From: Matthew Paulsen Date: Sat Mar 9, 2002 6:42pm Subject: Implementation of "smart card" technology across DoD by 2003 <> By Gerry J. Gilmore American Forces Press Service WASHINGTON, March 8, 2002 –- Implementation of "smart card" technology across DoD by 2003 will enable the department to deploy troops faster and safeguard its people and facilities better, the card's program manager said March 5. DoD's Common Access Card is a plastic identification card with an embedded 32-kilobyte memory chip, said Mary Dixon, director of the DoD Access Card Office. The card has already been issued at many stateside and overseas locales, and about this time next year, 4 million active-duty military, selected reservists, DoD civilians and eligible contractor employees are expected to have them, she noted. The card and stored data can be tied into computer networks for personnel actions and added security. It has proven its worth in speeding troop processing times during recent testing at Schofield Barracks, Hawaii, Dixon noted. The 25th Infantry Division troops there used to have to spend one or more days preparing for deployments using paper records, she said. The cards reduced deployment processing times to about an hour or two for each individual who took part in the test, Dixon remarked. And besides getting troops to the front faster, she noted, Common Access Cards could save time in a number of other ways. "We're returning that time to the units -- they can use it for training," she explained. Security concerns across DoD have been greatly heightened because of the Sept. 11 terrorist attacks, Dixon noted. Widespread use of smart card technology for identification purposes will also enhance DoD's security infrastructure, she noted. Personal identification numbers today, and biometric data such as fingerprints in the future, can be contained on the card, making it much more secure than paper IDs, Dixon said. "There is a one-in-a-million chance that you might guess a person's six-digit PIN," she explained, adding that the card automatically locks up to deny access after receiving three incorrect PINs. Widespread use of Common Access Cards should bolster security for DoD's people, buildings and facilities, Dixon noted. The new technology, she added, also allows a "one- card-fits-all" system, so IDs, Public Key Infrastructure tokens, and multiple security passes could be melded onto one card. Unlike easily duplicated paper ID cards, common access cards -- with their one-of-a-kind computer chips and embedded biometric data -- can facilitate secure access into a sophisticated computer security network, Dixon explained. If a common access card is lost or stolen, she noted, the identification and security accesses on the card can be invalidated immediately. Biometric information already in the card's computer database, she added, would be checked when a request is made for a replacement card. Issuance of Common Access Cards contains myriad checks and balances to ensure integrity, Dixon noted. A fraudulently issued card might conceivably get past security officials at first, but definitely not for long, she said. 4984 From: Hawkspirit Date: Sun Mar 10, 2002 9:48am Subject: R.F. Phone Believe me I did that, but this a Donald Trump personality and you can't tell him much, so, if I have to recommend an RF linked phone, what is the most difficult to demodulate? I am going to pick up a Seimens Gigaset next week and test it. Roger At 11:10 AM 3/10/2002 +0000, you wrote: >From: "James M. Atkinson" >Subject: Re: R.F. telephones > > >The first rule of communications security is: "If it has an antenna >it is not immune from eavesdropping". > >Instead of trying to find a "secure" cordless phone for your client, >your efforts would best be spent educating the client as to why he >should not be using a cordless phone if he is concerned about privacy. > >-jma 4985 From: James M. Atkinson Date: Sun Mar 10, 2002 9:54am Subject: Re: R.F. Phone In that case there is no legitimate product available, and you should tell your client that his expectations are unrealistic. Don't be afraid to hold your ground, the client will respect you for it. I have personally had so educate some of the richest multi-billionaires in the US, and you have to be pragmatic when dealing with these folks. Don't tell them what they want to hear, but what they need to hear, and always be up front with them... always. -jma At 7:48 AM -0800 3/10/02, Hawkspirit wrote: >Believe me I did that, but this a Donald Trump personality and you can't >tell him much, so, if I have to recommend an RF linked phone, what is the >most difficult to demodulate? I am going to pick up a Seimens Gigaset next >week and test it. Roger > > > >At 11:10 AM 3/10/2002 +0000, you wrote: >>From: "James M. Atkinson" >>Subject: Re: R.F. telephones >> >> >>The first rule of communications security is: "If it has an antenna >>it is not immune from eavesdropping". >> >>Instead of trying to find a "secure" cordless phone for your client, >>your efforts would best be spent educating the client as to why he >>should not be using a cordless phone if he is concerned about privacy. >> > >-jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4986 From: Michael Puchol Date: Sun Mar 10, 2002 11:55am Subject: Re: R.F. Phone Yes, but you also have to give him a solution, or you might get fired - a compromise here is a mix between using a somewhat-secure phone (like a DECT Gigaset), and teaching your costumer not to talk anything of a sensitive nature over it. I agree that there are many situations in which you MUST tell your costumer "it can't be done", but let's be realistic - DECT demodulators/decryptors are not over-the-counter items, nor are they available at spy shops - so with the above compromise, I don't think this guy will be in any real danger. You can download the DECT security specifications, plus cryptanalysis papers from the ETSI web site - an attack on DECT would most likely involve a man-in-the-middle scenario, or really heavy post-processing. In any case, it's not an easy task, or something that any bozo with a scanner will be able to do. All the best, Mike ----- Original Message ----- From: "James M. Atkinson" To: Sent: Sunday, March 10, 2002 4:54 PM Subject: Re: [TSCM-L] R.F. Phone > > In that case there is no legitimate product available, and you should > tell your client that his expectations are unrealistic. Don't be > afraid to hold your ground, the client will respect you for it. > > I have personally had so educate some of the richest > multi-billionaires in the US, and you have to be pragmatic when > dealing with these folks. Don't tell them what they want to hear, but > what they need to hear, and always be up front with them... always. > > -jma > > > At 7:48 AM -0800 3/10/02, Hawkspirit wrote: > >Believe me I did that, but this a Donald Trump personality and you can't > >tell him much, so, if I have to recommend an RF linked phone, what is the > >most difficult to demodulate? I am going to pick up a Seimens Gigaset next > >week and test it. Roger > > > > > > > >At 11:10 AM 3/10/2002 +0000, you wrote: > >>From: "James M. Atkinson" > >>Subject: Re: R.F. telephones > >> > >> > >>The first rule of communications security is: "If it has an antenna > >>it is not immune from eavesdropping". > >> > >>Instead of trying to find a "secure" cordless phone for your client, > >>your efforts would best be spent educating the client as to why he > >>should not be using a cordless phone if he is concerned about privacy. > >> > > >-jma > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > As Cuvier could correctly describe a whole animal by the contemplation of > a single bone, so the observer who has thoroughly understood one link in > a series of incidents should be able to accurately state all the other ones, > both before and after. - Sir Arthur Conan Doyle > ------------------------------------------------------------------------ -------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4987 From: James M. Atkinson Date: Sun Mar 10, 2002 0:02pm Subject: The Lie Behind the Lie Detector http://antipolygraph.org/pubs.shtml Polygraph Publications The Lie Behind the Lie Detector http://antipolygraph.org/lie-behind-the-lie-detector.pdf 2nd digital edition. 739 kb PDF.* Click on above link with right mouse button to save to disk. While an HTML version of the 2nd edition of The Lie Behind the Lie Detector is not yet available, you may still browse the 1st edition in HTML format By George W. Maschke and Gino J. Scalabrini 176 Pages Executive Summary POLYGRAPH "testing" has no scientific basis: it's entirely dependent on your ignorance and fear. Educate yourself. In this book, you will discover the trickery on which polygraph "testing" depends, and learn how to make sure you pass your polygraph "test." Our government's reliance on unreliable polygraph "testing" is both a danger to our national security and a hazard to the reputations of law-abiding citizens whose trustworthiness is judged by this voodoo science. The Lie Behind the Lie Detector exposes polygraph waste, fraud, and abuse. Chapter One covers the validity of polygraph "testing." Polygraphy can have no scientific validity because it is not a scientific procedure. Chapter Two discusses polygraph policy, with special emphasis on the Aldrich H. Ames espionage case. In addition, the false positive problem in polygraph security screening is also discussed in detail. Chapter Three exposes the trickery on which polygraph "testing" depends. Chapter Four provides detailed instructions on how to use polygraph countermeasures to protect yourself against becoming a false positive. Chapter Five discusses grievance procedures for those who have been falsely accused based on polygraph chart readings. The Lie Behind the Lie Detector is free for non-commercial use and distribution. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 4988 From: Al Arango Date: Sun Mar 10, 2002 9:35am Subject: Re: Light-bulb carrier current -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Here's a couple: Some vendors: http://www.smarthome.com/7528.html http://216.190.224.33/servlet/cat/product/CVL32.html The manufacturer/importer: http://www.seaview.com/index.htm Best Reagrds Al At 10:35 PM 3/8/2002 -0500, you wrote: >This one is not exactly a "functioning" light bulb but it does have ir led's >in it: > >http://www.gadgethome.com/cgi-local/SoftCart.exe/scstore/p-SVSB1.html?E+scst >ore > >Charles > > >charles@t... >Global Communications >Tarrytown, NY >www.telephonesecurity.com > > >----- Original Message ----- >From: >To: "TSCM-Group" >Sent: Friday, March 08, 2002 3:38 PM >Subject: [TSCM-L] Light-bulb carrier current > > > > Anyone know of an actual, non theoretical, functioning in the field > > carrier current device contained in a working light bulb? Might save me > > a trip if it's in the realm of Elvis sightings and bigfoot. Thanks for > > any help! > > > > Martin Brown > > Brown & Sikes, Inc. > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQA/AwUBPIt9J1AWwP1+SxuBEQJS3gCg7JHcWmU6dCRROEZdY7MRCoON9+8AoJdd j7PsJjvIh6RH5z4rPZznkUN3 =oWTP -----END PGP SIGNATURE----- 4989 From: Markku-Juhani O. Saarinen Date: Sun Mar 10, 2002 0:51pm Subject: Re: R.F. Phone On Sun, 10 Mar 2002, Michael Puchol wrote: [clip] > You can download the DECT security specifications, plus > cryptanalysis papers from the ETSI web site - Hmm, that is not entirely accurate.. It is true that ETSI has made the design and analysis of some newer telephony security standards available (e.g. the 3GPP algorithms), but the details of DECT, TETRA, and GSM encryption algorithms are still restricted. They've made some generic "analysis" available (like ETSI EN 300 175-7 regarding DECT), but these documents do not contain sufficient amount of technical detail to be useful to a cryptanalyst. Of course that doesn't mean that the details of encryption algorithms wouldn't have leaked to some or been reverse engineered; especially the GSM security algorithms are nowadays described even in cryptography textbooks. But they are not officially available from ETSI ! > an attack on DECT would most likely involve a man-in-the-middle > scenario, or really heavy post-processing. In any case, it's not an easy > task, or something that any bozo with a scanner will be able to do. True.. of course "any bozo" can probably still put their tap on the wire since encryption stops there. The amount of postprocessing (i.e. computational effort required to recover the key) can be debated. Cheers, - mjos Markku-Juhani O. Saarinen Helsinki University of Technology 4990 From: Michael Puchol Date: Sun Mar 10, 2002 2:03pm Subject: Re: R.F. Phone > [clip] > > You can download the DECT security specifications, plus > > cryptanalysis papers from the ETSI web site - > > Hmm, that is not entirely accurate.. Agreed. The document you mention below (I just checked it again) only provides generic security information about DECT, and some analysis on security/attack scenarios... > It is true that ETSI has made the design and analysis of some newer > telephony security standards available (e.g. the 3GPP algorithms), but the > details of DECT, TETRA, and GSM encryption algorithms are still > restricted. They've made some generic "analysis" available (like ETSI EN > 300 175-7 regarding DECT), but these documents do not contain > sufficient amount of technical detail to be useful to a cryptanalyst. ... but enough for me to see that this isn't some simple digital coding/scrambling scheme - it has some relative security. > Of course that doesn't mean that the details of encryption algorithms > wouldn't have leaked to some or been reverse engineered; especially the > GSM security algorithms are nowadays described even in cryptography > textbooks. But they are not officially available from ETSI ! Yup. And the DECT security algorithms have also leaked - specially since every manufacturer of a DECT device needs them, which inevitably sends them out in the open... > > an attack on DECT would most likely involve a man-in-the-middle > > scenario, or really heavy post-processing. In any case, it's not an easy > > task, or something that any bozo with a scanner will be able to do. > > True.. of course "any bozo" can probably still put their tap on the > wire since encryption stops there. The amount of postprocessing > (i.e. computational effort required to recover the key) can be debated. OK, the line tap is true, but the original discussion concerned on securing the air portion of the conversation, if the wire is not secure after that, then there's not much to discuss I guess :-) The old scenario of throwing ten high-security padlocks onto a solid-steel door with reinforced hinges, only to leave a window open afterwards. All the best, Mike 4991 From: Matthew Paulsen Date: Sun Mar 10, 2002 2:56pm Subject: FW: Implementation of "smart card" technology across DoD by 2003 Reposting to group. -----Original Message----- From: Thomas (Yahoo!) [mailto:thomasroygarner@y...] Sent: Sunday, March 10, 2002 9:10 AM To: mpaulsen6@a... Subject: RE: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 Has anyone seen these cards yet? I have one (active duty) and for those that have had military experience, this may come as a laugh. One item is the cost of these cards. I haven't seen much discussion on this, however, if one is to break down the costs (and I'm estimated largely here, so please forgive), we are GOING to see a HUGE administrative cost regarding the new ID cards. Guessing that in about four years (give/take), and I'm not including advancement, card replacement and influx of new personnel, since the cards are now being distributed Navy Wide, the cost is going to increase. I was issued my card about one month ago, according to the ID Card (civilian) processor, these cards cost between (not exact so don't flame me ok?) $10.00 - $15.00 each. My card is good for four years, so, imagine, Navy wide, @ $10-15 bucks a card, every four years, how much money this is going to cost. Assuming an estimated number of personnel @ around 100,000 (HUGE ESTIMATE WARNING!!! Figures not verified) personnel, your looking at $1-$1.5 yearly cost in about four years, once the cards come online. So, I'm assuming we will start seeing "notes" regarding how to take care of ones card, not to damage them, misplace them, etc. Since, they are only issuing the cards (in my area) on advancement and/or extensions. OK, so the #'s are not exact, but the point there will be a cost increase. What happens if a new encryption scheme comes out? Are they going to have to replace every card? Better, what happens if the encryption is cracked? Just curious... The humorous part of my story (besides my math skills) was an attempt to purchase alcohol and use my military ID card. I had a retired military (Army personnel) who was working the counter, and b/c the ID Card looks like a "badge" and not an ID Card, he didn't believe that my card was my military ID Card, I attempted to educate this individual and state that this is indeed my new military ID card. However, the education was lost and so was the sale of goods to me b/c I do not have any other form of ID (another long story). Ok, now that I read this, it isn't that funny, but one can imagine there will be an increase in admin costs, security will be only as good as those educated, and civilian population education will be needed to ensure that everyone knows what the "new" ID card looks like. Ohh yeah, and the printed text on my card is starting to chip away, where my Pay Grade / Rank is listed, the text is starting to flake off, so soon, I'll have to go back to my PSD and request a new ID Card b/c the old card is slowly becoming unreadable. Thomas Roy Garner SETIPRIME ( http://www.setiprime.com ) 4580576 (ICQ)/thomasroygarner (Y!) -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Saturday, March 09, 2002 4:43 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 <> By Gerry J. Gilmore American Forces Press Service WASHINGTON, March 8, 2002 –- Implementation of "smart card" technology across DoD by 2003 will enable the department to deploy troops faster and safeguard its people and facilities better, the card's program manager said March 5. DoD's Common Access Card is a plastic identification card with an embedded 32-kilobyte memory chip, said Mary Dixon, director of the DoD Access Card Office. The card has already been issued at many stateside and overseas locales, and about this time next year, 4 million active-duty military, selected reservists, DoD civilians and eligible contractor employees are expected to have them, she noted. The card and stored data can be tied into computer networks for personnel actions and added security. It has proven its worth in speeding troop processing times during recent testing at Schofield Barracks, Hawaii, Dixon noted. The 25th Infantry Division troops there used to have to spend one or more days preparing for deployments using paper records, she said. The cards reduced deployment processing times to about an hour or two for each individual who took part in the test, Dixon remarked. And besides getting troops to the front faster, she noted, Common Access Cards could save time in a number of other ways. "We're returning that time to the units -- they can use it for training," she explained. Security concerns across DoD have been greatly heightened because of the Sept. 11 terrorist attacks, Dixon noted. Widespread use of smart card technology for identification purposes will also enhance DoD's security infrastructure, she noted. Personal identification numbers today, and biometric data such as fingerprints in the future, can be contained on the card, making it much more secure than paper IDs, Dixon said. "There is a one-in-a-million chance that you might guess a person's six-digit PIN," she explained, adding that the card automatically locks up to deny access after receiving three incorrect PINs. Widespread use of Common Access Cards should bolster security for DoD's people, buildings and facilities, Dixon noted. The new technology, she added, also allows a "one- card-fits-all" system, so IDs, Public Key Infrastructure tokens, and multiple security passes could be melded onto one card. Unlike easily duplicated paper ID cards, common access cards -- with their one-of-a-kind computer chips and embedded biometric data -- can facilitate secure access into a sophisticated computer security network, Dixon explained. If a common access card is lost or stolen, she noted, the identification and security accesses on the card can be invalidated immediately. Biometric information already in the card's computer database, she added, would be checked when a request is made for a replacement card. Issuance of Common Access Cards contains myriad checks and balances to ensure integrity, Dixon noted. A fraudulently issued card might conceivably get past security officials at first, but definitely not for long, she said. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.333 / Virus Database: 187 - Release Date: 3/8/2002 4992 From: Matthew Paulsen Date: Sun Mar 10, 2002 3:09pm Subject: RE: Implementation of "smart card" technology across DoD by 2003 The cards we were issuing (and the one I was issued) ran between $30 and $60 flat depending on weather it was a "card" or "fob" - cards were garbage, people kept putting them in their wallet, and they would break - what a concept... a card in your wallet. And then you had a badge which was simpler that ran $4 - $6 to make, and administrative overhead that was calculated at $15 - $20 for creating everything, and an additional $80 - $120 for security development for your access id's to be populated throughout the system. Matt -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Sunday, March 10, 2002 12:56 PM To: 'TSCM submissions' Subject: FW: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 Reposting to group. -----Original Message----- From: Thomas (Yahoo!) [mailto:thomasroygarner@y...] Sent: Sunday, March 10, 2002 9:10 AM To: mpaulsen6@a... Subject: RE: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 Has anyone seen these cards yet? I have one (active duty) and for those that have had military experience, this may come as a laugh. One item is the cost of these cards. I haven't seen much discussion on this, however, if one is to break down the costs (and I'm estimated largely here, so please forgive), we are GOING to see a HUGE administrative cost regarding the new ID cards. Guessing that in about four years (give/take), and I'm not including advancement, card replacement and influx of new personnel, since the cards are now being distributed Navy Wide, the cost is going to increase. I was issued my card about one month ago, according to the ID Card (civilian) processor, these cards cost between (not exact so don't flame me ok?) $10.00 - $15.00 each. My card is good for four years, so, imagine, Navy wide, @ $10-15 bucks a card, every four years, how much money this is going to cost. Assuming an estimated number of personnel @ around 100,000 (HUGE ESTIMATE WARNING!!! Figures not verified) personnel, your looking at $1-$1.5 yearly cost in about four years, once the cards come online. So, I'm assuming we will start seeing "notes" regarding how to take care of ones card, not to damage them, misplace them, etc. Since, they are only issuing the cards (in my area) on advancement and/or extensions. OK, so the #'s are not exact, but the point there will be a cost increase. What happens if a new encryption scheme comes out? Are they going to have to replace every card? Better, what happens if the encryption is cracked? Just curious... The humorous part of my story (besides my math skills) was an attempt to purchase alcohol and use my military ID card. I had a retired military (Army personnel) who was working the counter, and b/c the ID Card looks like a "badge" and not an ID Card, he didn't believe that my card was my military ID Card, I attempted to educate this individual and state that this is indeed my new military ID card. However, the education was lost and so was the sale of goods to me b/c I do not have any other form of ID (another long story). Ok, now that I read this, it isn't that funny, but one can imagine there will be an increase in admin costs, security will be only as good as those educated, and civilian population education will be needed to ensure that everyone knows what the "new" ID card looks like. Ohh yeah, and the printed text on my card is starting to chip away, where my Pay Grade / Rank is listed, the text is starting to flake off, so soon, I'll have to go back to my PSD and request a new ID Card b/c the old card is slowly becoming unreadable. Thomas Roy Garner SETIPRIME ( http://www.setiprime.com ) 4580576 (ICQ)/thomasroygarner (Y!) -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Saturday, March 09, 2002 4:43 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Implementation of "smart card" technology across DoD by 2003 <> By Gerry J. Gilmore American Forces Press Service WASHINGTON, March 8, 2002 –- Implementation of "smart card" technology across DoD by 2003 will enable the department to deploy troops faster and safeguard its people and facilities better, the card's program manager said March 5. DoD's Common Access Card is a plastic identification card with an embedded 32-kilobyte memory chip, said Mary Dixon, director of the DoD Access Card Office. The card has already been issued at many stateside and overseas locales, and about this time next year, 4 million active-duty military, selected reservists, DoD civilians and eligible contractor employees are expected to have them, she noted. The card and stored data can be tied into computer networks for personnel actions and added security. It has proven its worth in speeding troop processing times during recent testing at Schofield Barracks, Hawaii, Dixon noted. The 25th Infantry Division troops there used to have to spend one or more days preparing for deployments using paper records, she said. The cards reduced deployment processing times to about an hour or two for each individual who took part in the test, Dixon remarked. And besides getting troops to the front faster, she noted, Common Access Cards could save time in a number of other ways. "We're returning that time to the units -- they can use it for training," she explained. Security concerns across DoD have been greatly heightened because of the Sept. 11 terrorist attacks, Dixon noted. Widespread use of smart card technology for identification purposes will also enhance DoD's security infrastructure, she noted. Personal identification numbers today, and biometric data such as fingerprints in the future, can be contained on the card, making it much more secure than paper IDs, Dixon said. "There is a one-in-a-million chance that you might guess a person's six-digit PIN," she explained, adding that the card automatically locks up to deny access after receiving three incorrect PINs. Widespread use of Common Access Cards should bolster security for DoD's people, buildings and facilities, Dixon noted. The new technology, she added, also allows a "one- card-fits-all" system, so IDs, Public Key Infrastructure tokens, and multiple security passes could be melded onto one card. Unlike easily duplicated paper ID cards, common access cards -- with their one-of-a-kind computer chips and embedded biometric data -- can facilitate secure access into a sophisticated computer security network, Dixon explained. If a common access card is lost or stolen, she noted, the identification and security accesses on the card can be invalidated immediately. Biometric information already in the card's computer database, she added, would be checked when a request is made for a replacement card. Issuance of Common Access Cards contains myriad checks and balances to ensure integrity, Dixon noted. A fraudulently issued card might conceivably get past security officials at first, but definitely not for long, she said. --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.333 / Virus Database: 187 - Release Date: 3/8/2002 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4993 From: Steve Uhrig Date: Sun Mar 10, 2002 5:40pm Subject: Avcom spectrum analyzer FS - cheap Hello list entities, I have available for sale an Avcom PSA-65A spectrum analyzer. This unit was purchased by a firm who used it twice, cared for it precisely, and sold it off when they realized they did not have the ability to interpret its results properly. The unit comes with the optional FM demodulator, includes standard AM demod, screen overlays, padded carrying case with accessory pouch (for test leads, manuals, shoulder strap etc), handle/stand, original instruction manual in 3 ring notebook with storage pockets, recent rechargeable battery and a telescoping whip antenna suitable for the majority of uses you would have for this thing. It also has the 10 kc bandwidth filter which in addition to providing a narrower bandwidth (normal is 75kc), also increases the lower frequency limit to 200 kc instead of 1 megacycle. This unit sells new on www.avcomofva for $2855 plus $89 for the case. Due to some incompetent coding on the Avcom website, I am unable to check the price of the optional 10kc filter or FM demodulator. I will guesstimate the total cost of this unit new equipped as described, today, would be around $3500. I will sell it for about half that, or $1850. The Avcom is an industry standard spectrum analyzer, used by novices as well as many pros. Many (many!) professional sweepers never move beyond this unit. It is extremely easy to learn and use, potent, sensitive enough to do a fine job, lightweight (about 30 pounds), rugged, very common so you easily will be able to get advice if you need it, reliable, and overall a proper tool for anyone serious about sweeping and not having a blank check budget. The 10kc resolution filter and FM demodulator make this one especially attractive for TSCM as well as an excellent value. The Avcom as described above has a top frequency limit of 1 gig. I also have a downconverter which plugs directly into the PSA-65A and extends the coverage to 2 gigs. It is a fairly elegant unit, actually recalibrating the LCD frequency readout by adding one gig to the readout so you don't have to do it in your head like with other methods. This is an Avcom MFC-something piece also which you will see on their website for $565. My price if purchased with the above PSA-65A is $300, $325 if purchased separately. Separate purchase will not be unless someone buys the spectrum analyzer and does not want the frequency extender. The unit will be shipped in the original heavily padded Avcom box. Anyone interested, contact me with questions or to arrange a sale. I take credit cards for payment and will ship anywhere in the world. If it ships outside the U.S., I will include a 220>110VAC power converter. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4994 From: Hawkspirit Date: Sun Mar 10, 2002 7:57pm Subject: R.F. phones http://www.digitaljournalist.org/issue0005/radio.htm RADIOMAN Roger Williams HOW TO HAVE A CORDLESS PHONE AND MAINTAIN PRIVACY It's only been a few decades since the first rudimentary FM-based cordless phones were introduced for consumer use. With modern computer technology, consumers have a wide range of security devices available to them. However, the buyer needs to know how to find the ultimate in range and reliable security. Without this security the phone user's conversations can easily be monitored and recorded. For instance, your checking account and credit card numbers, as well as other personal information can easily be picked up by unscrupulous eavesdroppers. Most cordless phone users are unaware that anyone with a police scanning device can sit outside a user's home and listen to the private two-way conversation going on. And the party being called may not be aware that the caller is using a cordless phone and thus subject to unknown monitoring. Armed with just a little technical information, however, any buyer can make decisions regarding a cordless phone purchase from the standpoint of security, increased range, and relatively low cost. The Original Phone: 49 MHz When the mass-produced cordless devices were hooked to phone lines as wireless extensions, little thought was given to the eavesdropper. These units transmitted and received direct FM signals on a single frequency, between the government-assigned frequencies of 46.0 MHz and 49.995 MHz. Anyone with a scanner could eavesdrop. Even worse, someone with another cordless phone could be on the same frequency, and if close enough, could access the phone line of the original user to make calls which would be charged to the number of that original user's system. These phones sometimes have ten frequencies that are switchable. Anyone with one of these units can "cruise" the neighborhood, switching channels until a "live one" is found, and then use that person's phone to make a call (as soon as a dial tone is heard, the frequency is active and phone calls can be made and received using someone else's line). Unfortunately, fancy packaging surround these Star Trek-looking devices and sales continue--buyers oblivious to the dangers. The idea is to stay away from these devices which can be easily monitored. New Generation: 900 MHz Phone Systems Once all the concerns over security were voiced, manufacturers requested and received permission to build cordless extension phones in the 900 MHz band range. These extender phones have increased range, and, with the new digital technology, have increased security. However, there are many devices available which can still monitor, but not use the systems. Although this protects the phone systems from illegal use, the eavesdropper remains a problem. This unit is sold to the consumer as eavesdropper-proof, leaving the buyer with a false sense of security. A version of the unit with "Spread Spectrum Technology," which is basically secure, has been introduced in a limited number of devices. Spread Spectrum Technology is a marriage of radio and digital technology involving automated non-repeating frequency switching--computer controlled. This technology provides noise-free transmission with the cleanest audio, combined with the highest security. These systems have double the range of previous systems. A Spread Spectrum transmission is a thousand times wider than a regular cordless phone signal. With all this extra space there is room for more data to be transmitted, which increases the sound quality and reduces interference from other units on nearby frequencies. Scanners are unable to make sense of the Spread Spectrum signal, therefore making it more secure. Only high tech computer-driven systems can monitor Spread Spectrum devices--at great expense and size. If a 900 MHz system is to be purchased, it should have Spread Spectrum Technology in both the handset and the base receiver. If only one part is covered it can still be monitored easily. The Future: 2.4 GHz Systems A number of manufacturers have recently released a version of the Spread Spectrum phones at a frequency not available in any commercially made monitors. The technology is the same as in the 900 MHz Spread Spectrum devices, however, there is slightly more range, with even greater security. Manufacturers and Costs Many major manufacturers are providing the consumer with quality, high-security devices. Competition between these manufacturers is keeping down the cost to the consumer. The prices range from about $60, for the totally non-secured 49 MHz devices, to $200 for the high-end 2.4 GHz Spread Spectrum unit with caller I.D., paging, voice mail, redial, message waiting and other exotic features. Uniden Corporation, Sony, Panasonic, and AT&T are among the major suppliers of today's equipment. I recommend that warranties be carefully checked. If the salesperson can explain Spread Spectrum Technology, they may be the right one to help you in your selection. If not, look carefully at the documentation--the unit's technology may NOT be Spread Spectrum. Remember: the unit MUST have Spread Spectrum on BOTH the handset and its base. Radioman can be reached at roger.w@i... All questions are certainly welcome. 4995 From: Hawkspirit Date: Sun Mar 10, 2002 8:25pm Subject: R.F. Phone Scrambling Anyone know what flavor of scrambling they are using on this phone? http://www.pc4d.com/electronics/products/97/gh2400_cordless_phone.shtml "The Freedom Phone features security protections for your privacy. Voice scramble encodes the signal between the handset and the base when you place and receive calls, making it virtually impossible for someone to intercept or understand your private conversations. Your cordless phone also randomly selects one of 65,000 available security codes." 4996 From: Hawkspirit Date: Sun Mar 10, 2002 9:20pm Subject: R. F. phone scrambling Here is a something on Casio's security approach Security: SecureComtm uses a highly sophisticated digital voice-scrambling technology, making eavesdropping on the communication between the handset and the base virtually impossible. Automatic Digital Security Coding protects communications between the handset and base by randomly selecting one of 16 million security codes. Signals from other phones, baby monitors or other 900 MHz devices will not falsely activate CASIO COMMUNICATIONS's 900 MHz features. 4997 From: Hawkspirit Date: Sun Mar 10, 2002 9:46pm Subject: Spread Spectrum Demodulator If you think that spread spectrum or frequency hopping alone will secure your R.F. phone conversation this next section describes the demodulator chips: Spread spectrum signals are demodulated in two steps: 1) the spectrum spreading (direct sequence, frequency hopping) modulation is removed, and 2) the signal is demodulated. The process of despreading a signal is called correlation. The spread spectrum signal is despread when the proper synchronization of the spreading code between the transmitter and receiver is achieved. Synchronization is the most difficult aspect of the receiver. More time, research, effort, and money has gone into the development and improving of synchronization techniques than in any other area of spread spectrum. The problem of synchronization is further broken down into two parts: initial acquisition and tracking. There are several methods to solve the synchronization problem. Many of these methods require a great deal of discrete components to implement. But perhaps the biggest break-through has been from Digital Signal Processing (DSP) and Application Specific Integrated Circuits (ASIC). DSP has provided high speed mathematical functions that can slice up in many small parts and analyze the spread spectrum signal to synchronize and decorrelate it. ASIC chips drive down the cost by using VLSI technology and creating generic building blocks that can be used in any type of application the designer wishes. With the fast growing Part 15 and Personal Communications System (PCS) spread spectrum market, many ASIC manufactures have been designing and selling ASIC chips that take care of the most difficult problem in spread spectrum -- despreading and synchronization. With a few extra components, the amateur can have a fully functioning spread spectrum receiver. One manufacture of a spread spectrum demodulator ASIC is Loral Communications Systems (recently Unisys Communications Systems Division) DSP Components, Dept. 9065, M/S F1F12, 640 North 2200 West, Salt Lake City, Utah 84116-2988; Phone: (801) 594-2440. Their PA-100 performs the functions of despreading and demodulation, carrier recovery loop (frequency or phase), Pseudo Noise (PN) code detection, PN code tracking loop, data synchronization, and automatic gain control. It is programmable and offers a wide range of choices in data rates, modulation types, processing gains, PN codes, loop bandwidths, and tracking and acquisition procedures. It is capable of chipping rates up to 32 Mcps and data rates up to 64 Mbps. The PA-100 is controlled via a simple 8-bit interface. The chip is a 208-pin plastic Metrix Quad Flat Package (MQFP). The cost of the chip is $167.00 in single qty and $67.00 in lots of 1000. 4998 From: Lawrence Dillard Date: Sat Mar 9, 2002 8:08pm Subject: snoop diffuse CRT light group: CRT light, reflected from a wall and detected with a PMT, computer processed, enables reading the screen! Check the 16 page PDF file at: http://www.cl.cam.ac.uk/~mgk25/ieee02-optical.pdf Regards Larry Dillard 4999 From: Charles P Date: Sun Mar 10, 2002 9:48pm Subject: Re: R. F. phone scrambling Important advertising distinction... > Automatic Digital Security Coding protects communications between the > handset and base by randomly selecting one of 16 million security codes. Most likely this is NOT scrambling > Signals from other phones, baby monitors or other 900 MHz devices will not > falsely activate CASIO COMMUNICATIONS's 900 MHz features. The security codes they speak of ONLY prevent other devices from accessing the phone line, etc. They typically do NOT prevent other devices from listening. Charles ----- Original Message ----- From: "Hawkspirit" To: Sent: Sunday, March 10, 2002 10:20 PM Subject: [TSCM-L] R. F. phone scrambling > Here is a something on Casio's security approach > > Security: SecureComtm uses a highly sophisticated digital voice-scrambling > technology, making eavesdropping on the communication between the handset > and the base virtually impossible. > Automatic Digital Security Coding protects communications between the > handset and base by randomly selecting one of 16 million security codes. > Signals from other phones, baby monitors or other 900 MHz devices will not > falsely activate CASIO COMMUNICATIONS's 900 MHz features. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 5000 From: Steve Uhrig Date: Sun Mar 10, 2002 11:07pm Subject: Comments on CASIO phones & EN-Genius > Signals from other phones, baby monitors or other 900 MHz devices will > not falsely activate CASIO COMMUNICATIONS's 900 MHz features. Casio discontinued the manufacture of all telephone equipment (Phone Mate Division) about 6 months ago. Anything still remaining is dead stock. There is a separate company contracted for warranty service, but no parts, accessories or post-warranty repairs are available. So I would question the wisdom of any investment in them unless you are willing to toss it when it croaks. You will find all telephone numbers for Casio/Phone Mate have been disconnected and their website is dead. I had just bought a new Casio Phone Mate multi line multi handset CDMA cordless phone system for the office last fall, and, as I always do, I purchase a service manual for the system so I can somehow bump up the handset volume. Both my wife and I are very hard of hearing and cannot use ordinary cordless phones because the earpiece volume is too low. I tried to get a service manual for the new cordless system and learned Casio was out of the phone business. I patiently wound my way through the labrynth on the web and on the phone to the contract service center and they said they had one manual and under the terms of their contract they were not allowed to release any technical info. I told them why I wanted it, and it turned out the boss in that office also was hard of hearing, they used the same cordless phone system, and had developed a mod to increase the earpiece volume in the cordless handset. They faxed me a schematic and indicated a single resistor to change. That worked and made the things usable. Adding a counterpoise to the antenna on the base increased the range a good bit but it still is pretty poor. Other than that, I love the phones and they are impossible to copy on a scanner. A scanner does not even stop on them. Wish I could buy more handsets for them, because I only got three with them, for me, my wife and my tech, and when one croaks the system gets replaced the next day. There were no more separate handsets available anywhere I looked. System came with one. Speaking of range, does anyone have any experience with the En-Genius super long range cordless phone system? Since my house and my office are next door to each other and share the same phone system, computers, satellite uplink, etc. I would like a cordless phone which covers both properties. The properties are fairly large but the total of 3 buildings are fairly close and all are wood frame and no foil backed insulation. No cordless phone I have tried will work reliably from the back corner of the house to the back corners of the office. I am not going to put an outside antenna on the cordless phone. I would appreciate a direct mail from anyone who has experience with these systems. I'm ready to buy one as soon as I find someone who actually has used one. Tks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5001 From: Justin T. Fanning Date: Mon Mar 11, 2002 2:57am Subject: Re: R. F. phone scrambling That's a 24 bit authentication system (2^24 = 16,777,216), which most likely translates to 2 rows of 12 dip switches (which are almost always left in the factory default), or perhaps a few thumb wheels (that usually always get set to someone's birthday or phone number). 99% chance it's only being used to authenticate the handset to the base and Vis-à-vis. Enough to perhaps stop the casual passer by from making toll calls, but considering this is effectively a three character password, an automated system would have it within a very short period. Not to mention that I don't believe these systems make any attempt to encode or use any Diffie-Hellman style key exchange and simply transmit their keys in the clear, so a sophisticated party could grab the key(s) right out of the air. A-K-A "Gone in 60 Seconds" garage door opener scene. My personal opinion (for what it's worth), I'd try and convince your client to not use a cordless phone as their primary handset for HEALTH reasons. Most of us are trying to eliminate excess RF from our lives, not glue a 2.4 Ghz TX to our ear (I wonder why no company has produced an IR cordless?! - IR headphones have been available for years). I think you'll find there is simply no consumer demand for highly secure cordless phones. (try a google search on +"cordless phone" and +"scramble"). A quick search showed some frequency inversion, what looked like some bit shift or bit flip techniques, but mostly snake oil. There also seems to be significant confusion at the retail end between call content security and call authentication security which frequently seemed to get blurred something like "This phone uses 65K codes so you know you're calls will be secure". Consider most major manufactures in this market want to market their products globally and a phone with built in heavy encryption spells heavy export & import issues in many countries. You could build a solution from existing off the shelf parts, Motorola and many of the majors all produce encryption modules for their two way radio lines (not sure about full duplex though), you could build this right into the handset & base. But now your talking custom installations, voided warranties, voided telco/FCC permits etc. I wonder if there is some type of external analogue encryption device that may acoustically fit to the handset, with another box between the receiver and the wall socket? This may offer a clumsy (but non warrantie/FCC voiding) solution. Have you considered an STU-IIB/STU-III minisat terminal solution? Good security, calls costs are a little higher than your average telco, but you have to love that range! :) (the ultimate cordless phone) JF --- Charles P wrote: > > Important advertising distinction... > > > Automatic Digital Security Coding protects communications between the > > handset and base by randomly selecting one of 16 million security codes. > > Most likely this is NOT scrambling > > > Signals from other phones, baby monitors or other 900 MHz devices will not > > falsely activate CASIO COMMUNICATIONS's 900 MHz features. > > The security codes they speak of ONLY prevent other devices from accessing > the phone line, etc. They typically do NOT prevent other devices from > listening. > > Charles > > ----- Original Message ----- > From: "Hawkspirit" > To: > Sent: Sunday, March 10, 2002 10:20 PM > Subject: [TSCM-L] R. F. phone scrambling > > > Here is a something on Casio's security approach > > > > Security: SecureComtm uses a highly sophisticated digital voice-scrambling > > technology, making eavesdropping on the communication between the handset > > and the base virtually impossible. > > Automatic Digital Security Coding protects communications between the > > handset and base by randomly selecting one of 16 million security codes. > > Signals from other phones, baby monitors or other 900 MHz devices will not > > falsely activate CASIO COMMUNICATIONS's 900 MHz features. > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5002 From: Charles P Date: Sun Mar 10, 2002 11:42pm Subject: Re: Comments on EN-Genius I tested an EnGenius with a Siemens 2420 Gigaset and found them to be fairly equal. The EnGenius was nothing spectacular. The significance may be the ability to add external antennae. But the Siemens also is supposed to have external antenna capability too if my memory is correct. The EnGenius was built very solidly, metal housing. Heavy though. I have a Panasonic KXT7890 ss phone with a remote handset charger. I put the base in the attic and I can get a clear signal in another building about 1/2 block away (~1/8 mile?) through trees. They discontinued that model though, so if you find one it's a good deal. Charles ----- Original Message ----- From: "Steve Uhrig" To: Sent: Monday, March 11, 2002 12:07 AM Subject: [TSCM-L] Comments on CASIO phones & EN-Genius > > Signals from other phones, baby monitors or other 900 MHz devices will > > not falsely activate CASIO COMMUNICATIONS's 900 MHz features. > > Casio discontinued the manufacture of all telephone equipment (Phone Mate > Division) about 6 months ago. > > Anything still remaining is dead stock. > > There is a separate company contracted for warranty service, but no > parts, accessories or post-warranty repairs are available. So I would > question the wisdom of any investment in them unless you are willing to > toss it when it croaks. You will find all telephone numbers for > Casio/Phone Mate have been disconnected and their website is dead. > > I had just bought a new Casio Phone Mate multi line multi handset CDMA > cordless phone system for the office last fall, and, as I always do, I > purchase a service manual for the system so I can somehow bump up the > handset volume. Both my wife and I are very hard of hearing and cannot > use ordinary cordless phones because the earpiece volume is too low. > > I tried to get a service manual for the new cordless system and learned > Casio was out of the phone business. I patiently wound my way through the > labrynth on the web and on the phone to the contract service center and > they said they had one manual and under the terms of their contract they > were not allowed to release any technical info. I told them why I wanted > it, and it turned out the boss in that office also was hard of hearing, > they used the same cordless phone system, and had developed a mod to > increase the earpiece volume in the cordless handset. They faxed me a > schematic and indicated a single resistor to change. That worked and made > the things usable. > > Adding a counterpoise to the antenna on the base increased the range a > good bit but it still is pretty poor. Other than that, I love the phones > and they are impossible to copy on a scanner. A scanner does not even > stop on them. Wish I could buy more handsets for them, because I only got > three with them, for me, my wife and my tech, and when one croaks the > system gets replaced the next day. There were no more separate handsets > available anywhere I looked. System came with one. > > Speaking of range, does anyone have any experience with the En-Genius > super long range cordless phone system? Since my house and my office are > next door to each other and share the same phone system, computers, > satellite uplink, etc. I would like a cordless phone which covers both > properties. The properties are fairly large but the total of 3 buildings > are fairly close and all are wood frame and no foil backed insulation. No > cordless phone I have tried will work reliably from the back corner of > the house to the back corners of the office. I am not going to put an > outside antenna on the cordless phone. > > I would appreciate a direct mail from anyone who has experience with > these systems. I'm ready to buy one as soon as I find someone who > actually has used one. > > Tks ... Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5003 From: Shawn Hughes Date: Mon Mar 11, 2002 10:09am Subject: phones, phones, phones Guys, Short of a STU-III being fed into a RF link, there just ain't no REALLY secure cordless phones. I've looked into it for years, because I like being able to go to the shop or pubs area, while talking on the phone (trying to explain something). The trick on the CASIO and all others using "Automatic Digital Security Coding", is: that ADSC has nothing to do with voice privacy. In ye olde days, you could take your cordless phone, and cruise around hitting 'talk' until you key up somebody else's base. Especially with a ham antenna grafted onto the phone handset. Both illegal, but done. Now, the phones' base loads a code into the handset everytime you replace it into the base. It sends this code as a preamble - no code, no dialtone. On the 2.4GHz units, be wary. Many use 2.4 for the out but still use 900 MHz for the back haul. Now following the thread, I have learned something new. Can you explain in more depth what you were using, and did to demod a spread spectrum signal again, please? Sincerely, Shawn 5004 From: James M. Atkinson Date: Mon Mar 11, 2002 11:07am Subject: Seminar : "What to do after you discover the bug..." - Boston 4/27/2002 SEMINAR ANNOUNCEMENT Granite Island Group Title: "What to do after you discover the bug..." Date: April 27-28, 2002 Duration: Twelve (12) classroom hours Location: Boston, MA Who Should Attend: Government, corporate, and private TSCM specialists, counter intelligence technicians, private investigators, law enforcement officers, and security personnel who are, have been, or may be involved finding an eavesdropping device or anyone involved in investigating an eavesdropping incident. Prerequisites: There are no formal prerequisites, however; this seminar assumes the attendee has knowledge of basic TSCM, counterintelligence, or investigative skills. Scope: This seminar will cover the protocols to follow when an eavesdropping device (or suspected eavesdropping device) is discovered to ensure that the eavesdropper or device can be identified. The seminar will also cover making proper notifications, documentation procedures, collection of evidence, establishing a chain of custody, evaluating the device, and measures taken to protect the discovery, and yet identify the spy. Security Classification: This seminar is unclassified, however; the material presented will cover highly proprietary materials, specialized methods, and trade secrets. As such all attendees will be required to sign a trade secret non-disclosure agreement. Instructor: James M. Atkinson, President and Sr. Engineer, Granite Island Group; Mr. Atkinson is a TSCM specialist, counter-surveillance expert, communications engineer, security consultant, and instructor with a reputation for designing and installing some of the most powerful secure communications systems used by both government agencies and major corporations. He has personally performed hundreds of TSCM inspections and is one of the most respected names in the industry. Registration: Attendance is limited and the seminar is expected to fill up fast so complete and return the attached registration and payment as soon as possible to guarantee your seat. All registrations will be acknowledged, and each attendee will be sent an agenda, hotel registration instructions, maps, and directions to the seminar site. Registration closes 14 days before the seminar. Seminar Fee: The fee for this seminar is $1295.00 USD per attendee for early registration and payment (until March 26, 2002). The fee for attendees who register and/or pay after March 26, 2002 is $1595.00. Online Signup: http://www.tscm.com/seminar02116.html Includes: The seminar fee will include over 12 hours of formal instruction, 100+ page "Discovery Protocol" workbook, and certificate of attendance. Attendees will also receive copious proprietary handouts, worksheets, charts, various tools, forensic items, and related materials (so reserve some extra space in your luggage). The seminar fee also includes a continental breakfast and catered lunch each day, beverages, and snacks (during the class). However, attendees will be on their own for dinner, drinks, lodging, travel, etc. Payment Options: The seminar fee is payable in full in advance at the time of registration, and at least 21 days in advance either by a check, money order, PayPal payment, or credit card via PayPal to: https://secure.paypal.x.com/refer/pal=jmatk%40tscm.com). If your agency requires an invoice to facilitate payment we are happy to provide same, but the invoice will still have to paid at least 21+ days in advance. Seminar Registration Form Full payment must be received at least 21 days before seminar date Name:______________________________________________ Company:______________________________________________ Address:______________________________________________ City:__________________State: _____Zip Code:_____ Phone:__________________Fax:___________________ E-Mail______________________________ Signature______________________________Date _________ Form of Payment Check ____ Money Order ____ PayPal ____ Credit Card (via PayPal) ____ Here is the full PayPal link for this seminar in case you need it: https://www.paypal.com/xclick/business=jmatk%40tscm.com&undefined_quantity=1&item_name=Seminar+-+What+to+do+after+you+discover+the+bug/BOSTON&item_number=Seminar+02116+%5Bearly+registration%5D&amount=1%2C295.00&return=http%3A//www.tscm.com/seminar02116.html Please complete this form and email, fax, or mail, along with your payment to: Granite Island Group 127 Eastern Avenue #291Ph: (978) 381-9111 Gloucester, MA 01931-8008Fax: http://www.tscm.com/mailto:jmatk@tscm.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 5005 From: Matthew Paulsen Date: Mon Mar 11, 2002 11:22am Subject: Hong Kongers to get 'smart' ID cards Hong Kongers to get 'smart' ID cards http://www.cnn.com/2002/TECH/ptech/03/11/hong.kong.smart.ids.ap/index.html 5006 From: A Grudko Date: Tue Mar 12, 2002 4:29am Subject: TSCMer coming of age Troling through jma's wesite today I saw something I wanted to briefly comment on. This week my wife and I are celebrating 21 years in the PI business. I didn't note the date I started serious TSCM work but it was about a year later with the purchase of my first Scanlock. I know that Uncle James is somewhat critical of PIs who conduct sweeps but in my own defence, because the State won't appoint an attorney for me, I have to point out that I modified a pre-WW2 Marconi radio to terrorise the neighbourhood with alien noises from our garden when I was about 7. Shortly afterwards I discovered the fun that concealed wired microphones could bring to an 8 year old. At 9 I built a 'cat's whisker' LW receiver and at 11 I built my first LW/MW(AM) radio and BFO. And so it went on, including some relevant study courses, with very important practicals, but not to degree level, plus field work with a company in London. On emmigrating to South Africa in 1979 I saw an oportunity to enter the TSCM field. I have found bugs of all types and I probably missed some, but hopefully, as 'Old Blue Eyes' sings, 'too few to mention'. I keep upgrading my equipment, as my budget allows 'cos TSCM here has not been a big money earner for me but I also value the free updates and advice that I get from this group. Regards Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 5007 From: James M. Atkinson Date: Mon Mar 11, 2002 6:56pm Subject: Keep Alert and Stay Cautious (UPI) WASHINGTON, DC---- Police warn all male clubbers, party-goers and unsuspecting pub regulars to keep alert and stay cautious when offered a drink from any woman. A new date rape drug on the market, called "beer", is being used by females to target unsuspecting men. The drug is generally found in liquid form, and is now available almost anywhere. "Beer" is used by female sexual predators at parties and bars to convince their male victims to go home and have sex with them. Typically, a woman needs only to persuade a guy to consume a few units of "beer" and then simply ask him home for 'no-strings-attached sex.' Men are rendered helpless against this approach: After several "beers" men will often succumb to desires to perform sexual acts on horrific looking women to whom they would never normally be attracted. Men often awaken after being given "beer" with only hazy memories of exactly what has happened to them the night before, just a vague feeling that something bad occurred. At other times these unfortunate men are stung for their life's savings in a familiar scam known as a "relationship." Please! Forward this warning to every male you know. However, if you fall victim to this insidious "beer" and the predatory women administering it, there are male support groups with venues in every town where you can discuss the details of your shocking encounter in an open and frank manner with similarly-affected, like-minded guys. For the nearest such support group near you, just look up "Golf Courses" in the Yellow Pages. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 5008 From: James M. Atkinson Date: Mon Mar 11, 2002 6:50pm Subject: Expensive Cigars Some people are too smart for their own good. A Charlotte NC lawyer purchased a box of 24 very rare and expensive cigars then insured them against fire among other things. Within a month he had smoked his entire stock-pile of these great cigars, without yet having made even his first premium payment on the policy and duly filed a claim against the insurance company. In his claim, the lawyer stated the cigars were lost "in a series of small fires." The insurance company refused to pay, citing the obvious Reason: that the man had consumed the cigars in the normal fashion. The lawyer sued....and won! In delivering the ruling the judge agreed with the insurance company that the claim was frivolous. The Judge stated nevertheless, that the lawyer held a policy from the company in which it had warranted that the cigars were insurable and also guaranteed that it would insure them against fire, without defining what! is considered to be "unacceptable Fire," and was obligated to pay the claim. Rather than endure a lengthy and costly appeal process, the insurance company accepted the ruling and paid $15,000.00 to the lawyer for his loss of the rare cigars in the "fires." NOW FOR THE BEST PART... After the lawyer cashed the check, the insurance company had him arrested on 24 counts of ARSON!!!! (Since there was a time break between the consumption of each cigar, each consumption was ruled a separate incident). The State used his own insurance claim and court testimony from the previous case against him. The lawyer was convicted of intentionally burning his insured property 24 separate times and sentenced him to 24 months in jail, ordered him to register with the local law enforcement where ever he lives as an arsonist (same classification as a sex offender since many cases of arson are actually considered sex offenses) and had to pay a $24,000.00 fine. This is a true story and was the 1st place winner in the recent Criminal Lawyers Award Contest. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 5009 From: James M. Atkinson Date: Mon Mar 11, 2002 7:23pm Subject: Re: TSCMer coming of age Andy, You misunderstand, I don't at all have a problem with PI's performing TSCM services provided that they are good at TSCM, have legitimate equipment, and don't misrepresent themselves to their client.. If the PI has a few weeks (or even days) of formal TSCM training under their belt, AND some legitimate equipment, AND they make if very clear the client what their technical limitations are, then I applaud them in their efforts. What I have a problem are PI's who buys a $3,000 box, attends little (if any) training and then hang their shingle out claiming to be a bug sweeping expert. There is a huge difference between an engineer or technician who shows up with a half million dollars in laboratory grade test equipment, and a unemployed cop with a CPM-700. I know a number of PI's who provide TSCM services, and most know when they need to bring in "the heavy guns" (ie: an outside TSCM specialist), but they also know when a quick check with a CPM-700 may be all the client needs. -jma At 12:29 PM +0200 3/12/02, A Grudko wrote: >Troling through jma's wesite today I saw something I wanted to briefly >comment on. > >This week my wife and I are celebrating 21 years in the PI business. I >didn't note the date I started serious TSCM work but it was about a year >later with the purchase of my first Scanlock. > >I know that Uncle James is somewhat critical of PIs who conduct sweeps but >in my own defence, because the State won't appoint an attorney for me, I >have to point out that I modified a pre-WW2 Marconi radio to terrorise the >neighbourhood with alien noises from our garden when I was about 7. > >Shortly afterwards I discovered the fun that concealed wired microphones >could bring to an 8 year old. >At 9 I built a 'cat's whisker' LW receiver and at 11 I built my first >LW/MW(AM) radio and BFO. >And so it went on, including some relevant study courses, with very >important practicals, but not to degree level, plus field work with a >company in London. On emmigrating to South Africa in 1979 I saw an >oportunity to enter the TSCM field. > >I have found bugs of all types and I probably missed some, but hopefully, as >'Old Blue Eyes' sings, 'too few to mention'. > >I keep upgrading my equipment, as my budget allows 'cos TSCM here has not >been a big money earner for me but I also value the free updates and advice >that I get from this group. > >Regards > >Andy Grudko -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after. - Sir Arthur Conan Doyle -------------------------------------------------------------------------------------------------- 5010 From: Steve Uhrig Date: Mon Mar 11, 2002 7:37pm Subject: We has arrived The Minox Historical Society makes a commemorative mug and T shirt every month as collector's items, with a different Minox camera each month. I am a member of the Executive Committee (ExComm has 2 members, elected by the membership, which is about 1000 worldwide). Check here *carefully* http://www.cafepress.com/cp/store/store.aspx?storeid=minox,minox1,minox2 Look at the shirts and the mugs. I used to be a nobody in Minox. Now I am a well known nobody. Fruit Cake ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5011 From: mwel10 Date: Tue Mar 12, 2002 2:58am Subject: Citizens of the world (humor) TOP 10 REASONS FOR BEING DUTCH 1. You can get arrested for growing plants, but not for smoking them. 2. You can make jokes about the Belgians and still drink their beer. 3.a. You can legally kill yourself. b. You can legally be killed 4. You're exactly like the Germans, except that nobody hates you. 5. You think you are a world power, but everyone else thinks Copenhagen is your capital. 6. You get to insult people and defend yourself by saying it's a national tradition. 7. You can put your finger in a dyke and it will save your country. 8. You live in the most densely populated country in Europe, and still you've never seen your neighbours. 9. If the economy is bad, blame the Germans. If a war is started, blame the Germans. If you lose your keys, blame the Germans. 10.Bikes are public property. Locks are a challenge. TOP 10 REASONS FOR BEING BELGIAN 1. You get to speak three languages, but none of them intelligibly. 2. If other countries want to fight a war, they will do it in your country. 3. You can brew drinks out of fruit, and still call it beer. 4. You are either a. like the Dutch, just less efficient b. like the French, just less romantic c. like the Germans. 5. Decent fries. Real mayonnaise. Great chocolate. The best beer. 6. No one knows anything about you, except for the Dutch and French and they make fun of you. 7. More scandals in a week than any other country in a decade. 8. You can drive like a maniac on the road and nobody cares. 9. All your famous countrymen are either imaginary, or sex-offenders. 10. Face it. It's not really a country, is it ? TOP 10 REASONS FOR BEING FRENCH 1. When speaking fast you can make yourself sound gay. 2. Experience the joy of winning the World Cup for the first time. 3. You get to eat insect food like snails and frog's legs. 4. If there's a war you can surrender really early. 5. You don't have to read the subtitles on those late night films on Channel 81 6. You can test your own nuclear weapons in other people's countries. 7. You can be hideously ugly and still become a famous film star. 8. Allow Germans to march up and down your most famous street humiliating your sense of national pride. 9. You don't have to bother with toilets, just crap in the street. 10. People think you're a great lover even when you're not. TOP 10 REASONS FOR BEING AMERICAN 1. You can have a woman president without electing her. 2. You can spell color wrong and get away with it. 3. You can call Budweiser beer. 4. You can be a crook and still be president. 5. If you've got enough money you can get elected to do anything. 6. If you can breathe you can get a gun. 7. It's cool to be really obese. 8. You can play golf in the most grotesque clothes ever made and nobody seems to care. 9. Pitch in at the 11th hour for major world conflicts. 10. You get to play/watch glorified cricket called baseball with each other and call it a "World" series. TOP 10 REASONS FOR BEING ENGLISH 1. Two World Wars and One World Cup. 2. Warm beer. 3. You get to play/watch glorified rounders called cricket. 4. You get to accept defeat very graciously in major sporting events. 5. Union jack underpants. 6. Water shortages guaranteed every single summer and flooding in Winter. 7. You can live in the past and imagine you are still a world power. 8. Bathing once a week - whether you need to or not. 9. Ditto changing underwear. 10. Beats being Welsh. TOP 10 REASONS FOR BEING SCOTTISH 1. You're not English! 2. You're not English! 3. You're not English! 4. You're not English! 5. You're not English! 6. You're not English! 7. You're not English! 8. You're not English! 9. You're not English! 10. You're not English! TOP 10 REASONS FOR BEING ITALIAN 1. In-depth knowledge of bizarre pasta shapes. 2. Unembarrassed to wear fur. 3. No need to worry about tax returns. 4. Glorious military history prior to 117AD. 5. Can wear sunglasses indoors or at night. 6. Political stability. 7. Flexible working hours. 8. Live near the Pope. 9. Can spend hours braiding girlfriend's armpit hair. 10. Country run by Sicilian mobsters. TOP 10 REASONS FOR BEING SPANISH 1. Glorious history of killing South American tribes. 2. The rest of Europe thinks Africa begins at the Pyrenees. 3. You get your beaches invaded by Germans, Danes, Brits, etc. 4. The rest of your country is already invaded by Moroccans. 5. Everybody else makes crap paella and claims it's the real thing. 6. Honesty. 7. Only sure way of bedding a woman is to dress up in stupid, tight clothes and risk your life in front of bulls. 8. You get to eat bull's testicles. 9. Gibraltar. 10. Supported Argentina in Falklands War. TOP 10 REASONS FOR BEING GERMAN 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Ok, give them a second chance 1. Oktoberfest. 2. Oktoberfest-beer. 3. BMW. 4. VW. 5. Audi. 6. Mercedes. 7. On a highway you can travel at a speed that would bring you to jail in any other country of the world. 8. You do not have to learn German as a foreign language. 9. You think sauerkraut is delicious. 10. Contrary to common belief laughing is not forbidden by law (yet). TOP 10 REASONS FOR BEING INDIAN 1. Chicken Madras. 2. Lamb Passanda. 3. Onion Bhaji. 4. Bombay Potato. 5. Chicken Tikka Masala. 6. Rogan Josh. 7. Popadoms. 8. Chicken Dopiaza. 9. Kingfisher lager. 10. Aggravate everyone else by shaking your head when talking. TOP 10 REASONS FOR BEING IRISH 1. Guinness. 2. 18 children because you can't use contraceptives. 3. You can get into a fight just by walking down someone's street. 4. Pubs never close. 5. Can use Papal edicts on contraception passed in second Vatican Council of 1968 to persuade your girlfriend that you can't have sex with a condom on. 6. No one can ever remember the night before. 7. Kill people you don't agree with. 8. Stew. 9. More Guinness. 10. Eating stew and drinking Guinness in an Irish pub at 3 in the morning after a bout of sectarian violence. TOP 10 REASONS FOR BEING CANADIAN 1. It beats being an American. 2. Only country to successfully invade the US and burn its capital to the ground. 3. You can play ice hockey 12 months a year, outdoors. 4. Only country to successfully invade the US and burn its capital to the ground. 5. Where else can you travel 1000 miles over fresh water in a canoe? 6. A political leader can admit to smoking pot and his/her popularity ratings will rise. 7. Only country to successfully invade the US and burn its capital to the ground. 8. Kill Grizzly bears with huge shotguns and cover your house in their skins. 9. Own-an-Eskimo scheme. 10. Only country to successfully invade the US and burn its capital to the ground. TOP 10 REASONS FOR BEING AUSTRALIAN 1. Know your great-grand-dad was a murdering bastard that no civilized nation on earth wanted. 2. Fosters Lager. 3. Dispossess Aborigines who have lived in your country for 40,000 years because you think it belongs to you. 4. Cricket captain not afraid to cry live on TV. 5. Tact and sensitivity. 6. Bondi Beach. 7. Other beaches. 8. Liberated attitude to homosexuals. 9. Drinking cold lager on the beach. 10. Having a bit of a swim and then drink some cold lager on the beach. TOP 10 REASONS FOR BEING GREEK 1. You get to shout about your culture although the only real culture most Greeks have is what is growing between their toes. 2. The police are even more corrupt than the criminals they are supposed to be chasing. 3. You can blow your nose in the street by pinching it between the thumb and forefinger and trumpeting forth without everyone around retching their stomach contents up at the sight. 4. Old women can sport moustaches. 5. Young women can sport moustaches. 6. Men can be hairier than the average grizzly bear and not get put in a zoo. 7. You get to call the bouzouki a musical instrument when the rest of the world sees it as an instrument of torture. 8. You are the only nation to have lost its marbles and still wants to let everyone else around the world know about it. 9. Ridiculous bureaucracy. 10. Nana Mouskouri and George Michael. Yours sincerely, Matthijs 5012 From: David Alexander Date: Tue Mar 12, 2002 7:17am Subject: re: we has arrived >Date: Mon, 11 Mar 2002 20:37:50 -0500 >From: "Steve Uhrig" >Subject: We has arrived > >The Minox Historical Society makes a commemorative mug and T shirt every >month as collector's items, with a different Minox camera each month. I >am a member of the Executive Committee (ExComm has 2 members, elected by >the membership, which is about 1000 worldwide). > >Check here *carefully* > >http://www.cafepress.com/cp/store/store.aspx?storeid=minox,minox1,minox2 > >Look at the shirts and the mugs. > >I used to be a nobody in Minox. Now I am a well known nobody. I could cope with spending 20,000 on sweep gear. I could even cope with growing a beard But if I have to have a hat like that to be a TSCMer, then I'm sticking with Information Security work ! Sorry Steve, too good an opportunity to pass up on. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b....