfreedomsrgoinga Way but we deleted the data that reflect where his vehicle may have traveled after his last "legally" tracked position. Since 99% of roadways are public, what difference does it make if "You still need a warrant to monitor the vehicle if it goes on private property" since the "legally unwarranted" data collected would already pin the vehicle to a specific location. Just as the war on terrorism "renders obsolete Geneva's strict limitations on questioning of enemy prisoners and renders quaint some of its provisions.", the supposingly stringent process (put in place to preserve privacy rights and indiscriminate surveillance) to acquire warrants too I'm afraid will become increasingly "obsolete" more and more over time. On Wed, 12 Jan 2005 08:59:43 -0600, sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if it goes on private > property; just don't need one (right now) to monitor while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ________________________________ > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 10583 From: Guy Urbina Date: Wed Jan 12, 2005 6:08pm Subject: GPS tracking system signal inhibitors Hi all, With all the recent chatter about GPS tracking, what are the legal ramifications of owning or selling a small GPS signal inhibitor? With the proliferation of GPS trackers seemingly ubiquitous, it seems like a good idea to prevent unauthorized people from tracking your movements in a vehicle. I've fabricated a few small devices that transmit a CW carrier under 50mw in the L1 frequency range. (1575.42Mhz) It effectively overdrives the front end of COTS GPS receivers.(Garmin, SIRF, Motorola etc.) (Most trackers use L1 receivers in their systems) Within a 10' radius, it effectively prevents a GPS receiver from locking on to get a position fix. Other than getting FCC type approval certification, Would these proposed devices be illegal to own or sell? Right now they are bench prototypes. I appreciate any constructive feedback. \R -Guy 10584 From: Bill & Tracy McDonnell Date: Wed Jan 12, 2005 8:05pm Subject: Re: speaking of GPS units Is the satellite they use to track GPS the Chameleon? By the way,I live in Ohio and the GPS they had on the SUV's trailer hitch was thrown out by the Appeals Court. We don't believe that the Ohio Supreme is going to touch it. The case thrown out is already a big deal in Constitutional Issues. Many blessings~~~ Bill & Tracy McDonnell Matthew 7:16 www.bigdaddydanes.com ----- Original Message ----- From: G P To: tscm-l@yahoogroups.com Sent: Wednesday, January 12, 2005 7:55 PM Subject: [TSCM-L] speaking of GPS units Can the list members here that have experience with GPS trackers post some common installations that they've ran across? I would assume that unless using a unit with advanced correlation ability (such as reflected signals off of pavement etc), that the unit would have to be mounted with clear view of the sky and no obstructions. What are some common places for permanent installations, and where would you start looking first if you suspected a vehicle had a GPS tracking device installed? With this recent court ruling, would that also imply that cellular handsets planted in a vehicle would also be legal? With the Emergency 911 (E911) Act (no relation to Sept. 11, the bill was passed a year or so prior to the attacks), cellular telephones now must support geolocation capability up to a few meter resolution now. There would be no need for an elaborate GPS tracker if you could accomplish the same goal by wiring a cellphone into the vehicle (with the added benefit of a voice channel to listen in on conversations in the cockpit). Where would be the best place to mount one of them, and what would be the preferred technique for discovering one? Greg ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10585 From: Greg Horton Date: Wed Jan 12, 2005 9:22pm Subject: Re: Re: Ruling gives cops leeway with GPS fjansgmxnet wrote: If it costs pennies, they will track or follow inconvenient citizens. I would like to see where you work, that your bean counters would let you track dozens of innocent citizens. Cops are always going to try to follow people that they think are involved in crime so they can stop the crime. We don't just pick out John Q Citizen and follow him because our bosses would probably put a boot up our rear for not doing anything productive. And as far as getting a warrant for everything we did, Frank we would never get anything done. If you investigate somebody, and nothing turns up, you close the investigation and move on. Many times it only takes an hour or so before you realize the information you received was probably false. And don't forget, the device that you put on the car only tells you where the individual has been, you still have to have eyes on him so you can see if the individual is actually involved in a crime. The tracking device is only a small tool to use in your investigation. Greg > > > --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > > > G P wrote: > > You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > That's the point. If it costs a heap of money, they will follow only > the real suspects of mayor crime offences. If it costs pennies, they > will track or follow inconvenient citizens. > > If they want to follow the real suspects of mayor crime offences, > they will get a warrant everywhere. This is only a problem, if they > haven't any substantial leads. But why should they follow then, > because of their preconceptions? (I am sure that they will not public > the events, if their preconceptions failed.) > > Regards, > Frank > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > [Non-text portions of this message have been removed] 10586 From: Greg Horton Date: Wed Jan 12, 2005 9:11pm Subject: Re: Ruling gives cops leeway with GPS Sorry Littledog, I was talking about the police. I agree with you that some CI's may abuse their relationship with the police. But then shame on the officers that let themselves get sucked into something like that without looking for some other indicators that would affirm or rebut what the CI told them. Greg littledog wrote: > > What about when these registered confidential informers do all this > tracking, bugging, eavesdropping, and knotholing for no other reason > than personal ones, and have always done so?> -----Original Message----- > > From: Greg Horton [mailto:sgtpelon@e...] > > Sent: Tuesday, January 11, 2005, 8:13 PM > > To: TSCM-L@yahoogroups.com > > Subject: Re: [TSCM-L] Ruling gives cops leeway with GPS > > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you don't need a > warrant to > > put a tracker on unless you hardwire it to the vehicle. So instead of > > fielding a six man surveillance team for thousands of dollars and maybe > > a helo or plane, you do the same thing for pennies. You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > From: Greg Horton Date: Wed Jan 12, 2005 9:37pm Subject: Re: Ruling gives cops leeway with GPS Michael Hammer wrote: > By that logic, I should just be able to break into (and wipe out) an > internet host that is being used to do bad things. We will get it shut > down/confiscated anyways by going through the legal steps so why not > just cut to the chase. As tempting as that may be, I understand the > reasons we have limitations. > > Just because something can be done doesn't mean it should be done. > Requiring a court order is a check/balance on the activities involved. > > Mike > > Holy Smokes Mike, what a leap of logic you make. How on earth do you > make a connection between following someone on a public thoroughfare > and comitting a burglary and then committing an additional crime of > wiping the computer clean. Talk about a non sequitur. There is no > requirement for a court order and case law has reaffirmed this > technique by the police. If you are that concerned about this type of > operation, maybe you should spearhead a movement to pass appropriate > legislation. Greg > > 10588 From: Roger Date: Wed Jan 12, 2005 10:10pm Subject: identity theft is a major problem in America. Dear Member It's no secret that identity theft is a major problem in America. Think you're not at risk? Unfortunately you are. - Do you hand your credit card to servers at restaurants? - Do you sign your credit cards? - Do you supply personal information over the internet? - Do you keep your Social Security number in your wallet or purse? - Do you leave mail at your home or business for the postal carrier to collect? - Do you shred unwanted mail with personal information? What if you discovered that your identity had been stolen? - Call your bank and/or credit card company - Contact the three major credit repositories - Go through the helpful but extensive steps recommended by the Federal Trade Commission in its 30-page consumer support publication - Fill out and submit the affidavit form supplied by the FTC to dispute new, unauthorized accounts - Spend on average $1,500 in out-of-pocket expenses to resolve the many problems cause by identity thieves WITH THE IDENTITY THEFT SHIELD: Get REGULAR monitoring of your credit report and let the proven leaders in the identity restoration and legal services fields assist you. With no obligation, you can view a short presentation and learn more by visiting my website. See what Pre-Paid Legal can do for you at: http://www.prepaidlegal.com/idt/hollowaypi Thank you for your time and if you're interested or just have questions, I'll be happy to help. Please feel free to contact me at your convenience. Sincerely, Roger Holloway Independent Associate Pre-Paid Legal ServicesÆ, Inc. 940-592-7000 www.TexasDetective.com www.RogerHolloway.com 10589 From: Greg Horton Date: Wed Jan 12, 2005 9:29pm Subject: Re: Ruling gives cops leeway with GPS G P wrote: > Because anybody and everybody can now fix up your car > with a GPS unit, without fear of civil or criminal > prosecution. This court precedent puts very dangerous > technology into the hands of the proletariat, without > any form of checks and balances. > > Wait until somebody wires up your wife's car for > sound, and you'll have a slightly different opinion > about tracking technology. GP, What you are saying is not quite accurate. A private person cannot use the devices or he is in violation of both criminal and civil codes. We were talking about tracking devices that are self contained and attach to the vehicle without using the vehicle's battery or electrical system. We said nothing about wiring for audio. All police officers MUST have a signed warrant to attach any video or audio to a suspect's vehicle. There is no way around that. You must have enough probable cause to convince a judge. I know for a fact that if a person in California puts a listening device in a car, he is in a heap o' trouble. Greg > > --- Greg Horton wrote: > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you > > don't need a warrant to > > put a tracker on unless you hardwire it to the > > vehicle. So instead of > > fielding a six man surveillance team for thousands > > of dollars and maybe > > a helo or plane, you do the same thing for pennies. > > You are going to > > follow the suspect anyway, why not do it in a way > > that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > [Non-text portions of this message have been removed] 10590 From: wiggyyy2000 Date: Wed Jan 12, 2005 11:07pm Subject: Thanks James.. I would like to thank Jim for inviting me to this group, it is very informative with good people thanks 10591 From: James M. Atkinson Date: Thu Jan 13, 2005 0:08am Subject: State Department/CIA Communications Annex and Special Collection Facilities (for publication to Cryptome) Consider for a moment the irony of having one of major the U.S. Governments espionage centers located between a road called "Ashcroft Drive" and one called "Entomology Road". The Beltsville Agricultural Research Center is world famous for the study of insects, but more than one kind of bug is grown at this location. The site has also been used as a base for spies and diplomats since the late 70's as a major communications center, and a wet-house where bugs of a more electronic nature are nurtured. In a forested area near Rt 295 there are two sister building set back from the road. On page 2 of the following FCC document we see that MCI Worldcom operates a satellite communications system from this location. http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-230090A1.pdf Application for Authority Class of Station: Fixed Earth Stations MCI WORLDCOM NETWORK SERVICES, INC. E030002 SES- LIC- 20030102- 00007 E Nature of Service: Domestic Fixed Satellite Service SITE ID: 1 LOCATION: 8101 Odell Rd, Montgomery, Beltsville, MD 39 ∞ 2 ' 48.40 " N LAT. 76 ∞ 51 ' 52.90 " W LONG. Universal Antennas 1 18.3 meters ANTENNA ID: 1183 0.00 dBW 3700.0000 - 4200.0000 MHz 44M2G7W 56.00 dBW PSK DATA 5925.0000 - 6425.0000 MHz 43K8G7W 71.60 dBW PSK DATA 5925.0000 - 6425.0000 MHz 44M2G7W 3700.0000 - 4200.0000 MHz 43K8G7W Points of Communication: 1 - ALSAT - (ALSAT) Note the listing on page 2, which reflects that MCI is operating the Satellite Dish on the East side of the State Department Communications Annex. ALSAT is a foreign based commercial communications satellite with surveillance capability, and the above frequency bands would allow this systems to handle a huge about of materials. Also, the bandwidth that they are using is enormous and they could move huge amounts of data through a system like this. http://dettifoss.fcc.gov/acweb/dettifoss/IBFS/IBFS_Ses_License.roi;16520?ViewDefault http://dettifoss.fcc.gov/acweb/dettifoss/Genmen_a/db_8/d_admin.roi;119?ViewDefault --------------------------------------------------------- Most State Department facilities have special phones lines that allow personnel to call their families while abroad via this systems at little or no cost, for example: http://foia.state.gov/MMS/postrpt/pr_view_all.asp?CntryID=159 Telephones and Telecommunications Last Updated: 7/12/2004 5:25 AM Local and international telephone service is available and reliable. International direct dial service is excellent. A one-minute call to the U.S. or other foreign country costs approximately $1. Direct calls from the U.S. can be received in Hanoi without cost. Residences of all USG personnel are equipped with telephones. Employees are responsible for paying the monthly residential telephone bill. Through the International Voice Gateway (IVG) Program, the Embassy has four IVG telephone trunks directly connecting the office with the State Department Telephone Switch at Beltsville, Maryland. This IVG connection was installed as both a cost-saving and morale-boosting program. Calls to the greater Washington area (703/202/301/410) are free. All 1-800 numbers are also free of charge to Embassy personnel. When placing personal calls, a commercial telephone calling card can be used for numbers outside the D.C. area. These personal calls will be billed to the employee as if the call originated from Beltsville, Maryland. Also, http://foia.state.gov/MMS/IVG_prefix/ivgprefix_start.asp IVG Usage Dial Prefix Codes The International Voice Gateway (IVG) switch is located in Beltsville, Maryland and provides interconnectivity from 135 overseas locations to all Department of State and government agencies located in the Washington, D.C. metropolitan area. Through the use of calling cards, it also enables users to access the FTS networks, GETS, WITS, as well as commercial numbers for international direct dialing at substantially reduced rates. Embassy to Off-Network Overseas Location: When calling from an Embassy to a different country, but not an IVG location, you must use your ID3 Calling Card. Off-Network Overseas Location to Department of State and/or U.S. Location: You must use your ID3 Calling Card. When calling from an off-network overseas location to an off-network location, you must use your ID3 Calling Card. and, http://foia.state.gov/masterdocs/05fah02/tel0640.pdf 5 FAH-2 H-640 INTERNATIONAL VOICE GATEWAY (TL:TEL-1; 07-01-1998) 5 FAH-2 H-641 DESCRIPTION (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) The International Voice Gateway (IVG) is an international telephone network directly linking foreign affairs agency headquarters with field offices abroad via dedicated voice circuitry. DTS-PO established the network to provide a cost-effective, U.S. Government-controlled and switched telephone service for foreign affairs agencies. Dial tone and switching for IVG trunks are provided by the central switch at the Network Control Center in Beltsville. DTS-PO manages the network and maintains the central switch and circuitry up to the PBX at destination points. 5 FAH-2 H-642 INTERCONNECTIVITY (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) IVG subscribers can connect to other U.S. Government networks by dialing special access codes. DTS-PO periodically sends telegraphic updates of IVG directories and detailed dialing instructions to all IVG subscribers. The other networks are described in greater detail below. 5 FAH-2 H-642.1 Department of State Metropolitan Area/Wide Area Network (MA/WAN) (Voice) (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) The Departmentís MA/WAN is a voice network connecting the IVG central switch at Beltsville to Department facilities at Main State, Washington area State annexes, and other facilities in Portsmouth, New Hampshire, Charleston, South Carolina and USUN New York. --------------------------------------------------------- Here is an article about MCI getting caught playing games with the system: http://www.computerweekly.com/Article123819.htm Note that MCI was illegally routing "sensitive calls" through Canada to save money. --------------------------------------------------------- The same 8101 Odell address is also listed as a GSA building at: http://www.iolp.gsa.gov/iolp/BuildingsList.asp?dID=2405 ALTERNATE COMM SITE 8101 ODELL RD BELTSVILLE , MD 20705-4110 PRINCE GEORGE'S COUNTY ------------------------------------------------------------- An index for State department Annex locations indicates that this location is part of the "Bureau of Information Resource Management ": http://foia.state.gov/MMS/Annexes/print_all_annex.asp State Annex - SA-26 SA-26 Beltsville 8108 O'Dell St. Beltsville, MD 20522 Major Office: IRM, AID ------------------------------------------------------ Here is a listing of some of the people at the facility, broken down by assignment/position: http://foia.state.gov/alphalisting/alpha_print.asp?Range=DD Alphabetical Listing of Employees Name Number Room Office Location Ortman, Edward 301-985-8318 102 Beltsville Kahney, Joseph 301-985-8100 154 SA-26 Ivan, Patricia 301-985-8006 BIMC SA-26 White, Robert H. 301-985-8100 143 SA-26 Bazemore, Lisa C. 301-985-8022 107 SA-26 Ivory, Cynthia Y. 301-985-8797 126 SA-26 Delisa, John 301-985-8064 GTS(BIMC) SA-26 Heiser, Richard E. 301-985-8019 BIMC SA-26 Scott, Betty Jean 301-985-8037 2nd Fl SA-26 Bowden, Alfred Jerome 301-985-8711 111A(GTS) SA-26 Crawford, Steadman C. 301-985-8016 126(GTS/EN SA-26 Chavis, Keith 301-985-8100 A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Clark, Sherry 301-926-5710 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Steen, Jon J. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Beckloff, Mark 301-985-8787 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Ortman, Edward 301-985-8318 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Bristol, Robert 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Jones, Jerry R. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Pantos, Lillian 301-985-8004 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Thomas, Anthony 301-985-4738 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Wilson, Rima S. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Harrell, Earl C. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Johnson, Chad R. 301-985-8318 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Mangal, Aaron S. 301-985-8208 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Marbley, Troy G. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Rice, William J. 301-985-8712 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Brown, Richard T. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Gonzalez, Jose F. 301-985-8512 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Ingram, Robert J. 301-985-8866 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Lippa, Michelle L. 301-985-8100 EMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Lippa, Michelle L. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Mooring, Odessa M. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Rios, Kixxonmin G. 301-985-8866 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Burgman, Charles E. 301-985-8815 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Dejesus, Yesenia D. 301-985-8712 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 McDaniel, Tyrone G. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Bruno-Nieves, Jorge L. 301-985-8100 109 A/DTSPO/GTS SA-26 Bryson, Cader A. 301-985-8945 A/OPR/FMS/RAM - Office of Facilities Management Services SA-26 Anderson, Michael G. 301-985-8946 B03E A/OPR/FMS/RAM - Office of Facilities Management Services SA-26 Palmer, Erica 301-985-8347 8th Fl DS/CIS/IST - Office of Information Security Technology SA-26 Hurt, Lolita M. 301-985-8347 DS/SI/AC SA-26 Perry, Gwenette C. 301-985-8347 DS/SI/AC SA-26 Washington, Shawnisa 301-985-8229 DS/SI/AC SA-26 D Elisa, John 301-985-8064 GTS IRM/NOC SA-26 Badra, Patrick M. 301-985-8433 IRM/NOC SA-26 Correll, Jacob A. 301-985-8008 GTS IRM/NOC SA-26 Bridgwood, Thomas F. 301-985-1717 GTS IRM/NOC SA-26 Carroll-Nickens, Mary 301-985-8371 117(GTS-NS IRM/OPS/ENM - Enterprise Network Management SA-26 Ballard, Paul E. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Wardle, Shane C. 301-985-8250 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Ross, Russell M. 301-985-8369 ENMOC IRM/OPS/ENM/OPS/NA SA-26 Williams, Sherman L. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Webster, Tara Marsette 301-985-8460 ENMOC IRM/OPS/ENM/OPS/NA SA-26 Bullock-Bangoura, Wanda D. 301-985-8227 1269 IRM/OPS/ENM/OPS/NA SA-26 Beddingfield, Guthrie 301-985-8356 ABCD IRM/OPS/ENM/OPS/TC Beltsville Kumar, Ravindra 301-985-8462 Bsmt IRM/OPS/ENM/OPS/TC SA-26 Neal, Joseph C. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/TC SA-26 Scott, Teresa D. 301-985-8806 140 IRM/OPS/ENM/OPS/TC SA-26 Rivera, Jose Antonio 301-985-8342 IRM/OPS/ENM/OPS/TC SA-26 Williams, Dorothea V. 301-985-8004 111 IRM/OPS/MSO - Messaging Systems Office Beltsville Premo, Rob 301-985-8516 IRM/OPS/MSO - Messaging Systems Office SA-26 Hedges, John S. 301-985-8004 IRM/OPS/MSO - Messaging Systems Office SA-26 Walker, Michael D. 301-985-8516 IRM/OPS/MSO - Messaging Systems Office SA-26 Cabral, John L. 301-985-8005 108 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division Beltsville Bell, Anthony R. 301-985-8007 Vault IRM/OPS/MSO/BMC - Beltsville Messaging Center Division Beltsville Leger, David J. 301-985-8061 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Glover, Henry A. 301-985-8319 105 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Williamson, Darrell L. 301-985-8122 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Hamilton, Lee 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Harrell, Earl 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Marbley, Troy 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Childs, Albert 301-985-8039 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Morris, Ofelia 301-985-8004 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Haskins, Albert 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Edwards, Anthony 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 McDaniels, Tyrone 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Williams, John A. 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Mooring, Odessa M. 301-985-8516 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Jones, Frank R. 301-985-8122 IPC IRM/OPS/MSO/BMC/OPS - Operations Branch Beltsville Gomez, Bernabe Jesus 301-985-8122 1 IRM/OPS/MSO/BMC/OPS - Operations Branch Beltsville Hunt, Richard L. 301-985-8122 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Manning, Felix 301-985-8122 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Zayas, Orlando 301-926-5405 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Champ, Renee C. 301-985-8296 108 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Gibson, Mary E. 301-985-8105 104 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Stephens, James 301-985-8866 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Motes, Roger D. 301-985-8516 PRIMARY IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Barclay, James E. 301-985-8302 108 IRM/OPS/MSO/BMC/TS - Technical Services Branch Beltsville Battle, Ronald Nelson 301-926-5400 5420 IRM/OPS/MSO/BMC/TS - Technical Services Branch Beltsville Beechum, Michael E. 301-926-5405 IRM/OPS/MSO/BMC/TS - Technical Services Branch SA-26 Norton, Adrian L. 301-985-8124 112 IRM/OPS/MSO/BMC/TS - Technical Services Branch SA-26 Fleming, Carla M. 301-985-8032 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch Beltsville Hill, Bruce 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Kodey, Mark 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Lutes, Mike 301-985-8714 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Ledger, Dave 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Mobeka, Rita 301-985-8505 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Garner, Cedric 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Jackson, Larry 301-985-8061 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Knight, Gerald 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Knieriem, Gerry 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Spellane, Michael 301-985-8145 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Schneider, Paul C. 301-985-8123 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Hampton, Angel B. 301-985-8905 1986E IRM/OPS/SIO/APD/PAY - Payroll Applications Branch SA-26 Dormio, Debora L. 301-985-8900 117 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch Beltsville Woodland, Marian G. 301-985-8293 130 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch Beltsville Baia, Joseph L. 301-985-8738 139 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 McCree-Green, Carol E. 301-985-8902 136 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 Williamson, Johnnie R. 301-985-8727 139 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 Dumas, Jimmie J. 301-985-8721 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Chase, Mary L. 301-985-8312 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Day, Marcus R. 301-985-8406 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Cook, Tyrone W. 301-985-8292 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Brown, Elliott W. 301-985-8737 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Davis, Leonard W. 301-985-8739 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Cornelison, Jim X. 301-985-8290 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Jackson, Ramona D. 301-985-8793 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Johnson, Sheila D. 301-985-8295 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Raiford, Angela E. 301-985-8741 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Williams, Steve R. 301-985-8732 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Wilson, Barbara J. 301-985-8294 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Smith, Lawrence C. 301-985-8901 1921 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Wise, Pernell X. 301-985-8790 135 - A IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Alami, Michelle E. 301-985-8746 Bubble IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Douglas, Kirk 301-985-8901 117 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Parker, Carlton 301-985-8743 OPS IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Sands, Vance H. 301-985-8795 135 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Slater, Demetrius 301-985-8700 139 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Stevens, Phillip H. 301-985-8731 135B IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Clough, Patricia A. 301-985-8700 1st Fl IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Weinberger, Jim C. 301-985-8792 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Collins, Tony C. 301-985-8794 130 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Richardson, Barbara A. 301-985-8700 130 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 http://foia.state.gov/MMS/OrgDirectory/OrgDir.asp?ID=56 MESSAGING SYSTEMS (IRM/OPS/MSO) Director Susan Musser, Acting 5440 202-647-7787 Deputy Director Susan Musser 5440 202-647-7787 Management Analysis Staff Chief Patsy Butler 5440 202-647-7768 Messaging Systems Products Division Chief Edward Courlang 2288C SA34 703-912-8009 Special Messaging Operation Divisions Chief Frontis Wiggins 5440 202-647-7989 E-Mail Division Chief Larry McElroy 1921 202-736-4878 Main State Messaging Center Division Chief Margaret Johnson 5440 202-647-7795 Beltsville Messaging Center Division Chief John Cabral 117 SA26 301-985-8005 -------------------------------------------------------------------------------------------------------- The East side of the Odell Road facility has two large Parabolic dish antenna for satellite up-link and down link. On the South side of the building there is a very tall red/orange and white tower with a point-to-point microwave dish to another site in the area. Next to this is a much shorter mast, with a large log-periodic antenna that we often see on the roofs of embassies and diplomatic facilities across the globe. There is also a fiber optic cable between this facility, and the one just to the east of it (the Special Collection Service). ------------------------------------------------------------------------------------------------------------- http://www.fbodaily.com/cbd/archive/1999/06(June)/22-Jun-1999/70sol003.htm COMMERCE BUSINESS DAILY ISSUE OF JUNE 22,1999 PSA#2372 U.S. Agency for International Development, M/OP/B/HNE, Room 7.09-120, 1300 Pennsylvania Avenue, NW, Washington, DC 20523-7100 70 -- GENERAL PURPOSE AUTOMATED DATA PROCESSING EQUIPMENT SOL M/OP/HNE/P99-002 DUE 062599 POC POC Daisy Matthews: Purchasing Agent, M/OP/B/HNE, Fax (202) 216-3052, Tel: (202) 712-0512, Internet: dmatthews@u..., Contracting Officer, James A. Jeckell WEB: http://www.info.usaid.gov/procurements_bus_opp/procurement/announce/cb d, http://www.info.usaid.gov. E-MAIL: dmatthews@u..., http://www.info.usaid.gov. This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in Federal Acquisition Regulations (FAR) subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotes are being requested and A WRITTEN SOLICITATION WILL NOT BE ISSUED. This CBD notice can be viewed and downloaded using the Agency Web Site. The Worldwide web address is http://www.info.usaid.gov. Select Business and Procurement Opportunities from the home page, then "USAID Procurements." On the following screen, select "Download Available USAID Solicitations." The Solicitation Number for this Request For Quotations (RFQ) is M/OP/HNE/P99-002. The Government anticipates awarding a single purchase order. This procurement is for the following items: CLIN NO. 001, Part No. ALSM64-05AE, 64KB Airlink Wireless Modems,Input Power: 90-270 VAC 50/60 HZ Qty. 12 ea.; CLIN NO. 002, Part No. ALS128-05AB, 128KB Airlink Wireless Modems, Input Power: 90-270 VAC 50/60 HZ Qty. 6 ea.; CLIN NO. 003, Part No. ALS256-05AB, 256KB Airlink Wireless Modems, Input Power 90-270 VAC 50/60 HZ Qty. 12 ea.; CLIN NO. 004, Part No. YEA-24SP-NF, 24DBI Semiparabolic Antenna Qty. 30 ea.; CLIN NO, Part No. 005 YELA-24, Lighting Arrestor with Bracket/Female Connector Qty. 30 ea.; CLIN NO. 006, Part No. YEX-4UF-010M/M, Ultra-Flex RF Cable 10 foot N. Male Connector Qty. 4 ea.; CLIN NO. 007, Part No. YEC-4UF-020M/M Ultra, Flex RF Cable 20 Foot N. Cable Connector Qty. 4 ea.; CLIN NO.008, Part No. YEC-400-1000B, 1000 Foot Spool LMR Cable (Bulk Reel) Qty. 1, CLIN NO. 009, Part No. YE-73565, Type N. 50 OHM Solder/Clamp Connector Qty. 50 ea. F.O.B Point, 8101 Odell Drive, Beltsvile, Maryland,20705. Date of Delivery: No later than July 30, 1999. No partial quotes will be considered. Please acknowledge all requirements on quotations. Please indicate F.O.B point on quote. This procurement is set-aside for small business. The provision at FAR 52.212-1, Instructions to Offerors, applies to this acquisition. Evaluation is based on best value including cost and ability to meet service requirements. Offerors shall include a completed copy of the provision at FAR 52.212-3, Offeror Representations and Certifications-Commercial Items, with its offer. The clause at 52.212-4, Contract terms and Conditions-Commercial Items, applies to this acquisition. In addition to the guidance contained in FAR 52.212-4, contractors shall submit proof of delivery with their invoices. The receiving office or representative of USAID may in the form of a bill of lading or other shipping document sign proof of delivery. Invoices received without proof of delivery with their invoices will not be accepted. The clause at FAR 52.212-5, Contract Terms and Conditions Required to Implement Status or Executive Orders-Commercial Items, applies to this acquisition. Offers are due by close of business 07/25/99, and can be submitted by fax to (202) 216-3052 Attn: Daisy Matthews. Inquiries regarding this request will only beaccepted via Fax. Posted 06/18/99 (W-SN344815). (0169) COMMERCE BUSINESS DAILY ISSUE OF JULY 20,1999 PSA#2391 U.S. Agency for International Development, M/OP/B/HNE, Room 7.09-120, 1300 Pennsylvania Avenue, NW, Washington, DC 20523-7100 70 -- GENERAL PURPOSE AUTOMATED DATA PROCESSING EQUIPMENT SOL M/OP/HNE/P99-003 DUE 072399 POC POC Daisy Matthews: Purchasing Agent, M/OP/B/HNE, Fax: (202) 216-3052; Telephone: (202) 712-0512, Internet: dmatthews@u..., Contracting Officer: James A. Jeckell WEB: http://www.info.usaid.gov/procurement_bus_opp/procurement/announce/cbd, http://www.info.usaid.gov. E-MAIL: http://www.info.usaid.gov, dmatthews@u.... This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in Federal Acquisition Regulations (FAR) subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotes are being requested and A WRITTEN SOLICITATION WILL NOT BE ISSUED. This CBD notice can be viewed and downloaded using the Agency Web Site. The Worldwide web address is http://www.info.usaid.gov. Select Business and Procurement Opportunities from the home page, then "USAID Procurements." On the following screen, select "Download Available USAID Solicitations." The Solicitation Number for this Request For Quotations (RFQ) is M/OP/HNE/P99-003. The Government anticipates awarding a single purchase order. This procurement is for the following item: CLIN NO. 001, Part No. Radyne DD 2401L, Receive-Only Modem, with Cisco Cable Kit, Twenty (20) each. F.O.B Point, 8101 Odell Drive, Suite 110, Beltsvile, Maryland,20705. Date of Delivery: No later than August 20, 1999. No partial quotes will be considered. Please acknowledge all requirements on quotations. Please indicate F.O.B point on quote. This procurement is set-aside for small business. The provision at FAR 52.212-1, Instructions to Offerors, applies to this acquisition. Evaluation is based on best value including cost and ability to meet service requirements. Offerors shall include a completed copy of the provision at FAR 52.212-3, Offeror Representations and Certifications-Commercial Items, with its offer. The clause at 52.212-4, Contract terms and Conditions-Commercial Items, applies to this acquisition. In addition to the guidance contained in FAR 52.212-4, contractors shall submit proof of delivery with their invoices. The receiving office or representative of USAID may in the form of a bill of lading or other shipping document sign proof of delivery. Invoices received without proof of delivery with their invoices will not be accepted. The clause at FAR 52.212-5, Contract Termsand Conditions Required to Implement Status or Executive Orders-Commercial Items, applies to this acquisition. Offers are due by close of business 07/23/99, and can be submitted by fax to (202) 216-3052 Attn: Daisy Matthews. Inquiries regarding this request will only be accepted via Fax. Posted 07/16/99 (W-SN355185). (0197) Loren Data Corp. http://www.ld.com (SYN# 0398 19990720\70-0012.SOL --------------------------------------------------------------------------------------------------------------- http://216.33.118.202/EPSData/AID/Synopses/11471/M-OP-1787/PROPOSALINSTRUCTIONS.doc Courier services will cover the District of Columbia; Montgomery and Prince George's County, Maryland, Fairfax and Arlington Counties, and the Cities of Alexandria and Falls Church, Virginia. Approximately eighty (80) percent of service calls will originate or terminate at the Agency office located in the District of Columbia. Agency's offices are currently located: District of Columbia Ronald Reagon International Trade Building 1300 Pennsylvania Avenue, N. W. Washington, D.C. 20523 Maryland (1) USAID Mainframe Computer Center 8101 Odell Road Beltsville, MD 20705 Virginia (2) Tower Building (State Annex 14) 1100 Wilsong Boulevard Rosslyn, VA 22209 --------------------------------------------------------------------------------- http://md.allpages.com/beltsville/real-estate/real-estate-services/ Montage Inc 8101 Odell Road Beltsville, MD 20705-4110 Phone: (301) 210-4540 Business Types: Property Maintenance & Services ------------------------------------------------------------------------------------- http://www.globalsecurity.org/org/news/2002/020718-scs1.htm The Baltimore Sun July 18, 2002 Report faults decisions by intelligence agencies By Tom Bowman WASHINGTON - The nation's spy agencies failed to provide adequate warning of the Sept. 11 terrorist attacks due partly to a series of "questionable management decisions" about where to spend money and assign workers, according to a sharply worded congressional report released yesterday. The Central Intelligence Agency and the National Security Agency must do more to penetrate al-Qaida and other terrorist organizations, said the report by the House Intelligence Subcommittee on Terrorism and Homeland Security. It was the first congressional report on the subject since the attacks on the Pentagon and the World Trade Center. The CIA should hire more foreign agents, while the NSA must shift from being a passive listener to a "proactive hunter" of terrorist targets. At the same time, the FBI was faulted in the report for the reluctance of top officials to share counterintelligence information with other agencies. "This report contains constructive suggestions for what the intelligence community needs to do to strengthen our country's counterterrorism intelligence capabilities," said Rep. Porter J. Goss, the Florida Republican who chairs the committee and has joined with the Senate committee in an investigation into why America had no advance warning of the attacks on the World Trade Center and the Pentagon. The FBI had no immediate comment on the report, while the CIA and NSA said they were making progress in dealing with the terrorist threat. Though funding for counterterrorism has sharply increased, both intelligence agencies said they face budget constraints in pursuing terrorists and spies. The intelligence community, with an annual budget in excess of $30 billion, is expected to receive billions of dollars more in the coming years. The CIA has an estimated work force of 19,000 and the NSA is believed to have 25,000 employees at Fort Meade, although precise figures are classified. While the report repeated long-standing criticisms that the agencies must hire more linguists and analysts to fight terrorism, the report broke ground by focusing on management decisions it said were key factors in the agencies' inability to sound the alarm before Sept. 11. The CIA's human intelligence - such as that gathered by foreign spies in the agency's employ - steadily eroded in the early to mid-1990s because the CIA perceived a reduced terrorist threat, the report said. It said the NSA had failed to find a way to closely follow a target who switches from a land-line phone to a cell phone or an Internet address. A senior intelligence official, who requested anonymity, said the CIA had yet to completely review the 100-page classified report. A declassified, 10-page summary was publicly released. But the intelligence official defended the agency's efforts on counterterrorism. Beginning in 1997, Director George J. Tenet beefed up the agency's efforts against terrorism with new employees and more focused analysis. Counterterrorism funding grew by 50 percent between 1997 and 2001, while the number of case officers - those who recruit foreign spies - rose by the same percentage. The official laid part of the agency's difficulty at the feet of Congress and the White House: "We certainly ask the administration and Congress to reverse the trend of increasing intelligence funding after terrorist attacks and then dropping back to former inadequate levels after the smoke clears." Robert Baer, a CIA officer for 21 years who left in 1997 and wrote about his experiences in the recent book See No Evil, said the committee's criticisms jibe with his own. Too much money was spent on CIA headquarters staff, he said, and not enough on the critical and often risky intelligence work overseas. The committee report "is right on the mark," he said. NSA released a statement saying it is dedicated to meeting technological challenges and ensuring that it has the right skills mix in its work force. The statement also said that since the end of the Cold War, "NSA is one-third smaller in population and has one-third fewer resources at its disposal." John Pike, an intelligence analyst with globalsecurity.org, said that many of the criticisms were not new, and some of them amount to "Monday morning quarterbacking" by Congress. Still, Pike said he was intrigued that the committee is calling for NSA to become a hunter rather than a passive listener. He said that might mean the agency will be encouraged to start "placing more bugs" around the world through its Special Collection Service, a joint program it runs with CIA that operates out of a secret office building in Beltsville. ------------------------------------------- http://www.spectrum.ieee.org/WEBONLY/publicfeature/apr03/code.html Bond, James Bond But a big remaining challenge, according to John Pike, a defense expert and founder of GlobalSecurity.org, are fiber-optic cables that stay on land. "I think that one of the things that [Navy Seals] spend a fair amount of time doing is [going] ashore...and walking to the nearest land line," says Pike. "They were doing that in Iraq a decade ago." Pike believes that this may also be how fiber-optic communications in North Korea and other countries are monitored: "It's cat and mouse, we try to see how many taps we can put on [chief of state Kim Jong II's] fiber-optic network, and the Dear Leader runs around and tries to catch them." Another, more aggressive approach to the land-line problem is to force an opponent onto the airwaves. "One of the things the United States has been doing since the middle of 2002 is systematically taking apart Iraq's land-line communications with air strikes, to force them to communicate via channels that are more readily compromised," says Pike. Indeed, this may be the reason why U.S. Secretary of State Colin Powell was able to present incriminating Iraqi telephone conversations to the United Nations last February. When a more subtle approach than aerial bombardment is called for, agencies like the U.S. National Security Agency (NSA) and the Central Intelligence Agency (CIA) can call upon organizations such as the Special Collection Service (SCS), a joint NSA-CIA covert group headquartered in Beltsville, Md. "What this group does is the more surreptitious black-bag operations," explains Wayne Madsen, who previously worked at the NSA and is now a senior fellow at the Electronic Privacy Information Center (Washington, D.C.). Black-bag operations can include breaking into embassies or facilities of communications providers and stealing information or installing bugs. -------------------------------------------------------------------------------- "It's been extremely difficult to break Russian ciphers" -------------------------------------------------------------------------------- By bugging a computer or communications system, information can be captured before it's sent through a fiber-optic cable, author Bamford observes. A tiny microphone dropped into a keyboard can pick up the sound made by the keys as they are struck and transmit the sounds to a nearby receiver. Different keys, according to Bamford, "sound different≠each has a specific signature." Those signatures can be used to reconstruct what was typed. The SCS also allows the Sigint community "to be proactive, to go after information rather than sit and wait," explains Bamford. Another important SCS mission is to recruit people who work for targeted governments, like cryptographic clerks or systems administrators, to ensure access to sensitive information, such as cipher keys. When successful, such activities also allow the NSA to avoid another steep hurdle: encryption. --------------------------------------------------------------------------------------------------------------- http://www.long-intl.com/mbw.htm CIA OPERATIONS FACILITY - Provided master planning, scheduling, budgeting, and monthly monitoring services on this $17 million new construction project at Beltsville, Maryland. The project was a classified fast-track office/research facility. ----------------------------------------------------------------------------------------------------------------- ww.villagevoice.com/features/9908/vest_madsen.shtml February 24 - March 2, 1999 A Most Unusual Collection Agency How the U.S. undid UNSCOM through its empire of electronic ears By Jason Vest and Wayne Madsen When Saddam Hussein raised the possibility of attacking U.S. planes in Turkey last week, his threats illustrated what many in diplomatic circles regard as an international disgrace≠ the emasculation of the UN by the U.S. When UNSCOM, the UN's arms-inspection group for Iraq, was created in 1991, it drew on personnel who, despite their respective nationalities, would serve the UN. Whatever success UNSCOM achieved, however, was in spite of its multinational makeup. While a devoted group of UN staffers managed to set up an independent unit aimed at finding Saddam's weapons and ways of concealing them, other countries seeking to do business with sanctions-impaired Iraq≠ notably France and Russia≠ used inspectors as spies for their own ends. But what ultimately killed UNSCOM were revelations that the U.S. government had manipulated it by assuming control of its intelligence apparatus last spring (or perhaps even earlier by using the group to slip spies into Iraq) not so much to aid UNSCOM's mission, but to get information for use in future aerial bombardments. When stories to this effect broke last month, however, there was almost no consistency in descriptions of the agencies involved or techniques used. The New York Times, for example, said only one CIA spy had been sent into Baghdad last March to set up an automated eavesdropping device. Time had multiple Defense Intelligence Agency (DIA) operatives planting bugs around Baghdad throughout 1998. The Wall Street Journal referred to the use of one "device" from the National Security Agency (NSA) last year and "a series of espionage operations used by the U.S. [since] 1996 to monitor the communications" of Saddam and his elite. When probing the world of espionage, rarely does a clear picture emerge. But according to a handful of published sources, as well as assessments by independent experts and interviews with current and former intelligence officers, the U.S. government's prime mover in Iraqi electronic surveillance was most likely a super-secret organization run jointly by the the CIA and the NSA≠ the spy agency charged with gathering signals intelligence (known as SIGINT)≠ called the Special Collection Service. Further, there is evidence to suggest that the Baghdad operation was an example of the deployment of a highly classified, multinational SIGINT agreement≠ one that may have used Australians to help the U.S. listen in≠ months after the CIA failed to realize the U.S. objective of overthrowing Saddam Hussein through covert action. According to former UNSCOM chief inspector Scott Ritter, when the U.S. took over the group's intelligence last year, a caveat was added regarding staffing: only international personnel with U.S. clearances could participate. "This requirement," says Ritter, "really shows the kind of perversion of mission that went on. The U.S. was in control, but the way it operated from day one was, U.S. runs it, but it had to be a foreigner [with a clearance] operating the equipment." authors Andrew and Patrick Cockburn demonstrate in their just published book Out of the Ashes: The Resurrection of Saddam Hussein, were two of the most colossally bungled CIA covert operations since the Bay of Pigs. While details of one of the failed operations were widely reported, the Cockburns fleshed out details of an arguably worse coup attempt gone awry in June 1996. Iraqi counterintelligence had not only managed to finger most of the suspects in advance, but months before had even captured an encrypted mobile satellite communications device that the CIA gave the plotters. Adding insult to injury, the Cockburns report, Iraqi counterintelligence used the CIA's own device to notify them of their failure: "We have arrested all your people," the CIA team in Amman, Jordan, reportedly was told via their uplink. "You might as well pack up and go home." Some UNSCOM staffers≠ first under Russian Nikita Smidovich, later under American Scott Ritter≠ managed to create what amounted to a formidable micro- espionage unit devoted to fulfilling UNSCOM's mission. Between information passed on from various countries and use of unspecified but probably limited surveillance equipment, the inspectors were gathering a great deal. But in March 1998, according to Ritter, the U.S. told UNSCOM chair Richard Butler of Australia that it wanted to "coordinate" UNSCOM's intelligence gathering. Ritter insists that no U.S. spies under UNSCOM cover could have been operating in Baghdad without his knowledge prior to his resignation in August 1998. However, as veteran spies point out, if they were, Ritter probably wouldn't have known. A number of sources interviewed by the Voice believe it possible that Special Collection Service personnel may have been operating undercover in Baghdad. According to a former high-ranking intelligence official, SCS was formed in the late 1970s after competition between the NSA's embassy-based eavesdroppers and the CIA's globe-trotting bugging specialists from its Division D had become counterproductive. While sources differ on how SCS works≠ some claim its agents never leave their secret embassy warrens where they perform close- quarters electronic eavesdropping, while others say agents operate embassy- based equipment in addition to performing riskier "black-bag" jobs, or break- ins, for purposes of bugging≠ "there's a lot of pride taken in what SCS has accomplished," the former official says. Intriguingly, the only on-the-record account of the Special Collection Service has been provided not by an American but by a Canadian. Mike Frost, formerly of the Communications Security Establishment≠ Canada's NSA equivalent≠ served as deputy director of CSE's SCS counterpart and was trained by the SCS. In a 1994 memoir, Frost describes the complexities of mounting "special collection" operations≠ finding ways to transport sophisticated eavesdropping equipment in diplomatic pouches without arousing suspicion, surreptitiously assembling a device without arousing suspicion in his embassy, technically troubleshooting under less than ideal conditions≠ and also devotes considerable space to describing visits to SCS's old College Park headquarters. "It is not the usual sanitorium-clean atmosphere you would expect to find in a top-secret installation," writes Frost. "Wires everywhere, jerry-rigged gizmos everywhere, computers all over the place, some people buzzing around in three- piece suits, and others in jeans and t-shirts. [It was] the ultimate testing and engineering centre for any espionage equipment." Perhaps one of its most extraordinary areas was its "live room," a 30-foot-square area where NSA and CIA devices were put through dry runs, and where engineers simulated the electronic environment of cities where eavesdroppers are deployed. Several years ago, according to sources, SCS relocated to a new, 300-acre, three- building complex disguised as a corporate campus and shielded by a dense forest outside Beltsville, Maryland. Curious visitors to the site will find themselves stopped at a gate by a Department of Defense police officer who, if one lingers, will threaten arrest. There are good reasons, explains an old NSA hand, for havingelectronic ears on terra firma in addition to satellites. "If you're listening to something from thousands of miles up, the footprint to sort through is so huge, and finding what you are looking for is not a simple chore. If you know more or less specifically what you want, it's easier to get it in close proximity. And if it happens to be a low-powered signal, it may not travel far enough." According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm. It's not an unreasonable assumption; though Ericsson brushes off questions about it, in 1996 a Middle Eastern businessman filed suit against the company, claiming, among other things, that it had stiffed him on his commission for brokering a deal between the Iraqis and Ericsson for sensitive defense communications equipment, which, reportedly, included encrypted cell phones. Speaking on condition of anonymity, a veteran intelligence official confirmed that the NSA has "arrangements" with other communications firms that allow NSA to access supposedly secure communications, but cooperation from Ericsson would be "a breakthrough≠ despite our best efforts, they always kept their distance. But it's not beyond the realm of possibility." (This is not without precedent; though hardly covered in the American press, it has been reported that Switzerland's Crypto AG≠ long the supplier of cipher equipment to many of the world's neutral and "rogue" states≠ enjoyed such an "arrangement" with the NSA for decades. Crypto AG denies this.) There is, however, another possible scenario regarding participation by Ericsson in an intelligence venture. According to FAS analyst Pike, it's much more likely that anyone doing intelligence work in Iraq would want a schematic of Baghdad's telephone system≠ which Ericsson installed in the late '60s and has subsequently updated. "I would find it to be far more plausible that the U.S. intelligence community would be interested in acquiring, and Ericsson would be interested in supplying, the wiring diagram for Baghdad's telephone exchange than encryption algorithms for cell phones," he says. Also, he explains, finding ways to tap into a whole phone system or pull short-range signals out of the air without being obvious is clearly SCS's portfolio. "This type of risky close surveillance is what SCS was formed to do," he says. "When you think of NSA, you think satellites. When you think CIA, you think James Bond and microfilm. But you don't really think of an agency whose sole purpose is to get up real close and use the best technology there is to listen and transmit. That's SCS." Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, "It would be classified and we would not be able to talk about it." It's also possible, according to Mike Frost, that cleverly disguised bugs might have been planted in Baghdad≠ SCS, he recalls, managed to listen in on secured facilities by bugging pigeons. But, says a retired CIA veteran, with UNSCOM effectively dead, bugging is now out of the question. "I hope the take from this op," he says, "was worth losing the only access the outside world's disarmament experts had to Iraq." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 10592 From: Thomas Kellar Date: Thu Jan 13, 2005 8:34am Subject: Re: GPS tracking system signal inhibitors I would assume buying, selling and owning would probably not be a problem. Using it would be the problem. phrack.org has a design of a gps jammer on their web site. I am not sure if it works as advertised. On Wed, 12 Jan 2005, Guy Urbina wrote: > Would these proposed devices be illegal to own or sell? Right now they are > bench prototypes. -- w8twk Freelance Systems Programming http://www.fsp.com 10593 From: Michael Hammer Date: Thu Jan 13, 2005 9:21am Subject: Re: Ruling gives cops leeway with GPS The answer Greg, is that the issue is about where we as a society draw the lines (and who should draw them) rather than whether something is currently legal (or illegal) because of an administrative decision, a lower court decision, etc. I'm a lifelong Goldwater Republican (no Neocon here) and proud of it. Barry would be rolling over in his grave! As someone who handles computer security issues, I work with LEOs at various levels across a wide range of issues. Sometimes it's something I bring them and sometimes it's because they approach us (formally with a subpeona or search warrant and sometimes informally). Some of the hoops we all jump through for the legalities are just plain silly. Still, when all is said and done, as a citizen I would prefer to see some bad guys go free than trample on the privacy and rights of the average person by eliminating those hoops. I've lived and worked in countries where survelliance by the government is an everyday thing and it's not something I would like to see here. I give up a certain amount of personal privacy because of the nature of the work I do. That is a choice I make at an individual level. Your focus is on the technical nuances rather than the societal and ethical issues. Your job is to catch bad guys. Your preference is for things to be structured to make it easier for you to do your job. When you attach a GPS tracking device to something, it doesn't know the difference between publicly accessible places and private property. It's an idiot savant tool. Where you stand depends on where you sit. Some books which might help better frame the issues for you include: "World without Secrets" By Richard Hunter (Gartner Analyst, don't hold it against him ) A quick synopsis can be found at http://www.csoonline.com/analyst/report230.html You could also try reading some of Bruce Schneiers writings (If you ever have the chance to see Bruce present, he is an awesome mind) Some of his essays/op ed pieces can be found at: http://www.schneier.com/essays.html To put his writings in perspective, Bruce has a long track record in the security field, specifically in crypto. Mike On Wed, 12 Jan 2005 19:37:45 -0800, Greg Horton wrote: > > > Michael Hammer wrote: > > > By that logic, I should just be able to break into (and wipe out) an > > internet host that is being used to do bad things. We will get it shut > > down/confiscated anyways by going through the legal steps so why not > > just cut to the chase. As tempting as that may be, I understand the > > reasons we have limitations. > > > > Just because something can be done doesn't mean it should be done. > > Requiring a court order is a check/balance on the activities involved. > > > > Mike > > > > Holy Smokes Mike, what a leap of logic you make. How on earth do you > > make a connection between following someone on a public thoroughfare > > and comitting a burglary and then committing an additional crime of > > wiping the computer clean. Talk about a non sequitur. There is no > > requirement for a court order and case law has reaffirmed this > > technique by the police. If you are that concerned about this type of > > operation, maybe you should spearhead a movement to pass appropriate > > legislation. > > Greg > 10594 From: Hawkspirit Date: Thu Jan 13, 2005 11:43am Subject: Ruling gives cops leeway with GPS I think the ruling stinks but it is good for business as long as you are competent at sniffing out GPS units. And let me say, it is sometimes it is no easy task. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Message: 1 Date: Wed, 12 Jan 2005 04:16:19 -0800 (PST) From: G P Subject: Re: Ruling gives cops leeway with GPS Because anybody and everybody can now fix up your car with a GPS unit, without fear of civil or criminal prosecution. This court precedent puts very dangerous technology into the hands of the proletariat, without any form of checks and balances. Wait until somebody wires up your wife's car for sound, and you'll have a slightly different opinion about tracking technology. --- Greg Horton wrote: > > -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 [Non-text portions of this message have been removed] 10595 From: Tech Sec Lab Date: Thu Jan 13, 2005 5:44pm Subject: Pentagon [OT] Well, I hadn't seen this until today. I can say this, it wasn't a 757. That's for sure. http://www.freedomunderground.org/memoryhole/pentagon.php Tragic that the truth will never be known. 10596 From: littledog Date: Thu Jan 13, 2005 3:10pm Subject: Re: Ruling gives cops leeway with GPS anybody, what was that website again that sells a small GPS blocker for your car? I accadently deleted that info. Thanx> -----Original Message----- > From: Hawkspirit [mailto:hawkspirit@e...] > Sent: Thursday, January 13, 2005, 9:43 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Ruling gives cops leeway with GPS > > > > > I think the ruling stinks but it is good for business as long as you are > competent at sniffing out GPS units. And let me say, it is sometimes it is > no easy task. > > > > Roger Tolces > > HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > > > > Message: 1 > > Date: Wed, 12 Jan 2005 04:16:19 -0800 (PST) > > From: G P > > Subject: Re: Ruling gives cops leeway with GPS > > > > Because anybody and everybody can now fix up your car > > with a GPS unit, without fear of civil or criminal > > prosecution. This court precedent puts very dangerous > > technology into the hands of the proletariat, without > > any form of checks and balances. > > > > Wait until somebody wires up your wife's car for > > sound, and you'll have a slightly different opinion > > about tracking technology. > > > > --- Greg Horton wrote: > > > > > > > > > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10597 From: Michael Puchol Date: Thu Jan 13, 2005 6:42pm Subject: Re: Pentagon [OT] I have to say I got sick and tired of footage of a 747 viewed from the ground being shown on the news as "the aircraft heading towards the Pentagon, seconds before impact". The big question after this presentation then is: where did Flight 77 go? The impact explosion footage appears to be of one petrolleum-fuelled, and I don't suppose the Pentagon stores large amounts of gas for internal use on their premises... Aircraft are made mainly of aluminium, which means that when one is completely driven into something, and it combusts, not much is left of it. The pictures of wreckage show are of crashes that had fire crews put out the flames and what is left, mainly struts and thicker structure. The engines tend to survive quite well too, as they are made from titanium, so they should have been in there somewhere. An engine travelling at a few hundred miles per hour can drive quite a distance into a building. If you notice in the Trade Center footage of the second plane hit, one of the engines completely crosses the building and shoots out the opposite end. The combustion is very similar to the one observed in the Pentagon. I'm not saying it's impossible that the whole truth hasn't come out, but I seriously doubt they drove a smaller plane (too much damage for that) or a land vehicle (ground marks?) into it. Regards, Mike Tech Sec Lab wrote: > Well, I hadn't seen this until today. > > I can say this, it wasn't a 757. That's for sure. > > http://www.freedomunderground.org/memoryhole/pentagon.php > > Tragic that the truth will never be known. > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10598 From: Agent Geiger Date: Thu Jan 13, 2005 6:46pm Subject: Re: Pentagon [OT] How about demo charges in the building already? --- Michael Puchol wrote: > I have to say I got sick and tired of footage of a > 747 viewed from the > ground being shown on the news as "the aircraft > heading towards the > Pentagon, seconds before impact". The big question > after this > presentation then is: where did Flight 77 go? The > impact explosion > footage appears to be of one petrolleum-fuelled, and > I don't suppose the > Pentagon stores large amounts of gas for internal > use on their premises... > > Aircraft are made mainly of aluminium, which means > that when one is > completely driven into something, and it combusts, > not much is left of > it. The pictures of wreckage show are of crashes > that had fire crews put > out the flames and what is left, mainly struts and > thicker structure. > The engines tend to survive quite well too, as they > are made from > titanium, so they should have been in there > somewhere. An engine > travelling at a few hundred miles per hour can drive > quite a distance > into a building. If you notice in the Trade Center > footage of the second > plane hit, one of the engines completely crosses the > building and shoots > out the opposite end. The combustion is very similar > to the one observed > in the Pentagon. > > I'm not saying it's impossible that the whole truth > hasn't come out, but > I seriously doubt they drove a smaller plane (too > much damage for that) > or a land vehicle (ground marks?) into it. > > Regards, > > Mike > > > Tech Sec Lab wrote: > > Well, I hadn't seen this until today. > > > > I can say this, it wasn't a 757. That's for sure. > > > > > http://www.freedomunderground.org/memoryhole/pentagon.php > > > > Tragic that the truth will never be known. > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10599 From: Greg Horton Date: Thu Jan 13, 2005 8:07pm Subject: Re: Ruling gives cops leeway with GPS Michael Hammer wrote: > > The answer Greg, is that the issue is about where we as a society draw > the lines (and who should draw them) rather than whether something is > currently legal (or illegal) because of an administrative decision, a > lower court decision, etc. > > I'm a lifelong Goldwater Republican (no Neocon here) and proud of it. > Barry would be rolling over in his grave! > > As someone who handles computer security issues, I work with LEOs at > various levels across a wide range of issues. Sometimes it's something > I bring them and sometimes it's because they approach us (formally > with a subpeona or search warrant and sometimes informally). Some of > the hoops we all jump through for the legalities are just plain silly. > Still, when all is said and done, as a citizen I would prefer to see > some bad guys go free than trample on the privacy and rights of the > average person by eliminating those hoops. I've lived and worked in > countries where survelliance by the government is an everyday thing > and it's not something I would like to see here. I give up a certain > amount of personal privacy because of the nature of the work I do. > That is a choice I make at an individual level. > > Your focus is on the technical nuances rather than the societal and > ethical issues. Your job is to catch bad guys. Your preference is for > things to be structured to make it easier for you to do your job. When > you attach a GPS tracking device to something, it doesn't know the > difference between publicly accessible places and private property. > It's an idiot savant tool. > > Where you stand depends on where you sit. Some books which might help > better frame the issues for you include: > > "World without Secrets" By Richard Hunter (Gartner Analyst, don't hold > it against him ) A quick synopsis can be found at > http://www.csoonline.com/analyst/report230.html > > You could also try reading some of Bruce Schneiers writings (If you > ever have the chance to see Bruce present, he is an awesome mind) Some > of his essays/op ed pieces can be found at: > http://www.schneier.com/essays.html To put his writings in > perspective, Bruce has a long track record in the security field, > specifically in crypto. > > Mike > > Good points Mike, but once again, it is a position that is framed by where you sit. I have been working in law enforcement for 30+ years and I think that the issues for me are framed clearly. You imply that we are all running out and randomly putting trackers on hundreds of people, mostly innocent. Once again, I would submit that even though the tracker is inexpensive to operate, It still does require money to purchase and monitor. But I also said that the tracker is only a very small part of the investigation, and can identify only patterns that the individuals may establish. If I see that Jack is going to the corner of Elm and Birch three times a day, I still have to put that location under surveillance and actually see if there is any crime involved. If a crime was observed, I would still need search warrants to search the car or any house I could establish was involved in the criminal act. Then arrest warrants would be in order, or maybe an arrest for a crime in progress. But to say that cops are wantonly placing placing devices on any Tom, Dick, or Harry is patently false. I read the article in the first website, and although it addresses surveillance issues, it doesn't really talk about putting trackers on cars. I also read "Curb electronic surveillance abuses." by Bruce Schneier and it was interesting and I can agree with his stressing that court issued warrants are a vital part of keeping our nation free. But I just don't think that it applies to the trackers put on vehicles in public places. Would you object to me putting a small IR beacon on the back of a car to follow at night with NVG's? That has been done before. Even Bruce Schneier says that It has always been possible for the police to tail a suspect, and wireless tracking is decades old. The only difference is that it's now much easier and cheaper to use the technology. And goes on to say that: Surveillance will continue to become cheaper and easier -- and less intrusive. (Quotes retrieved from: http://www.schneier.com/essay-043.html ) I think that the "less obtrusive" is the key here. Even though cops use trackers, the case doesn't solve itself and it still requires the use of good old fashioned police work to put a case together. Any way, that is my opinion. I want to thank you Mike for this excellent discussion and for you not engaging in the ad hominem attacks like others on this list. It is a pleasure to discuss very important issues with you. Greg [Non-text portions of this message have been removed] 10600 From: Date: Fri Jan 14, 2005 5:23am Subject: RE: GPS tracking system signal inhibitors Gentlemen, Obviously using such a device would be highly illegal. With a CW signal and 50 mW of RF power the jammer could be easily tracked within 1km using a conventional DF or even "fox hunt" handheld DF (By the way Cubic makes such DF with a similar application in mind). But more elegant jammers do exist. They use low power composite pulse signals. These jammers are practically not detectable from a distance more than 10 meters even with a dedicated equipment. For further technical details ask CIA or KGB. They have developed these devices for their respective diplomats. By the way even with CW signal you do not need 50 mW RF power to jam GPS receiver. For a SiRF and similar direct conversion receiver 50 microwatts would be enough. Even old Rockwell Navcore can be disabled with 5 mW. Well, this is not a "do it yourself" site as our moderator would say so I am closing down. Regards, A.W. Guy Urbina wrote: > > >Hi all, > >With all the recent chatter about GPS tracking, what are the legal >ramifications of owning or selling a small GPS signal inhibitor? > >With the proliferation of GPS trackers seemingly ubiquitous, it seems like >a good idea to prevent unauthorized people from tracking your movements in >a vehicle. > >I've fabricated a few small devices that transmit a CW carrier under 50mw >in the L1 frequency range. (1575.42Mhz) It effectively overdrives the front >end of COTS GPS receivers.(Garmin, SIRF, Motorola etc.) (Most trackers use >L1 receivers in their systems) > >Within a 10' radius, it effectively prevents a GPS receiver from locking on >to get a position fix. Other than getting FCC type approval certification, > >Would these proposed devices be illegal to own or sell? Right now they are >bench prototypes. > >I appreciate any constructive feedback. > >\R > >-Guy > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 10601 From: Javier Villanueva Date: Fri Jan 14, 2005 8:05am Subject: Icom IC-R3 and R20 Hi List, I¥ve been trying unsuccesfully to buy this equipment Online. All of the shops i¥ve found replied they are "out of stock". If any of you sell these, offer "Special modified versions", or know where to find them, i¥ll be grateful. Payment by credit card and express delivery to Mexico a big plus. Most probably this will be just the first buy, with more to come. Thank you very much guys. ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje ElectrÛnico y Seguridad Inform·tica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10602 From: Javier Villanueva Date: Fri Jan 14, 2005 8:08am Subject: Icom ICR3 and ICR20, detail Sorry, on the previous mail i forgot to tell you i was referring to the "unblocked" or "Non-USA" version, without the cellular gap. Thanks again. ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje ElectrÛnico y Seguridad Inform·tica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 10603 From: delta Date: Fri Jan 14, 2005 8:57am Subject: question about border hello everybody do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special authorisation to go outside our country ? may be the rules are different between some country ? many thanks david from paris 10604 From: contranl Date: Fri Jan 14, 2005 4:30pm Subject: Infrared Indicators ( credit card size) . Ran in to this manufacturer of credit card sized infrared indicators...maybe they are usefull for anything ? there's a short demo-video too. http://www.bromba.com/indicare.htm I suppose they need a fair bit of illumination Possibly usefull for : a) Detecting laserbeams ( i would say yes ...since they are concentrated beams with sufficient power left over at your end, best would be a card with as big as possible active area,) b) Detecting infrared illuminators for cameras ( i would say yes ...when you are close enough) c) Detecting infrared mics/bugs using infrared light to transport the audio/video ( you need to be very close to the bug to get enough level i guess) Kodak also makes similar cards and bigger sheets Infrared/Nightvision/Thermal-imagers would do too...probably better. Greets Tetrascanner 10605 From: contranl Date: Fri Jan 14, 2005 4:59pm Subject: Re: question about border . It depends on the local laws of the country you want to enter and the one you want to come back to. You might just ask/phone the customs office at the border. A rule of thumb could be that you consider your equipment as a radio-scanner (if it's a wideband receiver for example) In Belgium for example it is forbidden to have/possess/use a scanner therefore you could conclude that any equipment that could do the same could be forbidden too. In some countries they used to lock you up for bringing a satellite-phone...you had to ask special permission to bring that. To go one step further (overdoing it) you can't bring your NLJD to The Netherlands if it works (transmits)on a non-permitted frequency wich many do To go even one more step further...your equipment might be on the list of "strategic goods" usually that list refers to high level advanced stuff...for example a laser gyroscope or a wideband 100 watt jammer...not the regular TSCM equipment :) Many times they just care about the taxes being paid...so a piece of paper issued by your country's custom-tax-office could be sufficient just make shure you go in and out with the same amount of equipment. Anyway you can't ask this question in general because there is no general answer to it,it all depends on the local authorities and sometimes even on who's on service that day. The above is a little overstated and my advice again would be just ask them ! Tetrascanner 10606 From: Robin Hunter Date: Fri Jan 14, 2005 11:21am Subject: Re: question about border Hi David, depends where you are going, in Russia and a number of former Soviet Bloc countries Customs will impound your equipment and you will probably never see it again, similar problem in a number of African and Middle East countries.. Most western european countires - no problem. Regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. ----- Original Message ----- From: "delta" To: Sent: Friday, January 14, 2005 2:57 PM Subject: [TSCM-L] question about border > > > hello everybody > do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special > authorisation to go outside our country ? > may be the rules are different between some country ? > many thanks > david from paris > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10607 From: Michael Hammer Date: Fri Jan 14, 2005 1:31pm Subject: Re: Ruling gives cops leeway with GPS On Thu, 13 Jan 2005 18:07:29 -0800, Greg Horton wrote: > > > > > Good points Mike, but once again, it is a position that is framed by > where you sit. I have been working in law enforcement for 30+ years and > I think that the issues for me are framed clearly. And that's my point exactly. The issues are framed for you because it impacts you both as a citizen but more importantly as a law enforcement professional. Someone from the Center for Democracy and Technology (www.cdt.org) would almost certainly be against the use of GPS trackers under almost any circumstance. >You imply that we > are all running out and randomly putting trackers on hundreds of people, > mostly innocent. Absolutely not. What I am explicitly stating is that the potential for abuse is there and checks and balances are appropriate as new technology is introduced. One need only read the Federalist papers to see that our founding fathers basically distrusted government power and structured things to limit government power. Who would have thought an Attorney General (John Mitchell) of the United States would go to prison for acts committed while in office? >Once again, I would submit that even though the > tracker is inexpensive to operate, It still does require money to > purchase and monitor. But I also said that the tracker is only a very > small part of the investigation, and can identify only patterns that the > individuals may establish. If I see that Jack is going to the corner of > Elm and Birch three times a day, I still have to put that location under > surveillance and actually see if there is any crime involved. If a > crime was observed, I would still need search warrants to search the car > or any house I could establish was involved in the criminal act. Then > arrest warrants would be in order, or maybe an arrest for a crime in > progress. But to say that cops are wantonly placing placing devices on > any Tom, Dick, or Harry is patently false. > Again, I'm not saying that they are.... I'm saying that there are enough documented cases of individuals trusted with law enforcement abusing capabilities they are entrusted with that this is an issue (both generally and in the specific case of GPS) that deserves a wider discussion and consensus as to where the boundaries should be. We will either get a clear (national) line if this and other cases make it up the food chain to the Supremes or if there is a legislative resolution (going forward). I would put the question to you.... if placing tracking devices on ALL vehicles makes your job easier, why would anyone object? After all, people that have nothing to hide shouldn't care. Clearly, people that have OnStar in their vehicles are willing to allow themselves to be tracked. > I read the article in the first website, and although it addresses > surveillance issues, it doesn't really talk about putting trackers on > cars. I also read "Curb electronic surveillance abuses." by Bruce > Schneier and it was interesting and I can agree with his stressing that > court issued warrants are a vital part of keeping our nation free. But > I just don't think that it applies to the trackers put on vehicles in > public places. Would you object to me putting a small IR beacon on the > back of a car to follow at night with NVG's? That has been done > before. Even Bruce Schneier says that > The article on the first site ( re World without Secrets) doesn't cover as much territory as the book. I highly recommend reading the book even though I disagree with many of his conclusions. It frames the discussion and issues fairly well. As far as a small ir beacon, I would have to think about that and possibly do some research to formulate a position on it. My first reaction would tend towards thinking this should require a court order on the basis that you are doing something to the individuals property in order to track them. This is one of those grey areas as far as I'm concerned. Take a step back and let's frame the issues in the broadest sense. What we (as a society) are really struggling with is how to deal with new capabilities arising from new technologies. What is appropriate and what is inappropriate? Why should we choose one dividing line vs another? On one level, I obviously don't care about personal privacy vis-a-vis the government because more than one government agency has detailed information about me including biometrics/dna....all given up as part of the employment process. As a LEO you would probably have a difficult time getting that data if you could find it at all. On another level I care very much about giving up personal data including surveillence. Just because someone can use a satellite to watch me sit by my lake naked doesn't mean it's a good thing (ugly thing that I am I'd probably crack the lense anyways). > It has always been possible for the police to tail a suspect, and > wireless tracking is decades old. The only difference is that it's now > much easier and cheaper to use the technology. > > And goes on to say that: > > Surveillance will continue to become cheaper and easier -- and less > intrusive. (Quotes retrieved from: > http://www.schneier.com/essay-043.html ) > > I think that the "less obtrusive" is the key here. Even though cops use > trackers, the case doesn't solve itself and it still requires the use of > good old fashioned police work to put a case together. Any way, that is > my opinion. I want to thank you Mike for this excellent discussion and > for you not engaging in the ad hominem attacks like others on this > list. The key quote from Bruces article is really his parting thought. "Much of the rhetoric on the "security" side of the debate cloaks one of its real aims: increasing law enforcement powers by decreasing its oversight and accountability. It's a very dangerous road to take, and one that will make us all less secure. The more surveillance technologies that require a warrant before use, the safer we all are." Here's another related issue for you Greg. Check out this link and tell me what you think (I have a feeling I know where you will come down on this).... http://www.capecodonline.com/cctimes/dnasweep6.htm This (DNA Sweep) deeply troubles me on a couple of levels, particularly the following quote: "Police say it's a voluntary thing, but they will take note of the dissenters. " So, once someone has given up their DNA sample for this specific case (let's assume voluntarily), what will be done with it once they are found not to be the person involved? Will the information be discarded? Absolutely not, that would be destruction of evidence and the defense attorney (assuming someone is brought to trial) would have a field day. So this will in essence become part of a government controlled database and subject to other uses. Do the people involved really know (perhaps they don't understand or care) the extent of the personal information they are giving up? >It is a pleasure to discuss very important issues with you. Likewise. Time to get some work done. Mike 10608 From: Michael Angelo Date: Fri Jan 14, 2005 2:27pm Subject: Re: question about border cowboy delta wrote: hello everybody do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special authorisation to go outside our country ? may be the rules are different between some country ? many thanks david from paris ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? The all-new My Yahoo! ñ Get yours free! [Non-text portions of this message have been removed] 10609 From: Dragos Ruiu Date: Fri Jan 14, 2005 7:02pm Subject: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Anyone used one of these and care to share any experience: http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm Looks like an interesting gadget, tough I haven't found out yet if they want a ridiculous amount of money for it. It would also be interesting to find out if they could produce a variant with a wider sweep range/more agile front end.... (I'm on a quest to find WLAN node directional locators... specifically to find out which out of a few hundred laptops in a big room has a particular mac address and is messing around to other's detriment...) thanks, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, CanadaMay 4-6 2005 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 10610 From: Date: Fri Jan 14, 2005 4:53pm Subject: Re: question about border It's legal, but you might have trouble getting your equipment back in the US. Customs might think you just purchased it elsewhere. You need a customs form which shows you purchased it in the US , or had it already, and took it out of the country with you. You list mfgr, model number and serial number, etc. LARSEN and ASSOCIATES PRIVATE INVESTIGATIONS 18847 N. Alameda Drive Surprise, Arizona, 85387 ph/fax: 623-594-1783 [Non-text portions of this message have been removed] 10611 From: Hawkspirit Date: Fri Jan 14, 2005 10:36pm Subject: GPS Jammer HYPERLINK "http://www.phrack.org/phrack/60/p60-0x0d.txt"http://www.phrack.org/phrack/6 0/p60-0x0d.txt Does anyone know how to decode the schematic? Roger -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.12 - Release Date: 1/14/2005 [Non-text portions of this message have been removed] 10612 From: Charles Patterson Date: Fri Jan 14, 2005 10:47pm Subject: Re: Infrared Indicators ( credit card size) Radio Shack here in the US (do you have Radio Shack in the UK?) used to sell them (maybe they still do). If I recall, you had to "charge it up" by exposing it to a florescent light, then it would glow when ir shined on it. You did have to be pretty close to the source. Main purpose was to test your tv remote. Charles ----- Original Message ----- From: "contranl" To: Sent: Friday, January 14, 2005 5:30 PM Subject: [TSCM-L] Infrared Indicators ( credit card size) > > . > > Ran in to this manufacturer of credit card sized infrared > indicators...maybe they are usefull for anything ? > there's a short demo-video too. > > http://www.bromba.com/indicare.htm > > I suppose they need a fair bit of illumination > > Possibly usefull for : > > > a) > Detecting laserbeams ( i would say yes ...since they are > concentrated beams with sufficient power left over at your end, > best would be a card with as big as possible active area,) > > b) > Detecting infrared illuminators for cameras ( i would say > yes ...when you are close enough) > > c) > Detecting infrared mics/bugs using infrared light to transport the > audio/video ( you need to be very close to the bug to get enough > level i guess) > > > Kodak also makes similar cards and bigger sheets > > Infrared/Nightvision/Thermal-imagers would do too...probably better. > > > Greets > > Tetrascanner > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > > -------------------------------------------------------------------------------- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 10613 From: Andy Moore Date: Fri Jan 14, 2005 0:00pm Subject: Re: question about border David, at a guess, I'd imagine that there would be legal issues in crossing international borders with certain TSCM equipment. Many countries have regulations about possessing equipment which can receive frequencies other than broadcast and most will have rules relating to radio transmission equipment such as NLJDs. Standard ICT test equipment, such as multimeters and butt sets, probably wouldn't attract too much attention but spectrum analysers which reach into 10's of GHz might be subject to arms export regulations (!). All in all, you'd need to check with the countries into which you are importing the equipment - professional import/export handlers may be able to assist. In the face of these risks, you're unlikely to have any problems whatsoever travelling by road within the EU although airport x-rays may result in a detailed inspection by customs! Andy M ----- Original Message ----- From: "delta" To: Sent: Friday, January 14, 2005 2:57 PM Subject: [TSCM-L] question about border > > > hello everybody > do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special > authorisation to go outside our country ? > may be the rules are different between some country ? > many thanks > david from paris > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10614 From: Andy Moore Date: Sat Jan 15, 2005 3:21am Subject: Fw: question about border > David, > at a guess, I'd imagine that there would be legal issues in crossing > international borders with certain TSCM equipment. Many countries have > regulations about possessing equipment which can receive frequencies other > than broadcast and most will have rules relating to radio transmission > equipment such as NLJDs. Standard ICT test equipment, such as multimeters > and butt sets, probably wouldn't attract too much attention but spectrum > analysers which reach into 10's of GHz might be subject to arms export > regulations (!). All in all, you'd need to check with the countries into > which you are importing the equipment - professional import/export handlers > may be able to assist. In the face of these risks, you're unlikely to have > any problems whatsoever travelling by road within the EU although airport > x-rays may result in a detailed inspection by customs! > > Andy M > > ----- Original Message ----- > From: "delta" > To: > Sent: Friday, January 14, 2005 2:57 PM > Subject: [TSCM-L] question about border > > > > > > > > hello everybody > > do you know if it is legal to pass the border with some tscm equipment ( > cpm700 oscor tdr etc ... ) or if we need a special > > authorisation to go outside our country ? > > may be the rules are different between some country ? > > many thanks > > david from paris > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > 10615 From: Michael Puchol Date: Sat Jan 15, 2005 5:03am Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Hi, I've yet to either see one operating or know of someone that has one or has seen one operating. I believe this device to be more a stunt for the other products the company makes, than something tangible. The device is way too expensive (they charged twice the going price for the PDA alone, for example). If you need to do surveys like you mention, you can do with AirMagnet and a Cisco 350 card with MMCX antenna jacks - then you can connect a small 2.4GHz handheld yagi and attenuators to it, and do the hunting. AirMagnet costs some $2.5k last I looked, but it's quite an impressive little package, I have seen it operating and I have used it quite a few times myself. The BumbleBee does not demodulate data at all, which means that you cannot really tie a signal to a particular computer/MAC address without further manual inspection. With AirMagnet you can set a filter to capture only packets coming from a particular MAC address, and thus hunt for it in confidence. If you are not concerned about using commercial tools, you can flash an iPAQ with Linux and use the vast array of tools available for it. Regards, Mike Dragos Ruiu wrote: > > Anyone used one of these and care to share any experience: > > http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm > > Looks like an interesting gadget, tough I haven't found out > yet if they want a ridiculous amount of money for it. > > It would also be interesting to find out if they could produce a > variant with a wider sweep range/more agile front end.... > > (I'm on a quest to find WLAN node directional locators... > specifically to find out which out of a few hundred laptops > in a big room has a particular mac address and is messing > around to other's detriment...) > > thanks, > --dr > 10616 From: contranl Date: Sat Jan 15, 2005 5:34am Subject: Re: GPS Jammer . The complete and readable circuit and more other hot and iligal stuff used to be here: (i have seen it) http://www.dafh.org/gbppr/mil/gps/gps_jammer.png currently the're offline...maybe forever...(not necessarly when they were online it took a minute to see a page) Allthough i would'nt be surprised if they are really gone now The main page can still be found in google's cache: http://www.google.nl/search?q=cache:RiNkf9RKl- EJ:www.dafh.org/gbppr/mil/gps/+gps+jammer+png&hl=nl Maybe you can find it spending a few ours of research on the net possibly someone has copied it...try to put the properties of the links back in to google maybe it's cached somewhere Tetrascanner From: A Grudko Date: Sun Jan 13, 2002 4:11am Subject: Re: CELLULAR DETECTOR - Original Message - > MICRO-CELLULAR DETECTOR > Detection range: 5 Mhz - 2.6 Ghz Mmmm - more psudo technical "Janglish". Now I'm even more sceptical about the Star Tac scrambler. Sounds like a diode detector I had in the mid 80's, possibly crossed an RF cellphone ring detector. > ... risky 5 mhz to 2.5 ghz radio frequencies within reach ( hidden transmissions of > your conversations) created by your cellular telephone. I'd like to see a better explanation of the 'risk' before I fork out $480. > so that if the cellular phone emits a hidden hidden? > transmission of your > conversation, when it is in stand-by mode ( when it should not transmit > data) data? >, the Micro- Detector will adopt adopt? > the RF emitted by the cellular phone > This is an equipment that can detect and alert you about the most simple to > the most sofisticated tappings of cellular telephones as intruder microphones. Hey, jma, now you throw away most of those 2 tons of equipment > When the batteries of cellular telephones are removed during > meetings, this is no guarantee that the conversation that is taking place > is not being transmitted to a third party No battery? > since with today?s technology it > is very easy to place a microphone that transmitts at a distance of up to > 500 m. With the Micro- Detector you are able to confirm, after you have > removed the batteries, that no cellular phone is transmitting a > confidential conversation I think we can confirm that a cellphone with no power source is not transmitting without having to buy any toy. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4534 From: A Grudko Date: Sun Jan 13, 2002 11:56am Subject: Re: Re: Cellular Scramblers - Original Message - > Go to CDMA and you're safe from virtually anything not covered > by a Title III court order served on the service provider. More acronyms... Who or what are CDMA? Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" 4535 From: Miguel Puchol Date: Sun Jan 13, 2002 2:45pm Subject: Re: Re: Cellular Scramblers Hi Andy, CDMA = Code Division Multiple Access. It's used in cellular systems in the U.S. Qualcomm is rumoured to have bought some of Dolphin's licenses for European TETRA, to install CDMA systems instead. They already use it in their GlobalStar satphone network - I think they designed it if my memory serves me right... Take a look at a simple comparison between TDMA (used by GSM for example) and CDMA at: http://home.san.rr.com/denbeste/cdmatdma.html All the best, Mike ----- Original Message ----- From: "A Grudko" To: Sent: Sunday, January 13, 2002 6:56 PM Subject: Re: [TSCM-L] Re: Cellular Scramblers > - Original Message - > > Go to CDMA and you're safe from virtually anything not covered > > by a Title III court order served on the service provider. > > More acronyms... Who or what are CDMA? > > Andy Grudko > D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 > International business intelligence and investigations - ICQ 146498943 > Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 > 0255 - 244 0256 (Fax) > SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom > When you need it done right - first time > "Richard Milhouse Nixon was the first US president whose name contains all > the letters from the word "criminal." The second? William Jefferson Clinton" > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4536 From: Justin T. Fanning Date: Sun Jan 13, 2002 3:44pm Subject: Re: Re: Cellular Scramblers I don't understand why the encryption isn't done in the phone's own software. Most modules offered by various companies approach from the analogue prospective, but when you consider the phone itself is a miniature computer, why aren't companies producing modified OS ROMs that encrypt after the speech encoding stage. It would take just a few extra CPU cycles to push the byte value of the encoded audio through a cypher. (Taken to the extreme, you could even have handsets exchanging keys at the beginning of each call!) Providing you didn't modify the GSM/CDMA packet structure only the packet payload, this would seem a far more secure & simplistic approach than external analogue hardware. JF 4537 From: James M. Atkinson Date: Sun Jan 13, 2002 11:19pm Subject: Re: Re: Cellular Scramblers The problem is two-fold. First of all, when you ENCRYPT a signal you are breaking it down into a digital form, then mixing in a "key" and in so doing profoundly changing both the nature and structure of the original signal. Then the encrypted data is converted back into it digital; form for transmission. The problem with encrypting the signal is that you loose bandwidth, and you can either take the performance hit, increase bandwidth, or perform some black magic to "fake out" the missing bandwidth. SCRAMBLING on the other hand does not profoundly change both the nature and structure of the original signal. Instead we add a signal, shift a signal, subtract a signal, sync a signal, or some variation thereof. In some cases of "advanced scrambling" we can chop up the signal in both the time and frequency domain, and then move the sequence around, but not actually change the structure of the content (just make it annoying to the eavesdropper). Now with cellular telephones simply swapping keys would do nothing more then amuse the eavesdropper. What you would have to do is preload each phone with a matching set of ciphering keys, then at the beginning of the call (and at several points during the call) the phones negotiate which keys they will use. Since no key is EVER transmitted over the air (only and index or key bank address number is used in the negotiation). Since the only two people or phones (we hope) have the matching key banks in the two phones, the two users should be a very high level of privacy. Next we need a strong ciphering algorithm (without backdoors), and a data stream randomizing engine just prior to, and just after the encryption engine. On top of these we need constantly refreshed ciphering keys issued by a trusted source, and kept under rigid security. All of this is expensive, complicated, and moderately time consuming. When people want secure communications they should go to their hardwired lines, and not use a phone with an antenna unless they have some wicked good ciphering (not SCRAMBLING... but ENCRYPTION). -jma At 9:44 PM +0000 1/13/02, Justin T. Fanning wrote: >I don't understand why the encryption isn't done in the phone's own >software. Most modules offered by various companies approach from the >analogue prospective, but when you consider the phone itself is a >miniature computer, why aren't companies producing modified OS ROMs >that encrypt after the speech encoding stage. It would take just a >few extra CPU cycles to push the byte value of the encoded audio >through a cypher. (Taken to the extreme, you could even have handsets >exchanging keys at the beginning of each call!) Providing you didn't >modify the GSM/CDMA packet structure only the packet payload, this >would seem a far more secure & simplistic approach than external >analogue hardware. > > >JF -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4538 From: A.Lizard Date: Sun Jan 13, 2002 4:32pm Subject: re: Cellular Scramblers At 08:44 PM 1/13/02 +0000, you wrote: >Message: 3 > Date: Sat, 12 Jan 2002 21:40:52 -0800 > From: Hawkspirit >Subject: Cellular Scramblers > >Anyone know how effective these scramblers are? > >CELLULAR SCRAMBLER > > > >SPECIFICATIONS >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm >Audio range: 300 up to 3000 Hz >Telephone lines: Cellular >Consumption: 5 Vdc, 80 mA of the battery >Stand-by consumption: 5 Vdc, 80 mA of the battery > >Selling Price: $5800 >Prod. Code: HS-7000 > > > >Security level: III ( High security) >Hop rate: up to 150 times per second It would be more cost-effective for you to get a laptop, a cellular modem, and download a free copy of PGPfone from http://www.pgpi.org . You can decide for yourself whether or not the security level is better from the clear and explicit information presented there on how it works. The advice "don't bet your life on it" is appropriate in either the device you describe or the one I am suggesting you consider instead. Plus, of course, you can use the laptop to play Solitaire or run Excel or read this mailing list via modem connection from when you aren't transmitting SECRET messages. :-) A.Lizard ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4539 From: William Knowles Date: Mon Jan 14, 2002 1:53am Subject: Re: Cellular Scramblers On Sat, 12 Jan 2002, Men in black helicopters forced Hawkspirit to write: > Anyone know how effective these scramblers are? > > CELLULAR SCRAMBLER > > SPECIFICATIONS > Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > Audio range: 300 up to 3000 Hz > Telephone lines: Cellular > Consumption: 5 Vdc, 80 mA of the battery > Stand-by consumption: 5 Vdc, 80 mA of the battery > > Selling Price: $5800 > Prod. Code: HS-7000 > > This scrambling system is used by top entities and companies, > where nowadays information is the most valuable asset. > > These cellular scramblers are sold only by pairs. So effectively we're talking about $11,600? If you are going to pick two of these bad boys up, I have a friend selling airport concessions at Kandahar Airport. I hear rumblings that Afghanistan is supposed to be the next hot tourist destination! - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4540 From: David Alexander Date: Mon Jan 14, 2002 3:24am Subject: column titles for Steve How about "Is something bugging you ?" "Scope me in" "Don't sweep it under the carpet" "Sweep dreams" "News sweep" "For the recording" David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4541 From: Justin T. Fanning Date: Mon Jan 14, 2002 3:49am Subject: Re: re: Cellular Scramblers I was thinking along similar lines when I wrote my last post about modifying the on board software. It would be much simpler to wire a handheld/pocket PC running Windows CE (or similar) to a cell phone for use as an external (analogue) crypto device (and for a fraction of the cost of a dedicated unit). A cell phone & pocket PC would easily fit into the same pocket and used in conjunction with a personal hands free kit would look totally normal to any observer. Of course, if you are communicating only to known parties, you could dump the cell phone all together and get a PCMCIA cellular card (http://www.nokia.com/phones/cellularcard/index.html and http://www.nokia.com/phones/cardphone2_0/index.html) for your pocket PC and plug your personal hands free directly into the PC and simply establish GSM data calls between the pocket PC's using PGPfone or the voice over IP encryption software of your choice. I think it was commercially silly that Nokia didn't use an established OS in their 9110/9210 range of "communicator" phones, but instead went with a proprietary OS. I think it's only a matter of time until we see pocket pc's running Windows CE and other common OS's and cell phones merge, then strong mobile crypto will simply become the norm, making the whole concept of a cellular wiretap of limited use. You would still get the raw pen register & location data, but not the call audio. Once your already operating in the digital domain, adding a strong crypto engine is extremely easy and can of course all be done in software at little to no cost. Just before I finish, I note Nokia is about to release a phone with a built in digital camera, 640 x 480 still capture with store & forward capability the Nokia 7650 (http://www.nokia.com/phones/7650/index.html) I believe similar technology has been in use in Asia for some time, but this will be the first mainstream release of it in the west. I wonder if these will start turning up on sweeps concealed in other devices with modified lenses or used as the transport end of a remote camera setup... JF --- "A.Lizard" wrote: > > At 08:44 PM 1/13/02 +0000, you wrote: > >Message: 3 > > Date: Sat, 12 Jan 2002 21:40:52 -0800 > > From: Hawkspirit > >Subject: Cellular Scramblers > > > >Anyone know how effective these scramblers are? > > > >CELLULAR SCRAMBLER > > > > > > > >SPECIFICATIONS > >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > >Audio range: 300 up to 3000 Hz > >Telephone lines: Cellular > >Consumption: 5 Vdc, 80 mA of the battery > >Stand-by consumption: 5 Vdc, 80 mA of the battery > > > >Selling Price: $5800 > >Prod. Code: HS-7000 > > > > > > > >Security level: III ( High security) > >Hop rate: up to 150 times per second > It would be more cost-effective for you to get a laptop, a cellular modem, > and download a free copy of PGPfone from http://www.pgpi.org . You can > decide for yourself whether or not the security level is better from the > clear and explicit information presented there on how it works. The advice > "don't bet your life on it" is appropriate in either the device you > describe or the one I am suggesting you consider instead. > > Plus, of course, you can use the laptop to play Solitaire or run Excel or > read this mailing list via modem connection from when you aren't > transmitting SECRET messages. :-) > > A.Lizard > ************************************************************************ > new voicemail number,ask if you need it. > Personal Web site http://www.ecis.com/~alizard > Disaster prep info: http://www.ecis.com/~alizard/y2k.html > Littleton Killings: http://www.ecis.com/~alizard/littleto.html > backup address (if ALL else fails) alizard@o... > IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the > new version with the bug fixed is available NOW. > PGP 6.5.8 key available by request,keyserver,or on my Web site > For e-mail privacy, download PGP from http://www.pgpi.org > PGPfone v1.02 and v2.1 available for secure voice conferencing, get > your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ > ************************************************************************ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4542 From: Miguel Puchol Date: Mon Jan 14, 2002 10:23am Subject: Re: re: Cellular Scramblers Hi Justin, > Of course, if you are communicating only to known parties, you could > dump the cell phone all together and get a PCMCIA cellular card > (http://www.nokia.com/phones/cellularcard/index.html and > http://www.nokia.com/phones/cardphone2_0/index.html) for your > pocket PC and plug your personal hands free directly into the PC > and simply establish GSM data calls between the pocket PC's using > PGPfone or the voice over IP encryption software of your choice. That would be a nice setup - the problem I see is that PocketPCs (with the possible exception of the iPAQ) have rather limited processors and memory, and coding, scrambling, encrypting & sending audio via the network protocol stack (and viceversa) would probably make them spontaneously combust. In any case, the GSM encryption algorithm is reasonably secure for the average user, but as wisely pointed out, not against a court order (or unauthorised tap), or someone with enough resources. > I think it was commercially silly that Nokia didn't use an established > OS in their 9110/9210 range of "communicator" phones, but instead went > with a proprietary OS. I think it's only a matter of time until we > see pocket pc's running Windows CE and other common OS's and > cell phones merge, then strong mobile crypto will simply become the > norm, making the whole concept of a cellular wiretap of limited use. > You would still get the raw pen register & location data, but not the > call audio. Once your already operating in the digital domain, adding > a strong crypto engine is extremely easy and can of course all be done > in software at little to no cost. The Nokia 9210 uses a Crystal EPOC OS, which can be programmed via the free SDK provided by Nokia, which includes C++ and Java environments. Even so, this phone is also RAM and processor limited, so intensive tasks tend not to run too well. > Just before I finish, I note Nokia is about to release a phone with a > built in digital camera, 640 x 480 still capture with store & forward > capability the Nokia 7650 (http://www.nokia.com/phones/7650/index.html) > I believe similar technology has been in use in Asia for some time, > but this will be the first mainstream release of it in the west. I > wonder if these will start turning up on sweeps concealed in other > devices with modified lenses or used as the transport end of a remote > camera setup... Other solutions already exist for this, although more cumbersome. I expect any such unit found on a sweep will be a very nice and expensive gift :-) Cheers, Mike 4543 From: Hawkspirit Date: Mon Jan 14, 2002 11:39am Subject: Re: Theory (brought to mind by Comsec C3I discussion) Jim, As I have mentioned before I really don't care for digital test equipment for analog testing because of resolution losses due to quantizing. So my comment here are relative to my Tektronix 1503. It has been my experience with TDR, that the off hook steady state bias of 48 volts DC is the best case live line status for TDR measurement. At this time the 48 volts is a non interfering steady state DC bias. Inducing line current will not change the impedance parameters along the loop ( until it triggers the CO terminating card into off hook status) or improve TDR resolution. If you cross over into off hook status, then you have to deal with dial tone and source signals which is a problem. I don't know if taking fast time slice frames is really going to give you any resolution improvement. I currently don't have the capability to take triggered time slice measurements, but when I have used this technique it provided minimum resolution because of the shortness of interval. I prefer normal TDR real time renewal pulses and their averaging displays. As far as I know, termination card status will not radically effect the impedance vs distance line characteristic of the loop. A termination card is only a problem when it is sending back signals i.e. dial tone, voice, data. The only thing this technique (crossover measurement) might do is buy you better TDR resolution by limiting terminating card interference but I don't see how. You may shift the signal source impedance by activating the terminating card at the CO but once again, a TDR charts impedance at points of distance along the wire. Termination is but another impedance point to be described by its status at the time of measurement . Roger www.bugsweeps.com At 9:18 AM -0800 1/11/02, Hawkspirit wrote: >From: "James M. Atkinson" > >"What I am in interested in the electrical behavior of a line during >the loop relay seizing the line, and releasing it, and more >specifically the "overshoot" areas of the signal. >I am also interested in the frequencies that appear right at the >moments of making, and then of breaking the line." > >Jim, Could you amplify on this, what kind of line behavior, in what form of >result, would indicate what form of intercept? Thanks, Roger Sure, First I apply a slowly increasing resistance to the line until I seize the line. I repeat this several times until I have a fairly good calculation of the amount of current i need to get flowing to size the line, and the delay between the current draw and the seizure. I then sync my TDR to the circuit so that I start pounding the line with TDR pulse as I approach the seizing current. I then disregard the TDR pulses gathered just prior to the seize so that I am actually looking at TDR pulses during the zero crossing (when it should be really quiet). I can usually grab several hundred usable "pings" during the transition period, and have found it helpful for each "ping" to have a slightly offset rise/fall time or pulse width. The whole goal is to force a predictable zero crossing, and shoot pings into the line during the zero crossing. I start with a 5 pico second ping (using a high energy 90 volt tunnel diode), and slowly increase the rise time and/or pulse width to several milliseconds as I look down the line. I am not using a "sampling" circuit, but actually digitizing and capturing the TDR wave forms directly into a laptop in real time. This way I can see "mouse feces" laying against the wire, and can see any kind of resistive, inductive, or capacitive breach with some extreme resolution. The further down the line I am looking the less the resolution and the wider the pulses. If I can get two lines on the same cable I can ping on one line, and listen to the crosstalk of the signal on the other pair, I can also split the pairing and shoot them that way as well (while in transition). Either way the goal is to locate where the twisting of the pair has been compromised, and not just look for resistive faults. Most sweep methods are obsessed with finding resistive devices in series with the line, or some variation thereof. Sadly, the methods used to find resistive devices are worthless in finding something that is capacitively or inductively isolated (most professional eavesdropping devices are 10-40+ megaohms of impedance, or isolated in such a way that a regular TDR is worthless). The "virgin pair' vs "split pair" TDR will find any kind of inductive coupling on the line (of more then one loop), but you have to do it during the zero crossing. Inductive loading of less then one loop (such as in the case of a linear ferrite pickup) your going to have sweep more then the two wires your looking at (you need a total of four conductors, plus a good ground). Crosstalk analysis will detect any kind of separation or disturbance of the pairs of more then a mm, or even disturbance of the wire insulation (but you have to do it during the zero crossing). It's also helpful to "listen in" to the line with both an audio amp, AND a spectrum analyzer. After you have performed your regular non alerting phone sweep... disconnect the load (or phones), then "listen" to the line with a high impedance audio amp (like Kaisers 1059 or Alan's uAmp), then slowly tune something like the SCD-5 across the line. Next connect your AUDIO (100 Hz to about 10 kHz) spectrum analyzer to the line (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of control or command tones such as DTMF-C, 2100 Hz, etc (typically appearing as crosstalk). Then switch your your RF spectrum analyzer (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of RF present on the line. Hint: if someone attaches a transmitter to the line some of the RF will bleed back over the line and you will be able to see it.... however your going to have to "tune" the line to see it reliably. The determine how much current draw you need to seize the line card (remember the phone system works on current draw, not voltage) and bounce some TDR pulses down the line during the zero crossings to see what a regular wet line TDR might miss. The key in all of this is your ability to match the impedance of the line during the transition. This is not just a case of "cranking up the voltage", but one of "tuning up the TDR circuit" though a variable capacitor/varistor and resistor/inductor. You want a near perfect coupling between the TDR (or pulse generator) and the line. To look at it another way, consider that the line is an antenna, and you want a perfect impedance match between a radio, the feed line, and the antenna so you can maximize the signal your giving off or collecting. If you simply crank up your transmit power, but have a bad feed line all you will end of doing is heating up some wire. On the other hand if the feed line has a near perfect match to the radio, and the antenna has a near perfect mach to the feed line all kinds of wonderful things can be done. If you go one step further and fiddle with the antenna and use it at its precise resonant frequency you can work the world with just a small amount of power. Along the same lines if you filter out all the thunder-lizards, tune up your antenna, use good feed lines, and have a good LNA on the antenna you can hear extremely low poer things many thousands of miles away. Now, we take this and apply it to sweeping phone lines: First we find the "quietest time" on the line, which is during the transition point (the loop voltage and dial tone is our thunder lizard). Next we match the impedance of our TDR to the line impedance. Then we "tune" the line by bouncing TDR pulses down the line (with various pulse widths and rise times) while we tweak a capacitor/varactor for clean return (sort of like adjusting an SWR meter). The end result is a super precise series of pulses, clean TDR wave forms, and the exact position of anomalies along the line (including mouse feces touching the line). -jma 4544 From: James M. Atkinson Date: Mon Jan 14, 2002 1:38pm Subject: 2002 Darwin Awards It's that time again! The awards this year are classic. These awards are given each year to bestow upon (the remains of) that individual, who through single-minded self-sacrifice, has done the most to remove undesirable elements from the human gene pool. 5th RUNNER-UP Goes to a San Angelo, California man who died when he hit a lift tower at the Mammoth Mountain ski area while riding down the slope on a foam pad. The 22-year old David Hubal was pronounced dead at Central Mammoth Hospital. The accident occurred about 3a.m., the Mono County Sheriff's department said. Hubal and his friends apparently had hiked up a ski run called Stump Alley and undid some yellow foam protectors from lift towers, said Lt. Mike Donnelly of the Mammoth Lakes Police Department. The pads are used to protect skiers who might hit towers. The group apparently used the pads to slide down the ski slope and Hubal crashed into a tower. It has since been investigated and determined the tower he hit was the one with its pad removed. 4th RUNNER-UP Goes to Robert Puelo, 32, was apparently being disorderly in a St. Louis market. When the clerk threatened to call the police, Puelo grabbed a hot dog, shoved it into his mouth and walked out without paying. Police found him unconscious in front of the store. Paramedics removed the six-inch wiener from his throat where it had choked him to death. 3rd RUNNER-UP Goes to poacher Marino Malerba of Spain, who shot a stag standing above him on an overhanging rock and was killed instantly when it fell on him. 2nd RUNNER-UP "Man loses face at party." A man at a West Virginia party (probably related to the winner last year, a man in Arkansas who used the ..22 bullet to replace the fuse in his pickup truck) popped a blasting cap into his mouth and bit down, triggering an explosion that blew off his lips, teeth, and tongue. Jerry Stromyer, 24, of Kincaid, bit the blasting cap as a prank during the party late Tuesday night, said Cpl. M.D. Payne. "Another man had it in an aquarium hooked to a battery and was trying to explode it." "It wouldn't go off and this guy said I'll show you how to set it off." He put it into his mouth, bit down and it blew all his teeth out and his lips and tongue off, Payne said. Stromyer was listed in guarded condition Wednesday with extensive facial injuries, according to a spokesperson at Charleston Area Medical Division. "I just can't imagine anyone doing something like that," Payne said. 1st RUNNER-UP Doctors at Portland University Hospital said an Oregon man shot through the skull by a hunting arrow is lucky to be alive and will be released soon from the hospital. Tony Roberts, 25, lost his right eye last weekend during an initiation into a men's rafting club, Mountain Men Anonymous (probably known now as Stupid Mountain Men Anonymous) in Grant's Pass, Oregon. A friend tried to shoot a beer can off his head, but the arrow entered Robert's right eye. Doctors said that had the arrow gone 1 millimeter to the left, a major blood vessel would have been cut and Roberts would have died instantly. Neurosurgeon Doctor Johnny Delashaw at the University Hospital in Portland said the arrow went through 8 to 10 inches of brain with the tip protruding at the rear of his skull, yet somehow managed to miss all major blood vessels. Delashaw also said that had Roberts tried to pull the arrow out on his own he surely would have killed himself. Roberts admitted afterwards that he and his friends had been drinking that afternoon. Said Roberts, "I feel so dumb about this." No charges have been filed, but the Josephine County district attorney's office said the initiation stunt is under investigation. Now THIS YEAR'S WINNER. (The late) John Pernicky and his friend, (the late) Sal Hawkins, of th great State of Washington, decided to attend a local Metallica concert at the George Washington amphitheater. Having no tickets (but having had 18 beers between them), they thought it would be easy to "hop" over the nine foot fence and sneak into the show. They pulled their pickup truck over to the fence and the plan was for Mr. Pernicky, who was 100-pounds heavier than Mr. Hawkins) to hop the fence and then assist his friend over. Unfortunately for (the late) Mr. Pernicky, there was a 30-foot drop on the other side of the fence. Having heaved himself over, he found himself crashing through a tree. His fall was abruptly halted (and broken, along with his arm) by a large branch that snagged him by his shorts. Dangling from the tree with a broken arm, he looked down and saw some bushes below him. Possibly figuring the bushes would break his fall, he removed his pocket knife and proceeded to cut away his shorts to free himself from the tree. Finally free, Mr. Pernicky crashed into holly bushes. The sharp leaves scratched his ENTIRE body and now, without the protection of his shorts, a holly branch penetrated his rectum. To make matters worse, on landing, his pocket knife penetrated his thigh. Mr. Hawkins, seeing his friend in considerable pain and agony, threw him a rope. Intended pull him to safety by tying the rope to the pickup truck and slowly driving away. However, in his drunken haste/state, he put the truck into reverse and crashed through the fence landing on his friend and killing him. Police arrived to find the crashed pickup with its driver thrown 100 feet from the truck and dead at the scene from massive internal injuries. Upon moving the truck, they found John under it half-naked, scratches on his body, a holly stick in his rectum, a knife in his thigh, and his shorts dangling from a tree branch 25-feet in the air. ... Congratulations gentlemen, you win... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4545 From: James M. Atkinson Date: Mon Jan 14, 2002 9:17pm Subject: Estimate Worksheet Updated For those list members who are interested in such things... I have just updated and uploaded our current "Estimate Worksheet" to the website, and would be happy to get comments and feedback from the list concerning it. It can be found at: http://www.tscm.com/estimate.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4546 From: Guy Urbina Date: Mon Jan 14, 2002 11:59am Subject: Steve's column name Hi Steve, Here's mine off the top of my head....... "Sigint suggestions" "Wired wisdom" best regards, -Guy 4547 From: tek492p Date: Mon Jan 14, 2002 11:13pm Subject: Re: attacking CCS To the group -- I agree 100% with Steve Uhrig. For more information about CCS, go to the top of the "Messages" page, and do a "search" on CCS. Jack 4548 From: Justin T. Fanning Date: Sat Jan 15, 2028 3:07am Subject: Re: Steve's column name Hi Steve, how about "Bugger off!" "Stop bugging me!" "The bug swatter" "Bug eyed" "Bug spray" "A Bug's life" Hope this helps ... JF 4549 From: Dave Emery Date: Tue Jan 15, 2002 1:36am Subject: Re: Re: Theory (brought to mind by Comsec C3I discussion) On Mon, Jan 14, 2002 at 09:39:14AM -0800, Hawkspirit wrote: > Jim, > activating the terminating card at the CO but once again, a TDR charts > impedance at points of distance along the wire. Termination is but another > impedance point to be described by its status at the time of measurement . > Roger > www.bugsweeps.com As an engineer with an academic interest in TSCM but no actual practical experiance in that business but with significant rf and measurement experiance in various other areas over the years including design of high speed digital PC boards and networking devices and EMI control, I have to say that what you have to say makes much more sense to me than what Jim says. I cannot see why the status of line card relays or their modern solid state equivalent at the end of a transmission line should make any difference at all in the echos bounced back from discontinuities in the line in response to a pulse that has not even reached the end of the wire at the time the echoes are measured and recorded. Simple physics and the speed of light suggest otherwise. I suppose, just as you say, that various AC signals on the line might contaminate the measurement with various sorts of noise (but most tones and signalling found on a phone line are very very low in frequency compared to the echoes seen on a TDR). But the presence or absence of a particular terminating network should make no difference. There is a technique that has seen increasing use with cabling in communications systems where there are frequency selective networks that make traditional unit impulse based TDR impractical - FFT based sweep probing. This operates by injecting a swept carrier and measuring the complex return signal precisely (eg amplitude and phase). From the actual return signal and known exciting signal it is actually possible to derive - using a FFT - much the same impedance versus distance chart as a classical radar like TDR yields. I suppose that for such slow sweeps of a line it would be helpful to have a well behaved termination or even no termination on the other end, but unless I am confused it seems to me that TSCM techs use classical unit impulse type TDR radars rather the swept CW techniques (which are more like SAR radar). But one of the reasons I read the TSCM list is to learn of the technology used by actual practitioners in the field and perhaps I miss some subtlety of Jim's technique and the theory behind it. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 4550 From: Steve Uhrig Date: Tue Jan 15, 2002 8:45am Subject: Re: Theory - TDR Once upon a midnight dreary, Dave Emery pondered, weak and weary: > I cannot see why the status of line card relays or their modern > solid state equivalent at the end of a transmission line should > make any difference at all in the echos bounced back from > discontinuities in the line in response to a pulse that has not > even reached the end of the wire at the time the echoes are > measured and recorded. Simple physics and the speed of light > suggest otherwise. I haven't been following the thread, so if my response seems out in left field, it probably is. The ideal situation when using a TDR in TSCM is to have the TDR set to the impedance of the line under test (not many machines have the ability to set this parameter), then to see anything on the line you want an impedance mismatch --- of the fault or whatever you are looking for -- to be as miserable as possible. The most difficult thing to see on a TDR is a splice with perfect impedance match. The easiest thing to see is the grossest mismatch, like a short or an open. Zero impedance or infinite impedance. Re terminating at the CO -- seems a moot point since there is a lot of garbage, like loading coils, between the our end of the line and the CO, which we cannot read through. Speed of light -- in free space -- is different than in a conductor. You can't use the same formulas without introducing a correction factor called Velocity of Propogation (VOP), or velocity factor to the old buzzards. 1 is the speed of light. Speed in a conductor is something less than the speed of light, so you set the VOP on the TDR to whatever it is for the particular line under test, always a factor less than zero. 0.88, or 0.66 are typical for different types of coax, for example. Especially if you are trying to get a precise distance from the TDR to a fault, you need an accurate velocity factor. Some people leave the TDR set to a fixed value all the time, like .66 as a default for twisted pair phone line. It doesn't matter a whole lot in many cases, as the machine can measure a lot more accurately than you can. You can't precisely measure a line up a wall, down a hallway, between floors and all around, to where hundredths of a point of velocity factor matter. Velocity factor is different for each different type of cable. If you are running new cable, it will be listed in the manufacturer's spec sheet for the cable. I insist on marking it on the spools of all cable we have in stock, so I don't have to remember it or look it up later if all I want to do is see how much string is left on the spool. And once the cable leaves the factory and enters the real world, the velocity factor starts changing. Not by much, or quickly, but a 10 year old piece of coax running up the tower will read noticeably different than what the spec says it should be for Andrews Type XYZ hardline. If all this is completely irrelevant to the subject being discussed before I stuck my nose in, I apologize. Anyone who has the time -- there is a need for a good TDR tutorial specifically for TSCM, starting at the "see Spot Run" level. The few other people whpo have written books have gone down in history and helped many people. Glenn's stuff and Ted Swift's stuff are good examples. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4551 From: Date: Tue Jan 15, 2002 1:17pm Subject: re Steves column. " The Straight Line On Surveillance" " The Straight Line on Surveillance Technology" ,as in direct line from horse's mouth, ,as in " Don't cross this legal line,re do's and dont's' ,as in " line of privacy rights" ,as in phone line That's all i can come up with at this moment, although, i think the list members have some good ideas. Maybe ,a different title every week! That sounds interesting! HAVE A GREAT DAY !!! 4552 From: Rafail Kapustin Date: Tue Jan 15, 2002 0:43pm Subject: Re: Re: Attacking CCS? Yes, exactly that Hi everyone, I would like to thank Steve for very detailed reply regarding CCS equipment - it will save starters in a field like me from making a mistake. Thank you Rafail --- Steve Uhrig wrote: > Once upon a midnight dreary, david_johnrobinson > pondered, weak and weary: > > > Two things hit me regarding this listing; A) so > what is new? this > > stuff has been out there advertised for years. B) > Why does every > > one immediatly jump and say CCS? > > Because some of us have been around a long time and > have seen > this stuff over and over and over. I'm talking > longer than some > of the players in this industry have been alive and > longer than > practically anyone in the industry has been in > business. > > > Let me put my cards on the table, I was the > operations > > manager for CCS for a time here in London > > Then pardon me for being forthright, but either you > were > incredibly naive or you are a crook. > > > and they realy do not deserve the bad mouthing > they get from > > the group, > > See comment above. If you really believe this, I > will go with > naive. > > > OK so most of the stuff they provide is "crap" > from a > > professional point of veiw, but to most of their > clients it's > > exactly what they want > > One could make the same argument about illegal drugs > or > abortion. That doesn't justify it. > > > Any one wanting professional equipment would > /should come to > > professional suppliers like our company Department > Q who only > > deal with Government level bugs , covert equipment > and GSM > > tracking. > > Now I will change my opionion back to crook. > > If you only deal with 'Government level bugs', why > are you > inviting anyone to come to you. Do you claim to be > supplying > 'Government level bugs' to anyone? In the unlikely > event you > supply anything at all, I would expect it would be > to anyone > *other* than the government. > > Remember, there are a (very) few people around who > actually work > in these technologies, with government clients on a > daily basis, > and cannot be fooled. Most of them are smarter than > me and keep > their mouths shut. I speak my mind. > > > I don't think it is CCS for several reasons > > > > For all the reasons you mention, it absolutely fits > the pattern > of CCS. Lie to someone with money, schmooze them, > pump up their > egos and convince them they will make outrageous > profits dealing > with CCS. The ignorant fool (and ANYONE who deals > with CCS/G-COM > in ANY way is an ignorant fool) hands CCS five or > six figures > for the 'privilege' of acquiring their absolutely > worthless but > impressive boxes of nonfunctional bells and > whistles. At that > point the relationship, such as it was, is over > unless CCS feels > they can extract/extort even more money from the > ignorant fool. > > In this case apparently, and I have seen it more > times than I > could count, the ignorant fool private labeled the > crap because > he wants the other ignorant fools who might buy it > to think he > manufactured it. CCS doesn't care. They got their > money. They > probably charged the guy extra for private labeling > it, which in > itself is funny because CCS was the original king of > > repackaging and slapping their name on standard > products from > other manufacturers and claiming it as their own. > > CCS cheated the guy pushing this private labeled > crap, because > he was an ignorant fool and had more money than he > had brains. > ANYONE who does any homework on CCS would never deal > with them > on any level. > > > a CCS licence costs $150.000 with no stock. > > A CCS 'license' or 'distributorship' or whatever > they choose to > call it costs precisely as much money as they can > extract from > the ignorant fool who gets involved with them. They > (CCS) are > very good at developing financial information on > their victims, > and this is how much they charge. > > Same with 'exclusive' rights to distribute CCS's > vaporware in a > particular country. I had the distinct pleasure at a > trade show > in New Delhi some years ago of introducing three > 'exclusive > distributors for all of India' to each other. Each > had paid, as > I recall, sums between the rupee equivalent of USD > $50,000 and > $200,000 for the alleged privilege of having an > 'exclusive' > representation for CCS in all of India. None > received anything > in return. Nada. > > If I called them tomorrow, I could purchase the > exclusive rights > to distribute their products in any country you > could name, and > I likely would be the 50th person to purchase the > exclusive. > > You were a member of the den of thieves. You know > how the game > is played. You just have to pretend to defend them > to justify > stealing money from your victims. > > If you led the victim (ignorant fool) to believe > something which > was not true, either from a product representation > standpoint or > from an equipment performance standpoint, then you > committed > fraud. Whether you believe it or not, some day there > will be a > day of judgement, and you will have to provide an > accounting, > before man possibly and to God definitely, for your > actions. You > do have the opportunity to escape those penalties > and erase the > slate, and if you wish to discuss this issue only > via PRIVATE > email with me I will be glad to do so. > > > If you want to worry, and it seems you do , try > talking to > > professional covert suppliers - if you call us a > spy shop you > > had better duck > > You already provided substantial incontrovertible > testimony that > you are a crook, and your likely fictitious claims > indicate you > still are operating in the mode you learned from > CCS. Therefore > you fit this list's generic, and my personal, > definition of a > spy shop. > > This month is 30 years I have been manufacturing > electronic > surveillance and intelligence gathering products for > government > agencies. Do some research and you will find that is > true. > > === message truncated === __________________________________________________ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ 4553 From: James M. Atkinson Date: Tue Jan 15, 2002 10:41pm Subject: Face the Storms and Smile A little girl walked to and from school daily. Though the weather that morning was questionable and clouds were forming, she made the daily trek to the elementary school. As the afternoon progressed, the winds whipped up, along with thunder and lighting. The mother of the little girl felt concerned that her daughter would be frightened as she walked home from school and she herself feared that the electrical storm might harm her child. Following the roar of thunder, lightning, like a flaming sword, would cut through the sky. Full of concern, the mother quickly got into her car and drove along the route to her child's school. As she did so, she saw her little girl walking along, but at each flash of lightning, the child would stop, look up, and smile. Another and another were to follow quickly and with each, the little girl would look at the streak of light and smile. When the mother's car drew up beside the child she lowered the window and called to her, "What are you doing? Why do you keep stopping?" The child answered, "I am trying to look pretty. God keeps taking my picture." May God bless you today as you face the storms that come your way. And don't forget to smile. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4554 From: Date: Wed Jan 16, 2002 2:30am Subject: California's Wiretap Bill Scrapped California's Wiretap Bill Scrapped SACRAMENTO, Calif. (AP) - Gov. Gray Davis' proposal to expand state wiretapping laws has been dropped after state attorneys reviewing the plan said it exceeded federal law. The bill would have allowed state and local authorities to obtain wiretaps through state courts and permit them to conduct surveillance on e-mail and Internet communications. President Bush signed legislation late last year that broadened federal wiretapping activities but the law did not expand authority at the state level. Davis spokesman Steve Maviglio said the legislation was dropped Tuesday after lawmakers learned of the opinion by the Legislative Counsel's office. Maviglio said the Davis camp may try to reintroduce the bill later this year. Under state law, authorities need a court order to tap a phone line. The proposed legislation would have allowed ``roving'' wiretaps that can follow a person from one number to the next. The plan was the centerpiece of Davis' State of the State address last week. AP-NY-01-16-02 0706EST 4555 From: zack <10-33@c...> Date: Wed Jan 16, 2002 8:52pm Subject: Record device Due to experiences which have occurred within the past few days, I would like to enlist this list for some information. I am looking for a modest price recording device which would record phone conversations as soon as I pick up the phone, taking into account I also use the same line for Internet use. ( long play with time/date ). PS..... I live in a state with one party only knowledge as to recording. Thanks visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Our enemies have made the mistake that America's enemies always make. They saw liberty and thought they saw weakness. And now, they see defeat. " George W Bush President of the United States of America God Bless The USA http://www.copscops.com/blessusa.htm 4556 From: James M. Atkinson Date: Wed Jan 16, 2002 9:28pm Subject: Legal Office Sinks Davis' Wiretap Bill http://www.latimes.com/news/local/politics/cal/la-000004144jan16.story?coll=la%2Dnews%2Dpolitics%2Dcalifornia January 16, 2002 RESPONSE TO TERROR Legal Office Sinks Davis' Wiretap Bill Security: The proposal is dropped after legislative counsel finds 'roving' tracking of calls illegal. By MIGUEL BUSTILLO and NANCY VOGEL, TIMES STAFF WRITERS SACRAMENTO -- Gov. Gray Davis' proposal to let state and local police obtain roving wiretaps on suspected criminals was dropped from the legislation containing it Tuesday after the legislative counsel's office concluded that it was illegal. The proposal, a centerpiece of Davis' State of the State address last week, had been welcomed by some law enforcement leaders but criticized by civil libertarians and some liberals. Davis unveiled the idea at the outset of a reelection bid in which he faces challenges from three Republicans--former Los Angeles Mayor Richard Riordan, Secretary of State Bill Jones and investor Bill Simon Jr.--each vying for the GOP nomination to take on the Democratic incumbent. Asked to size up the chances of a roving-wiretap bill passing now, Assemblyman Fred Keeley (D-Boulder Creek) said: "I think none. There is no opportunity, because whether the Legislature has the will or not, our attorney is telling us it is moot because we lack the authority." Although aides to the governor challenged that interpretation, the legislative counsel said that a state law authorizing roving wiretaps for state and local prosecutors and police would exceed the authority federal wiretapping law gives states, and would thus be invalid. President Bush signed legislation in October that broadened federal wiretapping abilities to target suspected terrorists, but that law did not expand states' powers to allow roving wiretaps at the local level, the counsel concluded. Davis spokesman Steve Maviglio acknowledged that Assemblyman Carl Washington (D-Paramount) dropped roving wiretaps from his legislation Tuesday after hearing the legal opinion, but said the Davis administration would continue to work with the lawmaker, and may attempt to have it reinstated later this year. Maviglio said the Davis administration contacted local district attorneys and the Justice Department before making the proposal public, and was informed it was within the state's powers. George Vinson, Davis' security advisor, added that changes to federal law are still in flux, and that state lawmakers should eventually be able to pass legislation this year permitting roving wiretaps on suspected terrorists. With conventional wiretaps, police must obtain a judge's order authorizing them to listen in on a specific phone number. Roving wiretaps allow them to follow a suspect from number to number. Vinson said the administration may agree to back an alternative proposal that would would still require police to go to a judge any time they wanted to expand their wiretap authority but would speed up that process. Legal Questions Only One of Plan's Problems Some constitutional authorities joined with the legislative counsel in questioning Davis' approach. Erwin Chemerinsky, a USC professor of constitutional law, said Davis appeared to have acted without the benefit of careful legal analysis. The legal questions about Davis' wiretap proposal are only part of its difficulties. It also has been criticized by civil libertarians and some Democrats in the Assembly and Senate, who are wary of its proposed expansion of police power. As a result, some lawmakers on Tuesday predicted that the proposal is unlikely to become law. Assemblyman Washington, who was carrying the measure sponsored by Los Angeles County Sheriff Lee Baca and Dist. Atty. Steve Cooley, and whose bill Davis has seen as the best opportunity for expanded wiretap authority--had to pare back his bill just to get it out of the Public Safety Committee, which he chairs. Washington's bill, AB 74, initially would have allowed state and local authorities to obtain roving wiretaps through state courts, and also would have allowed them to conduct surveillance on e-mail and Internet communications. Law enforcement leaders argue that wiretap laws have failed to keep up with technology, and that criminals can now sidestep surveillance by switching mobile phones and using e-mail and Internet chat rooms to communicate. A roving wiretap would allow police to keep up with the times and the criminals, they say. Authorities must now obtain court orders to tap specific phone numbers, which they say puts them at a disadvantage in an age when criminals can buy cheap prepaid cell phones at convenience stores. "The world of terrorism in terms of criminal planning and strategizing has clearly shown law enforcement that these people are pretty clever," Baca said in an interview. "They will use one cell phone, turn it off, come back with another phone, turn that one off . . . conducting their transactions on dozens of mobile phones. Our current system prevents us from following that conversation without going back into court." Roving wiretaps and e-mail surveillance have come under fire, however, since Davis proposed them last week. It was because of that criticism that Washington requested the legal opinion from the legislative counsel. Once he received it, he announced that his bill would no longer authorize roving wiretaps. Several lawmakers also objected to the provisions of Washington's bill that would extend wiretapping to e-mail and the Internet, arguing that the privacy of countless innocent people would be infringed. Washington then scratched those sections from his measure as well. Assemblyman Keeley was among those who raised doubts about the idea of police and prosecutors screening e-mail. During a spirited committee hearing, he questioned the prosecutors and police who supported that proposal, and they conceded that they were still developing ways to screen e-mail without unduly intruding on personal privacy. "These are the types of scattershot investigative tools that result in the widespread loss of personal privacy," said Francisco Lobaco of the American Civil Liberties Union, which opposed the bill. Having pared back his legislation Tuesday, Washington's bill now would only slightly expand local wiretapping powers to target suspected terrorists planning to use anthrax or other "weapons of mass destruction." Its main purpose is to allow local police and prosecutors to continue to obtain wiretaps beyond next year, when their power to do so under state law is set to expire. Slight Expansion Is All Most Lawmakers Expect Such a law, several lawmakers said, is as strong as is likely to pass in the Capitol this year, particularly after the counsel's office opinion. Chemerinsky called the legislative counsel's analysis a "very strong opinion" showing that state and local governments cannot engage in wiretapping except as permitted by federal law. Chemerinsky and others have questioned the need for expanded state wiretapping powers, noting that local authorities can already partner with the federal government to conduct surveillance on suspected terrorists if needed. A recent report by the state Department of Justice showed that California law enforcement requested 88 wiretap orders in 2000. Judges granted every request. The wiretaps cost an average of $56,767 and resulted in the arrests of 271 people. Of those, 17 were convicted. Most were used in drug investigations and involved home phones, cellular phones and pagers. For information about reprinting this article, go to http://www.lats.com/rights -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4557 From: James M. Atkinson Date: Wed Jan 16, 2002 9:32pm Subject: Los Alamos Scientist Criticizes FBI in Book [(grumble, grumble)... Lee should still be in prison (grumble, grumble). See what happens when investigators gets caught lying trying to make a case? (grumble, grumble) -jma] http://www.washingtonpost.com/wp-dyn/articles/A52000-2002Jan15.html Los Alamos Scientist Criticizes FBI in Book Lee Calls Copied Tapes 'Crown Junk' By Walter Pincus Washington Post Staff Writer Wednesday, January 16, 2002; Page A08 Former Los Alamos scientist Wen Ho Lee maintains he was selected for prosecution because of his ethnic background and asserts that the computer tapes he downloaded, which were the basis of his guilty plea, were not the "crown jewels" of nuclear weapons building, but "largely the crown junk." In his newly published autobiography, "My Country Versus Me," written with the help of Helen Zia, Lee acknowledges that his downloading of computer tapes was a security violation. But he blames the multi-year FBI investigation of his activities and his jailing in solitary confinement for nine months on espionage charges partly on Washington hysteria and spineless bureaucrats. Most of all, the Taiwan-born Lee writes, "Had I not been Chinese, I never would have been accused of espionage and threatened with execution." Lee's book, however, does not totally explain why he downloaded computer codes associated with nuclear weapons designs in 1993-94, and again in 1997. In fact, he focuses his attention on the earlier download and not at all on those of 1997. As he did in earlier interviews, he said in his book that the downloading in the 1993-94 period was done "to protect my files, to make a backup copy." He adds, as he did just before his guilty plea to the surprise of his own lawyers, that he had "made more than one backup copy, actually." Why more than one backup? Because, he writes, "there were no lab rules against making copies -- most prudent people keep copies of their important documents." He also said he had "lost some important codes before, when the [Los Alamos computer] operating system changed, and I didn't want that to happen again." But, as Los Alamos senior scientists testified at Lee's trial, and another newly published book on the Lee case, "A Convenient Spy," repeats, Los Alamos scientists in the highly classified X Division where Lee worked were repeatedly offered opportunities to copy their own work in case of computer failure, "day by day, even computer stroke by computer stroke," one said recently. Reporters Dan Stober and Ian Hoffman provide another reason for Lee's downloading. He might have wanted to use the data in a future job, either with a Taiwan company called Asiatek, which has close ties to that country's defense ministry, or some other company. As for the computer codes themselves, called the "crown jewels" of the nuclear weapons business by one of the nuclear lab's senior scientists, Lee called them "the crown junk" and "the biggest nuclear weapons secret that [Los Alamos National Laboratory] and the government have to hide. "The cornerstone of nuclear deterrence," Lee writes, "is to scare the rest of the world into thinking that our weapons are bigger, stronger, faster, and far more destructive than theirs." And while saying that statement is true, Lee goes on to say, "the science of nuclear weapons hasn't progressed much" since the end of the Cold War and the test ban treaty. He says scientists like himself still at the U.S. weapons labs "spend their time figuring out what to do with rusty, old nuclear bombs." The stockpile stewardship program, "fixing old bombs and digging up old test data" in trying to keep U.S. nuclear weapons safe and reliable, is "like eating leftovers for dinner, [but] it's better than nothing." Much of the preliminary testimony and motions in court went Lee's way, particularly because of the work of his two lead lawyers, John Cline and Mark Holscher. But when the decision came before trial to accept an agreement that included pleading guilty to one count of mishandling classified information, Lee writes that Cline and Holscher told him he had a 95 percent chance of winning "if it goes to trial, but a five percent chance that we could lose. If we lose, you could face life in prison. Are you willing to take that risk?" Saying "it was not worth the risk of spending the rest of my life in prison," Lee said he agreed, since losing the right to vote, own a gun, run for public office or serve on a jury was "less of a sacrifice . . . than to risk a prison sentence." © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4558 From: Steve Uhrig Date: Wed Jan 16, 2002 9:45pm Subject: Re: Record device Once upon a midnight dreary, zack pondered, weak and weary: > Due to experiences which have occurred within the past few > days, I would like to enlist this list for some information. I > am looking for a modest price recording device which would > record phone conversations as soon as I pick up the phone, > taking into account I also use the same line for Internet use. > ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. Very easy problem. Connect a tape recorder to your phone line via any standard method, and start the recorder manually when you make or receive a call you wish to record. Since you are in a one party consent state, you are OK as the one party, and it would only be your own calls you would be recording, so you merely can start the machine yourself when needed. That way, you won't fill the tape needlessly with Internet noise/data instead of voice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4559 From: Hawkspirit Date: Wed Jan 16, 2002 10:18pm Subject: Electronic Harassment Sweepers http://www.siin.com/invres.html This is our most recommended service for clients who are serious about solving their EH problems permanently. This service while being the most expensive is the best and most cost effective. You will receive at least 2 experts. One will be a scientist with experience and understanding of electronic harassment, the science behind it and defensive measures. You will also receive an investigative research specialist, our IR Specialists have experience and training in many aspects such as surveillance, counter-surveillance, investigative sciences, law, psychology, undercover operations, and computer security. You will never receive an inexperienced team, we field train all of our staff and test them regularly. What you get essentially is two experts that will locate, eliminate, and document your situation to ultimately solve your problem. The initial portion of this service is conducted covertly. Due to the secure nature of our methods we do not publish how our covert activities are carried out. Rest assured that no one will know of our activities or our arrival. Once we announce our presence to the client, we begin a thorough and extensive test of your residence, you and appropriate individuals, vehicles, personal electronics, computers and appropriate areas. On the conclusion of the testing we will inform you of our findings. We take detailed case history, speculative and factual statements from appropriate parties. Once we determine the source of the Electronic Harassment, we will take appropriate countermeasures. You will also receive a report (including a CAD rendering of your residence) detailing our tests, findings and "hotspots". Using a combination of our state-of-the-art equipment, counter-surveillance techniques and hands-on approach we will detect almost any signal between DC to Infrared, this includes: ∑ DC ELF pulse ∑ AC ELF pulse ∑ Low Hz audio to Ultrasonic levels ∑ Microwave signals (1GHz to 20GHz) & >20GHz pulses ∑ LF to UHF RF signals (DC to 20GHz) (Linear or Digital) ∑ Laser, Infrared, visible light spectrum ∑ Soliton and Scalar waves ∑ EMP ∑ AM/FM transmissions ∑ High energy static fields ∑ High voltage ion fields ∑ Plasma radiation ∑ Nuclear radiation (includes X-rays, Gamma, Beta and Alpha) This also includes detection of tracking devices, bugs, wireless surveillance equipment, and other electronic radiation signal emitting devices. We can also detect metallic and semi-metallic devices. 4560 From: Ray Van Staden Date: Wed Jan 16, 2002 10:09pm Subject: Demonstration - Combat Terrorism The Leaders of the world are asking for your support to combat terrorism and we're encouraging to demonstrate against them next Friday, at 15:00. It is a well-known fact that the Taliban are against alcohol consumption and think it is sinful to look at a naked woman. Therefore, Friday at 15:00, women should run naked through the office while men chase them with a beer in their hands. This is the best way to show our disgust for the Taliban and will hopefully help us in detecting the terrorists among us (anybody who doesn't do as proposed will be deemed a terrorist and denounced to the World). Your efforts are much appreciated in the name of a free, democratic world. [Non-text portions of this message have been removed] 4561 From: Matthew Paulsen Date: Thu Jan 17, 2002 2:28am Subject: RE: Re: Record device Careful with this, in some states this may be illegal, check with your lawyer before proceeding. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, January 16, 2002 7:45 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Record device Once upon a midnight dreary, zack pondered, weak and weary: > Due to experiences which have occurred within the past few > days, I would like to enlist this list for some information. I > am looking for a modest price recording device which would > record phone conversations as soon as I pick up the phone, > taking into account I also use the same line for Internet use. > ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. Very easy problem. Connect a tape recorder to your phone line via any standard method, and start the recorder manually when you make or receive a call you wish to record. Since you are in a one party consent state, you are OK as the one party, and it would only be your own calls you would be recording, so you merely can start the machine yourself when needed. That way, you won't fill the tape needlessly with Internet noise/data instead of voice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4562 From: Justin T. Fanning Date: Thu Jan 17, 2002 3:39am Subject: Re: Record device In the CCITT phone system (see See ITU-T G.165 etc.) all non voice calls are proceeded with a short burst of 2100 Hz to switch off the Line Echo Canceler. I don't believe the US Bell system uses such a standard, but you may find it's an option on your modem/fax, or the receivers modem/fax. This could then be incorporated into your recording device to not record calls preceded with 2100 Hz. Of course the other solution is to use DSL/Cable etc and segregate the data off the voice line & get higher speed always on to boot! JF --- zack wrote: > > Due to experiences which have occurred within the past few days, I would > like to enlist this list for some information. I am looking for a modest > price recording device which would record phone conversations as soon as I > pick up the phone, taking into account I also use the same line for > Internet use. ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. > > Thanks > > visit http://www.copscops.com > Washington DC Police Department http://mpdc.dc.gov/main.shtm > > "Our enemies have made the mistake that America's enemies always make. They > saw liberty and thought they saw weakness. And now, they see defeat. " > > George W Bush > President of the United States of America > > God Bless The USA > http://www.copscops.com/blessusa.htm > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ From: rockdriver Date: Mon Jan 13, 2003 9:38pm Subject: Antenna Shootout For educational purposes,I was wondering what type of antennas the list members preferred/owned antennas were for doing "business",and why, I use a discone for anything up to 1.2 gig with 2 small conical designed antennas for anything above 1.2.....and a loop antenna for vlf. Any input is welcome,thanx! MitchD 6754 From: Matt Paulsen Date: Mon Jan 13, 2003 11:06pm Subject: Marriott International goes WiFi with STSN! Get that WiFi card and sniffer out and hit one of over 400 hotels for your enjoyment while you eat in the dining room. If your organization travels, now would be a good time to consider mobile code security practices if you haven't. Or you may just find your next product release on the market... by your competitor. 6755 From: James M. Atkinson Date: Tue Jan 14, 2003 0:14pm Subject: Re: Antenna Shootout I prefer an wide-band array of 16 quarter wave GAM antenna's with base loading, and a varactor for remote tuning over a 6 foot wide by 12 foot long ground plane of heavy steel (vehicle mounter) . Each element of the array is cut and tuned to a specific frequency that is "hot with bugs", the varactor is used to tune up a specific frequency of interest. The varactor is remote controlled by the preselector which isolated all 16 signals (in parallel) by 40+ dB, before being amplifier by 32 dB. Four to six 2.4 GHz high gain panels (with filters and preamps). Two 5.8 GHz high gain panels Two to four 900 MHz high gain panels One omni directional TV antenna with LNA Two steerable 2.4 GHz high gain panels in an external Radome Two Bi-Conicals (20-300 MHz) on an 16 foot mast Two spiral logs (200-1 GHz) on an 16 foot mast Two Microwave Discones (400 MHz to 3 GHz) on a 12 foot mast). Two Wideband Discones (36 MHz to 1.5 GHz) on a 12 foot mast Several active loop antennas (for specific bug channels) broadband passive loop antenna's with remote band select, and tuning. Double loop (small loop) tunable with sense element for DF usable Several active rod antenna's with 24" ground plane 98 MHz close field probe (micro-loop) with swept comb circuit for FM band. Set of EMCO, Electrometrics, and HP close field probes. Really big, and really nasty dipole set (15 MHz to 1 GHz) A collection of standard gain antenna with ampls/mixers (900 MHz to 40 GHz) EMCO broadband quad ridges horns (1 GHz to 40 GHz) Microtel Microwave array "Pipe organ" (2 GHz to 125 GHz) Copious collapsible whip antenna Several high threat frequency specific Yagi's (ie: 398.605, 169.505) Several collapsible log periodic (200-420 MHz, 420-480, 800-890 MHz) ...and several others -jma At 3:38 AM +0000 1/14/03, rockdriver wrote: >For educational purposes,I was wondering what type of antennas the >list members preferred/owned antennas were for doing "business",and >why, > >I use a discone for anything up to 1.2 gig with 2 small conical >designed antennas for anything above 1.2.....and a loop antenna for >vlf. > >Any input is welcome,thanx! >MitchD -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6756 From: James M. Atkinson Date: Tue Jan 14, 2003 1:30pm Subject: Spyking/Frank Jones associates by the name of Terry Kawles Hello List Members, One of the Spyking/Frank Jones associates by the name of Terry Kawles is trying to force my ISP to shutdown my site in an attempt to blackmail me into taking down the public records I have concerning he and Frank Jones. Here are the latest round of documents, they just came in today : http://www.tscm.com/01-14-03AUPnotice.pdf http://www.tscm.com/01-13-03complaint.pdf Also, I have added a great deal of materials the the page concerning Jones, and you may find it of interests. http://www.tscm.com/FNJspyking.html The more they try to pursue all of this the more public document I will be adding... I would note that I have recently received threats of physical violence and harassment unless I remove the pages with the public documents on them. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6757 From: kondrak Date: Tue Jan 14, 2003 1:37pm Subject: Anti-Spam program.. Dont know if you've seen or used this program, but its helped control spam here. Mailwasher - http://mailwasher.net/ It operates on the simple principal of downloading the mail headers before you actually download the mail from the server. It compares headers against known spammer addresses in ORBS and spamcop, and a blacklist you maintain locally. You merely scan the titles, check obvious spam for the built in blacklist, and the spam will be bounced back to the sender, and future mail from that address (or expression in a header, like Viagara, or Morgage etc.) will cause the mail to be blacklisted. You then "process mail", and garbage is bounced, then your real email program is brought up. You then hit the "check mail" in your emailer and download the real email. This sounds complicated, but really isn't. A must do, however, is to turn of the auto-check in your email program, as if you dont, and its running in the background, it will download all the mail on the server before you can check it in mailwasher. Read more about it, its free, or pay, (paid removes ad banner) I'm down to perhaps one or two that slip by me (my bad, not its fault) per day now. Well worth a look...I have no interest in the company other than I like the product... At 10:04 1/13/03 -0500, you wrote: >Just wanted to see if I was able to get through. Because of SPAM I had to >change e-mail accounts. Thanks. 6758 From: Marcel Date: Tue Jan 14, 2003 3:48pm Subject: Re: Spyking/Frank Jones associates by the name of Terry Kawles Amazing simply amazing. I'm sure you have seen this......... http://212.100.234.54/content/55/24477.html http://212.100.234.54/content/55/24461.html http://212.100.234.54/content/55/24456.html http://212.100.234.54/content/55/24433.html http://212.100.234.54/content/archive/19480.html "James M. Atkinson" wrote: > Hello List Members, > > One of the Spyking/Frank Jones associates by the name of Terry Kawles > is trying to force my ISP to shutdown my site in an attempt to > blackmail me into taking down the public records I have concerning he > and Frank Jones. > > Here are the latest round of documents, they just came in today : > > http://www.tscm.com/01-14-03AUPnotice.pdf > > http://www.tscm.com/01-13-03complaint.pdf > > Also, I have added a great deal of materials the the page concerning > Jones, and you may find it of interests. > > http://www.tscm.com/FNJspyking.html > > The more they try to pursue all of this the more public document I > will be adding... > > I would note that I have recently received threats of physical > violence and harassment unless I remove the pages with the public > documents on them. > > -jma > > -- 6759 From: kondrak Date: Tue Jan 14, 2003 7:42pm Subject: Re: Spyking/Frank Jones associates by the name of Terry Kawles As an aside, we had a machine in that was allegedly infected with his software, and found several easily identified viruses, that's how stealthy his crap was. Machine was cleaned in an hour, and we sent it back out with a IDS system installed to see if there was any future attempts to access it. None ever returned. His crap used FTP to communicate, and it was easily defeated with proper fire-walling. At 16:48 1/14/03 -0500, you wrote: >Amazing simply amazing. > > >I'm sure you have seen this......... Yup... >http://212.100.234.54/content/55/24477.html > >http://212.100.234.54/content/55/24461.html > >http://212.100.234.54/content/55/24456.html > >http://212.100.234.54/content/55/24433.html > >http://212.100.234.54/content/archive/19480.html 6760 From: Marcel Date: Tue Jan 14, 2003 8:44pm Subject: Re: Spyking/Frank Jones associates by the name ofTerry Kawles I found it amazing that public safety would associated themselves with someone with such a questionable past. The documents presented by jma surely should raise some antennas. kondrak wrote: > As an aside, we had a machine in that was allegedly infected with his > software, and found several easily identified viruses, that's how stealthy > his crap was. Machine was cleaned in an hour, and we sent it back out with > a IDS system installed to see if there was any future attempts to access > it. None ever returned. > His crap used FTP to communicate, and it was easily defeated with proper > fire-walling. > > At 16:48 1/14/03 -0500, you wrote: > >Amazing simply amazing. > > > > > >I'm sure you have seen this......... > > Yup... > > >http://212.100.234.54/content/55/24477.html > > > >http://212.100.234.54/content/55/24461.html > > > >http://212.100.234.54/content/55/24456.html > > > >http://212.100.234.54/content/55/24433.html > > > >http://212.100.234.54/content/archive/19480.html -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6761 From: Matt Paulsen Date: Tue Jan 14, 2003 9:48pm Subject: RE: Spyking/Frank Jones associates by the name ofTerry Kawles I searched kazaa for pcphonehome and got 0 hits. Somewhat remarkable since the stats read at 3,786,197 users, sharing 752,969,031 files in 5,540,736 GB. So much for a widely used good app! ha! Tried these variants on it as well, same results. phonehome macphonehome Funny enough though, if you search for "Frank Jones" (without the "'s) you get "You're a mean one Mr Grinch" back. -----Original Message----- From: Marcel [mailto:Marcelrf@B...] Sent: Tuesday, January 14, 2003 6:44 PM To: kondrak Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Spyking/Frank Jones associates by the name ofTerry Kawles I found it amazing that public safety would associated themselves with someone with such a questionable past. The documents presented by jma surely should raise some antennas. kondrak wrote: > As an aside, we had a machine in that was allegedly infected with his > software, and found several easily identified viruses, that's how stealthy > his crap was. Machine was cleaned in an hour, and we sent it back out with > a IDS system installed to see if there was any future attempts to access > it. None ever returned. > His crap used FTP to communicate, and it was easily defeated with proper > fire-walling. > > At 16:48 1/14/03 -0500, you wrote: > >Amazing simply amazing. > > > > > >I'm sure you have seen this......... > > Yup... > > >http://212.100.234.54/content/55/24477.html > > > >http://212.100.234.54/content/55/24461.html > > > >http://212.100.234.54/content/55/24456.html > > > >http://212.100.234.54/content/55/24433.html > > > >http://212.100.234.54/content/archive/19480.html -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6762 From: John McCain Date: Tue Jan 14, 2003 11:19am Subject: Another antenna question Along the same line, I use a couple of "professional quality" amateur or "commercial" discones for vhf/uhf. Antennas that I've had for a couple of decades. I have little exposure to government or lab grade portable antennae, and wonder if anyone is aware of an economical (what an adjective :,) discone that is faster to deploy than having to screw 32 small rods into the center castings. I was thinking of simply cutting off the rods about a half inch from the center and slipping small springs over the cuts to make it "pop out" of a tubular transit case, but didn't like the though of brass or steel springs in the middle of my aluminum antenna. Anyone with experience trying this, or know of a similar antenna? Cheers, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-897-6600 2949 CR 1000N Web: http://www.dcbnet.com Dewey, IL. 61840 Email: Jmccain@d... 6763 From: James M. Atkinson Date: Wed Jan 15, 2003 9:20am Subject: Re: Another antenna question First, exactly match the material content of the antenna to that of the spring (both should be steel. Second, be sure to trim off enough of the original element to compensate for the added length of the spring. Third, install a small tip or coating on the ends of the elements so that you don't put an eye out if it gets away from you. Fourth, Use a velcro strap to restrain the elements, and do not let them "pop out" as you risk physical injury You will get better performance if you DO NOT use the springs, and use a solid element Always use a decent low noise 25-30 dB amplifier with a broad band antenna such as a discone. Having a dozen of so cheap band pass filters in front of the amplifier will do you a world of good. -jma At 11:19 AM -0600 1/14/03, John McCain wrote: >Along the same line, I use a couple of "professional quality" amateur or >"commercial" discones for vhf/uhf. Antennas that I've had for a couple of >decades. > >I have little exposure to government or lab grade portable antennae, and >wonder if anyone is aware of an economical (what an adjective :,) discone >that is faster to deploy than having to screw 32 small rods into the center >castings. > >I was thinking of simply cutting off the rods about a half inch from the >center and slipping small springs over the cuts to make it "pop out" of a >tubular transit case, but didn't like the though of brass or steel springs >in the middle of my aluminum antenna. Anyone with experience trying >this, or know of a similar antenna? > >Cheers, >JohnM > > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-897-6600 >2949 CR >1000N Web: http://www.dcbnet.com >Dewey, IL. 61840 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6764 From: kondrak Date: Wed Jan 15, 2003 9:49am Subject: Re: Another antenna question How about, putting banana jacks on the base, and plugs on the radials? I'd make the base out of say brass or something durable, and just drill holes to accommodate the banana plugs. I realize not everyone has access to a machine shop, but its a thought. >I was thinking of simply cutting off the rods about a half inch from the >center and slipping small springs over the cuts to make it "pop out" of a >tubular transit case, but didn't like the though of brass or steel springs >in the middle of my aluminum antenna. Anyone with experience trying >this, or know of a similar antenna? > >Cheers, >JohnM > > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-897-6600 >2949 CR >1000N Web: http://www.dcbnet.com >Dewey, IL. 61840 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6765 From: Hawkspirit Date: Wed Jan 15, 2003 10:44am Subject: Cordless Phone Monitoring While doing a sweep yesterday for a client in a condo who had an opposing party in a litigation rent an apartment under him, I had an interesting result with his cordless phone (Sanyo CLT-957). After disconnecting the clients cordless phone base from the AC, every time I initiated the handset into transmission I had a return RF handshake at the exact same frequency and matching 913MHZ digital spread spectrum wave pattern. No dial tone but a matching wave pattern reply. Does anyone know the circuits in these units well enough to tell me how a covert specialized receiver would use this setup and handshake to adjust its receiving frequencies for monitoring. Roger Tolces Electronic Security www.bugsweeps.com 6766 From: Kirk Adirim Date: Thu Jan 16, 2003 0:05am Subject: Re: another antenna question If you place springs in line with the elements make sure you bypass them with copper braid soldered to each end of the elements. This prevents the spring from acting as a loading or phasing coil and will also short out any noise generated by the dissimilar metals in the spring. Any movement or corrosion between disimilar metals can act as a noise generating diode (PN junction). You could also replace your elements with flat 1/16th inch spring steel strips that are cut to the same length. Another solution would be to cut a skirt of brass mesh to wrap around your elements to the same length. Now remove all but 4 of the elements to hold the skirt in place. You'll have to devise a way to electrically secure and connect/disconnect the skirt to the 4 elements or collar. The mesh will replicate the 32 elements or cone. Now you only have 4 rods to install and the mesh skirt will roll up for easy transport. Kirk www.tactronix.com [Non-text portions of this message have been removed] 6767 From: Does it matter Date: Tue Jan 14, 2003 2:03pm Subject: info http://hot.ee/nuhk/tempest.html http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=14077 http://www.ebiz.co.za/L_SCRIPTS/Regular.ASP? pklRegularID=889&pklIssueID=294 Some more info about that Attorney. 6768 From: Date: Wed Jan 15, 2003 10:56am Subject: Rif: Re: Another antenna question > First, exactly match the material content of the antenna to that of > the spring (both should be steel. Does the material really matter, as long as it conduces electricity well, and has a reasonable dimensinal stability? I thought it was mainly the length of the rod that matters, as it must resonate at the appropriate frequency, and therefore must be one nth of the wavelength. Remo Cornali 6769 From: bc Date: Wed Jan 15, 2003 9:51pm Subject: fyi: ~e; Electromagnetic News & Views #10 a sample of a newsletter from the electronetwork.org which compiles news from various sectors/disciplines with electromagnetism as a common theme or context. it is part of an electromagnetic educational initiative- to find out more please visit http://www.electronetwork.org/ =================================================== Electromagnetic News & Views -- #10 =================================================== 01) Top Stories of Electromagnetism 02) Electromagnetic health & medicine 03) Electromagnetic trash & treasure 04) Electromagnetic security & surveillance 05) Electromagnetic power & energy 06) Electromagnetic current & human affairs 07) Electromagnetic transportation & communication 08) Electromagnetic matter & information 09) Electromagnetic trends & inventions 10) Electromagnetic weaponry & warfare 11) Electromagnetic business & economics 12) Electromagnetic art & artifacts =================================================== 01) --top stories-- --------------------------------------------------- Vatican warning on danger of 'online confession' "THE Vatican has warned Catholic bishops and priests not to use the internet to hear "online confessions" in case they are read by "ill-intentioned people such as hackers" for purposes such as blackmail." // you would FTP files or check e-mail from a wi-fi cafe? Expert: Alleged Wi-Fi Risks Are Nonsense By Mitch Wagner "The solution is not to limit Wi-Fi, but rather to install personal firewalls on each computer, and encrypt all traffic going over the network, Doctorow said." // waiting for ISPs and Webhosts to offer this service to // avoid liability issues for unsecured access/transit... How Secure Is Secure Shell? Despite its vulnerabilities, SSH is far better than its unsecure cousins, including Telnet, the "r" commands and FTP, which transmit usernames and passwords -- and everything else, for that matter -- as clear text. Stealth Antennae Try to Blend In "There are about 130,000 communications antennae in place across the United States, according to industry officials. Roughly 75 percent are standard antennae. The rest have been surreptitiously stashed in scenic simulations. "The next time you see a picturesque shot of rocks, a flagpole, a church steeple, cacti or trees, consider that there might be more there than meets the eye..." Phone Units Join in Effort for Seamless Wireless Net "Most Wi-Fi networks have focused on transfer of e-mail messages and other forms of data from laptop computers but the goal of the three companies is to offer seamless transitions to cellphone users as well." IBM's New PDA Provides a Measure of Security "Instead of swiping a badge through a reader, the employee places his or her thumb on the Paron's small fingerprint-recognition screen. A wirelessly connected server reads the fingerprint, makes an identification, and grants access if a match is found between the individual making the request and the stored data. Do told NewsFactor that the Paron features CDL's proprietary encryption processor, the CDL-82, enabling secure wireless transmission of sensitive voice calls and data. It also has a smart-card reader for ID cards." --------------------------------------------------- 02-- electromagnetic health & medicine --------------------------------------------------- When the Athlete's Heart Falters, a Monitor Dials for Help "Soon, machines may be able to do some of this emergency dialing on their own. Manufacturers are working on wearable heart monitors linked to cellphones that can sound an alert automatically, contacting a doctor, family member or Web site when trouble beckons." Chip Plants Take Heat for Toxics "A government health agency ordered Motorola and two other leading semiconductor makers to tighten up their handling of carcinogenic and toxic materials after a groundbreaking investigation uncovered holes in their safety procedures." Charting the hidden force at street corners "Havas is quick to point out there is no proof, as yet, that electromagnetic fields directly cause illnesses. But there is plenty of evidence showing they are associated with illnesses and can promote them. Her work on Main Street, Ontario, should be a wake-up call to public utilities and other businesses generating electromagnetic fields, such as banks and cellphone companies, which one day could face lawsuits from people claiming compensation for impaired health." --------------------------------------------------- 03-- electromagnetic trash & treasure --------------------------------------------------- What to Do With That Old, Slow PC Don't throw away your old computer. Some manufacturers offer trade-ins and rebate programs so you can recycle what you no longer want to use. By Kendra Mayfield. // will the 4-fold increase in e-waste be due to HDTVs? E-Waste: Dark Side of Digital Age U.S. computer makers are improving recycling programs, but they still lag behind Europe and Japan in managing toxic e-waste. Most U.S. manufacturers received failing grades in an annual Computer Report Card survey. By Kendra Mayfield. "The SVTC report card evaluated the firms based upon criteria gleaned from the companies' websites. Only one company, Fujitsu, received a passing grade. Fujitsu...developed technologies to eliminate toxic chemicals by developing lead-free products. "The leadership continues to be by and large the Japanese companies, and the U.S. companies tend to be far behind," Smith said." ... "The report also criticizes Dell's use of federal prison labor to recycle old computers, which it says exposes inmates to toxic chemicals without the same health and safety protections as workers at other facilities." Consumer Electronics Show Panel Addresses E-Waste For videocassettes, the end is near --------------------------------------------------- 04-- electromagnetic security & surveillance --------------------------------------------------- George Orwell, here we come By Declan McCullagh "But what could Poindexter and the Bush administration devise in five or 10 years, if they had the money, the power and the will? That's the real question, and therein lies the true threat. Even if all of our current elected representatives, appointed officials and unappointed bureaucrats are entirely trustw