From: David Alexander Date: Fri Mar 14, 2003 2:48am Subject: RE: France > -----Original Message----- > From: Ocean Group - MU TSD [mailto:inertia@o...] > Sent: 08 March 2003 15:54 > To: TSCM Group > Subject: [TSCM-L] France > > > What's sadder is that obviously it simply isn't a joke your > sending out but > a voice of contempt for people that do not agree with you. > > Anyway...on my last visit to France a couple of weeks ago I > sat down for > dinner with some friends...they couldn't believe what they > were seeing on > TV, Yanks pouring french wine in the gutter to show their > support for their > troops. What's more they promptly pointed out that everyone > in the US was > saying that without them in WW2 there would be no France. > They then informed > me that without France there would have been no USA during the war of > independence. Funny that. By the same token, you kicked our English butts in 1776, but now we're the ones lining up alongside you out in the desert. In the 14th & 15th Century England and France had a war known as the 'Hundred years war' (France 1, England 0 after extra time ), yet in 1944 we played a major part (with yourselves) in hauling them out of the fire. I seem to remember the US had something called the Monroe doctrine for a long time - what would hapen if you still had that in effect now ? They say 24 hours is a long time in politics, let alone 227 years. Things change. P.S. I always take my .308 calibre semi-auto accordian when I go hunting... David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 7024 From: A Grudko Date: Fri Mar 14, 2003 6:59pm Subject: Lo-jack (sp?) Anyone out there familiar with the tech. side of the lo-jack vehicle recovery system - I'm looking for the frequencies so that I can DF vehicles when I'm on police duty. I guess private replies are the most appropriate. Andy Grudko andy@g... (Hartbeesport Police Reserve). 7025 From: Marcel Date: Fri Mar 14, 2003 9:38am Subject: Re: Lo-jack (sp?) II. BACKGROUND 2. LoJack operates a stolen vehicle recovery system (SVRS) with state and local police departments across the nation. The system aids in the tracking and recovery of stolen vehicles. Section 90.20(e)(6) of the Commission’s Rules designates frequency 173.075 MHz for SVRS use, and sets forth certain technical parameters. For example, mobile units are restricted to a duty cycle of no more than 200 milliseconds every ten seconds, or 200 milliseconds every second when a vehicle is being tracked actively. The Waiver Request seeks a waiver of Section 90.20(e)(6), to permit LoJack to utilize a duty cycle of 1800 milliseconds every 300 seconds when the system is activated by unauthorized movement, with a maximum of six messages per mobile unit in any thirty-minute period. II. BACKGROUND 2. LoJack operates a stolen vehicle recovery system (SVRS) with state and local police departments across the nation. The system aids in the tracking and recovery of stolen vehicles. Section 90.20(e)(6) of the Commission’s Rules designates frequency 173.075 MHz for SVRS use, and sets forth certain technical parameters. For example, mobile units are restricted to a duty cycle of no more than 200 milliseconds every ten seconds, or 200 milliseconds every second when a vehicle is being tracked actively. The Waiver Request seeks a waiver of Section 90.20(e)(6), to permit LoJack to utilize a duty cycle of 1800 milliseconds every 300 seconds when the system is activated by unauthorized movement, with a maximum of six messages per mobile unit in any thirty-minute period. http://ftp.fcc.gov/Bureaus/Wireless/Orders/2000/da001987 A Grudko wrote: > Anyone out there familiar with the tech. side of the lo-jack vehicle > recovery system - I'm looking for the frequencies so that I can DF vehicles > when I'm on police duty. > I guess private replies are the most appropriate. > > Andy Grudko > andy@g... > (Hartbeesport Police Reserve). [Non-text portions of this message have been removed] 7026 From: Marcel Date: Fri Mar 14, 2003 10:11am Subject: Re: Lo-jack (sp?) Here is the LoJack III Theory of Operation And Tuning Procedure Manual From Motorola AIEG Revision: A May 16, 2000 (Note it may not include the new duty cycle referenced here: http://ftp.fcc.gov/Bureaus/Wireless/Orders/2000/da001987.doc) https://gullfoss2.fcc.gov/prod/oet/forms/blobs/retrieve.cgi?attachment_id=118716&native_or_pdf=pdf -- Marcel wrote: > II. BACKGROUND > > 2. LoJack operates a stolen vehicle recovery system (SVRS) with state and local police > departments across the nation. The system aids in the tracking and recovery of stolen > vehicles. Section 90.20(e)(6) of the Commission’s Rules designates frequency 173.075 MHz > for SVRS use, and sets forth certain technical parameters. For example, mobile units are > restricted to a duty cycle of no more than 200 milliseconds every ten seconds, or 200 > milliseconds every second when a vehicle is being tracked actively. The Waiver Request > seeks a waiver of Section 90.20(e)(6), to permit LoJack to utilize a duty cycle of 1800 > milliseconds every 300 seconds when the system is activated by unauthorized movement, with > a maximum of six messages per mobile unit in any thirty-minute period. > http://ftp.fcc.gov/Bureaus/Wireless/Orders/2000/da001987.doc -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 7027 From: James M. Atkinson Date: Sat Mar 15, 2003 0:10am Subject: Dossier Updated - Ian A. Murphy "Captain Zap" Greetings, The dossier of Ian Murphy "Captain Zap" has been updated, and list members should find it interesting (or at least amusing). He is a dirt-bag felon, career felon, and career con artist. http://www.tscm.com/farms.html A number of list members have been screwed by this guy, and the industry as a whole should keep an eye out for him Ian Murphy is a homeless, penniless, petty criminal, convicted felon, psychiatric patient, with a severe narcotic and alcohol addiction. He has been convicted of numerous criminal offenses including felony theft, car theft, drunk driving, and so on. He has repeatedly been arrested for narcotics possession, domestic abuse, and various other "dirty boy" offenses. He is a close associate of Frank Jones "SpyKing" ( http://www.tscm.com/spyking.html ), and several other well know con artists and crackpots. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7028 From: Matt Paulsen Date: Sat Mar 15, 2003 0:42am Subject: RE: Dossier Updated - Ian A. Murphy "Captain Zap" ***** - Secretary Toes, the making. "I laughed... I cried... I cringed..." 7029 From: Matt Paulsen Date: Sat Mar 15, 2003 0:46am Subject: listserv for 1st line respondents? Any good suggestions for 1st line respondents that work in the private industry, yet coordinate with local/state/federal groups for 1st hour response? Areas of interest - government, emergency services, public health, information and telecommunications. TIA, Matt 7030 From: Matt Paulsen Date: Sat Mar 15, 2003 1:11am Subject: RE: Iraqi Cyberwar: an Ageless Joke Does anyone else remember that show from NBC - Secret Service, aired 16 Aug 1992? about the virus embedded in the printer.... I remember watching it that night, quick bling bling for such an early air of the evils of technology..snort. Found the snips below on it as well. So, can anyone validate the claims made in the story that was aired on national TV 11 years later? A few thoughts - someone mistook the fabled evil of all virii, the Novell Virus of 1990 when writing the story? Or, it was as accurate as the moon saga that Fox aired... or it happened as described, and could be the missing link in this urban legend. -various snips below- http://venus.soci.niu.edu/~cudigest/CUDS4/cud438.txt Date: 17 Aug 1992 12:24:24 -0400 (EDT) From: Stephen Tihor 212 998 3052 Subject: File 5--Secret Service -- the TV show Last night NBC broadcast an episode of "Secret Service" in NY at least that featured a straightforwards nut who wants to kill the President The expert quickly diagnosed the problem as a VIRUS. Interesting references were made to viruses lurking WITHIN modems. Then they identified the source of the attacking codes as the local font storage in what appeared to be a old DECwriter dot matrix printer. The expert has announced that this is a logic bomb and eventually realizes that since the bug code is not in the copy of the system on disk as long as they shutdown without writing memory to disk they can reboot bug free. So a brief deliberate blackout is used to save the city. -end snips- -----Original Message----- From: Matthijs van der Wel [mailto:tscm@f...] Sent: Thursday, March 13, 2003 7:01 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Iraqi Cyberwar: an Ageless Joke http://www.securityfocus.com/columnists/147 Did U.S. infowar commandos smuggle a deadly computer virus into Iraq inside a printer? Of course not. So why does it keep getting reported? ... Special Forces men were also said to have infiltrated Iraq, where they dug up a fiber-optic cable and jammed a computer virus into it. "It remained dormant until the opening moments of the air war, when it went active..." wrote the columnist. Iraq's air defense system was vanquished. ... Frankly, this is a great story. It's amusing to remember how it kicked up a storm in 1991 after its initial appearance as an April Fool's joke in Infoworld magazine. The gag asserted the National Security Agency had developed the computer virus to disable Iraqi air defense computers by eating windows -- "gobbling them at the edges..." The virus, called AF/91, was smuggled into Iraq through Jordan, hidden in a chip in a printer - - the latter being a distinguishing feature of many subsequent appearances of the hoax. ... Why was the hoax so successful? The easy answer is to simply call everyone who falls for the joke a momentary idiot. But the Gulf War virus plays to a uniquely American trait: a child-like belief in gadgets and technology and the people who make them as answers to everything. Secret National Security Agency computer scientists made viruses that hobbled Saddam's anti- air defense without firing a shot! Or maybe it didn't work but it sure was a good plan! In this respect, the joke is ageless. People are just as able to nebulously theorize about the tech of it and its implications in 2003 as they were in 1991. Will an updated version of the nonexistent AF/91 virus be used against unwired Iraq? Stay tuned... April 1st is less than a month away. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7031 From: Steve Uhrig Date: Sat Mar 15, 2003 10:35pm Subject: Wirtap prosecution http://www.eonline.com/News/Items/0,1,4775,00.html Remember this was 5 years ago when analog cell was deployed far more widely than it is today. Federal prosecution of a paparazzi for intercepting an analog cell phone call between Tom Cruise and his wife Nicole Kidman. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7032 From: Date: Sun Mar 16, 2003 5:11am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7033 From: Date: Sun Mar 16, 2003 5:11am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7034 From: Does it matter Date: Sat Mar 15, 2003 8:05pm Subject: WOW hope this isn't really being used If you're under FBI surveillance, there's a good chance your phone calls and Internet traffic are traveling over the equipment of Verint Systems -- a company that's doing very well these days, writes SecurityFocus' Kevin Poulsen. New York-based technology firm Verint Systems recently launched a product called "IntelliFind" that claims impressive capabilities. The system is designed to be attached to the phone lines at a company's call center, where it silently monitors every telephone call, and -- using advanced voice recognition technology -- picks out conversations in which certain keywords are spoken, dumping a digital recording into a searchable database. "You can decide you want to see all the calls where product 'xyz' was mentioned, and then you can pick one and listen to that entire call," says Alan Roden, Verint's VP of corporate development. If IntelliFind sounds like something that would normally be found on a supercomputer humming in an NSA basement, there's a reason. Behind business intelligence offerings like IntelliFind, and a line of networkable video cameras, Verint is a leading maker of electronic surveillance equipment and software for the United States and other governments. And it turns out that while other technology firms are struggling in a down economy, the business of helping governments with their spying may be a growth industry. In quarterly results announced Wednesday, Verint, a subsidiary of Comverse Technology, posted record sales of $42 million for the fourth quarter of fiscal year 2002 -- the company's third straight quarter of growth since going public in May 2002. "During the year we believe that a greater interest in gathering intelligence to prevent criminal activity by government and law enforcement agencies resulted in greater demand for our communication interception solutions," said company president Dan Bodner in a conference call for analysts. "Over the past year we enhanced our competitive position by entering new markets, expanding our customer base, and introducing new capabilities for the analysis of content and culled data collected from wireline, wireless and data networks." Among those new markets was an unnamed country "in the Latin America region" whose government recently placed a multi-million dollar order for communications interception systems, said Bodner. Bodner didn't say what the Latin American government bought with that money, but the mainstay of Verint's electronic surveillance business is its "STAR-GATE" and "RELIANT" products, which operate on the supply and consumption sides of domestic spying respectively. The RELIANT system acts as a government agency's big ear, collecting and managing intercepted voice, e-mail, fax, SMS, data, chat, and Web browsing -- all on a single platform. On the delivery side, STAR- GATE does the actual wiretapping, and is primarily marketed to telephone companies trying to comply with the 1994 Communications Assistance for Law Enforcement Act (CALEA), which requires telecommunications carriers to keep their networks wiretap friendly for the FBI. An ISP version of STAR-GATE lets Internet providers conduct lawful surveillance of their customers and send the intercepted data to law enforcement over private networks. PATRIOT Profits With recent legislation and court decisions granting U.S. law enforcement agencies greater spying powers than they've had since the Nixon administration, government surveillance solutions look like a good bet, and other technology companies are getting in on the game. Last Fall, VeriSign launched its "NetDiscovery" service -- a turnkey CALEA solution for telephone companies that sends intercepted communications to law enforcement over a national IP- based network, using Verint STAR-GATEs for the taps. And last August, computer security company Network Associates got into the Carnivore business with its acquisition of Utah-based Traxess, makers of the "DragNet" Internet spy tool. And for every company that makes the news with a surveillance system, there may be countless more that nobody's ever heard of. When the non-profit Electronic Privacy Information Center recently obtained a list of companies vying for a piece of the Defense Department's "Total Information Awareness" computerized spying project, the list of bidders included nearly as many obscure companies as it did brand name defense contractors. "It looks like there's this whole world of these little security technology companies that are probably doing well these days," says EPIC attorney David Sobel. But Gartner analyst John Pescatore isn't convinced that there's big money in domestic surveillance. Instead, he says, the real opportunities are in helping the U.S. perform surveillance internationally. Indeed, according to its quarterly report, Verint has a subsidiary that provides communications interception solutions to what's described demurely as "various U.S. government agencies." The subsidiary's offices hold a facility security clearance from the Defense Department, and are located in Chantilly, Virginia, a stone's throw from most of America's intelligence agencies. "Certainly with the USA-PATRIOT Act and all this homeland security stuff, there's been more effort in domestic collection," says Pescatore. "But the domestic type money has been a lot slower to start flowing than the national intelligence stuff... There's been definite growth there." 7035 From: Robin Hunter Date: Sun Mar 16, 2003 4:57am Subject: Re-FRANCE The Sunday Times, News Review Section, March 16th 2003; "Plans to revive Captain Scarlet, the vintage children's TV series, have hit a snag. France has vetoed the idea, saying that the evil Mysterons, Captain Scarlet's arch-enemy, pose no current threat to earth." regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 7036 From: Dora Furlong Date: Sun Mar 16, 2003 2:32pm Subject: Re: WOW hope this isn't really being used A lot of engines for internet usage have been developed like this and do get used. The problem with these things is absolutely none of them, that i am aware of or have researched, actually provide integrity checking on the data as it is captured....a simple hash as it comes in, then validation the first time it is accessed and recheck of the hash any other time you wish it would be simple enough...but well how do we know this is the original data captured....I would not call this information evidence....I would call it an investigative lead that must be validated elsewhere. -->Dora On Sun, 16 Mar 2003, Does it matter wrote: > If you're under FBI surveillance, there's a good chance your phone > calls and Internet traffic are traveling over the equipment of > Verint Systems -- a company that's doing very well these days, > writes SecurityFocus' Kevin Poulsen. > > New York-based technology firm Verint Systems recently launched a > product called "IntelliFind" that claims impressive capabilities. > The system is designed to be attached to the phone lines at a > company's call center, where it silently monitors every telephone > call, and -- using advanced voice recognition technology -- picks > out conversations in which certain keywords are spoken, dumping a > digital recording into a searchable database. "You can decide you > want to see all the calls where product 'xyz' was mentioned, and > then you can pick one and listen to that entire call," says Alan > Roden, Verint's VP of corporate development. > > If IntelliFind sounds like something that would normally be found on > a supercomputer humming in an NSA basement, there's a reason. Behind > business intelligence offerings like IntelliFind, and a line of > networkable video cameras, Verint is a leading maker of electronic > surveillance equipment and software for the United States and other > governments. And it turns out that while other technology firms are > struggling in a down economy, the business of helping governments > with their spying may be a growth industry. In quarterly results > announced Wednesday, Verint, a subsidiary of Comverse Technology, > posted record sales of $42 million for the fourth quarter of fiscal > year 2002 -- the company's third straight quarter of growth since > going public in May 2002. > > "During the year we believe that a greater interest in gathering > intelligence to prevent criminal activity by government and law > enforcement agencies resulted in greater demand for our > communication interception solutions," said company president Dan > Bodner in a conference call for analysts. "Over the past year we > enhanced our competitive position by entering new markets, expanding > our customer base, and introducing new capabilities for the analysis > of content and culled data collected from wireline, wireless and > data networks." > > Among those new markets was an unnamed country "in the Latin America > region" whose government recently placed a multi-million dollar > order for communications interception systems, said Bodner. > > Bodner didn't say what the Latin American government bought with > that money, but the mainstay of Verint's electronic surveillance > business is its "STAR-GATE" and "RELIANT" products, which operate on > the supply and consumption sides of domestic spying respectively. > The RELIANT system acts as a government agency's big ear, collecting > and managing intercepted voice, e-mail, fax, SMS, data, chat, and > Web browsing -- all on a single platform. On the delivery side, STAR- > GATE does the actual wiretapping, and is primarily marketed to > telephone companies trying to comply with the 1994 Communications > Assistance for Law Enforcement Act (CALEA), which requires > telecommunications carriers to keep their networks wiretap friendly > for the FBI. An ISP version of STAR-GATE lets Internet providers > conduct lawful surveillance of their customers and send the > intercepted data to law enforcement over private networks. > > PATRIOT Profits > > With recent legislation and court decisions granting U.S. law > enforcement agencies greater spying powers than they've had since > the Nixon administration, government surveillance solutions look > like a good bet, and other technology companies are getting in on > the game. Last Fall, VeriSign launched its "NetDiscovery" service -- > a turnkey CALEA solution for telephone companies that sends > intercepted communications to law enforcement over a national IP- > based network, using Verint STAR-GATEs for the taps. And last > August, computer security company Network Associates got into the > Carnivore business with its acquisition of Utah-based Traxess, > makers of the "DragNet" Internet spy tool. > > And for every company that makes the news with a surveillance > system, there may be countless more that nobody's ever heard of. > When the non-profit Electronic Privacy Information Center recently > obtained a list of companies vying for a piece of the Defense > Department's "Total Information Awareness" computerized spying > project, the list of bidders included nearly as many obscure > companies as it did brand name defense contractors. "It looks like > there's this whole world of these little security technology > companies that are probably doing well these days," says EPIC > attorney David Sobel. > > But Gartner analyst John Pescatore isn't convinced that there's big > money in domestic surveillance. Instead, he says, the real > opportunities are in helping the U.S. perform surveillance > internationally. Indeed, according to its quarterly report, Verint > has a subsidiary that provides communications interception solutions > to what's described demurely as "various U.S. government agencies." > The subsidiary's offices hold a facility security clearance from the > Defense Department, and are located in Chantilly, Virginia, a > stone's throw from most of America's intelligence agencies. > > "Certainly with the USA-PATRIOT Act and all this homeland security > stuff, there's been more effort in domestic collection," says > Pescatore. "But the domestic type money has been a lot slower to > start flowing than the national intelligence stuff... There's been > definite growth there." > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > One net to rule them all One net to find them One net to bring them all Using Unix to bind them 7037 From: human being Date: Sun Mar 16, 2003 5:27pm Subject: TSCM-L fish story comments below relate to this recent NYC story.... Fish Talks, Town Buzzes http://www.nytimes.com/2003/03/15/nyregion/15FISH.html i am curious if, in the history of TSCM, that someone has made 'things talk' through remote microphones to speakers, or with pre-recorded messages embedded in other devices, instead of just listening but for fear. once i heard of a house that was thought to be haunted or that it was being terrorized by someone unknown, who had control over the answering machine, lights, etc. this all led me to wonder if, in the area of wireless lapel microphones and the nature of carp's voracious ability to eat (anything and everything) that it may have had room for an electromagnetic speaker. possible? has this ever happened? or is this just in the pranks/jokes category and would serve no other purpose (disinformation or misinformation). curious, it is. brian http://www.electronetwork.org/list/ 7038 From: Andre Holmes <1ach@g...> Date: Mon Mar 17, 2003 2:30am Subject: Re: TSCM-L fish story Hello Brian It is in no way a superstition but reality. A careful sweep will uncover the Microphone sooner or later. Andre Holmes Neptune Enterprise Security ----- Original Message ----- From: "human being" To: Sent: Sunday, March 16, 2003 6:27 PM Subject: [TSCM-L] TSCM-L fish story > > comments below relate to this recent NYC story.... > > Fish Talks, Town Buzzes > http://www.nytimes.com/2003/03/15/nyregion/15FISH.html > > i am curious if, in the history of TSCM, that someone has made > 'things talk' through remote microphones to speakers, or with > pre-recorded messages embedded in other devices, instead of > just listening but for fear. once i heard of a house that was thought > to be haunted or that it was being terrorized by someone unknown, > who had control over the answering machine, lights, etc. this all > led me to wonder if, in the area of wireless lapel microphones and > the nature of carp's voracious ability to eat (anything and everything) > that it may have had room for an electromagnetic speaker. possible? > has this ever happened? or is this just in the pranks/jokes category > and would serve no other purpose (disinformation or misinformation). > > curious, it is. brian > http://www.electronetwork.org/list/ > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 7039 From: A Grudko Date: Sun Mar 16, 2003 8:58pm Subject: TSCM-L fish story - Original Message - From: human being To: Sent: Monday, March 17, 2003 1:27 AM Subject: [TSCM-L] TSCM-L fish story > > comments below relate to this recent NYC story.... > > Fish Talks, Town Buzzes > http://www.nytimes.com/2003/03/15/nyregion/15FISH.html > > i am curious if, in the history of TSCM, that someone has made > 'things talk' through remote microphones to speakers, or with > pre-recorded messages embedded in other devices, instead of > just listening but for fear. once i heard of a house that was thought > to be haunted or that it was being terrorized by someone unknown, > who had control over the answering machine, lights, etc. this all > led me to wonder if, in the area of wireless lapel microphones and > the nature of carp's voracious ability to eat (anything and everything) > that it may have had room for an electromagnetic speaker. possible? > has this ever happened? or is this just in the pranks/jokes category > and would serve no other purpose (disinformation or misinformation). Go back to basics and a moving coil over a fixed magnet is both speaker and microphone. OK, the impedances are missmatched so frequency response and levels are terrible, but add the right impedance matching transformer and a 4 - 8 ohm speaker becomes a 600 - 1200 ohm dynamic mike. I must admit I've never tried to make an electret mike act like a speaker, but I'm sure I could at least make it shriek like the Carp From Hell.... Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 7040 From: Date: Mon Mar 17, 2003 9:07am Subject: Ex-Va. GOP Head's Wiretap Charges Upheld Ex-Va. GOP Head's Wiretap Charges Upheld By ADRIENNE SCHWISOW .c The Associated Press RICHMOND, Va. (AP) - A federal judge refused Monday to throw out charges that the former head of Virginia's Republican Party illegally eavesdropped on and recorded Democratic conference calls. Attorneys for Edmund Matricardi III argued that his participation in the two calls was legal under Virginia's Freedom of Information Act and the First Amendment. But prosecutors said it was a criminal act because he listened to a Democratic strategy session without identifying himself or getting consent from Democratic legislators. ``He's being prosecuted for one reason and one reason only: As a partisan, he clandestinely and deliberately listened in on Democratic Party conference calls for his own selfish reasons,'' Assistant U.S. Attorney Stephen Miller said. U.S. District Judge James Spencer said he would explain his ruling in favor of the prosecution in a later written memorandum. Matricardi, 34, is scheduled to go on trial April 9 on five felony charges related to wiretapping for allegedly eavesdropping on two Democratic strategy sessions and recording one of them. Claudia Tucker, chief of staff to former state House Speaker S. Vance Wilkins Jr., has pleaded guilty to a misdemeanor for listening in on one of the calls. Because of the scandal, Matricardi resigned as Virginia GOP director. He later joined the South Carolina GOP as operations director, then quit that post after he was indicted in Virginia. A former Democratic legislative aide admitted in a plea agreement last month that he distributed the phone number and access code for the private Democratic conference calls. 03/17/03 14:56 EST [Non-text portions of this message have been removed] 7041 From: doug ellsworth Date: Mon Mar 17, 2003 1:37am Subject: UV eye protection Hi group, Need a source for eye protection when using various wavelengths of UV. Would like max protection yet minimal interference of visual discrimination. I've been using just COTS UV sunglasses, but am concerned about fairly long total periods of reflected exposure during some physical inspections. Special goggles? Or should I consider rigging up a special close-up video/monitor "viewer" to my UV source and completely shield eyes from ambient UV? Thanks, -Doug 7042 From: Date: Mon Mar 17, 2003 3:47pm Subject: Re: TSCM-L fish story I used to do this in High School. I needed a little speaker and didn't have anything else, so I plugged the mic into the output and with the vol down low, was able to hear the feed. Played around and did this with a radio too. Took a smashed radio and spliced the (broken) speaker wires to a little lapel mic and had an ear piece. Not the best sound, but clear enough. :-) At 20:58 3/16/03, A Grudko wrote: >- Original Message - >From: human being >To: >Sent: Monday, March 17, 2003 1:27 AM >Subject: [TSCM-L] TSCM-L fish story > > > > > > comments below relate to this recent NYC story.... > > > > Fish Talks, Town Buzzes > > http://www.nytimes.com/2003/03/15/nyregion/15FISH.html > > > > i am curious if, in the history of TSCM, that someone has made > > 'things talk' through remote microphones to speakers, or with > > pre-recorded messages embedded in other devices, instead of > > just listening but for fear. once i heard of a house that was thought > > to be haunted or that it was being terrorized by someone unknown, > > who had control over the answering machine, lights, etc. this all > > led me to wonder if, in the area of wireless lapel microphones and > > the nature of carp's voracious ability to eat (anything and everything) > > that it may have had room for an electromagnetic speaker. possible? > > has this ever happened? or is this just in the pranks/jokes category > > and would serve no other purpose (disinformation or misinformation). > >Go back to basics and a moving coil over a fixed magnet is both speaker and >microphone. OK, the impedances are missmatched so frequency response and >levels are terrible, but add the right impedance matching transformer and a >4 - 8 ohm speaker becomes a 600 - 1200 ohm dynamic mike. > >I must admit I've never tried to make an electret mike act like a speaker, >but I'm sure I could at least make it shriek like the Carp From Hell.... > >Andy Grudko (British), Grad I.S, South Africa >Registered as a security service provider by the Private Security Industry >Regulatory Authority, registration number. 8642 >www.grudko.com , andy@g... . Est. 1981. International investigations >(+27 12) 244 0255 - 244 0256 (Fax). >IPA, SACI, WAD, CALI, UKPIN, IWWA. >When you need it done right - first time > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7043 From: Fernando Martins Date: Tue Mar 18, 2003 3:56pm Subject: Nokia SGSN (DX200 Based Network Element) SNMP issue This may have some interest here ...FM@stake, Inc. www.atstake.com Security Advisory Advisory Name: Nokia SGSN (DX200 Based Network Element) SNMP issue Release Date: 03/13/2003 Application: Nokia SGSN (DX200 Based Network Element) Platform: DX200 Severity: An attacker is able to read SNMP options with any community string Author: Ollie Whitehouse [ollie@a...] Vendor Status: Vendor has removed support for this protocol CVE Candidate: CVE Candidate number applied for Reference: www.atstake.com/research/advisories/2003/a031303-2.txt Overview: Nokia's (http://www.nokia.com) SGSN (Serving GPRS support node) is the platform which exists between the legacy GSM network and the new IP core of the GPRS network. This enables operators to deploy high speed data access over the top of their GSM network with minimal upgrades to their BSCs (Base Station Controllers), thus making the transition from a 2.0G to a 2.5G network. Due to its position in the network (i.e. between the RF network and the IP network) the SGSN will have interfaces on the SS7 signaling network and the IP core network as well as connections to the BSCs. For this reason, the SGSN can be considered a key part of the infrastructure of any mobile operator looking to deploy GPRS. A vulnerability exists in the SNMP (Simple Network Management Protocol) daemon of the DX200 based network element that allows an attacker to read SNMP options with ANY community string. This is a good example of why network elements which introduce IP functionality to legacy networks should have their functionality verified in terms of impact on security before deployment in a production environment. Proof of Concept: The following proof of concept will return the default MIB information on the DX200 based network element using the snmpwalk and snmpset commands which ship by default with operating systems such as Linux. [reading of SNMP details] snmpwalk tellmeyoursecrets Vendor Response: In SNMP v1 (RFC 1157) and v2c (RFC 1901) standards, authentication is based on a community string (text string) representing an unencrypted username without a password. A recognized concern in industry is that the security check as documented in these SNMP standards is inadequate. Because of the above, read access to MIB-II (RFC 1213) variables is allowed in Nokia SGSN SG1 / SG1.5 products with any community string value. However, write access to MIB-II variables is not permitted in Nokia SGSN SG1 / SG1.5 products, even though the SNMP MIB-II RFC standard defines some of the MIB-II variables to be write accessible. Nokia has made a product design decision that the value of each write accessible MIB-II variable remains unchanged, even in cases where the SNMP agent in Nokia SGSN SG1 / SG1.5 products would return an OK status notification as a response to the SNMP set-request operation. This means that a malicious attacker is under no circumstances able to alter any settings of Nokia SGSN SG1 / SG1.5 products via the SNMP interface. Furthermore, support for the SNMP interface has been removed from subsequent Nokia SGSN releases, which eliminates the possibilities for SNMP based vulnerabilities completely. Vendor Recommendation: Network operators do not need to take any further action. @stake Recommendation: Typically in a GPRS network design, the SGSN should not be contactable from the Gi interface of the GGSN where the user's routable IP is located. This is due to the fact that GGSN to SGSN communication occurs over the Gn interface. However @stake has observed instances where the NMS (Network Management System) network is routable from the Gi network. If the SGSN has an NMS connection, then appropriate ACLs (Access Control Lists) should be deployed on the routing device or firewall between the Gi and the NMS networks to restrict access to SNMP. Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CAN-2003-0137 @stake Vulnerability Reporting Policy: http://www.atstake.com/research/policy/ @stake Advisory Archive: http://www.atstake.com/research/advisories/ PGP Key: http://www.atstake.com/research/pgp_key.asc @stake is currently seeking application security experts to fill several consulting positions. Applicants should have strong application development skills and be able to perform application security design reviews, code reviews, and application penetration testing. Please send resumes to jobs@a.... Copyright 2003 @stake, Inc. All rights reserved. 7044 From: Matt Paulsen Date: Tue Mar 18, 2003 10:25pm Subject: RE: Nokia SGSN (DX200 Based Network Element) SNMP issue @stake is so in need of cash... get me boundschecker and notepad.. I'll go find a 'vulnerability' to match this one in wit, style and class in no time and write up some witty 'security advisory' to boot. Heck, forget notepad.. copy con I say. Where's my f6 key? -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Tuesday, March 18, 2003 1:57 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Nokia SGSN (DX200 Based Network Element) SNMP issue This may have some interest here ...FM@stake, Inc. www.atstake.com Security Advisory Advisory Name: Nokia SGSN (DX200 Based Network Element) SNMP issue Release Date: 03/13/2003 Application: Nokia SGSN (DX200 Based Network Element) Platform: DX200 Severity: An attacker is able to read SNMP options with any community string Author: Ollie Whitehouse [ollie@a...] Vendor Status: Vendor has removed support for this protocol CVE Candidate: CVE Candidate number applied for Reference: www.atstake.com/research/advisories/2003/a031303-2.txt Overview: Nokia's (http://www.nokia.com) SGSN (Serving GPRS support node) is the platform which exists between the legacy GSM network and the new IP core of the GPRS network. This enables operators to deploy high speed data access over the top of their GSM network with minimal upgrades to their BSCs (Base Station Controllers), thus making the transition from a 2.0G to a 2.5G network. Due to its position in the network (i.e. between the RF network and the IP network) the SGSN will have interfaces on the SS7 signaling network and the IP core network as well as connections to the BSCs. For this reason, the SGSN can be considered a key part of the infrastructure of any mobile operator looking to deploy GPRS. A vulnerability exists in the SNMP (Simple Network Management Protocol) daemon of the DX200 based network element that allows an attacker to read SNMP options with ANY community string. This is a good example of why network elements which introduce IP functionality to legacy networks should have their functionality verified in terms of impact on security before deployment in a production environment. Proof of Concept: The following proof of concept will return the default MIB information on the DX200 based network element using the snmpwalk and snmpset commands which ship by default with operating systems such as Linux. [reading of SNMP details] snmpwalk tellmeyoursecrets Vendor Response: In SNMP v1 (RFC 1157) and v2c (RFC 1901) standards, authentication is based on a community string (text string) representing an unencrypted username without a password. A recognized concern in industry is that the security check as documented in these SNMP standards is inadequate. Because of the above, read access to MIB-II (RFC 1213) variables is allowed in Nokia SGSN SG1 / SG1.5 products with any community string value. However, write access to MIB-II variables is not permitted in Nokia SGSN SG1 / SG1.5 products, even though the SNMP MIB-II RFC standard defines some of the MIB-II variables to be write accessible. Nokia has made a product design decision that the value of each write accessible MIB-II variable remains unchanged, even in cases where the SNMP agent in Nokia SGSN SG1 / SG1.5 products would return an OK status notification as a response to the SNMP set-request operation. This means that a malicious attacker is under no circumstances able to alter any settings of Nokia SGSN SG1 / SG1.5 products via the SNMP interface. Furthermore, support for the SNMP interface has been removed from subsequent Nokia SGSN releases, which eliminates the possibilities for SNMP based vulnerabilities completely. Vendor Recommendation: Network operators do not need to take any further action. @stake Recommendation: Typically in a GPRS network design, the SGSN should not be contactable from the Gi interface of the GGSN where the user's routable IP is located. This is due to the fact that GGSN to SGSN communication occurs over the Gn interface. However @stake has observed instances where the NMS (Network Management System) network is routable from the Gi network. If the SGSN has an NMS connection, then appropriate ACLs (Access Control Lists) should be deployed on the routing device or firewall between the Gi and the NMS networks to restrict access to SNMP. Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CAN-2003-0137 @stake Vulnerability Reporting Policy: http://www.atstake.com/research/policy/ @stake Advisory Archive: http://www.atstake.com/research/advisories/ PGP Key: http://www.atstake.com/research/pgp_key.asc @stake is currently seeking application security experts to fill several consulting positions. Applicants should have strong application development skills and be able to perform application security design reviews, code reviews, and application penetration testing. Please send resumes to jobs@a.... Copyright 2003 @stake, Inc. All rights reserved. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7045 From: Date: Wed Mar 19, 2003 1:31am Subject: Bugging Devices Found in French EU Office Bugging Devices Found in French EU Office .c The Associated Press BRUSSELS, Belgium (AP) - Electronic bugging devices have been found in offices used by the French and German delegations in a building where an European Union summit will open on Thursday, EU officials said. EU spokesman Dominique-George Marro said Wednesday the EU had launched an investigation into the bugs, but had no immediate idea who was behind it. He said listening devices were also found in offices used by other EU nations, but declined to say which or how many. The offices were in an EU headquarters building. ``We found anomalies in the telephone lines'' during regular security checks a few days ago, said Marro by telephone. He said only a small number of lines had been affected. Leaders of the 15 EU nations are scheduled to hold a summit Thursday and Friday in the sprawling Justus Lipsius building which houses the secretariat of the EU council of ministers. The EU's regular meetings of ministers are held there. The building also houses the offices of Javier Solana, the EU's high representative for foreign and security policy. 03/19/03 07:02 EST [Non-text portions of this message have been removed] 7046 From: David Alexander Date: Wed Mar 19, 2003 9:31am Subject: FW: TSCM-L speaker I would have thought a Sea Bass would be a much better candidate for a speaker than a Carp..... David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk X-eGroups-Return: sentto-49964-7513-1047917219-dave_ale=etmra.com@r... X-Sender: agrudko@i... X-Apparently-To: TSCM-L@yahoogroups.com To: X-Mailer: Microsoft Outlook Express 5.00.2615.200 From: "A Grudko" X-Yahoo-Profile: damstuff2000 Mailing-List: list TSCM-L@yahoogroups.com; contact TSCM-L-owner@yahoogroups.com Delivered-To: mailing list TSCM-L@yahoogroups.com List-Unsubscribe: Date: Mon, 17 Mar 2003 04:58:15 +0200 Subject: [TSCM-L] TSCM-L fish story - Original Message - From: human being To: Sent: Monday, March 17, 2003 1:27 AM Subject: [TSCM-L] TSCM-L fish story > > comments below relate to this recent NYC story.... > > Fish Talks, Town Buzzes > http://www.nytimes.com/2003/03/15/nyregion/15FISH.html > > i am curious if, in the history of TSCM, that someone has made > 'things talk' through remote microphones to speakers, or with > pre-recorded messages embedded in other devices, instead of > just listening but for fear. once i heard of a house that was thought > to be haunted or that it was being terrorized by someone unknown, > who had control over the answering machine, lights, etc. this all > led me to wonder if, in the area of wireless lapel microphones and > the nature of carp's voracious ability to eat (anything and everything) > that it may have had room for an electromagnetic speaker. possible? > has this ever happened? or is this just in the pranks/jokes category > and would serve no other purpose (disinformation or misinformation). Go back to basics and a moving coil over a fixed magnet is both speaker and microphone. OK, the impedances are missmatched so frequency response and levels are terrible, but add the right impedance matching transformer and a 4 - 8 ohm speaker becomes a 600 - 1200 ohm dynamic mike. I must admit I've never tried to make an electret mike act like a speaker, but I'm sure I could at least make it shriek like the Carp From Hell.... Andy Grudko (British), Grad I.S, South Africa Registered as a security service provider by the Private Security Industry Regulatory Authority, registration number. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time David Alexander Towcester, Northamptonshire, England Competition Co-ordinator - MSA British Drag Racing Championship Founder member, European Top Methanol Racers Association www.etmra.com Gone racing, back in 5.5 seconds 7047 From: Hawkspirit Date: Wed Mar 19, 2003 6:10pm Subject: Caller ID http://cgi1.ebay.com/aw-cgi/eBayISAPI.dll?MakeTrack&item=3012540984 7048 From: Robert Dyk Date: Wed Mar 19, 2003 8:28pm Subject: RE: Caller ID We are about to sell a large lot of our inventory of CCTV equipment including NIB Panasonic Pan Tilt drives, NIB Burle housings and brackets, High security in-wall housings as well as multiplexers, quad splitters, etc etc. Anyone on the list interested in this or other CCTV equipment, before it goes on ebay or other, please contact me privately. Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 7049 From: Date: Wed Mar 19, 2003 1:39pm Subject: Rif: FW: TSCM-L speaker > I would have thought a Sea Bass would be a much better candidate for a > speaker than a Carp..... Especially since the fish was still alive when the phenomenon was observed: the sea bass still had reflexes.... Ciao! Remo Cornali, Milano, Italy 7050 From: James M. Atkinson Date: Thu Mar 20, 2003 6:14am Subject: Short and Sweet Support our Troops. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 7051 From: Ocean Group - MU TSD Date: Thu Mar 20, 2003 4:57am Subject: US keeping on eye on the EU...or rather an ear Hmm......wonder who they use for their sweeps? Any ideas? If anyone digs up the Le Figaro article I would appreciate a copy....... Cheers Vance Deran Ocean Group, Technical Security Division, Ireland. _______________ Listening devices found in offices of EU states From:ireland.com Thursday, 20th March, 2003 Brussels: Electronic bugging devices have been found in offices used by six EU member-states at a Brussels building where European leaders will meet this evening, writes Denis Staunton, in Brussels The devices, describes as "highly sophisticated", were discovered almost three weeks ago during a routine sweep by security staff at the Justus Lipsius building, headquarters of the EU Council of Ministers. The bugs were found in telephone cabling in rooms used by French, German, British, Italian, Spanish and Austrian delegations during meetings of EU ministers. Devices were also discovered in rooms that were once used as offices but now serve other functions, such as storage rooms. The French newspaper Le Figaro broke the story yesterday, saying that Belgian authorities are convinced that the US was behind the bugging. However, a spokesman for the Council of Ministers, Mr Dominique-Georges Marro, said that, although an investigation was under way, it was not yet possible to say who was responsible. "We have no evidence that it was the Americans but we also have none that it wasn't," he said. A spokesman for the US mission to the EU said the mission had received no communication from the council about the investigation into the bugging. The six countries whose delegation rooms were bugged were informed as soon as the discovery was made. It was not until Le Figaro reported the story that other member-states, including Greece, which holds the EU presidency, were informed. The EU foreign policy chief, Mr Javier Solana, who has offices in the building, first heard about the discovery yesterday, but he was told that no devices were found in his offices or those of the military staff in the building. Sweden's EU ambassador, Mr Sven-Olaf Petersson, said after a briefing by council officials that the devices were found on February 28th, but there were indications that they may have been installed before the building was inaugurated in 1995. "They were very sophisticated installations, we are told, which only a few intelligence services are able to install," he said. There have long been concerns about security at the Justus Lipsius building, and NATO officials have refused to attend meetings there on the basis that the rooms were not secure. When Mr Solana moved into the building, he installed a number of "secure" rooms which are swept for listening devices. 7052 From: Robin Hunter Date: Thu Mar 20, 2003 7:20am Subject: Re-Short and Sweet Seconded from Scotland, UK. ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited.