From: Steve Whitehead Date: Sun Apr 14, 2002 2:05pm Subject: Re: File - Gold List James What about an international list. Would appreciate some comments from other international members on this list outside the US. Regards Steve Whitehead E-mail : sceptre@m... Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) P O Box 16063, Lyttelton, 0140, Centurion, South Africa ----- Original Message ----- From: To: Sent: Sunday, April 14, 2002 10:07 AM Subject: [TSCM-L] File - Gold List > > The current version of this list may be found at: http://www.tscm.com/goldlist.html > > Recommended U.S. TSCM Firms > > The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). > > While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). > > These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. > > TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. > > The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). > > An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. > > On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. > > If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. > > ------------------------------------------------------------------------ > > Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. > > Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. > > It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. > > Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. > > If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. > > It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. > > Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. > > Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. > > When you contact any of the following firms please mention that you saw them listed on this web site. > > This file is set to automatically go out to list members every two weeks, Please review it, and ensure that you are listed properly (correct address, phone, etc). > > ------------------------------------------------------------------------ > > All of New England, Upstate New York, and the Boston Metropolitan Area > (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) > > > James M. Atkinson > Granite Island Group > 127 Eastern Avenue #291 > Gloucester, MA 01931-8008 > > (978) 381-9111 Telephone > > URL: http://www.tscm.com/ > E-mail: jmatk@tscm.com > ------------------------------------------------------------------------ > > Stamford, Connecticut Metropolitan Area > (also, Manhattan, Long Island, and New Jersey) > > Sam Daskam > Information Security Associates, Inc. > 38 Settlers Trail > Stamford, CT 06903 > > (203) 329-8387 Telephone > > URL: http://www.isa-tscm.com/ > E-mail:sales@i... > ------------------------------------------------------------------------ > > Norwalk, and Lower Fairfield Country Area > (also, Manhattan, Long Island, Philadelphia, and New Jersey) > > Rob Muessel > TSCM Technical Services > 11 Bayberry Lane > Norwalk, CT 06851 > > (203) 354-9040 Telephone > > URL: http://www.tscmtech.com/ > E-mail:rmuessel@t... > ------------------------------------------------------------------------ > > Greater Philadelphia and Harrisburg Metropolitan Area > (also, serving South-Eastern and Central Pennsylvania) > > Bob Motzer > RCM and Associates > 609 Sandra Lane > Phoenixville, PA 19460 > > (888) 990-6265 Telephone > > E-mail: 1RCM@M... > ------------------------------------------------------------------------ > > Washington DC and Baltimore Metropolitan Area > (also, Virginia, Delaware, and Pennsylvania) > > Steve Uhrig > SWS Security > 1300 Boyd Road > Street, MD 21154-1836 > > (410) 879-4035 Telephone > > URL: http://www.swssec.com/ > E-mail: steve@s... > ------------------------------------------------------------------------ > > Houston, Dallas, Austin, and Galveston > (also, Gulf Coast of Texas and Louisiana) > > Rick Udovich > Communication Security, Inc. > 2 Shadow Lane > Bay City, TX 77414 > > (979) 244-4920 Telephone > > URL: http://www.bugsweep.com/ > E-mail: rjudo@s... > ------------------------------------------------------------------------ > > Lexington KY Metropolitan Area > (also, Louisville, Cincinnati, and Central Midwest) > > Bill G. Rhoads > Intelcom, Inc. > 121 Prosperous Place, Suite 4B > Lexington, KY 40509 > > (859) 263-9425 Telephone > > E-mail: bgr101@a... > ------------------------------------------------------------------------ > > Atlanta Metropolitan Area, Southeastern US > (including AL, FL, GA, NC, SC, TN) > > Buzz Benson > Executive World Services, Inc. > P.O. Box 33 > Braselton, Georgia 30517-0033 > (678) 316-7002 Telephone > > URL: http://www.executiveworldservices.com/ > E-mail: sales@e... > ------------------------------------------------------------------------ > > Washington State and Seattle WA Metropolitan Area > (also, Oregon, and the Pacific North West) > > Gordon Mitchell > Future Focus, Inc. > P.O. Box 2547 > Woodinville, WA 98072 > > (425) 489-0446 Telephone > > URL: http://www.bug-killer.com/ > E-mail: gordonm@b... > ------------------------------------------------------------------------ > > San Francisco and all of Northern California > (also, Silicon Valley Area) > > William Bennett > Walsingham Associates, Inc. > P.O. Box 4264 > San Rafael, CA 94913 > > (415) 492-1594 Telephone > > E-mail: walsingham@c... > ------------------------------------------------------------------------ > > Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County > (also, Riverside County, and Ventura County) > > Rick Hofmann > Microsearch LLC > P.O. Box 2084 > Cypress, CA 90630 > > (714) 952-3812 Telephone > > URL: http://home.earthlink.net/~microsearch > E-mail: tscmsweeps@e... > > ------------------------------------------------------------------------ > > Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County > (also, Riverside County, and Ventura County) > > Roger Tolces > Electronic Security > 6646 Hollywood Blvd. #212 > Los Angeles, CA 90028 > > (323) 462-1351 Telephone > > URL: http://www.bugsweeps.com/ > E-mail: info@b... > > ------------------------------------------------------------------------ > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 5194 From: Fernando Martins Date: Sun Apr 14, 2002 4:40pm Subject: RE: File - Gold List As an european, seems fine to me. Also, if it is not just about bug sweep and wiretap, better. Even regarding US, I think there is a gap between "the mission" and "the gold list", for example regarding physical security. May be a clarification on this is needed (at least for me, because I'm new in the list, and I may be wrong) regarding what "the mission" refers as "physical security weaknesses" - anti intrusion, cctv or access control systems problems? FM > -----Original Message----- > From: Steve Whitehead [mailto:sceptre@m...] > Sent: domingo, 14 de Abril de 2002 20:06 > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] File - Gold List > > > James > > What about an international list. Would appreciate some > comments from other international members on this list outside the US. > > Regards > > Steve Whitehead > E-mail : sceptre@m... > Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) > P O Box 16063, Lyttelton, 0140, Centurion, South Africa 5195 From: James M. Atkinson Date: Sun Apr 14, 2002 10:31pm Subject: RE: File - Gold List I would be happy to clarify, A client simply can not establish an effective TSCM program until they have their physical security issues under control. Sure, we can go out, set up two tons of equipment and crawl their every inch the the building, but if their security is full of holes they are wasting their money by having sweeps performed. One of the disciplines we have to master in the TSCM profession is that of vulnerability analysis, and more specifically be able to understand how all of the various sub-disciplines overlap with one another to provide air-tight security... of lack of same. If you focus too much on one particular discipline (like alarms or access control) you risk missing external lighting issues, door issues, the 96 inch rule, and even locks. During any bug sweep, step back for a second and see if there holes are, and include these holes in your report with very specific things you client can do to fix it. I would however, caution you not to "find the problem" and then offer to fix it. By doing this you will likely blow your credibility with the client and they will think your trying to con them. If (during a sweep) you feel they need an alarm system, then send them to an alarm company, ditto for CCTV systems, IDS, lighting, and so on. -jma At 10:40 PM +0100 4/14/02, Fernando Martins wrote: >As an european, seems fine to me. Also, if it is not just about bug >sweep and wiretap, better. >Even regarding US, I think there is a gap between "the mission" and "the >gold list", for example regarding physical security. > >May be a clarification on this is needed (at least for me, because I'm >new in the list, and I may be wrong) regarding what "the mission" refers >as "physical security weaknesses" - anti intrusion, cctv or access >control systems problems? > >FM > >> -----Original Message----- >> From: Steve Whitehead [mailto:sceptre@m...] >> Sent: domingo, 14 de Abril de 2002 20:06 >> To: TSCM-L@yahoogroups.com >> Subject: Re: [TSCM-L] File - Gold List >> >> >> James >> >> What about an international list. Would appreciate some >> comments from other international members on this list outside the US. >> >> Regards >> >> Steve Whitehead >> E-mail : sceptre@m... >> Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) > > P O Box 16063, Lyttelton, 0140, Centurion, South Africa -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5196 From: Secdep Date: Mon Apr 15, 2002 9:43am Subject: BEWARE SNOOPING SOFTWARE THE INDEPENDENT ON SATURDAY 13 APRIL 2002 Beware: SNOOPING SOFTWARE Big Brother is Watching Thanks to a new piece of sleuthing computer software, illicit online lovers, adolescent porn site surfers and employees abusing company computers have no place to hide writes WENDY KNOWLER IMAGINE someone being able to see absolutely everything on your computer screen; a complete slide show of every e-mail, web page and image, down to the last keystroke. A US-designed software program called Spector makes that possible for the Big Brothers of the world - as errant e-mailers are discovering. Suspicious spouses use it to check on their partners; companies use it to check on their employees' net activities and parents use it to make sure their children aren't accessing adult web sites. It's been causing havoc in companies and homes across America for a couple of years and now thanks to Durban private investigator Mr. Raymond van Staden, who has sole agency for Spector in South Africa, it's likely to do the same here. For the few local bosses and parents who have installed it, the shock factor has been huge. A prominent member of the security industry got "the fright of my life" after installing it on his home PC out of curiosity "My teenage son was having a very raunchy chat with an American woman. I sent her an e-mail telling her to back off and then informed my son." He also put a block on a certain spanking web site, which was being regularly visited by the children in his home. And a Durban employer discovered that his secretary was spending hours each day downloading web site information for her husband. "She has since moved on, and my Telkom bill is better for it," he said. According to US research, employees with Internet access at work spend at least an hour a day net surfing. From the bosses' perspective, this means lost productivity at best: and at worst, legal liability should an employee be sending offensive e-mails or accessing child pornography -- or massive losses if someone is passing on trade secrets. Spector nails the culprits good and proper. "Even the most computer literate users won't know it's there and, even if they did. They wouldn't be able to uninstall it," Van Staden says. But what about our Constitutional right to privacy? "Well, exactly," says Mr. Wayne Lurie, an e- commerce lawyer with Durban's Garlicke and Bousfield. "Our right to privacy goes beyond the Constitution. The Interception and Monitoring Prohibition Act makes it an offence to monitor someone's personal communication without their knowledge. Employers who monitor their employees that closely, without getting their consent in writing could face a fine or two-year prison sentence. "Whatever the motives, it's a diabolical invasion of privacy" Van Staden, of course, disagrees. `An individual's right to privacy has to be balanced with the employer's right to know what's happening in his own business. It's no different from having a camera aimed at a production line. But yes, they should know it's there." For more information: visit; http://www.vanstaden.co.za --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5197 From: Secdep Date: Mon Apr 15, 2002 9:42am Subject: No secrets are safe . . . THE INDEPENDENT ON SATURDAY 13 APRIL 2002 No secrets are safe . . . By WENDY KNOWLER IT TAKES just two minutes to install, and immediately begins to deliver life­ changing information in spell-binding detail. It's a computer program called Spector and it goes where no other computer monitoring device has gone before, secretly recording everything which appears on a person's screen and delivering it in slide show form to the spy, be it a boss, parent or spouse. It was developed primarily for corporate use - to root out abuse of internet facilities as well as espionage - and as a tool for parents to monitor their children's internet use. But in the US, more than half of the sales are to suspicious spouses or lovers in need of heartrending proof. And, boy, have they found it, as the company's web site reveals. "I was curious about why my wife was spending so much time on the computer," wrote Mr M Bandy of Cleveland. "My first use of Spector revealed her boyfriend and what she really thought of me." Spector is also giving many a parent a wake-up call. "The day after installing Spector I caught a grown man, a parent of a local child, using extreme sexual language online with my 14-year-old daughter," wrote Ms Christine Abbott of Pennsylvania. SpectorSoft President Doug Fowler has his own favourite anecdotes about what people discovered after using Spector, including a story about a husband who learned that his wife and her lover were plotting to murder him. There are three forms of the system available in SA: SpectorPro (the most intrusive, for corporate use), Spector and eBlaster, which performs many of the same functions as Spector but sends the information via e-mail to the spy who installed it. They range in price from Rl 200 to Rl 600. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 5198 From: Graham Bignell Date: Mon Apr 15, 2002 10:26am Subject: "Tempest Shielded Mac" http://www.wired.com/news/mac/0,2125,51670,00.html In a drafty shed in rural northern California is perhaps the rarest Macintosh ever made: an electronically shielded Mac used by a spy or military agency. The machine appears to be unique, and is so secret, no one knows anything about it. Sitting on a dusty shelf in an old Boulder Creek, California, barn owned by programmer and author Bruce Damer, the Macintosh SE 30 1891 ST at first appears to be a standard all-in-one Mac from the mid-1980s. ... --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 5199 From: Date: Mon Apr 15, 2002 0:46pm Subject: Worth viewing potential threats! The following web sight contains threats a TSCM pro should be aware of. Video and Audio Communications for Business or http://www.mgteurope.co.uk/index.html 5200 From: Marcel Date: Mon Apr 15, 2002 6:25pm Subject: NCIC U.S. Attorney General John Ashcroft has ordered that the FBI's NCIC database be loaded up with the names of 100,000+ suspected terrorists. Interestingly, the list violates NCIC's previous policy of listing only those persons who have warrants or are considered missing. In this case, Ashcroft says, each "information" record on a terrorist suspect will contain instructions for the "hit" agency: arrest, follow or notify the FBI. Oh, the same list will be tacked on to the separate databases maintained by the Customs Service and State Department. -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 5201 From: Marcel Date: Mon Apr 15, 2002 7:01pm Subject: Carriers Snarl At CALEA Order http://www.wirelessweek.com/index.asp?layout=print_page&articleID=&doc_id=81050 -- [Non-text portions of this message have been removed] 5202 From: Marcel Date: Mon Apr 15, 2002 6:58pm Subject: Wireless 'Nanny Cams' Provide Window For Voyeurs Wireless 'Nanny Cams' Provide Window For Voyeurs http://www.wirelessweek.com/index.asp?layout=print_page&articleID=&doc_id=81192 -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG [Non-text portions of this message have been removed] 5203 From: James M. Atkinson Date: Mon Apr 15, 2002 9:08pm Subject: Wireless 'Nanny Cams' Provide Window For Voyeurs http://www.wirelessweek.com/index.asp?layout=print_page&articleID=&doc_id=81192 Wireless 'Nanny Cams' Provide Window For Voyeurs April 14, 2002 Thousands of people who have installed a popular wireless-video camera, intending to increase the security of their homes and offices, have unknowingly opened a window on their activities to anyone equipped with a cheap receiver. The wireless-video camera, heavily advertised on the Internet, is intended to send its signal to a nearby base station and be viewed on a computer or a television. But its signal can be intercepted from more than a quarter-mile away by off-the-shelf electronic equipment costing less than $ 250. A drive in New Jersey with two security experts underscored the ease with which a digital eavesdropper can peek into homes where the cameras are put to use as video baby monitors and inexpensive security cameras. The rangy young driver pulled his truck around a corner in the well-to-do suburban town of Chatham and stopped in front of an unpretentious home. A window on his laptop's screen that had been flickering suddenly showed a crisp black-and-white video image: a living room, seen from somewhere near the floor. Baby toys were strewn across the floor, and a woman sat on a couch. After showing the nanny-cam images, the man, a privacy advocate who asked that his name not be used, drove on, scanning homes and finding a view from above a back door and of an empty crib. In the nearby town of Madison, from the parking lot of a Staples store, workers could be observed behind the cash register. Such peeping is apparently legal, said Clifford Fishman, a law professor at the Catholic University of America and the author of "Wiretapping and Eavesdropping." When told of the novel form of high-technology prying, Fishman said, "That is astonishing and appalling." But he said that wiretap laws generally apply to intercepting sound, not video. Legal prohibitions on telephone eavesdropping, he said, were passed at the urging of the telecommunications industry, which wanted to reassure customers about their products. "There's no corresponding lobby out there protecting people from digital surveillance," he said. Some states have passed laws that prohibit placing surreptitious cameras in places like dressing rooms, but legislatures have generally not considered the legality of signal interception. Nor have they considered that signals would be intercepted from cameras that people planted themselves. "There's no clear law that protects us," Fishman said. "You put it all together, the implications are pretty horrifying." With no federal law and no consensus among the states on the legality of tapping video signals, Fishman said, "The nanny who decided to take off her dress and clean up the house in her underwear would probably have no recourse" against someone tapping the signal. Police with search warrants could use the technology for investigative purposes as well, he suggested. Surveillance has been a growing part of American life, especially since Sept. 11. Privacy activists argue that the benefit to security is questionable and the cost to privacy is high. But the cameras continue to proliferate -- with many people buying them for personal use. Surveillance cameras have also sprouted at intersections to catch drivers who speed or run red lights and as a part of many voyeur-oriented pornographic Web sites. Ads for the "Amazing X10 Camera" have been on the Internet for months. The ads for the device, the XCam2, carry a taste of cheesecake -- usually a photo of a glamorous-looking woman. But many people have bought the cameras for more pedestrian purposes. "Frankly, a lot of it is kind of dull," and most of the women being surreptitiously observed are probably nannies, said Marc Rotenberg, the executive director of the Electronic Privacy Information Center in Washington. The company that sells the cameras, Seattle-based X10 Wireless Technology, was created in 1999 by an American subsidiary of X10 Ltd., a Hong Kong company. It is privately held and does not release sales figures. A spokesman, Jeff Denenholz, said the company had no comment for this article. Filings with the Securities and Exchange Commission for an initial public-stock offering that was later withdrawn provide some figures, however. X10 lost $ 8.1 million on revenue of $ 21.3 million for the nine months ended Sept. 30, 2000, and said that 52 percent of its revenue came from wireless-camera kits. At the camera's retail price of about $ 80, that would translate to sales of more than 138,000 cameras in those nine months alone. Rob Enderle, a research fellow with the Giga Information Group, a consulting business in Cambridge, Mass., that studies technology companies, said he was a big fan of X10 -- which sells the most popular wireless cameras on the consumer market -- and its wares. "Theirs is the least expensive option out there, and they actually do a good job," he said. Enderle was surprised to hear of the cameras' lack of security, but said he did not see it as a cause for great concern. "Clearly, if you are pointing that at areas like your bathroom or shower, there may be people enjoying that view with you," he said. "But fundamentally, you shouldn't be pointing it that way anyway." The vulnerability of wireless products has been well understood by manufacturers and privacy advocates for decades. The radio spectrum is crowded, and broadcast is an inherently leaky medium, as former House Speaker Newt Gingrich discovered when recordings of a 1996 cell-phone conference call were released by Democratic foes. In the case of the XCam2, the cameras transmit an unscrambled analog radio signal that can be picked up by receivers sold with the cameras. Replacing the receiver's small antenna with a more powerful one and adding a signal amplifier to pick up transmissions over greater distances is a trivial task for anyone who knows his way around a RadioShack and can use a soldering iron. Products designed for the consumer market rarely include strong security, because security costs money, said Gary McGraw, the chief technology officer of Cigital, a software risk-management company. "When you're talking about a cheap thing that's consumer grade that you're supposed to sell lots and lots of copies of, that really matters," he said. Refitting an X10 camera with encryption technology would be beyond the skills of most consumers. It is best for manufacturers to design security features into products from the start, McGraw said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5204 From: Shawn Hughes Date: Tue Apr 16, 2002 4:03pm Subject: Re: NannyCAM Monitor At 01:41 PM 4/16/02 , the list quoth: >.............A window on his laptop's screen that had been >flickering suddenly showed a crisp black-and-white video image: What's he using? I have a PCR-1000, and I've seen some software driven scanners, but how would one go about making a video monitor / scanner out of a PC? If he is just using the PC as a monitor, would've seemed cheaper to get one of the LCD monitors I use to set up cameras. Thanks, Shawn 5205 From: Fernando Martins Date: Tue Apr 16, 2002 2:08am Subject: RE: Worth viewing potential threats! http://www.mgteurope.co.uk/vmd_960mm.htm "For direct computer control the unit needs a RS 2323 level converter" wow :> FM > -----Original Message----- > From: MACCFound@a... [mailto:MACCFound@a...] > Sent: segunda-feira, 15 de Abril de 2002 22:47 > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Worth viewing potential threats! > > > > The following web sight contains threats a TSCM pro should be > aware of. > > Video and Audio > Communications for Business or > http://www.mgteurope.co.uk/index.html > > > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> HOT! PRICE BREAKTHROUGH! SUPER Tiny > Wireless Video Camera UNDER $80 BUCKS --> ORDER NOW! > http://us.click.yahoo.com/y7toOC/8o6DAA/yigFAA> /kgFolB/TM > > > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 5206 From: Gil Zimmerman Date: Tue Apr 16, 2002 5:37pm Subject: RE: Re: NannyCAM Monitor It could be something as simple as the Nogitech USB video capture cable that I use. It allows for continuous feed from any video source with screen shot ability. Recording can be done with any number of available utilities. Just have to have enough room on the disk to store them! I have the capture package and an X-10 receiver, will have to give it a try! Regards, Gil Gil Zimmerman Director of Business Development Erhart Sawyer International, Inc. 676A Ninth Avenue, #207 New York, NY 10036-3602 gilz@o... (646) 261-7378 mobile/GSM (646) 349-1485 fax (877) 856-1774 US toll free (33) (0)1 43 66 81 05 Paris (bureau) (011) (507) 220-1026 Panama City, Panama (office) Worldwide service in English, French & Spanish languages -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Subject: [TSCM-L] Re: NannyCAM Monitor What's he using? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.349 / Virus Database: 195 - Release Date: 4/15/2002 5207 From: James M. Atkinson Date: Tue Apr 16, 2002 9:31pm Subject: Re: NannyCAM Monitor At 5:03 PM -0400 4/16/02, Shawn Hughes wrote: >At 01:41 PM 4/16/02 , the list quoth: >>.............A window on his laptop's screen that had been >>flickering suddenly showed a crisp black-and-white video image: > > >What's he using? I have a PCR-1000, and I've seen some software driven >scanners, but how would one go about making a video monitor / scanner out >of a PC? If he is just using the PC as a monitor, would've seemed cheaper >to get one of the LCD monitors I use to set up cameras. > >Thanks, > >Shawn Bah, it was bullshit theatrics. The guy used a laptop for a prop, nothing more, and nothing less. All he did was take the video from a Wavecom receiver and squirt it into the laptops video input port or USB port... This way it would "look cool" and he wouldn't be trying to balance a laptop on the dash of the car. The use of the laptop would also tend to indicate that the guy hacks wireless LAN's; as the WLAN hackers very commonly use the laptop video interface to help sniff out WLAN's being used. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5208 From: Justin T. Fanning Date: Wed Apr 17, 2002 3:38am Subject: Re: Worth viewing potential threats! Did anyone else pickup page: http://www.mgteurope.co.uk/trv_14_uk.htm "operating on the licence exempt MPT1394 band". Would that be MPT1349 (I-ETS 300 440) by any chance?! http://www.radio.gov.uk/publication/mpt/mpt_pdf/mpt1349.pdf JF --- Fernando Martins wrote: > > http://www.mgteurope.co.uk/vmd_960mm.htm > > "For direct computer control the unit needs a RS 2323 level converter" > wow :> > > FM > > > -----Original Message----- > > From: MACCFound@a... [mailto:MACCFound@a...] > > Sent: segunda-feira, 15 de Abril de 2002 22:47 > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Worth viewing potential threats! > > > > > > > > The following web sight contains threats a TSCM pro should be > > aware of. > > > > Video and Audio > > Communications for Business or > > http://www.mgteurope.co.uk/index.html > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > ---------------------~--> HOT! PRICE BREAKTHROUGH! SUPER Tiny > > Wireless Video Camera UNDER $80 BUCKS --> ORDER NOW! > > http://us.click.yahoo.com/y7toOC/8o6DAA/yigFAA> /kgFolB/TM > > > > > > -------------------------------------------------------------- > > -------~-> > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire > > speed, the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 5209 From: Graham Bignell Date: Tue Apr 16, 2002 8:16am Subject: Re: Wireless 'Nanny Cams' Provide Window For Voyeurs On Mon, 15 Apr 2002, James M. Atkinson wrote: > http://www.wirelessweek.com/index.asp?layout=print_page&articleID=&doc_id=81192 > Wireless 'Nanny Cams' Provide Window For Voyeurs [snip] > Rob Enderle, a research fellow with the Giga Information Group, a > consulting business in Cambridge, Mass., that studies technology > companies, said he was a big fan of X10 -- which sells the most > popular wireless cameras on the consumer market -- and its wares. > > "Theirs is the least expensive option out there, and they actually do > a good job," he said. [snip] > Refitting an X10 camera with encryption technology would be beyond > the skills of most consumers. It is best for manufacturers to design > security features into products from the start, McGraw said. [snip] [snipe] ;) --- Graham "Lorax" Bignell - 416 366 9755 1024D/57A07181 = CF49 889B 9266 030C F0FD 7298 30B6 98D5 57A0 7181 5210 From: Lists Date: Wed Apr 17, 2002 7:26am Subject: Re: Re: NannyCAM Monitor How do you use the video input on a laptop to help sniff out WLANs? All of the tools I am familiar with have no options that work in this way. Kismet, Netstumbler, Airopeek, Sniffer Pro Wireless, etc. Could you clarify what you meant by this? 5211 From: James M. Atkinson Date: Wed Apr 17, 2002 9:05am Subject: RE: File - Gold List At 8:57 PM -0600 4/16/02, Christopher E. Brown wrote: >On Sun, 14 Apr 2002, James M. Atkinson wrote: >> >> If you focus too much on one particular discipline (like alarms or >> access control) you risk missing external lighting issues, door >> issues, the 96 inch rule, and even locks. > >The 96 inch rule? > >Have to admit, I am sufferint from a mental gap on this one. The "The 96 inch rule" concerns the meticulous documentation of any opening in the building which exceeds 96 square inches, or area being subjected to TSCM, or specific secure area. Basically, you document any opening that exceeds 96 square inches, and apply some type of security measure to stop intruders. In some case you may want to apply a standard of 36 or 64 square rule instead. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPh: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5212 From: Christopher E. Brown Date: Tue Apr 16, 2002 9:55pm Subject: Re: Re: NannyCAM Monitor On Tue, 16 Apr 2002, Shawn Hughes wrote: > At 01:41 PM 4/16/02 , the list quoth: > >.............A window on his laptop's screen that had been > >flickering suddenly showed a crisp black-and-white video image: > > What's he using? I have a PCR-1000, and I've seen some software driven > scanners, but how would one go about making a video monitor / scanner out > of a PC? If he is just using the PC as a monitor, would've seemed cheaper > to get one of the LCD monitors I use to set up cameras. Well, if I remember their marketing fluff from before I started routing it all to /dev/null... One of the things they went on about was remote monitoring via the internet. In addition to a standard receiver they offered one for the computer, and some software for remote view (bosed off of a mutant H.323 stack IIRC). Little module with a USB interface, exports to the computer, and accepts a few control items (channel/fine tuning/etc). I would assume he picked up the comp interface kit for the X10 cam. That or there are pccard based NTSC/PAL capture/view cards and/or full TV tuner cards available in pccard format. The non computer receiver output is standard NTSC baseband via RCA connector. 5213 From: charly.white Date: Tue Apr 16, 2002 10:44pm Subject: Re: Re: NannyCAM Monitor Yeah,,,,I do alittle Whacking (wireless hacking). It would be nice to flip back and fourth..... Subject: [TSCM-L] Re: NannyCAM Monitor At 01:41 PM 4/16/02 , the list quoth: >.............A window on his laptop's screen that had been >flickering suddenly showed a crisp black-and-white video image: What's he using? I have a PCR-1000, and I've seen some software driven scanners, but how would one go about making a video monitor / scanner out of a PC? If he is just using the PC as a monitor, would've seemed cheaper to get one of the LCD monitors I use to set up cameras. Thanks, Shawn Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 5214 From: James M. Atkinson Date: Wed Apr 17, 2002 4:13pm Subject: Hidden sex cameras may soon be banned http://www.cnn.com/2002/TECH/internet/04/17/surveillance.reut/index.html Hidden sex cameras may soon be banned WASHINGTON (Reuters) --Hidden video cameras in bedrooms, bathrooms and other private places would be outlawed under a bill introduced in Congress Tuesday that would also limit pornographic Web sites to an online red-light district. Television star Angie Harmon and privacy activist Susan Wilson joined Louisiana Democratic Sen. Mary Landrieu to announce a bill that would make it illegal to film someone for a "lewd or lascivious purpose" without that person's consent. Violators would face an unspecified fine and up to three years of jail time, or 10 years if the filmed subject was under 18. The bill would not apply to security cameras in private places such as department store dressing rooms, nor would it penalize those filming on city streets or other public places where privacy does not exist. Landrieu said she wrote the bill after hearing from Wilson, a Monroe, Louisiana, homemaker who found hidden video cameras above her bed and in her shower nearly four years ago. Wilson found she could not pursue criminal charges against the voyeur because secret video taping, unlike audio surveillance, is illegal in only a handful of states. "It's an outrageous, outrageous violation of someone's privacy and it's outrageous we don't have laws prohibiting this," Landrieu said. Harmon, best known for her role on the hit TV series "Law and Order," played Wilson in a TV movie for the Lifetime network. A privacy expert said the bill would provide a needed update to existing laws, but should be extended to cover potential abuses by government or private surveillance systems. "It's getting to the point where every aspect of our lives is now subject to this kind of surveillance ... and there's a lack of procedures governing the use of that technology," said David Sobel, general counsel at the Electronic Privacy Information Center. Adults-only Internet domain The bill would also require Web sites containing pornography, hate speech or other material deemed harmful to minors to give up their ".com" Web addresses and register under an adults-only Internet domain such as ".prn." Such an approach could prove troublesome, as other congressional attempts to regulate online content have been struck down in the courts or run aground on free-speech concerns. Moreover, Internet domains are created and approved not by the Congress but by an independent, international body. A bill approved last week by the House Commerce Committee would seek to protect children from inappropriate online content by creating a kid-safe Internet space within the United States' ".us" domain. A House staffer who has worked on the issue said that Commerce Committee members decided their approach was workable because it would not limit speech online, nor would it seek to impose decency standards on other countries. Copyright 2002 Reuters. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5215 From: James M. Atkinson Date: Wed Apr 17, 2002 4:17pm Subject: Peeping Tom Crackdown Proposed Federal Law Targets Video Voyeurs http://more.abcnews.go.com/sections/gma/goodmorningamerica/gma020416video_voyeur_bill.html Peeping Tom Crackdown Proposed Federal Law Targets Video Voyeurs W A S H I N G T O N, April 16 - Susan Wilson's family went about their everyday business in their home - believing they were alone. Meanwhile, a neighbor had been videotaping their most intimate moments. MORE ON THIS STORY The man who secretly videotaped the Wilsons violated their trust and created a private nightmare. Now the invasion of privacy that the Wilson family experienced will become the subject of public scrutiny, as Congress looks at a bill that would make video voyeurism a federal crime. The Wilsons, who were secretly videotaped in their Monroe, La., home, inspired the proposed legislation. Their story became the basis for a Lifetime TV movie that aired in January called Video Voyeur: the Susan Wilson Story. Wilson told ABCNEWS' Good Morning America her family couldn't believe an established punishment didn't exist for those who videotaped others without their knowledge. "Well, I was already feeling vulnerable and unprotected and then when I found there was no law against it, I felt even more so," she said. Actress Angie Harmon played Susan Wilson in the TV movie and has joined Wilson and Sen. Mary Landrieu, a Democrat from Louisiana, in announcing the bill on Capitol Hill today. "What's even creepier about it is that it's not just celebrities anymore that are victimized in this way, it's everyone," Harmon said on Good Morning America. The actress said privacy laws need to be developed to regulate the latest developments in technology, whether it relates to videotape or live feeds on the Internet. Creepy Feeling Lingers The federal bill targets anyone who uses a camera or similar recording device to record another person "either for a lewd or lascivious purpose without that person's consent," placing them in violation of the law. The penalty would be a fine or imprisonment up to three years. If a minor were the one recorded, the imprisonment would be up to 10 years, under the bill's provisions. In a 1999 interview with ABCNEWS, Wilson said her image of her own home changed drastically after she found out a neighbor was spying on her with a video camera. "It gives me the creeps still," Wilson said. The violator of the family's privacy, Steve Glover, had been a longtime family friend and fellow church member of the Wilsons. "He seemed to know everything about me," Wilson said. "Everything that I'd done. He just knew everything." She became so convinced that Glover was spying on her, that she searched his home one day while visiting, and found a videotape. After pressing play, Wilson watched in horror as her bedroom filled the screen. Video Cameras in Bedroom Ceiling It turns out there was hidden recording equipment in the Wilsons' attic, and holes cut into the ceiling above their bedroom and master bathroom. But what shocked Wilson even more was learning that Glover had broken no laws with his voyeuristic videotaping. He eventually pleaded guilty to unauthorized entry into the Wilson home, received probation and was ordered to pay $2,000 for damages done to his neighbor's home. Wilson went on a crusade, and convinced state lawmakers in Louisiana to pass a law against video voyeurism, making it a federal crime. Only five states have similar laws against video voyeurism: California, Louisiana, Michigan, Mississippi and Ohio, though Louisiana's is the broadest in scope. Connecticut prohibits video surveillance in employee locker rooms and rest rooms, while New York prohibits concealed cameras in fitting rooms. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python -------------------------------------------------------------------------------------------------- 5216 From: Hawkspirit Date: Wed Apr 17, 2002 6:55pm Subject: NannyCAM Monitor Jim, How does the video interface help sniff out WLAN's? Roger "The use of the laptop would also tend to indicate that the guy hacks wireless LAN's; as the WLAN hackers very commonly use the laptop video interface to help sniff out WLAN's being used." -jma 5217 From: Steve Uhrig Date: Thu Apr 18, 2002 0:03am Subject: Riser Bond's new address + TDRs If anyone cares, Riser Bond (TDR manufacturer) has been absorbed by SPX's Dialectric Communications Facility and has the following new contact info: Radiodetection Group 35 Whitney Road Mahwah NJ 07430 201-848-8070 800-688-8377 201-848-1303 fax The above is the new address for sales and customer support. Engineering will move to Lincoln, NE and manufacturing will move to Bridgeton, ME. If you own a Riser Bond TDR, you may wish to print this message, cut out the above, and tape it inside the cover of your manual against future need. I still have some 1205CX, 1205CXA and 1205T-OSP 'yellow box' TDRs with the LCD screen, and some 2401B+ and the very latest model 1000. This last is new in box never used. Contact me for prices if interested. Mine are *very* aggressive prices, guaranteed pieces, most with new batteries or very recent at least. Most of the ones listed are in current production. Unllike Tek TDRs, Riser Bond are perfectly OK on wet lines up to 400 volts, and extremely easy to use. Riser Bond has an excellent tutorial at www.riserbond.com. A TDR is mandatory for sweeping telephone lines. Jim Ross doesn't like them which is all the more proof they are needed. Holler if interested. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 5218 From: Christopher E. Brown Date: Tue Apr 16, 2002 9:57pm Subject: RE: File - Gold List On Sun, 14 Apr 2002, James M. Atkinson wrote: > > If you focus too much on one particular discipline (like alarms or > access control) you risk missing external lighting issues, door > issues, the 96 inch rule, and even locks. The 96 inch rule? Have to admit, I am sufferint from a mental gap on this one. 5219 From: Michael Puchol Date: Thu Apr 18, 2002 2:57am Subject: Re: Re: NannyCAM Monitor ----- Original Message ----- From: "James M. Atkinson" To: Sent: Wednesday, April 17, 2002 4:31 AM Subject: [TSCM-L] Re: NannyCAM Monitor > Bah, it was bullshit theatrics. Agreed. > The guy used a laptop for a prop, nothing more, and nothing less. Agreed too. :-) > All he did was take the video from a Wavecom receiver and squirt it > into the laptops video input port or USB port... This way it would > "look cool" and he wouldn't be trying to balance a laptop on the dash > of the car. Well, your usual flash show for TV. You see this kind of stuff all the time. > The use of the laptop would also tend to indicate that the guy hacks > wireless LAN's; as the WLAN hackers very commonly use the laptop > video interface to help sniff out WLAN's being used. Well, this is one I'll comment on - why use the video interface to find WLANs, when you have available a much better set of tools for that job, which range from 'hacker' tools to software that costs over $35k like NAI Sniffer Pro? I take it that in your scenario, you'd get a 2.4GHz wideband receiver, and use it to look for signals on the designated 802.11b 'channels', which would show up on the video input not as a video signal - custom written software could look for particular DSSS signatures rather than actual video. All you need to look for WLANs is a laptop, PCMCIA WiFi card, and some software (take your pick, Windows or Linux-based), there's no need to get as complicated as using video equipment & such. All the best, Mike 5220 From: Michael Puchol Date: Wed Apr 17, 2002 10:49am Subject: Re: Re: NannyCAM Monitor ----- Original Message ----- From: "James M. Atkinson" To: Sent: Wednesday, April 17, 2002 4:31 AM Subject: [TSCM-L] Re: NannyCAM Monitor > Bah, it was bullshit theatrics. Agreed. > The guy used a laptop for a prop, nothing more, and nothing less. Agreed too. :-) > All he did was take the video from a Wavecom receiver and squirt it > into the laptops video input port or USB port... This way it would > "look cool" and he wouldn't be trying to balance a laptop on the dash > of the car. Well, your usual flash show for TV. You see this kind of stuff all the time. > The use of the laptop would also tend to indicate that the guy hacks > wireless LAN's; as the WLAN hackers very commonly use the laptop > video interface to help sniff out WLAN's being used. Well, this is one I'll comment on - why use the video interface to find WLANs, when you have available a much better set of tools for that job, which range from 'hacker' tools to software that costs over $35k like NAI Sniffer Pro? I take it that in your scenario, you'd get a 2.4GHz wideband receiver, and use it to look for signals on the designated 802.11b 'channels', which would show up on the video input not as a video signal - custom written software could look for particular DSSS signatures rather than actual video. All you need to look for WLANs is a laptop, PCMCIA WiFi card, and some software (take your pick, Windows or Linux-based), there's no need to get as complicated as using video equipment & such. All the best, Mike 5221 From: Date: Thu Apr 18, 2002 6:28am Subject: Re: Re: NannyCAM Monitor Michael Puchol wrote: > ----- Original Message ----- > From: "James M. Atkinson" > To: > Sent: Wednesday, April 17, 2002 4:31 AM > Subject: [TSCM-L] Re: NannyCAM Monitor > > > Bah, it was bullshit theatrics. > > Agreed. > > > The guy used a laptop for a prop, nothing more, and nothing less. > > Agreed too. :-) I disagree. http://www.spybusters.com/RRSA.html Cheers, Kevin 5222 From: James M. Atkinson Date: Thu Apr 18, 2002 8:08am Subject: FBI Tech Jobs https://www.fbijobs.com/joblist.asp Electronics Engineer (Amended 4/2/2002) Announcement Number: 02-07-325 Salary Range: $36,615 - $86,095 (GS 7/9/11/12/13) Promotion Potential: GS 14 POSITION IS LOCATED AT THE ENGINEERING RESEARCH FACILITY, QUANTICO, VIRGINIA. NO PUBLIC TRANSPORTATION IS AVAILABLE. Duties and Responsibilities: Serves as project manager, and/or performs research, test and evaluation, and/or developmental engineering studies on projects in the field of advanced telephony, encryption, intercept capabilities and wireline digital voice/data communications. Research, develop, test and evaluate new innovative software and hardware, not commercially available, to assist law enforcement and intelligence agencies in the interception of Wireline data communications and encryption areas of telecommunications and computer networks. Performs engineering analysis and evaluations of existing technologies to include the use of a wide variety of public switch telephone network (wireline), cellular and personal communications services (PCS) networks (wireless) and/or data networking and communications networks. Designs and develops techniques, methods and equipment to enhance, modify or compromise existing or developing technology within the field of telephony, specifically, wireline or wireless networks, data networks and digital communications. Isolates and defines specific engineering problems and possible modifications and solutions. ---------------------------------------------------------------- https://www.fbijobs.com/joblist.asp Electronics Engineer (Amended 4/2/2002) Announcement Number: 02-07-326 Salary Range: $36,615-$86,095 (GS 7/9/11/12/13) Promotion Potential: GS 14 Open Period: 2/7/2002- 5/10/2002 This announcement will close at 5/10/2002 12:00 am CST. To be considered for employment, you must submit your application before that time. Duty Location: Quantico, Virginia Area of Consideration: All Sources *Cut-off date: 4/12/2002. Applicants who apply by this date will received consideration in filling positions through this vacancy. Who May Apply: 1.Current federal employees serving under a career or career-conditional appointment, current federal employees in an excepted service position, and former employees with reinstatement eligibility may apply. 2.All others qualified candidates may apply. EXPENSES INCURRED WILL BE BORNE BY THE SELECTEE. POSITION IS LOCATED AT THE ENGINEERING RESEARCH FACILITY, QUANTICO, VIRGINIA. NO PUBLIC TRANSPORTATION IS AVAILABLE. Duties and Responsibilities: Performs studies, research, analysis and /or development on a wide variety of technical projects in one or more of the following areas: Audio Collection, Audio/Video and Image processing and Signal Analysis, Radio Frequency Communications, Signal Intelligence, Technical Countermeasures, Covert Mobile and Physical Surveillance, Information Systems Networks/Platforms. Work involves development, design, test, analysis, evaluation, implementation, and maintenance of advanced electronic devices, systems and technologies as well as program/project management at the senior levels. Travel may be required. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "...three shall be the number to count, and the number to be counted shall be three.....four shall thou not count......five is right out". - M. Python