This text file is the raw feed for the TSCM-L, dating back to the LISTSERVE move back and 1994, and spanning foward with a large segment of the archive in a single file in order to make it easier to use for your reference in TSCM matters between 1999 and 2006. The earlier 1991-1994 and 1994-1999 LISTSERV archives can only be provided to confirmed U.S Citizens, and the post 2006 posts can be found on Google. In total this part of the archive is almost 35 megabytes, the 1991 to 1999 list serve is a huge amount of source code used to drive TSCM instruments (about 500 MB worth), and I have no idea how large the Google Archive of the post-2006 materials are (it has been rolling for over 12 years). ------------------------------ From: Charles P Date: Tue Jan 2, 2001 10:15pm Subject: Re: Re: Playstation 2 Tomb Raiders ----- Original Message ----- From: To: Sent: Tuesday, January 02, 2001 12:51 PM Subject: [TSCM-L] Re: Playstation 2 > Anyone have ideas as to what Saddam Hussein intends to use the Sony > Playstation 2 for? > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > 2223 From: Date: Tue Jan 2, 2001 10:42pm Subject: ZDNet: News: Is PlayStation2 a military weapon? HAVE A GREAT DAY !!! ---------- http://www.zdnet.com/zdnn/stories/news/0,4586,2550857,00.html [Non-text portions of this message have been removed] 2224 From: Kohlenberg, Toby Date: Tue Jan 2, 2001 10:16am Subject: RE: A lesson in reality... Out of curiousity, what exactly does any portion of this discussion have to do with TSCM? toby Toby Kohlenberg, CISSP Intel Corporate Information Security STAT Team Information Security Specialist 503-264-9783 Office & Voicemail 877-497-1696 Pager "Just because you're paranoid, doesn't mean they're not after you." PGP Fingerprint: 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 > -----Original Message----- > From: Robert G. Ferrell [mailto:rferrell@r...] > Sent: Tuesday, January 02, 2001 5:18 AM > To: TSCM-L@egroups.com > Subject: Re: [TSCM-L] A lesson in reality... > > > >The toilet paper costs a buck. The 2000 pages of paperwork it > >takes to comply with all the applicable regulations and agencies > >and sanctions and certifications and programs is where the > >difference comes from. > > I've never seen a political discussion between extreme > opposing viewpoints where either side accomplished much of > anything beyond enraging their opponents, so I'm going to > stay far away from the central thrust of this thread. > However, I would like to point out that a great many folks > are putting considerable effort into reducing or eliminating > the need for paperwork when providing services to the U. S. > government. My agency, for example. The National Business > Center is a franchise agency of the U. S. Department of the > Interior that (among other things) develops applications > for paperless bidding, bid notification, invoice tracking, > and payment from Treasury. If you're a potential contractor > for the U.S. government, take a look at > > http://www.nbc.gov/products/procurement.html > > More and more agencies are signing up for this sort of thing > every day. As a franchise agency, I might add, we're required > (eventually) to "pay our own way" without any direct financial > support from Congress. > > As H. L. Mencken once wrote, "The wheels of bureacracy grind > slowly, but exceedingly fine." That doesn't have a lot of > relevance here, but it's still a great quote. > > ;-) > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2225 From: Shawn Hughes Date: Wed Jan 3, 2001 0:10am Subject: computers >>> Subject: WORD PERFECT >>> >>> >>> This has got to be one of the funniest I've heard of in a long time. >>> Truthfully, I think this guy should have been promoted, not fired. This >> is a true story from the WordPerfect Helpline which was transcribed from a >>> recording monitoring the customer care department. Needless to say the >>Help Desk employee was fired; however, he/she is currently suing the Word >>Perfect organization for "Termination without Cause." >>> >>> Actual dialogue of a former Word Perfect Customer Support employee (now I >>> know why they record these conversations!) >>> "Ridge Hall computer assistance; may I help you?" >>> "Yes, well, I'm having trouble with WordPerfect." >>> "What sort of trouble?" >>> "Well, I was just typing along, and all of a sudden the words went away." >>> "Went away?" >>> "They disappeared." >>> "Hmm. So what does your screen look like now?" >>> "Nothing." >>> "Nothing?" >>> "It's blank; it won't accept anything when I type." >>> "Are you still in WordPerfect, or did you get out?" >>> "How do I tell?" >>> "Can you see the C: prompt on the screen?" >>> "What's a sea-prompt?" >>> "Never mind, can you move your cursor around the screen?" >>> "There isn't any cursor: I told you, it won't accept anything I type." >>> "Does your monitor have a power indicator?" >>> "What's a monitor? >>> "It's the thing with the screen on it that looks like a TV. >>> "Does it have a little light that tells you when it's on?" >>> "I don't know," >>> "Well, then look on the back of the monitor and find where the power cord >>> goes into it. Can you see that?" >>> "Yes, I think so," >>> "Great. Follow the cord to the plug, and tell me if it's plugged into the >>> wall." >>> "Yes, it is," >>> "When you were behind the monitor, did you notice that there were two >>cables >>> plugged into the back of it, not just one?" "No." >>> >>> "Well, there are. I need you to look back there again and find the other >>> cable." >>> "Okay, here it is," >>> "Follow it for me, and tell me if it's plugged securely into the back of >>> your computer." >>> "I can't reach," >>> "Uh huh. Well, can you see if it is?" >>> "No." >>> "Even if you maybe put your knee on something and lean way over?" "Oh, >>it's >>> not because I don't have the right angle - it's because its dark." >>> >>> "Dark?" >>> "Yes the office light is off, and the only light I have is coming in from >>> the window." >>> "Well, turn on the office light then." >>> "I can't." >>> "No? Why not?" >>> "Because there's a power failure," >>> "A power... A power failure? Aha, Okay, we've got it licked now. Do you >>> still have the boxes and manuals and packing stuff your computer came >in?" >>> "Well, yes, I keep them in the closet." >>> >>> Good. Go get them, and unplug your system and pack it up just like it was >>> when you got it. Then take it back to the store you bought it from." >>> "Really? Is it that bad?" >>> >>> "Yes, I'm afraid it is." >>> "Well, all right then, I suppose. What do I tell them?" >>> "Tell them you're too stupid to own a computer." 2226 From: Larry Hountz - -(©ø©)- Date: Tue Jan 2, 2001 2:37pm Subject: Re: Re: Playstation 2 I thought for the chips... here is some very good feedback.. http://www.zdnet.com/tlkbck/comment/22/0,7056,87627-402464,00.html Larry.. ----- Original Message ----- From: To: Sent: Tuesday, January 02, 2001 12:51 PM Subject: [TSCM-L] Re: Playstation 2 > Anyone have ideas as to what Saddam Hussein intends to use the Sony > Playstation 2 for? > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2227 From: Date: Wed Jan 3, 2001 4:05am Subject: Is Sony's Playstation2 a Military weapon ? Japan thinks the game machine could be used to guide missiles -- sothe coun= try is leveling export controls.By Reuters UPDATED April 16, 2000 8:21 AM PT= TOKYO -- Japan has slapped export controls on Sony Corp.'s new,hugely popul= ar Playstation2 video game because the machine is sosophisticated it could b= e used for military purposes, media saidSunday. The hit home game machine, w= hich includes a digital video disc playerand will eventually offer Internet = access, is Sony's most profitableproduct. The company said it had shipped 1.= 4 million in the monthafter the game's March 4 launch. Sound off here!! Post= your commenton this story. The console and its eight-megabyte memory card = have been designatedas ``general-purpose products related to conventional we= apons¥¥because they contain components that could be used for militarydevice= s such as missile guidance systems, Kyodo news agency quotedindustry sources= as saying. Playstation2 is the first game console to face export controls u= nderthe Foreign Exchange and Foreign Trade Control Law, Kyodo said. The law = requires the trade ministry's approval for the export ofrestricted products = worth more than 50,000 yen ($472). Thus, theexport of more than two consoles= would be controlled because each ispriced at 39,800 yen. Sony: Competition = allows no compromise``We have mixed feelings because our efforts to produce = a gameconsole of the highest quality have resulted in legalrestrictions,¥¥ t= he Asahi Shimbun newspaper quoted an official ofSony Computer Entertainment = Inc. as saying. ``We could not compromise because of the fierce competition = in theindustry,¥¥ he said. Officials of the trade ministry and Sony could no= t be reached forfurther comment. With U.S. software giant Microsoft Corp. (N= asdaq: MSFT) due to enterthe lucrative video game market next year with its = ownhigh-performance console, tentatively called the X-Box, exportcontrols co= uld hinder Sony's ability to compete, Kyodo quotedindustry sources as saying= . Get free e-mail and voicemai 2228 From: Date: Wed Jan 3, 2001 4:15am Subject: Is Sony's Playstation2 a Military weapon ? Japan thinks the game machine could be used to guide missiles -- so the country is leveling export controls. By Reuters UPDATED April 16, 2000 8:21 AM PT TOKYO -- Japan has slapped export controls on Sony Corp.'s new, hugely popular Playstation2 video game because the machine is so sophisticated it could be used for military purposes, media said Sunday. The hit home game machine, which includes a digital video disc player and will eventually offer Internet access, is Sony's most profitable product. The company said it had shipped 1.4 million in the month after the game's March 4 launch. Sound off here!! Post your comment on this story. The console and its eight-megabyte memory card have been designated as ``general-purpose products related to conventional weapons¥¥ because they contain components that could be used for military devices such as missile guidance systems, Kyodo news agency quoted industry sources as saying. Playstation2 is the first game console to face export controls under the Foreign Exchange and Foreign Trade Control Law, Kyodo said. The law requires the trade ministry's approval for the export of restricted products worth more than 50,000 yen ($472). Thus, the export of more than two consoles would be controlled because each is priced at 39,800 yen. Sony: Competition allows no compromise ``We have mixed feelings because our efforts to produce a game console of the highest quality have resulted in legal restrictions,¥¥ the Asahi Shimbun newspaper quoted an official of Sony Computer Entertainment Inc. as saying. ``We could not compromise because of the fierce competition in the industry,¥¥ he said. Officials of the trade ministry and Sony could not be reached for further comment. With U.S. software giant Microsoft Corp. (Nasdaq: MSFT) due to enter the lucrative video game market next year with its own high-performance console, tentatively called the X-Box, export controls could hinder Sony's ability to compete, Kyodo quoted industry sources as saying. Get free e-mail and voicemail Try ZDNet eCircles -- your private place on the Web Join ZDNet now! The first version of the PlayStation generated approximately 40 percent of Sony's group-based operating profits. Sony Computer Entertainment Inc, a Sony Corp. subsidiary, has said it aims to ship four million PlayStation2 consoles in Japan and three million each in Europe and the United States in 2000/01. Overseas shipments are due to start later this year. ``These days there are so many items that have technology for civilians that can also be used for military purposes, and of course, PlayStation2 is among these goods,¥¥ the Asahi Shimbun newspaper quoted military commentator Kensuke Ebata as saying. PlayStation2 could guide a missile Military analysts cited the example of a Tomahawk missile that needs to ``see¥¥ where it is going until it strikes its target and must process graphic material at high speed to keep to its target. PlayStation2's graphic processing capability is fast enough to enable it to be used in a missile. Japan's government has become increasingly wary of the possibility that products meant for civilian use could be diverted for weapons use. Japanese radar and communications devices for civilian use were discovered in a North Korean submarine sunk by the South Korean military in December 1998, and two Japanese men were arrested in January on suspicion of illegally shipping parts for anti-tank rocket launchers to Iran. The export restrictions are just the latest in a string of problems that have plagued Sony's most profitable product. Sony Computer Entertainment said this month that users could illegally manipulate the machine to copy DVD movies to videotape. Last month it said it had found the game player could be used to watch digital video disk software sold overseas in breach of a worldwide agreement among DVD player makers. HAVE A GREAT DAY !!! 2229 From: Tom Mann Date: Wed Jan 3, 2001 9:51am Subject: Re: Re: Playstation 2 Dear Pat: I was told that the chip in the Play Station will allow Hussein to radically improve his surface to air missile and anti-aircraft gunnery systems in relation to tracking targets. Tom Mann Guardian International Salem, OR 2230 From: Mike Date: Wed Jan 3, 2001 10:07am Subject: Playstation 2 Obviously he intends to modify them for use as computers. Nuff Said- Bootleg [Non-text portions of this message have been removed] 2231 From: Date: Wed Jan 3, 2001 11:26am Subject: Y2K Computer Glitch Hits 7-Eleven Y2K Computer Glitch Hits 7-Eleven By David Koenig AP Business Writer Wednesday, Jan. 3, 2001; 4:36 p.m. EST DALLAS ‚Äì‚Äì A Y2K-type computer bug hit cash registers in 7-Eleven stores this week, causing them to read the new year as 1901 instead of 2001 and inconveniencing customers who wanted to make credit-card purchases. A spokeswoman said the problem was fixed late Tuesday night and most stores were operating normally Wednesday. Officials at the Dallas-based chain of about 5,200 U.S. convenience stores and thousands more around the world thought they had nipped calendar-related computer glitches a year ago when, like many other big corporations, they geared up for an onslaught of Y2K bugs that never came. 7-Eleven said it spent $8.8 million preparing its in-store computer systems for the rollover from 1999 to 2000. "This was all specifically devised for 7-Eleven and was all Y2K-compliant," said Margaret Chabris. "We did some 10,000 tests on it, and it was working fine until Monday." Chabris said about 15 percent of 7-Eleven's sales involve credit cards ‚Äì not including credit-card ports on the outside gas pumps, which she said were not disrupted. 7-Eleven had 1999 sales of $8.25 billion. Chabris said it wasn't clear whether the company lost any sales because of the outage. For one thing, customers could still pay by cash or check. For another, she said, most of the stores still have devices for manually taking an imprint of a customer's credit card. The chain has a proprietary system that tracks inventory, weather forecasts ‚Äì to change the product mix during hot or cold spells ‚Äì and all cash-register sales. The system is critical in helping 7-Eleven manage inventory in stores that have limited shelf space. The 7-Eleven spokeswoman said major hardware and software vendors on the overall system, installed in 1999, included Electronic Data Systems Corp., NCR Corp., and Affiliated Computer Systems of Dallas. An EDS spokesman said the company did not work on the point-of-sale system, where the bug occurred, which 7-Eleven confirmed. Businesses and government agencies braced for service disruptions a year ago because older computers and software were programmed to use only two digits to represent the year. The shortcut saved computer memory by ignoring the 21st century. 2232 From: St. Clair, James Date: Wed Jan 3, 2001 10:14am Subject: RE: Re: Playstation 2 Well, it should be noted that while all of this is theoretically true, there is no magic fix for this. PS2's run on a standard 32-bit processor, but there vector graphics rendering is EXTREMELY fast, on the order of a super computer . The problem is these machines must be networked and reprogrammed to be used any other way but playing GOLF or NASCAR, and that is cantankerous: PS2s were not designed for this, and Saddam may not have the best script kiddies available. Given his historical penchant for charity, he may even be planning on handing them out to kids as a "hearts and minds". He has previously given away free art supplies before the embargo.. Jim -----Original Message----- From: Tom Mann [mailto:guardian@n...] Sent: Wednesday, January 03, 2001 10:51 AM To: patedwards@w... Cc: TSCM-L@eGroups.com Subject: Re: [TSCM-L] Re: Playstation 2 Dear Pat: I was told that the chip in the Play Station will allow Hussein to radically improve his surface to air missile and anti-aircraft gunnery systems in relation to tracking targets. Tom Mann Guardian International Salem, OR ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2233 From: Psiber Joe Date: Wed Jan 3, 2001 5:06pm Subject: Re: Re: Playstation 2 ----- Original Message ----- From: "Tom Mann" To: Cc: Sent: Wednesday, January 03, 2001 8:51 AM Subject: Re: [TSCM-L] Re: Playstation 2 > Dear Pat: > > I was told that the chip in the Play Station will allow Hussein to > radically improve his surface to air missile and anti-aircraft gunnery > systems in relation to tracking targets. > > Tom Mann > Guardian International > Salem, OR > > I believe this stems from the fact that the PS2 is the first console system with a powerful enough processor to make it worth your while. Somewhere (slashdot?) I believe it was quoted that it takes just 7 - 10 PS2 processors per missle; and at $200/unit wholesale, this is a /bargin/ for a country underneath econonic sanctions. Psiber Joe 2234 From: James M. Atkinson, Comm-Eng Date: Wed Jan 3, 2001 6:19pm Subject: New cameras focus on fuel bandits New cameras focus on fuel bandits http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 by David Williams, Motoring Editor Twenty-four surveillance is being launched by police at London filling stations to combat a huge rise in the number of people stealing fuel - following a year of sharp petrol price rises. Up to £2 million worth of fuel is now being stolen from forecourts in the capital every month. Motorists are driving off with up to £60 of fuel at a time, although the average haul in London is £26. The boom in "drive-offs" has doubled since the problem was reported in the summer, when 1,200 garages within the M25 were losing between £750,000 and £1 million every month. Then the British Oil Security Syndicate (Boss) said thousands of drive-offs were occurring every four weeks. Nationally the crisis cost petrol retailers at least £11.2 million last year. New Year figures, however, are expected to show a doubling in drive-offs in the past eight months, and police say the crimewave is nationwide. Now the Met has begun fighting back by installing high-resolution spy cameras linked to a powerful mobile police computer, and arrests have already been made. The computer reads every car number plate entering a forecourt and checks them against lists of known offenders who have previously been reported to police following drive-offs. Police also programmed the computer to issue an alert if it spots vehicles involved in other crimes or with no valid tax disc. In most cases offenders are approached by plain-clothes officers before they drive off. Backed by the oil industry, the operation was launched secretly at 30 south London forecourts and is expected to spread throughout London before going nationwide. Detective Inspector Larry Lawrence said: "The computer works in the blink of an eye and has proved very successful. "We are pleased to be working with Boss to tackle forecourt crime. The figures are quite high but this type of crime is preventable. "We believe the pattern we have found in south London reflects a London-wide problem." Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip of the iceberg as forecourt crime goes. People who do this normally engage in other crimes too." Earlier this year Boss reported that since 1998 credit card fraud at filling stations across Britain leapt from £12.2 million to £19 million. Drivers claiming to have "forgotten their wallet" and driving off rose to £5 million this year. Police also urged oil firms to install barriers at petrol station forecourts. They feel that with further rises in the cost of petrol, drive-offs will continue to soar. In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around 77.9p. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2235 From: Talisker Date: Thu Jan 4, 2001 0:22pm Subject: Re: New cameras focus on fuel bandits I saw a TV programme on this recently, and know that the number plate reading is working well, however, I really can't see that reading the tax disc is feasible, in the UK the lettering is just over an inch tall and on top off hard to copy colouring making the letter outline difficult to read, add to this that the disc is displayed inside the windscreen at a variety of positions and angles. Also the disc is displayed in a portion of the windscreen outside the coverage of the wipers. Any opinions from the CCTV geeks out there? Oh and the range from camera to windcreen is 10,s of metres Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. ----- Original Message ----- From: "James M. Atkinson, Comm-Eng" To: "TSCM-L Mailing List" Sent: Thursday, January 04, 2001 12:19 AM Subject: [TSCM-L] New cameras focus on fuel bandits New cameras focus on fuel bandits http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 by David Williams, Motoring Editor Twenty-four surveillance is being launched by police at London filling stations to combat a huge rise in the number of people stealing fuel - following a year of sharp petrol price rises. Up to £2 million worth of fuel is now being stolen from forecourts in the capital every month. Motorists are driving off with up to £60 of fuel at a time, although the average haul in London is £26. The boom in "drive-offs" has doubled since the problem was reported in the summer, when 1,200 garages within the M25 were losing between £750,000 and £1 million every month. Then the British Oil Security Syndicate (Boss) said thousands of drive-offs were occurring every four weeks. Nationally the crisis cost petrol retailers at least £11.2 million last year. New Year figures, however, are expected to show a doubling in drive-offs in the past eight months, and police say the crimewave is nationwide. Now the Met has begun fighting back by installing high-resolution spy cameras linked to a powerful mobile police computer, and arrests have already been made. The computer reads every car number plate entering a forecourt and checks them against lists of known offenders who have previously been reported to police following drive-offs. Police also programmed the computer to issue an alert if it spots vehicles involved in other crimes or with no valid tax disc. In most cases offenders are approached by plain-clothes officers before they drive off. Backed by the oil industry, the operation was launched secretly at 30 south London forecourts and is expected to spread throughout London before going nationwide. Detective Inspector Larry Lawrence said: "The computer works in the blink of an eye and has proved very successful. "We are pleased to be working with Boss to tackle forecourt crime. The figures are quite high but this type of crime is preventable. "We believe the pattern we have found in south London reflects a London-wide problem." Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip of the iceberg as forecourt crime goes. People who do this normally engage in other crimes too." Earlier this year Boss reported that since 1998 credit card fraud at filling stations across Britain leapt from £12.2 million to £19 million. Drivers claiming to have "forgotten their wallet" and driving off rose to £5 million this year. Police also urged oil firms to install barriers at petrol station forecourts. They feel that with further rises in the cost of petrol, drive-offs will continue to soar. In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around 77.9p. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2236 From: Date: Thu Jan 4, 2001 4:39pm Subject: Playstation2 The prices have risen dramatically on Playstation2 systems,from the suggested retail of $250 plus. Auctions at Ebay list $350-$550. At Amazom they are topping out at the $2200 range! That's supply and demand,for you! HAVE A GREAT DAY !!! 2237 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 6:34pm Subject: Clinton directive designed to reshape counterintelligence activities [News] Published Friday, January 5, 2001 Clinton directive designed to reshape counterintelligence activities Washington Post WASHINGTON, D.C. -- President Clinton has signed an order establishing a counterintelligence board that will bring together high-ranking FBI, CIA and Defense Department officials in an effort to devise a more effective strategy to combat spying, senior administration officials said Thursday. Dubbed "CI-21," which stands for counterintelligence for the 21st century, the "presidential decision directive" creates a board of directors, chaired by FBI Director Louis Freeh, that is charged with implementing a "pro-active" counterespionage program. The board will hire an executive who will be the federal government's foremost expert on counterintelligence, officials said. "It is a dramatic change," a senior Clinton administration official said. In addition to Freeh, other members of the board will be the CIA deputy director, the deputy secretary of defense and a representative of the attorney general. The operation will be housed at the CIA. The presidential directive is significant, senior Clinton administration officials said, because it restructures the counterintelligence community by formalizing information-sharing without regard to borders or federal agencies. It also reflects a heightened focus on economic espionage and other types of spying, rather than solely emphasizing the protection of government secrets. "We have always looked at spies and tried to figure out who was spying on us and what they were after," a senior administration official said. "Now, we are looking more at what it is we want to protect. We will no longer focus on embassies as the centers of foreign intelligence-gathering activities." The CI-21 concept was developed in the aftermath of recent security lapses that revealed systemic failures in sharing information about spying. While information will be shared and counterespionage strategy coordinated, the CIA will not be permitted to conduct surveillance activities in the United States; its agents will continue to operate abroad. Former FBI counterterrorism chief Bob Blitzer said CI-21 represents a major improvement. "It is a big change because of the deliberate focus" on counterespionage, Blitzer said. "This new structure will bring everyone together in terms of how to assess what is going on abroad, what is going on here, and what the entire intelligence community needs to do to counter past, present and emerging threats." The first task of the board of directors will be to identify American threats and vulnerabilities. And under CI-21, the National Security Council, composed of Cabinet-level secretaries with responsibility for security issues, also will have a new oversight role in counterintelligence. "All of this," a White House official said, "really depends on the willingness of the players to make sure that the directive is carried out and these agencies cooperate." © Copyright 2001 Washington Post. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2238 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 6:37pm Subject: Judge gets video in home privacy case http://www.freep.com/news/locoak/zpriv_20010105.htm Judge gets video in home privacy case January 5, 2001 BY SALLY FARHAT FREE PRESS STAFF WRITER A prosecuting attorney turned in a videotape to an Oak Park judge Thursday depicting a 23-year-old woman taking a shower and using the toilet -- video her stepfather is accused of secretly filming. Oakland County Assistant Prosecutor Kathryn Steiner said that the nine scenes she gave Judge Marvin Frankel during a preliminary examination Thursday are strong enough to convict John Brown, 33, of eavesdropping. She chose not to include video Brown allegedly filmed of the woman in the living room. Defense attorney Scott Weinberg told the judge Thursday that no one has a reasonable expectation of privacy in a living room, whether a family member or a baby-sitter. That's his interpretation of a state eavesdropping statute that says it is illegal to spy on people with cameras or listening devices in places where they have a reasonable expectation of privacy. "This was the defendant's own home," said Weinberg, who also defended a Royal Oak man last year who was convicted of videotaping his daughter's 18-year-old girlfriend as she showered in their home. "The statute has to be reasonable expectation of privacy. The question of fact now becomes, is the bathroom in the clients' own home considered private?" The case was bound over to Oakland County Circuit Court, and that question will be decided by Judge Wendy Potts on Jan. 17. Brown's bond was reduced to $10,000, but he remained in Oakland County Jail. Brown, who is accused of secretly videotaping his wife and stepdaughter, is charged with 10 counts of eavesdropping. He faces up to 2 years in prison and a $2,000 fine on each count, if convicted. The visibly shaken stepdaughter, who found a camera hidden in the shower drain last month, recounted for Frankel how it felt to discover that she had been taped. "He said, 'It was an obsession,' " the stepdaughter said, burying her face in her hands as she referred to Brown. The videotaping started two weeks before the stepdaughter moved into the Oak Park home Brown shared with her mother, the 23-year-old testified. Brown also faces another court date in front of Judge Barry Howard on Jan. 24 for a probation violation relating to an earlier criminal sexual misconduct conviction involving a 9-year-old step-granddaughter. His bond in that case is set at $50,000. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2239 From: Gerard P. Keenan Date: Wed Jan 3, 2001 8:34pm Subject: FL licensing for security/Brad Robinson Sorry for the crosspostings. Can anyone point me in the right direction for licensing laws in Florida for security guard companies? We are licensed as a Guard and Patrol Agency in the state of NY, and are looking into establishing a presence in Florida due to a number of recent inquiries from that state. Is there a reciprocity licensing agreement between NY and FL? Secondly, I know Brad Robinson is on some of these lists. Can you please contact me via private email at your earliest convenience? I lost your contact info when I had my massive computer crash a couple of months ago. Thanks to everyone in advance. Jerry Keenan [Non-text portions of this message have been removed] 2240 From: Gerard P. Keenan Date: Thu Jan 4, 2001 11:22am Subject: FL lic./virus warning Just wanted to say a big "THANKS" to all the replies I received on the Florida Licensing info I requested. You guys (and gals!) are all terrific! I also want to pass out a warning about viruses. The holidays are over, but the danger from viruses is, apparently, far from over. We've all heard about the Snow White & the Seven Dwarfs virus that's been making the rounds. Be very, very careful of this one. It seems to be propagating big time. I've been hit with it eight times in the last 2 weeks -- two of those times were just this morning!! The first one came in today around 0930, and the second one came in about 1110. Luckily, I recognized it before opening it and they have been deleted from my computer. I don't know where they're coming from, but if I received it twice in less than 2 hours, I'm pretty sure it'll pop up again. So I wanted to let everyone know that it's out there and making the rounds today. I also received a 3rd virus in between the two SW&7Ds. It came with an email from another list I belong to. This time there was no warning, but my Norton caught it and got rid of it. As many of you know, I have two email accounts. The Snow White virus came in on my earthlink account. The unknown virus came in on my other one through a local server (suffolk.lib.ny.us). And all before noon! Again, thanks to everyone who responded. Got some really good info from it -- and all very helpful. Jerry K. [Non-text portions of this message have been removed] 2241 From: Shawn Hughes Date: Thu Jan 4, 2001 7:33pm Subject: decoding software Hello, I know that this is more a surveillance than a counter - surveillance question, but does anyone have experience with the Code - 3 series of decoding software from Hoka products? I don't have it in the budget ($800+) for it now, but would it be worthwhile to consider over, say a M8000 ? TIA, Shawn 2242 From: Craig Snedden Date: Fri Jan 5, 2001 8:36am Subject: Re: New cameras focus on fuel bandits I can see that a recognition system would be able to pick up the pre-printed portion of the tax disc and the colour (different colours for different validity periods), which may catch out quite a number of defaulters, but in my experience, only an inspection with the "mark one eyeball" will ascertain if the handwritten portion (the vehicles details) has been tampered with or not. It is a common method of alteration for a stolen tax disc to be treated with a substance to fade or remove the pen ink, then fill in the details for the car that it is going to be displayed on. Such alterations are easily spotted by close visual inspection and touching the disc, but I can't see a camera system being able to pick up on these. I'm sure the Government "boffins" will be looking at an RF device (passive or active) embedded in the vehicle which will be validated by some means and if invalid will send out a signal to static speed cameras, police cars etc. This raises questions of civil rights and freedom of movement....... Local authorities in the U.K. have just been given powers to raise revenue from taxing vehicles entering certain areas, commonly city centres, supposedly in a move to combat congestion. The U.K. has just recently adopted the European Convention of Human Rights. Does the imposition of a tax on my freedom of movement on the public highway, when there is no alternative route to my destination, not impose on my Human Rights? I know our cousins in the US have been tackling these sorts of questions for years now. Any comments? Sorry this got a bit off topic, but in a way it's still to do with surveillance..... ;-) Craig ----- Original Message ----- From: "Talisker" To: "TSCM-L Mailing List" ; "James M. Atkinson, Comm-Eng" Sent: Thursday, January 04, 2001 6:22 PM Subject: Re: [TSCM-L] New cameras focus on fuel bandits > I saw a TV programme on this recently, and know that the number plate > reading is working well, however, I really can't see that reading the tax > disc is feasible, in the UK the lettering is just over an inch tall and on > top off hard to copy colouring making the letter outline difficult to read, > add to this that the disc is displayed inside the windscreen at a variety of > positions and angles. Also the disc is displayed in a portion of the > windscreen outside the coverage of the wipers. > > Any opinions from the CCTV geeks out there? Oh and the range from camera to > windcreen is 10,s of metres > > Andy > http://www.networkintrusion.co.uk > Talisker's Network Security Tools List > ''' > (0 0) > ----oOO----(_)---------- > | The geek shall | > | Inherit the earth | > -----------------oOO---- > |__|__| > || || > ooO Ooo > talisker@n... > > The opinions contained within this transmission are entirely my own, and do > not necessarily reflect those of my employer. > > > > > > ----- Original Message ----- > From: "James M. Atkinson, Comm-Eng" > To: "TSCM-L Mailing List" > Sent: Thursday, January 04, 2001 12:19 AM > Subject: [TSCM-L] New cameras focus on fuel bandits > > > > New cameras focus on fuel bandits > > http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 > > by David Williams, > Motoring Editor > > Twenty-four surveillance is being launched by police at London filling > stations to combat a huge rise in the number of people stealing fuel - > following a year of sharp petrol price rises. > > Up to £2 million worth of fuel is now being stolen from forecourts in the > capital every month. Motorists are driving off with up to £60 of fuel at a > time, although the average haul in London is £26. > > The boom in "drive-offs" has doubled since the problem was reported in the > summer, when 1,200 garages within the M25 were losing between £750,000 and > £1 million every month. > > Then the British Oil Security Syndicate (Boss) said thousands of drive-offs > were occurring every four weeks. Nationally the crisis cost petrol retailers > at least £11.2 million last year. > > New Year figures, however, are expected to show a doubling in drive-offs in > the past eight months, and police say the crimewave is nationwide. > > Now the Met has begun fighting back by installing high-resolution spy > cameras linked to a powerful mobile police computer, and arrests have > already been made. The computer reads every car number plate entering a > forecourt and checks them against lists of known offenders who have > previously been reported to police following drive-offs. > > Police also programmed the computer to issue an alert if it spots vehicles > involved in other crimes or with no valid tax disc. > > In most cases offenders are approached by plain-clothes officers before they > drive off. Backed by the oil industry, the operation was launched secretly > at 30 south London forecourts and is expected to spread throughout London > before going nationwide. Detective Inspector Larry Lawrence said: "The > computer works in the blink of an eye and has proved very successful. > > "We are pleased to be working with Boss to tackle forecourt crime. The > figures are quite high but this type of crime is preventable. > > "We believe the pattern we have found in south London reflects a London-wide > problem." > > Tom Sterling, Boss chief, said: "The habitual drive-off offender is the tip > of the iceberg as forecourt crime goes. People who do this normally engage > in other crimes too." Earlier this year Boss reported that since 1998 credit > card fraud at filling stations across Britain leapt from £12.2 million to > £19 million. > > Drivers claiming to have "forgotten their wallet" and driving off rose to £5 > million this year. > > Police also urged oil firms to install barriers at petrol station > forecourts. They feel that with further rises in the cost of petrol, > drive-offs will continue to soar. > > In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around > 77.9p. > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2243 From: Date: Fri Jan 5, 2001 6:14am Subject: PlayStations Some of you have been commenting on Saddams' PlayStation. Here are some ideas. Reportedly, the PS2's powerful chips could be put to military use, but according to a Sony representative, "If somebody buys and uses PlayStations for military purposes, it is something we cannot control." What will happen once all those PS2s arrive in Baghdad? Here are a few possibilities: 1. Parts and Labor: Iraqi government at standstill while federal employees redeployed to fill out warranty cards. 2. Fitting In: PlayStation 2 now available in camouflage colors. 3. Hollywood Calls: Saddam Hussein offered the title role in next year's highly anticipated sequel, "How the Grinch Stole Detroit's Christmas." 4. Keeping Up With the Jones's: Kuwait stockpiles thousands of Atari 2600s, declares formation of elite SuperPong battalion. 5. Form Follows Function: All Iraqi tanks redesigned to include reset button. 6. Cheat Code: Pressing Triangle plus Square while pressing the Down arrow on the PS2 console annihilates Desert Shield with a roundhouse kick. 7. Fashion Sense: Iraqi armed forces required to dress like fighters in Tekken Tag Tournament. 8. Entertainment Aloft: Iraqi jets now include in-flight DVD movies. 9. Sign Me Up: Kids who didn't get a PS2 start enlisting in the Iraqi military, hoping to score a spare unit. 10. New Game: SCUD Missile Command. [Non-text portions of this message have been removed] 2244 From: James M. Atkinson, Comm-Eng Date: Fri Jan 5, 2001 7:21pm Subject: Man Arrested at Wal-Mart, Charged With Video Voyeurism St. Petersburg Times January 04, 2001, Thursday Man Arrested at Wal-Mart, Charged With Video Voyeurism Times Staff Writers PLANT CITY - A man was arrested after he installed a tiny video camera in the toe of his sneaker and then followed women around a store to look up their skirts with the gadget, police said. Daniel W. Searfoss, 42, was charged with voyeurism Sunday and taken to the Hillsborough County jail, investigators said. He was released on $ 500 bail later that day. Two women at a local Wal-Mart complained to managers and police Sunday that Searfoss had been following them around the store, Plant City police Detective Kevin Shultz said. One of the women said she saw a camera on one of Searfoss' sneakers, Shultz said. Searfoss, who told police he was a mechanic, was held by store security while they waited for police to arrive. When authorities got there, they found Searfoss with a sophisticated filming system, police Chief Bill McDaniel said. "He had a camera in his shoe and wires that went up his pants and came out at his waist," McDaniel said. "It's the first time that I know of that someone did such an elaborate job. He had his shoes specially altered for this." The wires were connected to a videocassette recorder carried inside a bag, McDaniel said. Police examined the tapes and saw that other unsuspecting women had also been snooped upon. McDaniel said Plant City enacted the voyeurism law in 1998 because of similar problems at public beaches and restrooms. Voyeurism is the lewd or indecent watching, filming or taping of any person without that person's knowledge or consent. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2245 From: Date: Fri Jan 5, 2001 3:33pm Subject: Clinton orders retooling of counterintelligence Clinton orders retooling of counterintelligence By Steve Holland WASHINGTON, Jan 5 (Reuters) - President Bill Clinton, in his waning days in office, has ordered a retooling of the country's counterintelligence efforts to take account of new espionage threats and protect the private sector, the White House said on Friday. The order will establish a new top government position -- a national counterintelligence executive charged with overseeing activities between the FBI, CIA and other agencies, and making sure they have enough money. White House National Security Council spokesman P.J. Crowley said Clinton signed the order in late December with a view toward addressing a changing espionage environment in which computer hackers can steal government and corporate secrets. "Before, you were worried about foreign intelligence services that might be operational out of embassies here in the United States. Now you have to worry about getting hacked by someone who is trying to glean information that we need to protect," he said. Clinton leaves office on Jan. 20. President-elect George W. Bush's spokesman, Ari Fleischer, declined to comment on the order, which Bush could decide to change after taking office. The national executive job is similar to that of the national drug control policy director, which coordinates anti-drug activities among various agencies and lobbies for funding for the effort on Capitol Hill. Crowley said the executive would work not only within the government but with the private sector "to make sure we understand potential threats to technology and infrastructure." The executive, unlikely to be named before Clinton leaves office, would have no role in investigations. U.S. officials have long worried about the possibility of a terrorist attack on the country's electricity grid or telephone systems. Protecting company research and development secrets has increasingly been viewed as a priority in the government. DEFINE CROWN JEWELS A key goal of the new office would be to identify the most precious items for the protection of U.S. national security, that if stolen or tampered with could be disastrous. "The first element will be understanding what is truly the crown jewel rather than costume jewelry," a senior U.S. intelligence official told Reuters on condition of anonymity. For example it could be the sophisticated W-88 nuclear warhead, a secret policy stating the "real intentions" of the United States in some realm, and disruption of the Middle East peace process, the official said. In the private sector it could be the need to maintain U.S. dominance in the world of information technology, he added. "It's a much broader concept than simply what are hostile intelligence services doing to us?" the official said. "What is so important to us that it must not be damaged?" The government last year drew fire for its handling of Taiwanese-born Los Alamos scientist Wen Ho Lee, who was never charged with spying and was freed from jail in September 2000 after pleading guilty to one count of downloading nuclear weapons design secrets to a non-secure computer. The new office was not created in response to Lee or past espionage cases, but rather to shift from a predominant focus on hostile nations which "in today's world ... is going to miss more than it's going to get," the intelligence official said. "The FBI surveilling the Russian embassy is a good thing, we ought to keep doing it, but to think that that was 98 percent of your defense is crazy," he said. For example in the 1999 case of the Russian diplomat accused of monitoring an eavesdropping device planted in the State Department, the new counterintelligence executive might have checked to see whether the U.S. military or another agency had some interest in feeding him information before arresting him, the official said. The new counterintelligence executive's office would replace the National Counterintelligence Center, which was instituted after the 1994 arrest of a CIA officer, Aldrich Ames, who was later convicted of spying for Moscow. (Additional reporting by Tabassum Zakaria) 16:12 01-05-01 2246 From: Date: Fri Jan 5, 2001 3:32pm Subject: Conference on the Future of European Intelligence to Take Place in CastleOutside Rome, Italy 14-16 February 2001 Conference on the Future of European Intelligence to Take Place in CastleOutside Rome, Italy 14-16 February 2001 WASHINGTON, Jan. 4 /PRNewswire/ -- A very exclusive gathering of the top European intelligence authorities will take place within a castle on the outskirts of Rome, Italy, from 14 through 16 February 2001. With the support of the Italian government as well as the European Parliament and the European Commission, six Italian educational institutes have organized the first really high-level public conference on "Intelligence in the 21st Century." The purpose of the conference is to offer to a select audience of participants from government, business and academic communities a critical overview of the revolution of intelligence at the beginning of the new century and to discuss the emergence of a new cultural paradigm regarding intelligence and its use in the decision-making process. The Government of Italy itself anticipates a near-term modernization of its intelligence community while also seeking to establish new open relationships with appropriate private sector and non-governmental organizations. The larger European community in turn is contemplating the need for a special European intelligence architecture that uses the Internet and European encryption to create shared capabilities that reduce European dependence upon and vulnerability to non-European intelligence collection capabilities. Confirmed speakers include the most authoritative representatives from various European countries as well as England, the United States, and Canada. The event is organized into half-days covering the new intelligence challenges, economic and information warfare, transnational threats, new methods of intelligence analysis and the open source revolution, business intelligence sources and methods, and the future of intelligence in Italy. A number of exhibits and special meals will enhance the ability of participants to network with senior European intelligence officials and examine new private sector offerings. Due to the intimate nature of the castle and the security arrangements that will characterize this event there are only 120 seats and 15 exhibits available on a first come first served basis. Profile Keywords: Analytic Services, Business Information, C3I Systems, Database and Information Management, Education, Geographic Information, Graphics, Intelligence Support, Mission Planning, Modeling & Simulation, Open Source Intelligence, Research, Space Operations, Surveillance Systems, Training, Workstations SOURCE Open Source Solutions, Inc. 2247 From: A Grudko Date: Fri Jan 5, 2001 10:16am Subject: Re: Sony's Playstation2 a Military weapon ? ----- Original Message ----- > Japan thinks the game machine could be used to guide missiles -- so the > country is leveling export controls. And Elvis is alive and well in Tokyo. Just don't give him a Playstation or he could take over the world...... Sounds like marketing ploy no. 367, "Tell the public they can't have it and everyone will want one", or No. 448, "Make it illegal and the price goes up" Here in SA we have a few shops that sell LCO FM +/-100 Meg room and series phone bugs 'under the counter' for US$ 150 - and as we all know these things cost about $4 in components to build. The nice metal PCB enclosure, the fancy packaging and a 100% profit margin probably push the wholsale price up to a whopping $15! So how can the retailer get away with a 1 000% mark up? Consumer ignorance. First they think these things are actually sophisticated! Second, the retailer implies that the importation/manufacturing/posession of this 'high tech' equipment is ILLEGAL (which in this country it isn't but it's USE contravienes a number of laws). Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2248 From: A Grudko Date: Sat Jan 6, 2001 7:17am Subject: Re: New cameras focus on fuel bandits ----- Original Message ----- > I really can't see that reading the tax disc is feasible >..... the disc is displayed inside the windscreen at a variety of > positions and angles. Also the disc is displayed in a portion of the > windscreen outside the coverage of the wipers. > Any opinions from the CCTV geeks out there?.... the range from camera to > windcreen is 10,s of metres I don't consider myself an expert (not even a geek) but we've done a lot of covert CCTV observation under a wide range of conditions. There are many factors in play here but few problems are insummountable given enough motivation (usually money). We have a 1200mm focal length Bausch & Lomb reflector lens which will read a number plate at 1500 metres. It hooks up to a Nikon 35mm camera but has a 'C type' adaptor for CCTV cameras. I have not tried to read a tax disk at short range but I think it would work - I once photoed an airport employee's ID from our van at about 30 metres and could read his name, which was in about 12 point typeface, perhaps 4 mm high. I could envisage a camera with pan and tilt controlled by a computer which was programmed to recognise the specific shape of the disk as the target, even controlling focus (which is critical with this type of lens, as is camera 'wobble' with this kind of magnification). Multiple cameras would have to be available per vehicle on the forecourt to ensure the angle of view was optimmum, never mind factors such as dirty windscreens, poor lighting rain (in England? - no!) or reflections. And as you imply, anti- photocopy features (reflections or contrasts) are actualy designed to hinder camera resolution. And if the field of view was wide enough to see both the number plate (bottom front center of the car) and the tax disk (potentially a metre higher and an equal distance left or right) the resolution would have to be increadible and hence the digital drive space huge per frame. Unless someone sits there and pans/zooms manually. Different on the US or German type plates where the annual licence info is on the plate (Big Brother Uncle Sam worked that out long ago. Invalid licence - welcome to Club Fed and maybe have your car confiscated! Check out the tollgates on the Sam Houston Freeway, Tx) Sounds disproportunatly expensive to me. But who knows, Maybe Jack Straw doesn't only exceed the speed limit (the head of the UK's police service was nabbed by their excellent vehicle surveillance system but not prosicuted) but steals petrol and someone is out to nail him ;-) Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWL, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2249 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:00am Subject: NSA abandons wondrous stuff NSA abandons wondrous stuff http://www.sunspot.net/content/cover/story?section=cover&pagename=story&storyid=1150520223288 Surprises: Astronomers who took over an abandoned spy base find remarkable, expensive and often incomprehensible stuff at every turn. By Laura Sullivan Sun National Staff Originally published Jan 5 2001 "There are things on this site you will never see anywhere else." TRANSYLVANIA COUNTY, N.C. - Along the long, twisting road through the Pisgah National Forest, the first sign that something is out of the ordinary is a line of giant transformers. Then, around the bend, a barbed-wire fence, guard shack and surveillance cameras protect what looks like nothing more than another hill of trees and dense shrubbery. It is anything but. This is the entrance to one of the National Security Agency's former spy stations, a place shrouded in secrets and denials, the source of local lore that seems right out of "X-Files." What is inside that giant geodesic dome that looks like a golf ball? Where do the tunnels snaking beneath the 202-acre site lead? Why are the rugs welded to the floors of the windowless buildings? Few people have been beyond these gates, deep inside the Appalachian Mountains, 50 miles southwest of Asheville. The NSA abandoned the site to the U.S. Forest Service five years ago, leaving behind a deserted minicity in the middle of nowhere. Now, some of the secrets are being revealed. Last year, with the base boarded up and close to demolition, the property was transferred to a group of astronomers in exchange for a piece of land in western North Carolina. Over the past year, they have begun piecing together the site's past. "There are things on this site you will never see anywhere else," said site manager Jim Powers. "I've never had someone come here that wasn't blown away." The astronomers, who formed the Pisgah Astronomical Research Institute, were attracted by two 85-foot satellites dishes on the site - some of the largest in the country - which could be repositioned to catch deep-space radio signals and allow them to study the life and death of stars. When the group arrived in January 1999, they expected a basic, albeit large, government facility, but as the weeks passed they realized little about the site was what it appeared. As they began to install their computers, they found hundreds of miles of top-of-the-line cabling running under every floor. They discovered that the self-contained water and sewer treatment plant could handle tens of thousands of gallons of water at a time and the generator could produce 235 kilowatts of energy - powerful enough to light up a small city. In a basement room of one of the larger buildings, they found the entrance to a 1,200-foot tunnel system that connects two of the site's main buildings. Every inch of floor in more than four buildings was covered with two-by-two-foot squares of bleak brown carpet. When the astronomers tried to replace it, they discovered it was welded with tiny metal fibers to the floor. The result, they eventually realized, is that the rugs prevent the buildings from conducting static electricity. Even the regular lighting looks different, covered by sleek metal grids that prevent the light bulbs from giving off static interference. The few windows are bulletproof. But what fascinated the astronomers was the still-operable security system that, among other things, sounds an alarm in the main building any time the front perimeter is crossed. The group can watch on monitors as cars approach from miles away. Inside the site, the agency had taken further measures. One area is in a small, sunken river ravine surrounded by barbed wire and an additional guard post. Steps, with reflective metal paneling to shield the identity of those walking beneath, lead down a small hill and wind their way to two small buildings with conference rooms inside - both of which once emanated "white noise" to prevent electronic eavesdropping. What Powers and several others in the group find remarkable, though, is not just the expansive network of buildings and security, but the extraordinary cost of all they items they have found - items the agency discarded. He said the extensive fiber optic cabling that runs for miles under the floors and through the tunnel system is the most expensive on the market. When a state regulator came out to issue a permit for a massive underground storage tank with a double lining, the astronomers said he told them he wished he had a camera. He wanted to take a picture to show his co-workers because he had never seen a system so sophisticated. And the agency didn't just install one water tank; it installed two. In a basement room, beneath a system that pressurizes wells, is another system just like it. "You see this kind of thing everywhere here," Powers said. "They never have just one of something." Even most of the heavy bolt locks - which every door has - are covered by black boxes locked with padlocks. Despite the site's stark appearance, there are some human - and humorous - vestiges. A bright happy face is painted on the smallest of the four satellite dishes on the site, something one former employee said was done so that they could "smile back at the Russians." Inside the tunnels, too, are chalk drawings of animals and warriors resembling those found in caves thousands of years ago. Aside from the rustling of deer and the wild turkeys that run rampant across the hundreds of vacant parking spaces, everything about the place is now eerily quiet. Paperwork in the guard shack is held in place by a stapler though no one has been inside the small building in years. Security cameras still work and alarms all still sound, though no one is listening. When the agency withdrew in 1995, some of the 300 workers, especially those who grew up locally and got hired on as groundskeepers and mechanics, returned to the nearby towns, though many say they are still forbidden to talk about their work. Most of the others - the security officers, military personnel and cryptologists - left the area for their next Department of Defense post. The site dates back to the early 1960s, when a scaled-down version was carved out to support the space program. It was operated at first by the National Aeronautics and Space Administration, and scientists used the early satellite dishes to track the flights into outer space and kept the door open for school groups and visitors who wanted to learn more about space missions. But suddenly in 1981, the NSA took over from NASA. Local hikers and hunters who stumbled onto some of the agency's acreage would be suddenly surrounded by armed guards who appeared as if from nowhere to escort them out of the woods. Vans with darkened windows shuttled past the local coffee shops, fueling rumors. The agency's presence was hard on the local employees as well. Don Powell began working on the site in 1967 as a car mechanic and spent the next three decades learning the mechanics of every inch of the satellite dishes for the Defense Department. He also learned to avoid questions about his work and to lie to his neighbors. For 15 years people would approach him and the few other local workers, asking what was out there, what they did and, of course, what is that golf ball? "The kids would always ask, what's in [that] giant dome?" He would tell them it was "filled with chocolate pudding," he said. "I couldn't even tell my wife. I couldn't tell anyone." The 1995 closure appears to have caught the agency by surprise. It had recently cleared several more areas and laid the foundations for additional smaller satellite dishes that were never built. One newly built satellite dish, which one insider says was never turned on, was dismantled and shipped to England. The Forest Service tried unsuccessfully to engineer a land trade for three years, hampered by a site that posed many problems for the few interested parties - from the remote location to the expense of removing satellite dishes embedded 80 feet into the ground. The agency was about to return with a bulldozer when the astronomers group, headed by benefactor J. Donald Cline, a scientist and former computer executive, offered to buy and trade 375 acres along the French Broad River in North Carolina for the spy station. What made the site, shielded from interference in a natural bowl-shaped terrain, so perfect for the NSA made the site perfect for the astronomers as well. They plan to use the satellite dishes to read the characteristics of elements given off by dying stars. "This area is free of light pollution," Powers said, as he stood in the middle of a vast, empty parking lot. "It's also clean in terms of electromagnetic interference like cell phone towers or things that create electromagnetic noise. "And we can be sure there won't be any in the future because the Forest Service owns everything around here. ... It's easy to see why they liked this place." Recently, in one of a dozen large empty rooms in one of four mostly empty office buildings where the group decided to set up shop, four scientists stood around a portable panel of monitors and computers, watching the results of a test appear on a screen. "It's stardust," said the site's technical director, astronomer Charles Osborne. "This stuff is just floating around out there. It's the building blocks of life." In order to use the satellite dishes, they had to spend months trying to slow them down. Both of the 85-foot dishes swing on two axes, an extravagance the astronomers suspect allowed the agency to swing the face around swiftly to catch up with satellites orbiting Earth. The astronomers need the dishes to move no faster than the speed of Earth itself. But there is much on the site that the astronomers don't know what to do with, such as the paper-shredding building up on one hill, the large helicopter pad on top of another, and down in a valley of well-manicured grass, that giant golf ball, similar to those seen at NSA headquarters at Fort Meade. Close up from the outside, the ball is a circle of triangles, no two identical, that feel like Gore-Tex to the touch. When one triangle at the bottom is pushed, several triangles around it gyrate, letting off a low grumbling sound of bending metal echoing throughout the ball. Inside, past a small door less than 4 feet tall, the ball glows white, lighted by the sunlight outside reflecting and bouncing inside from one triangle to another. In its center is a 40-foot satellite dish, cleaner and smoother than any of the others. It looks new, though it has been there for years. There are unusual numbered patterns on the dish's white panels, laid out like a cheat sheet to a jigsaw puzzle. The astronomers believe that the triangles vary in size as a clever way to minimize the effect of interference that comes from patterns. Enclosing the dish under such a surface, they speculate, would protect it from the weather, and prevent anyone else from seeing it or reading the direction it is pointed. For the astronomers, though, this curious dish is somewhat irrelevant. They need dishes with large faces, like the two bigger ones, to read the radio signals of stars millions of light-years from Earth. >From far above on the perfectly level, perfectly painted helicopter pad with a view of miles of mountains and green trees, Powers laughed at the differences between the previous owners and the astronomers, a group short on staff and scraping for funding. He studied the golf ball. "You'll go a long way before you find anything like that around anywhere else," he said. " ... But nothing about this place is what it seems." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2250 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:09am Subject: Clinton Creates Secrets Panel January 05, 2001 Clinton Creates Secrets Panel http://www.lasvegassun.com/sunbin/stories/bw-wh/2001/jan/05/010500817.html ASSOCIATED PRESS WASHINGTON (AP) -- President Clinton has signed an order creating a national counterintelligence executive to oversee the government's efforts to protect its most vital national security secrets, administration officials said Friday. The new counterintelligence executive will have a four-member board composed of the director of the FBI, the deputy secretary of defense, the deputy director of the Central Intelligence Agency and a Justice Department representative. White House spokesman Jake Siewert said Clinton took the action to help adapt U.S. counterintelligence efforts to a post-Cold War era "in which danger could come just as easily from a laptop (computer) and not the traditional cloak-and-dagger spies." "The old system was designed to counter intelligence threats that came from our adversaries in the Cold War," Siewert said. "Now you're in a new era where those threats are not quite as centrally localized, and you need a more integrated system." Siewert said although the incoming Bush administration could reverse Clinton's decision, that looks doubtful since it is strongly supported by the CIA, FBI, Defense Department and other agencies involved in counterintelligence matters. He said national security adviser Sandy Berger had briefed his anticipated successor, Condoleezza Rice. "They can undo it, but this is not a partisan issue," Siewert said. The organization will reside at CIA headquarters and will replace the CIA's National Counterintelligence Center, according to an administration official who discussed the matter in advance of the White House announcement. The center was created in 1994 after the arrest of Aldrich Ames, a longtime CIA officer convicted of spying for the former Soviet Union. Clinton's order was first reported in Friday's editions of The New York Times and The Washington Post. The existing counterintelligence center at CIA focuses on known, suspected or potential intelligence losses. The new organization will take a broader, more forward-looking approach to determining which national secrets are most vital, which are of greatest interest to foreign governments and how U.S. agencies can cooperate to protect them. Siewert said he believed it was unlikely Clinton would name the counterintelligence executive before he leaves office Jan. 20. Prior to the Ames case, which was one of the worst intelligence disasters in CIA history, the FBI and other government agencies had their own counterintelligence operations but there was no central government-wide office in charge of protecting secrets. --- On the Net: the National Counterintelligence Center at http://www.nacic.gov -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2251 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:11am Subject: Interagency Board to Revise Counterintelligence Strategy Interagency Board to Revise Counterintelligence Strategy http://www.iht.com/articles/6496.html David A. Vise Washington Post Service Saturday, January 6, 2001 WASHINGTON President Bill Clinton has signed an order establishing a counterintelligence board that will bring together high-ranking FBI, CIA and Defense Department officials in an effort to devise a more effective strategy to combat spying, according to senior administration officials. . The presidential directive creates a board chaired by the head of the Federal Bureau of Investigation, Louis Freeh, that is charged with carrying out a "pro-active" counterespionage program. The board will hire an executive who will be the federal government's foremost expert on counterintelligence, officials said. . "It is a dramatic change," a senior Clinton administration official said. "It is revolutionary in its focus and perspective." . In addition to Mr. Freeh, other members of the board will be the deputy director of the Central Intelligence Agency, the deputy secretary of defense and a representative of the attorney general. The operation will be run out of offices at the CIA. The directive is significant, senior Clinton administration officials said, because it restructures the counterintelligence community by formalizing information-sharing without regard to borders or federal agencies. . It also reflects a heightened focus on economic espionage and other types of spying, rather than solely emphasizing the protection of government secrets. . "We have always looked at spies and tried to figure out who was spying on us and what they were after," a senior administration official said. "Now, we are looking more at what it is we want to protect. We will no longer focus on embassies as the centers of foreign intelligence-gathering activities." . The new approach was developed after security lapses that revealed systemic failures in sharing information about spying. The board's first task will be to produce a study identifying threats and vulnerabilities. . Under the concept, the National Security Council also will have a new oversight role in counterintelligence. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Ocean Group Date: Fri Jan 3, 2003 10:18am Subject: PCR Pcr....? Isn't that what the KGB(or whatever the Russian dept was in charge of making US tech's earn their wages!) planted in the US crest given to the Yanks in one of their embassies back in the olden days....? I read about that...the Yanks brought it into the UN Council meeting and gave the Russian rep's heart attacks...! Ha ha.... You might find some info on the unit from the UN minutes! I think I remember seeing it on someone's tscm website....I can't remember where exactly...but I think it was Kevin Murray's site..... I guess the use for it was that it was totally dorment most of the time, ie night time etc when sweeps were carried out, or if the sweeps were random only activated when someone important arrived at the embassy for meetings etc....the SA wouldn't see anything if there was no signal at the time....right? Cheers Vance Deran Ocean Group, Technical Security Division, Ireland. Message: 4 Date: Tue, 31 Dec 2002 01:20:27 -0000 From: "jdobbs2001 " Subject: passive cavity resonator operation Is there any public information regarding PCR's? estimated range and companies known to manufacture them. Is a PCR a typical T3 device used by LE or your typical PD? Why would someone use such a device since its operation would be obvious on any spectrum analyser. 6724 From: Ocean Group Date: Fri Jan 3, 2003 10:20am Subject: ID card solution... ######################################## Before I start, excuse anyone who has been getting emails bounced back from my email address, things went down over Christmas and no one noticed, hopefully all is back online though and please resend your messages, Thanks. ######################################## Hi Matt, Yeah that is a real fast buck option but to be honest I'd be too worried of sticky fingers messing around with the laminate and going design happy with creative id's. Ideally if a high grade laminate could pass as a pvc therm printed card then people would be less likely to munipulate them(or at least try)...that would be a fairly reasonable solution. Maybe a system whereby the inks are printed onto an ultra thin soft laminate and then over coated in a harder pvc like film that would give it an appearance of a therm printed card. But not only that making the things durable and waterproof and thus avoiding making them by the dozen per employee....Come to think of it I wouldn't see why the top over coat of laminate couldn't be hot thermal applied(like a standard laminator) hence making a good card. But the heat may cause image bleed on the underlying soft film from the standard OEM deskjet inks.... Unfortunately I haven't come by any high grade laminate system like that. Does anyone have any ideas regarding this? Of course I could just walk into Compustore and pick up a pack of HP laminate to run on a HP deskjet and off I go, but I see that coming back to haunt me in the future! But your right, $1400 is a waste of cash for an id system, fine for a large org but not for an SME. Hmmm, not easy, anyway maybe someone will have an idea. All the best Kind regards Vance Deran, Ocean Group, Technical Security Division, Ireland. Quoted: Message: 3 Date: Tue, 31 Dec 2002 22:04:38 -0800 From: "Matt Paulsen" Subject: RE: ID cards... If cost is a concern, why not just laminate a printout from a bubblejet/inkjet and a cheap webcam? Total cost is under $125 for everything easily and if you scrounge used you can get it all less than $50. Or if that's not great... around $1400 with a cam... but why waste the cash I ask.. you can get this http://www.pricegrabber.com/search_getprod.php/masterid=466060/search=FARGO% 2520printer/ut=0ce01c8e4f1f7082 http://www.pricegrabber.com/search_getprod.php/masterid=21255/search=card%25 20printer/ut=0ce01c8e4f1f7082 6725 From: cybersnoops1 Date: Fri Jan 3, 2003 1:37pm Subject: Wanted: Real-time GPS tracker... Seeking information on "real-time" GPS vehicle tracking devices. Any with knowledge of the best available to please contact via private email to: jhall@t... Thanks! John Hall President ASG Investigations jhall@t... 888.n2fraud 6726 From: Matt Paulsen Date: Sat Jan 4, 2003 11:31pm Subject: RE: ID card solution... Source it - http://www.123barcode.com/cards.htm -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: Friday, January 03, 2003 8:21 AM To: TSCM Group Subject: [TSCM-L] ID card solution... ######################################## Before I start, excuse anyone who has been getting emails bounced back from my email address, things went down over Christmas and no one noticed, hopefully all is back online though and please resend your messages, Thanks. ######################################## Hi Matt, Yeah that is a real fast buck option but to be honest I'd be too worried of sticky fingers messing around with the laminate and going design happy with creative id's. Ideally if a high grade laminate could pass as a pvc therm printed card then people would be less likely to munipulate them(or at least try)...that would be a fairly reasonable solution. Maybe a system whereby the inks are printed onto an ultra thin soft laminate and then over coated in a harder pvc like film that would give it an appearance of a therm printed card. But not only that making the things durable and waterproof and thus avoiding making them by the dozen per employee....Come to think of it I wouldn't see why the top over coat of laminate couldn't be hot thermal applied(like a standard laminator) hence making a good card. But the heat may cause image bleed on the underlying soft film from the standard OEM deskjet inks.... Unfortunately I haven't come by any high grade laminate system like that. Does anyone have any ideas regarding this? Of course I could just walk into Compustore and pick up a pack of HP laminate to run on a HP deskjet and off I go, but I see that coming back to haunt me in the future! But your right, $1400 is a waste of cash for an id system, fine for a large org but not for an SME. Hmmm, not easy, anyway maybe someone will have an idea. All the best Kind regards Vance Deran, Ocean Group, Technical Security Division, Ireland. Quoted: Message: 3 Date: Tue, 31 Dec 2002 22:04:38 -0800 From: "Matt Paulsen" Subject: RE: ID cards... If cost is a concern, why not just laminate a printout from a bubblejet/inkjet and a cheap webcam? Total cost is under $125 for everything easily and if you scrounge used you can get it all less than $50. Or if that's not great... around $1400 with a cam... but why waste the cash I ask.. you can get this http://www.pricegrabber.com/search_getprod.php/masterid=466060/search=FARGO% 2520printer/ut=0ce01c8e4f1f7082 http://www.pricegrabber.com/search_getprod.php/masterid=21255/search=card%25 20printer/ut=0ce01c8e4f1f7082 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6727 From: Paolo Sfriso Date: Sun Jan 5, 2003 5:42am Subject: International Transport of TSCM Equipment Dear Colleagues. As most of you may know, an essential document for all involved in International TSCM services is an "ATA Carnet". More information on this document, how and where to obtain it, etc. can be found at the following website: http://www.iccwbo.org/index_ata.asp . Best wishes for a safe and prosperous 2003. Your Italian Contact. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... [Non-text portions of this message have been removed] 6728 From: Date: Sun Jan 5, 2003 8:05am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County (also, Riverside County, and Ventura County) Rick Hofmann Microsearch LLC P.O. Box 2084 Cypress, CA 90630 (714) 952-3812 Telephone URL: http://home.earthlink.net/~microsearch E-mail: tscmsweeps@e... ------------------------------------------------------------------------ Los Angeles Metropolitan Area, Beverly Hills, Orange County, Los Angles County, San Diego County, San Francisco, Silicon Valley, San Jose, San Diego, and Las Vegas. (Also, anywhere in a thousand mile radius from Los Angeles.) Roger Tolces Electronic Security 6646 Hollywood Blvd. #212 Los Angeles, CA 90028 (323) 462-1351 Telephone URL: http://www.bugsweeps.com/ E-mail: info@b... ------------------------------------------------------------------------ 6729 From: Date: Sun Jan 5, 2003 8:05am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6730 From: Date: Mon Jan 6, 2003 1:51pm Subject: Spies keep busy as ever, quietly from the January 02, 2003 edition - http://www.csmonitor.com/2003/0102/p06s01-woeu.html Spies keep busy as ever, quietly On Friday, Russia banned US Peace Corps volunteers, accusing them of espionage. By Fred Weir | Special to The Christian Science Monitor MOSCOW - Following Russia's historic rapprochement with the West after Sept. 11, even celluloid superspy James Bond has forgiven his traditional nemesis in Moscow and gone in search of fresh enemies. The latest Bond flick, "Die Another Day," has the evergreen hero battling bad guys from the hermit state of North Korea. That's fiction, but in the real world, actual spies appear to be busier than ever. In the past month alone, Canada and Sweden angrily expelled Russian diplomats for "activities incompatible with their status," the familiar code for espionage. Moscow announced Friday that it will no longer accept US Peace Corps workers, after denying visas to 30 of 64 volunteers, charging they were up to more than humanitarian work. "The leading intelligence agencies of the world have strengthened their presence in Russia," complained Oleg Firomolotov, deputy chief of counterintelligence for the FSB security service, in a recent interview with the government paper Rossiskaya Gazeta. "Russia is a priority object of their activity." From the other side, the authoritative Jane's Intelligence Digest warns that "Russian intelligence operations in the West appear to be rapidly escalating." In London alone, the number of operatives of Moscow's SVR external spy service has jumped from just one in 1991 to 33 today, the journal estimates. Russian President Vladimir Putin responded to the Sept. 11 terrorist attacks by moving Russia into solid geopolitical alignment with the West. In the past year, Russian and US special services have cooperated closely in the war against terrorism, and Moscow has even forged a historic friendship pact with the Western military alliance NATO. Experts say Mr. Putin's gestures were genuine, and that the Kremlin sees cooperation with the West as crucial, to overcome Russia's post-Soviet economic malaise and national identity crisis. "In the war against the Taliban and Al Qaeda in Afghanistan, Russia provided more help to the United States than all the countries of NATO combined," says Vyacheslav Nikonov, head of the independent Politika Foundation, and a former political adviser to the Soviet KGB security service. "We have a common enemy now, and such contacts are very much in the interests of both sides." In the short term, however, Russia's political shift has not brought the hoped-for wave of foreign investment to revive its sluggish economy, particularly the crumbling military-industrial complex. One traditional solution, with which former KGB foreign agent Putin is personally familiar, is to ferret out Western technological and managerial secrets by means of espionage. "Intelligence services will always exist," says former KGB operative Stanislav Lekarev. "It's a mistake to associate espionage with war. In fact, the less shooting is going on, the more spying there will be. Russia's secret services were much depleted in the post-Soviet era, so they're only now beginning to get back up to speed." Two Russian diplomats expelled from Canada recently were reportedly agents of the GRU armed forces intelligence wing, seeking access to high-tech military secrets. Two Russians kicked out of Sweden in November were allegedly trying to penetrate Telefon AB LM Ericson, a company that makes cellphones and aircraft radar systems. Both cases resulted in old-fashioned tit-for-tat expulsions of Canadian and Swedish diplomats from Moscow. The thirty American Peace Corps workers barred from Russia last month stand accused of "collecting information on the social, political, and economic situation in Russian regions, [on] staff members of bodies of power, [and] on elections," according to FSB director Nikolai Patrushev. Russian security officials are understandably tight-lipped about their espionage abroad, but often publicly express pride in their Soviet heritage, which includes running a formidable spy network in the West. In a recent Rossiskaya Gazeta interview, the head of Russia's SVR external intelligence agency, Sergei Lebedev, suggested that tradition may not have died with the USSR. "Even now, many of our supporters help us out of political conviction," he said. "There are people abroad who sympathize with Russia and support our efforts to build a multipolar world, to ensure a global balance of forces." Experts say the international spy game now seldom leads to splashy public scandals the way it did in cold war days. Today, leaders dance a careful two-step around their countries' shadow activities. "We've learned to spy and smile at the same time," says Mikhail Lyubimov, a famous Soviet agent who, since his retirement, has become one of Russia's best-loved writers of espionage novels. "Our presidents go on kissing each other, and have become very adept at pretending nothing is happening." Mr. Lebedev, the SVR chief, also hinted that what the public sees of today's cloak-and-dagger world is just the tip of the iceberg. "I can tell you there are plenty of cases in which a spy is unmasked, and he is allowed by mutual agreement to leave the country quietly," he said. "Neither the press nor anyone else ever gets to hear about it." But the continuing focus of Russian security services on catching spies, and the broad definitions of the term they seem to apply, has some experts and human rights advocates worried. "All reforms are coming to an end and we are returning to the past," says Konstantin Preobrazhensky, a former KGB colonel turned critic. "The same bitter and vengeful people are in charge, and they feel their chance to return has arrived." "We see a lot of dubious accusations against journalists, environmentalists, human rights workers and scientists," says Otto Latsis, with the liberal daily Novoye Izvestiya. "This has nothing to do with ensuring national security, and a lot to do with intimidating people who commit themselves to political causes that are inconvenient for the state, or who associate too much with foreigners." In October, the FSB raided the offices of Baikal Ecological Wave, a coalition dedicated to saving Siberia's fragile Lake Baikal, seizing maps, volunteer lists, and computers. Then, this month, the commander of Russia's north Caucasus military zone, Viktor Kazantsev, accused humanitarian agencies of supplying food to Chechen rebels. "All this aid activity should be taken under tough control," he said. "We all know perfectly well who works in the Red Cross: spies." Some argue Russia's security services are using harsh domestic tactics in a misguided effort to prove their relevance to a population weary of old enemy stereotypes. "Our secret agents are the last children of the cold war," says Yury Shchekochikhin, deputy chairman of the State Duma's security commission. "Of course the state must protect its secrets. But it's time for our special services to grow up and stop trying to divide the world into black and white, them and us. That time is gone forever." [Non-text portions of this message have been removed] 6731 From: Louisiana Investigator Date: Tue Jan 7, 2003 9:53am Subject: RE: Wanted: Real-time GPS tracker... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Check out the items at http://store.yahoo.com/national-scientific/ The NSC Followit looks interesting. Louisiana has a very poor GSM network, but most other areas in the US have good GSM coverage. If so, I think that this device would be excellent for asset or vehicle tracking. If you do purchase one of these items, please reply with a brief evaluation. Hope this helps, Ricky Gray Richard T. Gray Jr., Licensed Private Investigator Gray & Associates, L.L.C. A Professional Investigative Firm 408 North Parkerson Crowley, LA 70527 337-785-0046 Voice 337-785-2768 Fax Serving All of Louisiana WWW.LA-PI.COM - -----Original Message----- From: cybersnoops1 [mailto:info@n...] Sent: Friday, January 03, 2003 1:38 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Wanted: Real-time GPS tracker... Seeking information on "real-time" GPS vehicle tracking devices. Any with knowledge of the best available to please contact via private email to: jhall@t... Thanks! John Hall President ASG Investigations jhall@t... 888.n2fraud Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use iQA/AwUBPhr35WUZ0inzIURkEQJ/dACgsViDjVQNrwtZmsMYyH/76Zsj6pMAoLzu HXXAttyrXYaPkJgXWT4ZSLVD =hD8e -----END PGP SIGNATURE----- 6732 From: Ocean Group Date: Tue Jan 7, 2003 11:22am Subject: High Tech Wire Strippers Hi, This may seem like a strange question, but a colleague informed me today he has seen a laser wire stripper. He says its just like a laser pointer but more powerful and can used to melt away the plastic in a precise area of typical small electronic wire.... He is however, unable to give me a supplier or any other details so I am a little skeptical as to its existance... Can anyone shed some light on this? Kind regards Vance Deran Ocean Group, Technical Security Division, Ireland. 6733 From: Date: Tue Jan 7, 2003 10:44am Subject: Cryptome Log Subpoenaed Cryptome Log Subpoenaed http://yro.slashdot.org/yro/03/01/07/0550242.shtml?tid=99 Posted by chrisd on Tuesday, January 07, @10:14AM from the john-has-my-tie dept. PaulBu writes "Stopped by on Cryptome tonight... It seems that their logs have been subpoenaed by Massachusetts Assistant Attorney General Chief, Corruption, Fruad (sic) & Computer Crime Division. Cryptome's answer was that "logs of Cryptome are deleted daily, or more often during heavy traffic, to protect the privacy of visitors to the site." (Good job!) See here: http://cryptome.org/cryptome-log.htm [Non-text portions of this message have been removed] 6734 From: Louisiana Investigator Date: Tue Jan 7, 2003 10:30pm Subject: Periscope for Surveillance Van -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Does any list members have any surveillance van equipment for sale? I am particularly interested in a motorized periscope. Thanks in advance, Richard Gray Richard T. Gray Jr., Licensed Private Investigator Gray & Associates, L.L.C. A Professional Investigative Firm 408 North Parkerson Crowley, LA 70527 337-785-0046 Voice 337-785-2768 Fax Serving All of Louisiana WWW.LA-PI.COM -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use iQA/AwUBPhupZmUZ0inzIURkEQLZlgCbBjD2gnfATqsG3o11KD5WPwbZEewAoL9k OLVGWj+NqxqjRZ1fJQcKgflM =tfCJ -----END PGP SIGNATURE----- 6735 From: James M. Atkinson Date: Wed Jan 8, 2003 6:06pm Subject: Dear Abby Dear Abby My husband is a lying cheat. He tells me he loves me, but he has cheated our entire marriage. He is a good provider and has many friends and supporters. They know he is a lying cheat, but they just ignore the issue. He is a hard worker but many of his coworkers are leery of him. Every time he gets caught, he denies it all. Then he admits that he was wrong and begs me to forgive him. This has been going on for so long, everyone in town knows he is a lying cheat. To top it off, he ignores me just because I am a lesbian. Abby, I just don't know what to do. Signed, Frustrated in New York ----- Frustrated in New York: You should dump him. Now that you are finally a New York Senator, you don't need him anymore. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6736 From: Steve Uhrig Date: Wed Jan 8, 2003 8:10pm Subject: Executive World Services? If anyone is on here from Executive World Services, be advised sales@executiveworldservices just sent me a virus which was detected and quarantined. The message had a subject something like 'Frame Spacing'. Anyone having BOTH of these two addresses: sales@executiveworldservices *and* Steve@s... in their address book is a suspect for being infected. The infection may well not be on the executiveworldservices end. We've seen this before, and the culprit was an innocent third party who had both our addresses in his address book. Took a lot of investigation on the part of a savvy list member to isolate a third party problem. Someone needs to take appropriate action. If YOU have both addresses in your address book, it may be YOU. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6737 From: Marcel Date: Thu Jan 9, 2003 11:57am Subject: LJK-Junior Low Cost Vehicle Tracking Product ( BW)(NV-INTERTRAK-3)(NMRX) InterTrak, Televoke & Numerex Introduce LJK-Junior Low Cost Vehicle Tracking Product;``Security is More Important Than Ever Before'' Business Editors/High-Tech Writers 2003 International CES LAS VEGAS--(BUSINESS WIRE)--Jan. 9, 2003--InterTrak Tracking Services, L.L.C. (www.trackmenow.com), responding to dealer requests for a simplified version of their successful LJK-EXT GPS vehicle tracking product is proud to announce that it will be showing its new LJK-Junior model at the 2003 Consumer Electronics Show. The show takes place in Las Vegas, from January 9-12, 2003, Booth 4856. The LJK-Junior includes two inputs, three outputs and independently mounted combination Cellular/GPS hi-gain antennas. "The LJK-Junior culminates our dealer field experience and includes the most popular product features, yet the LJK-Junior is simple to install coupled with a lower MSRP," says Barnet Fagel, InterTrak's Vice President of Sales and Marketing. Fagel added "We have been in the market for the last two years collecting real world market information that has been used to define the new LJK-Junior to appeal to mass market buyers." About InterTrak InterTrak L.L.C. has offices in Frisco, Texas and Chicago whose employees have accumulated 20 years of vehicle security and tracking experience. InterTrak now markets the most cost efficient vehicle location products and service in North America. Coupling the combined industry talents of its corporate staff InterTrak is well positioned to take advantage of the burgeoning Telematics market. Combining the communications power of the Internet, Cellular Communications, and the Global Positioning System (GPS), InterTrak promises to be the bright star on the automotive location horizon. For additional information on InterTrak's products and services call1-866-FINDME1 (346-3631) or visit us www.trackmenow.com. About Televoke Televoke "connects people to things" by providing an automated web and telephony service platform that enables individuals and enterprises to track and control valuable assets (e.g., people or vehicle). For the first time ever, businesses and their customers can be proactively notified via phone, pager or email when a valuable fixed or mobile asset is at risk. The Televoke service platform can be customized and branded for any partner, and integrated with virtually any enterprise system, hardware device, GPS or other location technology, wireless or wire line network. For more information on Televoke, visit www.televoke.com or send an email to info@t.... About Numerex Numerex (Nasdaq:NMRX) is a technology company comprised of operating subsidiaries that develop and market a wide range of communications products and services. The Company's primary focus is wireless data communications utilizing proprietary network technologies. The Company primarily offers products and services in wireless data communications through Cellemetry(R) and Data1Source(TM), and digital multimedia through PowerPlay(TM). These services enable customers around the globe to monitor and move information for a variety of applications from home and business security to distance learning. In addition, the Company offers wire line alarm security products and services, as well as telecommunications network operational support systems. For more information on Numerex, please visit our Web site at: http://www.nmrx.com. --30--lr/da* CONTACT: InterTrak L.L.C., Frisco Barnet Fagel, 1-866-FINDME1 (346-3631) Ext. 111 barnet@t... KEYWORD: TEXAS NEVADA TRACK INDUSTRY KEYWORD: SOFTWARE COMPUTERS/ELECTRONICS AUTOMOTIVE TELECOMMUNICATIONS PRODUCT TRADESHOW SOURCE: InterTrak Tracking Services, L.L.C. http://www.businesswire.com/cgi-bin/f_headline.cgi?day0/230090318&ticker=nmrx 6738 From: Ocean Group Date: Wed Jan 8, 2003 3:46pm Subject: News - CCTV Security cameras are getting smart -- and scary From wealthy private homes to military installations, security cameras are going high tech. Prompted in part by new fears after the Sept. 11, 2001, terrorist attacks, camera makers, security specialists, hard-disk makers and chip designers are transforming the art of video surveillance, long known for its grainy, black-and-white images and reams of tape. http://www.siliconvalley.com/mld/siliconvalley/4883623.htm 6739 From: Jacob Date: Wed Jan 8, 2003 9:04pm Subject: Re: ID cards... Vance, The two big players in the card printer business are ELTRON and FARGO. They both have web sites and there are many distrubuters in the US. The also sell "overlaminates" that can contain gold ink patterns or hollograms. There can print on regular pvc or even ProxCards or MagStripe cards. Here are a few links to get you going. http://www.e-scan.com/plastic.htm http://store.yahoo.com/cardprinterwarehouse/ http://www.plastic-id-card-printers.com/ Jake Ryan This message was scanned with Norton AntiVirus 2002. [Non-text portions of this message have been removed] 6740 From: Buzz Benson Date: Thu Jan 9, 2003 2:41pm Subject: Re: Executive World Services? After reading Steve's msg I immediately ran a full Norton scan revealing no infections. Steve's infectious msg was received from the address "sales@executiveworldservices" which is not a valid sender address. It is only a a mailbox for incomming mail. I called Steve and after some discussion it was determined that the suspect virus probably uses SMTP to propagate and randomly selects email addresses from resident data bases in the host. An example would be a varient of the WORM KLEZ. So, as Steve said earlier, check your addresses for "sales@executiveworldservices" and "steve@swssec". If you have both you may be the host. Scan with Norton Anti-virus. Thanks for the heads-up Steve. Buzz Benson EWS Atlanta USA www.executiveworldservices.com email: buzzben@m... Tel: (678) 316 7002 Fax: (706) 654 2080 >From: "Steve Uhrig" >Reply-To: Steve@s... >To: tscm-l@yahoogroups.com >Subject: [TSCM-L] Executive World Services? >Date: Wed, 08 Jan 2003 21:10:54 -0500 > >If anyone is on here from Executive World Services, be advised >sales@executiveworldservices just sent me a virus which was detected >and quarantined. > >The message had a subject something like 'Frame Spacing'. > >Anyone having BOTH of these two addresses: > >sales@executiveworldservices > >*and* > >Steve@s... > >in their address book is a suspect for being infected. The infection >may well not be on the executiveworldservices end. We've seen this >before, and the culprit was an innocent third party who had both our >addresses in his address book. Took a lot of investigation on the >part of a savvy list member to isolate a third party problem. > >Someone needs to take appropriate action. If YOU have both addresses >in your address book, it may be YOU. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ _________________________________________________________________ The new MSN 8 is here: Try it free* for 2 months http://join.msn.com/?page=dept/dialup 6741 From: James M. Atkinson Date: Thu Jan 9, 2003 11:10pm Subject: SpyKing As many of you know my website concerns methods, techniques, and protocols used to find bugs and wire tapes, and the art and craft of hunting spies. Part of this involves covering court cases when spies and their associates are busted, and presenting historical public documents about how the business operated prior to the bust, during the bust, during the court case, and then watching how the people involved re-invent themselves (all culled from government documents). A good example is the following page where I cover the Frank Jones bust, which includes court documents on the case, incorporation documents, and so on. http://www.tscm.com/FNJspyking.html There is a very, very small amount of materials that is not based on court documents, but this small amount is based on interviews I have personally performed, or taken from published articles (with appropriate credit) and added my own added commentary. Please let me know if you find any errors or omissions, and please let me know if you think I need to clarify anything on this or any other page. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6742 From: Steve Uhrig Date: Sat Jan 11, 2003 8:45pm Subject: Someone else has a virus Anyone having both the following addresses in their address book should check their machine for virii: walshingham@c... AND Steve@s... I received a spoofed message from the compuserve address. As with the other one earlier this week, some third party machine is infected, and is sending random messages to persons in your address book, spoofing the headers of someone else in your address book. The spoof apparently is coming from the AOL domain, specifically: LugNutz3@a... Headers below. ================ Status: U Return-Path: Received: from halfdome.istep.com ([66.250.97.227]) by merlin (EarthLink SMTP Server) with ESMTP id 18xxZk1bz3NZFlq0 for ; Sat, 11 Jan 2003 18:36:38 -0800 (PST) Received: from rly-ip06.mx.aol.com (rly-ip06.mx.aol.com [205.188.156.51]) by halfdome.istep.com (8.12.3/8.12.3/Debian -4) with ESMTP id h0C2a51l006898 for ; Sat, 11 Jan 2003 18:36:06 -0800 Received: from logs-tp.proxy.aol.com (logs-tp.proxy.aol.com [152.163.204.135]) by rly-ip06.mx.aol.com (v89.10) with ESMTP id RELAYIN5-0111213522; Sat, 11 Jan 2003 21:35:22 1900 Received: from Wuntnqpno (AC958C1C.ipt.aol.com [172.149.140.28]) by logs-tp.proxy.aol.com (8.12.6/8.12.6) with SMTP id h0C2X7qq183116 for ; Sat, 11 Jan 2003 21:33:08 -0500 (EST) Date: Sat, 11 Jan 2003 21:33:07 -0500 (EST) Message-Id: <200301120233.h0C2X7qq183116@l...> From: walsingham To: steve@s... Subject: {Virus?} Bottom footer table MIME-Version: 1.0 Content-type: multipart/mixed; boundary="Ds85WC93ulO0637jf59tV66820v9zJQb386Sa" X-Apparently-From: LugNutz3@a... X-MailScanner: Found to be infected X-MailScanner-SpamCheck: not spam, SpamAssassin (Message larger than max testing size) X-PMFLAGS: 570949760 0 1 P6AE60.CNM --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Warning: This message has had one or more attachments removed Warning: (msg-4856-5.html, href.scr). Warning: Please read the "VirusWarning.txt" attachment(s) for more informat= ion. --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" Content-Disposition: attachment; filename="VirusWarning.txt" Content-Transfer-Encoding: quoted-printable This is a message from the I-Step E-Mail Virus Protection Service ---------------------------------------------------------------------- The original e-mail attachment "msg-4856-5.html" was believed to be infected by a virus and has been replaced by this warning message. If you wish to receive a copy of the *infected* attachment, please e-mail helpdesk and include the whole of this message in your request. Alternatively, you can call them, with the contents of this message to hand when you call. At Sat Jan 11 18:36:10 2003 the virus scanner said: Found dangerous IFrame tag in HTML message Note to Help Desk: Look on I-Step Mail System in /var/spool/MailScanner/qua= rantine/20030111 (message h0C2a51l006898). --=20 I-Step Communications Anti-Virus Team (415) 777-3268 mail-support@i... --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: text/plain; charset="us-ascii"; name="VirusWarning.txt" Content-Disposition: attachment; filename="VirusWarning.txt" Content-Transfer-Encoding: quoted-printable This is a message from the I-Step E-Mail Virus Protection Service ---------------------------------------------------------------------- The original e-mail attachment "href.scr" was believed to be infected by a virus and has been replaced by this warning message. If you wish to receive a copy of the *infected* attachment, please e-mail helpdesk and include the whole of this message in your request. Alternatively, you can call them, with the contents of this message to hand when you call. At Sat Jan 11 18:36:10 2003 the virus scanner said: href.scr Infection: W32/Klez.H@mm Windows Screensavers are often used to hide viruses (href.scr) Note to Help Desk: Look on I-Step Mail System in /var/spool/MailScanner/qua= rantine/20030111 (message h0C2a51l006898). --=20 I-Step Communications Anti-Virus Team (415) 777-3268 mail-support@i... --Ds85WC93ulO0637jf59tV66820v9zJQb386Sa Content-Type: application/octet-stream; name=fact_driver[1].htm Content-Transfer-Encoding: base64 Content-ID: ================== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6743 From: A Grudko Date: Sat Jan 11, 2003 10:33pm Subject: Re: Someone else has a virus - Original Message - From: Steve Uhrig > Anyone having both the following addresses in their address book > should check their machine for virii: > walshingham@c... Thanks Caught on it's way in and zapped by my code-warriors. Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6744 From: A Grudko Date: Sun Jan 12, 2003 3:15am Subject: Yaesu FT90-R mods I have a Yaesu FT90-R (which is a great radio) which I use primarily for UHF comms on 407-409 Rx, 417- 419 Tx on a + 10 Meg repeater system. Secondary comms are simplex in the 407 - 409 range and this is a problem for me as Tx is blocked below 410.00 . Does anyone have a modification around this block. Private replies please. Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6745 From: frost_bitten_ca Date: Fri Jan 10, 2003 0:54pm Subject: What might someone do with stuff like this? Usable range apparantly to 60 feet, audible to 300 feet. HyperSonic Sound What is HSS? HyperSonic Sound Technology is simply the most revolutionary sound reproduction system of this century. Not since the development of the "cone" loudspeaker more than 75 years ago has any technology provided such significant departure from conventional loudspeakers and such a remarkable new approach to the reproduction of sound ... http://www.atcsd.com/tl_hss.html --- Put sound where you want it Is already successfully used by major corporations, museums, and other venues all over the world ï Delivers clean, clear audio with ~1% distortion ï Is fully CE compliant ï Uses zero-lag, realtime processing, making video synchronization simple ï Has proven long-term reliability, with public installations running for years http://www.holosonics.com/ 6746 From: Rick Hofmann - MICROSEARCH Date: Sun Jan 12, 2003 7:09pm Subject: Antennas I am looking for input from anyone with experience using the Electrometrics or Summitek collapsible antennas. Any information will be greatly appreciated. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 6747 From: James M. Atkinson Date: Mon Jan 13, 2003 7:17am Subject: Espionage Case May Face Public Trial Espionage Case May Face Public Trial By Ted Bridis Associated Press Writer Sunday, January 12, 2003; 1:20 PM Washington Post ALEXANDRIA, Va. -- It's the first U.S. espionage trial in nearly 50 years that could end in a death sentence: A retired Air Force master sergeant, deeply in debt, is accused of offering satellite secrets to Saddam Hussein and others for more than $13 million in Swiss currency. Barring a last-minute plea agreement, jury selection was to begin Monday in the case against Brian Patrick Regan in U.S. District Court. His lawyers waged a late, unsuccessful fight to delay the trial because of a possible U.S. invasion of Iraq, one of the countries to whom Regan was accused of offering to sell secrets. Legal experts said a plea avoiding trial this late was unlikely. "I think you can assume any offers that were put on the table have been long-since rejected," said Lawrence S. Robbins. He was the losing defense lawyer in the last espionage trial, in 1997, when a federal jury convicted a married couple of spying for East Germany. Full-blown spy trials in civilian courtrooms are rare. The Justice Department nearly always negotiates a plea agreement, even in cases where espionage has resulted in the deaths of America's foreign agents. That is because the government could suffer embarrassing disclosures of sensitive information in a public courtroom, including hints that could help other spies learn to evade detection and capture. The government also often needs the defendant's help to describe which secrets might have been handed over to foreign governments. Leverage to negotiate a plea is so powerful that prosecutors complain about threats from defense lawyers that a public trial could expose their secrets. "The government has to choose between dropping the charge or revealing the information," said Michael Woods, a former chief in the FBI spy-hunting unit that investigated Regan. Citing national security, U.S. District Judge Gerald Bruce Lee barred the public and reporters from attending some earlier hearings in Regan's case. Defense lawyers have pored over classified documents for weeks at the federal courthouse inside a secure room where cellular telephones and pagers are not allowed. Two other lawyers in the 1997 espionage case with Robbins, James Clyde Clark and Joseph John McCarthy, are among four court-appointed attorneys for Regan. In that case, Therese Marie Squillacote, a former Defense Department lawyer, was sentenced to nearly 22 years in prison; her husband, Kurt Alan Stand, got more than 17 years. Regan retired from the Air Force in August 2000 to work for a defense contractor in the National Reconnaissance Office. He was pulled off a flight to Zurich, Switzerland, at Dulles International Airport one year later by FBI spy-hunters, who had been secretly following him and videotaping him inside his office for months. The FBI said it found on Regan a spiral notebook with codes describing images of a missile launcher in the northern no-fly zone over Iraq and of another launcher in China. Agents said Regan also carried, tucked inside his right shoe, addresses he found on the Internet showing locations for embassies in Switzerland and Austria for the governments of Iraq, China and Libya. On Regan's home computer, the FBI said it found a dramatic letter drafted to Saddam offering details about American satellites that could help Iraq hide its anti-aircraft missiles. The letter demanded $13 million in Swiss francs and complained that movie stars and athletes make more money. "If I am going to risk my life and the future of my family, I am going to get a fair price," the letter said. Court records indicate that Regan, a father of four, carried debts of at least $53,000 at the time. Prosecutors have said they would introduce Regan's credit-card and banking records during the trial. Regan has pleaded innocent to three counts of attempted espionage and one additional count of illegally gathering national security information. The Bush administration has taken an unusually aggressive posture against Regan, pledging to seek the death penalty if he is convicted. That is despite government indications it has little evidence Regan actually turned over any information and no evidence anyone died as a result of any alleged disclosures. In espionage cases against the CIA's Aldrich Ames or the FBI's Robert Hanssen, the spying was tied directly to the executions of U.S. agents overseas. Following plea agreements, both were sentenced to life without parole. "It does seem rather a perverse reality," said Paul Stevens, the legal adviser to the White House National Security Council in 1987. "But the paramount interest here is in preserving and protecting national security." No U.S. citizen has been executed in an espionage case since Julius and Ethel Rosenberg in June 1953, for revealing nuclear bomb secrets to the Soviet Union. The death penalty was re-enacted in 1994 as a punishment for peacetime espionage, although none of 11 people indicted for espionage since then has faced it. "This may reflect a calculation on the part of the government that they need to show they are willing to try these cases," said Stewart Baker, former general counsel for the National Security Agency. "We're in a climate when the importance of maintaining secrets is likely to get a favorable response from a jury." Regan's lawyers have spent much of their time focused on the threat of the death penalty, which they criticize as "arbitrary and irrational." In one court filing, defense lawyers called his letter to Saddam "the alleged rantings of a retired Air Force master sergeant prepared in what appears to be an effort to scam a foreign government out of $13 million." Defense lawyers also have indicated they would introduce evidence about Regan's mental health during any penalty phase, to help him escape a death sentence. © 2003 The Associated Press -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 6748 From: Ben Evans Date: Sun Jan 12, 2003 0:42pm Subject: Re: Yaesu FT90-R mods www.mods.dk is the best place for this type of mod to be found. -Ben At 11:15 AM 1/12/2003 +0200, you wrote: >I have a Yaesu FT90-R (which is a great radio) which I use primarily for UHF >comms on 407-409 Rx, 417- 419 Tx on a + 10 Meg repeater system. > >Secondary comms are simplex in the 407 - 409 range and this is a problem for >me as Tx is blocked below 410.00 . > >Does anyone have a modification around this block. > >Private replies please. > >Andy Grudko (British), Grad I.S, South Africa >SIRA investigators Reg. No. 8642 >www.grudko.com , andy@g... . Est. 1981. International investigations >(+27 12) 244 0255 - 244 0256 (Fax). >IPA, SACI, WAD, CALI, UKPIN, IWWA. >When you need it done right - first time > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----------------------------------------------- Counter Intelligence Solutions Group, Inc. http://www.cisginc.com/ Corporate Website http://www.spywholesalers.com/ Covert Cameras http://www.slantback.com Just for fun 585.889.2321(v) 585.889.0823(f) ----------------------------------------------- 6749 From: The Inhabitant Date: Sun Jan 12, 2003 5:29pm Subject: Spy King This ìspy kingî who was caught by this United States may have known how to acquire electronic bugs, but has not knowledge of the law. Ref: Title 18 USCA section 3401 The Warrant is invalid that was used to arrest Frank Jonesís liberty. Ref: Title 28 USCA section 601 et. seq. The Federal Magistrate has no authority to move, unless the unknowing respondent involuntarily volunteers to controvert its singular innocence. Ref: Title 18 USCA section 3041 Not only did the Magistrate fail to append its signature as required by law, but it has failed to effectuate the seal of its office. Ref: Title 28 USCA section 638c This particular covert agent apparently had no Intel on the laws of this United States. Ref: Title 28 USCA FRCP Rule 1, 2, 4, 9, 12 This Spy King was not convicted of any crime. It simply involuntarily volunteered for a criminal contempt in equity that which has not standing in law. Ref: Title 5 USCA section 701 et. seq. here on the banks of the Choptank, off the shores of the Chesapeake Bay, stands this Inhabitant upon the Land Consensus Tollit Errorem Communis error facit jus Speaking the Truth in times of universal deceit is a revolutionary act. George Orwell --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.443 / Virus Database: 248 - Release Date: 1/10/03 [Non-text portions of this message have been removed] 6750 From: AccessOneNetworkNorthwest AONNRecords Date: Sun Jan 12, 2003 11:17pm Subject: Foolish Frank Jones was foolish. I read the entire file and was astounded. I could see a master spy who would feign weakness in order to lead potential adversaries to believe that his capabilities were unsecure and low level, thus he could then dance circles around them, but Jones had no plan. His mind was gone and he didn't know what the hell he was doing - he didn't know what century it was. More alarming was was his blatant proliferation of restricted technology and the raising of awareness of things which most shouldn't be concerned with. Frank Jones was no SpyKing. The brief was most hilarious as well as frightening. Thank God for counter espionage. AONN --------------------------------- Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now [Non-text portions of this message have been removed] 6751 From: Hawkspirit Date: Mon Jan 13, 2003 9:17am Subject: Equipment for sale Date: Sun, 12 Jan 2003 21:11:20 -0000 From: "j7lionrush " Subject: Counter measures gear for sale All the equipment is new in box unless indicated and what I paid for it. What I'm asking is in ( ). Or best offer. 1. DP-19 $295.00 ($270) 2. TT-46 $395.00 ($370) 3. TD-20 $295.00 ($270) 4. WIDE BAND MICRO B.D. $295.00 ($270) 5. TE-4200 $395 ($370) 6. JM-20&SAFELINE $495.00 ($450) 7. CPM 700 $2525.00 (USED) ($2200) As I mentioned before all items except the CPM 700 are NIB. I also have the following items I'm trying to off load: Steiner Binos:10x50 Police. NIB ($500.00/$300). 10x30 Nighthunter, NIB.($300/$250) US Armor Body Armor custom made w/trauma plate, used, ex. condition. ($275) Elec. lock pick, NIB, best offer Lockaid Tool, NIB, best offer Master Pick Set, NIB, best offer High-Tech Pick Set, NIB, best offer Lock pick equip. made in US, (exept for elec. lock pick). Hatch lrg/x-lrg, slash guard gloves, new. Best offer. 2 pair. Various elec. c-s manuals/books, I'll throw in no charge. Anything you buy, I'll pay the shipping and insurance. Please respond privately by e-mail if interested. John M. Leontieff Alliance Security and Investigations 2510 Leach Ct. S.E. Olympia, WA 98501 (360) 709-0369 WA. State License 601886548 Member NAIS 6752 From: Date: Mon Jan 13, 2003 9:04am Subject: Testing Just wanted to see if I was able to get through. Because of SPAM I had to change e-mail accounts. Thanks. From: Does it matter Date: Sat Jan 3, 2004 9:10am Subject: Internet phone usuage I just wanted to let ppl on this group know incase they may wonder about this type of service it is great. At home I use Vonage's service and it is incredibly clear. Several times I moved it around from office to other locations and got mixed results because of the various signal strengths that I was getting pumped through my cable service. When I finally tried it at home where I have had Comcast's interenet service since day one there were 0 interrupts. If anyone is thinking of trying something like this I can recommend the service that I use to people. Thanks Darren 8135 From: Date: Tue Jan 6, 2004 6:38am Subject: Re: Re: CIA Science and Technology Directorate Museum Opens << The C130s had a detector that could, at short ranges, pick up the RF generated by a vehicle's electric's and then take them out.>> Delightful. About what year was this? Technology is a good thing. [Non-text portions of this message have been removed] 8136 From: David Alexander Date: Wed Jan 7, 2004 3:24am Subject: FW: Re: CIA Science and Technology Directorate Museum Opens Igloo White ran from 1969 onwards. The ignition detection system was code-named Black Crow. Don't forget they were basic trucks, probably using magnetos. Not much (probably square root of nothing) in the way of suppression fitted to them. See home.att.net/~c.jeppeson/igloo_white.html for more technical details on the remote trail sensor units Regards Dave David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent:06 January 2004 17:39 To:TSCM-L@yahoogroups.com Cc:dave_ale@o... Subject:Re: [TSCM-L] Re: CIA Science and Technology Directorate Museum Opens << The C130s had a detector that could, at short ranges, pick up the RF generated by a vehicle's electric's and then take them out.>> Delightful. About what year was this? Technology is a good thing. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ 8137 From: Mitch D Date: Wed Jan 7, 2004 4:10am Subject: RCA Lyra 2780 pocket Video/Audio Recorder Ran the Lyra 2780 through some simple tests for various applications,it performed well and passed. With an internal 20G HDD and removable compact Flash mem, its deadly in the field as a pocket recorder. It will record audio, as well as video for over 10 hours.It accepts a composite video input,as well as audio through an AV cable adapter. Unit accepts an external 12 V DC Input Video is in mpeg4 format we used a small low quality color cam for bench testing,playback on a monitor demonstrated smooth fluid video with a crisp color image. There is no on screen T/D stamp. Audio capability testing yielded excellent results utilizing a inexpensive consumer grade microphone,AKG 1000 pro line mic,and another mike from a law enforcement supplier. The unit is effective,easily passes for a PDA,and is something to be kept out of secure conference rooms,product development areas etc...
http://www.rca.com/product/viewdetail/0,,PI700667-CI700324,00.html At at 5 1/4 inches high by 3 1/4 inches wide by 1 inch deep, the Lyra AV Jukebox can slip into a large pocket. The color screen, measuring 2 7/8 inches wide by 2 1/4 inches high, sits in the middle of the Jukebox face, with two rocker buttons on the right side for navigating on-screen menus. Plugged into a Windows or Macintosh computer through a USB 2.0 cable, the Jukebox appears to the PC as a hard drive - so you move files back and forth by drag and drop. You can even use the Jukebox to store data files, such as Word documents, that can't be played on the device. For music, the Jukebox plays songs in the MP3 and WMA formats For photographs, the Jukebox displays images stored in the widespread JPEG format. You can show pictures one at a time, or start a slide show that automatically moves through images. For video, the Jukebox plays MPEG4 video clips. If you have clips in that format, you can drag them into the Jukebox. The Jukebox acts as a recorder for both audio and video. There's a "line in" jack on the Jukebox that connects to a cable, included in the box, ending in the familiar yellow video jack and red and white audio jacks. The cable can plug into any audio source - such as a home stereo system - to record music in MP3 format. Or the cable can plug into any video source - such as cable box, videocassette recorder, DVD player or camcorder - to record full-motion video with sound. The Jukebox holds 40 hours of video recorded this way; to get 80 hours, you must first prepare compressed video on a computer. In addition to the headset jack for listening to music, there is a "line out" jack for connecting the Jukebox to a stereo or television - again with the yellow, red and white plugs - for playing back audio and video. RCA promises a free software upgrade soon that will extend battery life to 12 hours for audio playback, by turning off the power-intensive color screen. __________________________________ Do you Yahoo!? Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus 8138 From: Does it matter Date: Tue Jan 6, 2004 11:33am Subject: Re: Portable MP3 Players Brian, Not every device leaves a registry entry. In fact lots of the thumb drives/usb key chain drives don't leave any remnants of being there. Good advice on the disable of the usb. --- In TSCM-L@yahoogroups.com, "Brian Varine" wrote: > There is a way to lock out the USB ports on 2000/2003/XP. We did this at my > last company and DoD does it as well. I'm not sure which setting you need to > tweak but it can be done. I can look it up if someone is really interested. > One other interesting feature is that every device that gets connected to > the machine leaves a registry entry. When performing a forensic analysis you > can see what they've attached. Unfortunately it doesn't tell you what > they've transferred. > > Brian 8139 From: Mitch D Date: Thu Jan 8, 2004 5:15pm Subject: Landlord goes to trial for placing illegal wiretap/cam Alleged snooping landlord in pretrial conference Gary Alan Rubio By Jeanine Gore--Half Moon Bay Review The El Granada landlord accused of installing a video camera behind his tenant's bathroom mirror and tapping her telephone line will meet in closed session Thursday with the judge and prosecution to determine whether his case will move to trial. According to Deputy District Attorney Steve Wagstaffe, the Superior Court Review hearing is an opportunity for both the defense and prosecution to hear what sort of sentence Judge Craig Parsons plans to impose on Gary Alan Rubio, if convicted. Then Rubio will have a chance to re-enter his plea, said Wagstaffe. "It's like a pretrial conference," he said. Wagstaffe said Superior Court Reviews are occasionally used as a way to resolve "non-violent" felony cases before trial. But, he said, avoiding trial is unlikely for Rubio because of the unusual nature of his case. "This case is a little different," Wagstaffe said. "Something tells me this one won't be that easy to resolve." Rubio, an electrical engineer, was arrested Oct. 5 at his El Granada home. Police charged him with two misdemeanor counts for trespassing and invasion of privacy and one felony charge for installing an unauthorized wiretap. At his arraignment Nov. 10 he pleaded not guilty. If the case proceeds, the next step is a preliminary hearing and then trial. If convicted, Rubio faces up to three years in state prison for the wiretap, six months in county jail for invasion of privacy, and six months in county jail for trespassing. Wagstaffe said the DA's office is confident it has a "strong" case against Rubio. "We feel the evidence is strong enough that the jury will convict him," said Wagstaffe. Loretta Rhodes, the alleged victim, said she plans to bring a $1 million civil suit against her landlord following his criminal trial. Rhodes discovered the mini-camera Oct. 5 with the help of Sheriff's deputies, who later found evidence of a wiretap beneath the home. Neither Rhodes' attorney, Jim Lassart of San Francisco, nor Rubio's attorney, Stephen Defilippis of San Jose, could be reached for comment on the case. http://www.hmbreview.com/articles/2004/01/07/news/local_news/story3.txt __________________________________ Do you Yahoo!? Yahoo! Hotjobs: Enter the "Signing Bonus" Sweepstakes http://hotjobs.sweepstakes.yahoo.com/signingbonus 8140 From: James M. Atkinson Date: Fri Jan 9, 2004 7:21pm Subject: MARTIAN AIR FORCE DENIES STORIES OF UFO CRASH MARTIAN AIR FORCE DENIES STORIES OF UFO CRASH Gusev Crater (MPI) - A spokesthing for Mars Air Force denounced as false rumors that an alien space craft crashed in the desert, outside of Ares Vallis on Saturday. Appearing at a press conference today, General Rgrmrmy The Lesser stated that "the object was, in fact, a harmless high-altitude weather balloon, not an alien spacecraft". The story broke late Saturday night when a major stationed at nearby Ares Vallis Air Force Base contacted the Gusev Crater Daily Record with a story about a strange, balloon-shaped object which allegedly came down in the nearby desert, "bouncing" several times before coming to a stop, and "deflating in a sudden explosion of alien gases." Minutes later, General Rgrmrmy The Lesser contacted the Daily Record telepathically to contradict the earlier report. General Rgrmrmy The Lesser stated that hysterical stories of a detachable vehicle roaming across the Martian desert were blatant fiction, provoked by incidences involving swamp gas. But the general public has been slow to accept the Air Force's explanation of recent events, preferring to speculate on the "other-worldly" nature of the crash debris. Conspiracy theorists have condemned Rgrmrmy's statements as evidence of "an obvious government cover-up," pointing out that Mars has no swamps. They point to the release of secret government memos detailing attempts to discredit reports of the landings by alien space craft. The memos discuss stategies to avoid troubles similar to those caused by the War of the Worlds radio program of years ago. The program, which featured a sensational story of gigantic oxygen breathing two-eyed invaders from Earth, sparked planet wide panic. Local residents like Driv Rhodo, who lives in the area of the alleged landings, are even more sceptical. "I seen it with my own 5 eyes" claimed Rhodo last week. "I've lived here over 300 years, most of my adult life-form. Them things used to be few and far between but lately they come in every few years or so. The government wants to bury the truth but I can tell you what's real. The Earthlings are going to invade and the government is spending our hard earned tax dollars on press releases and denials instead of preparing for the battle to come." A spokesthing denied any government involvement in the disappearance of Rhodo, who has not been seen since shortly after the interview, claiming "Any sentient being knows that a planet with the concentrations of water and oxygen found on Earth is a deadly and inhospitable environment for the formation of life, much less intelligent life. The fear and consternation caused by the unfounded and wild speculations of citizens like Rhodo are a traitorous disservice to the citizens of Mars." ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8141 From: James M. Atkinson Date: Sat Jan 10, 2004 10:09am Subject: Florida judge sues women who accused him of spying http://www.montereyherald.com/mld/montereyherald/news/7670050.htm Posted on Fri, Jan. 09, 2004 Florida judge sues women who accused him of spying By KEVIN HOWE khowe@m... A Florida judge who was once charged with peeping and prowling in a case involving a Maryland mother and her daughter at a Carmel motel has filed a malicious-prosecution lawsuit against the two women. Charles Weaver Cope, 54, a judge on the Pinellas-Pasco Counties Circuit Court, served the Monterey County Superior Court lawsuit this week on veterinarian Lisa Jeanes, 33, and her mother, physician Nina Jeanes, both of Maryland. "I'm pretty scared," Lisa Jeanes said Thursday. "The whole thing's a horrifying experience. I was hoping it was over. I'm pretty shocked and disheartened to hear about this. I really want it to be over with for good." Being served with the suit, she added, was "Very much a surprise. I thought the whole thing was over with." Though the prowling and peeping charges were eventually reduced to public drunkenness, Cope was formally reprimanded by Florida judicial authorities as a result of the Carmel incident. Adding to his troubles, the November issue of Readers Digest cited the Carmel case while listing him as one of three recipients of its "Broken Gavel Award" given to "sleazy, corrupt or abusive" judges. "From what I know of the case, the lawsuit won't survive long," said John Mills, the lawyer who prosecuted Cope in Florida for the Judicial Qualifications Commission, a watchdog of judicial behavior. "What I've said all along is that the way Judge Cope has handled the allegations against him has done much more harm to the judiciary than any of the conduct he was charged with." Cope was arrested in April 2001 after the Jeaneses complained to Carmel police that he had tried to enter their hotel room with a stolen key. Cope had met the women earlier when all three were intoxicated, police said. They were vacationing in Carmel and he was attending a judicial conference. Monterey County prosecutors initially charged him with misdemeanor counts of peeping and prowling. The criminal case against him ended in a plea bargain in August 2002, when Cope entered a written no-contest plea of public drunkenness. Five other misdemeanor charges were dropped. Cope was ordered to pay a $1,000 fine and donate $5,000 to charity. He was credited for 28 days served in a Florida residential alcohol treatment center in September 2001, said Lisa Poll, a Monterey County deputy district attorney. The case caused a stir in Florida, where Cope was tried before Florida's Judicial Qualifications Commission in June 2002. According to reports in the St. Petersburg Times, Lisa Jeanes testified that Cope introduced himself by offering to help her in a time of emotional distress. She testified that he then made unwanted sexual advances on the beach and later tried to enter her room. Cope's Florida attorney countered that she was lying to cover up an amorous encounter with the judge. The Florida panel found Cope guilty of public drunkenness and inappropriate behavior but dismissed several other charges. Last August the Florida Supreme Court publicly reprimanded Cope for his behavior, but he remains on the bench. Cope's suit alleges that the women's allegations against him "were without probable cause, were malicious, and made for an improper purpose" and that "all charges against plaintiff (Cope) were favorably terminated in his favor." Prosecutor Poll commented at the time Cope entered his no-contest plea that her office believed the women's account of what went on in Carmel, and that the other misdemeanor charges -- prowling, peeping, aggravated trespassing, petty theft, and battery -- were not dropped for lack of evidence. "We discussed the resolution with (Lisa Jeanes) extensively and with her agreement decided not to put her through the hardship of a trial," Poll said. Prosecutors also felt that bringing in witnesses from Virginia, Maryland, and Florida would be too difficult for them and too costly for local taxpayers, Poll said. Cope's suit alleges that the accusations caused him economic harm and asks for actual and punitive damages in excess of $25,000. Lisa Jeanes said she is working on finding an attorney to respond to the suit within the required 30 days. The suit was filed Aug. 4 but was not formally served on the women until this week because Cope's attorney, Charles Warner of Monterey, had been waiting for legal documents from Florida. Kevin Howe can be reached at 646-4416. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8142 From: James M. Atkinson Date: Sat Jan 10, 2004 1:24pm Subject: It's a fitting tribute. I would invite list members to check out the following: http://madblast.com/funflash/swf/theUSA.swf It's a fitting tribute. -jma ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8143 From: Date: Sat Jan 10, 2004 5:38pm Subject: pinhole camera attached to ATM was transmitting PIN numbers to van Article published January 10, 2004 ATM thief on probation Paul Raymore Valentin Raducan, 31, pleaded no contest to one charge of fraudulent use of an access card, a misdemeanor, in Nevada County Superior Court Nov. 18. Raducan had initially been charged with two other felony counts, including concealing, selling or withholding stolen property and burglary; however, both of these charges were dismissed. Raducan received three years of conditional probation for his plea (the equivalent of pleading guilty) in addition to 20 days' jail time and a fine of $708.78. Other conditions of his probation: He is required to submit to search and seizure, he is forbidden to possess any access cards such as credit cards and ATM cards unless they have been issued to him, and he is forbidden to possess electronic surveillance equipment. The defendant also agreed to pay restitution, although that amount had not yet been determined. After Raducan's arrest in early November, agents with the FBI were looking into whether Raducan might have ties to an organized crime ring linked to similar activities nationwide. After further investigation, the bureau decided that there was not enough evidence to pursue charges other than those he faced in the state of California. Raducan was arrested Nov. 5 in Truckee after local police noticed him talking with another man on a two-way radio in the vicinity of the U.S. Bank branch on Donner Pass Road. A silver van was parked nearby with the motor running and nobody inside. Inside the van, officers found a laptop computer, a suitcase and a new coffee maker that had recently been purchased from Starbucks Coffee. Further investigation revealed that Raducan had purchased more than $1,100 worth of coffee equipment from Starbucks, using two credit cards that had been reported stolen in the North Lake Tahoe area earlier that day. Officers also found a pinhole camera attached to the U.S. Bank ATM machine, which they believe was transmitting PIN numbers of potential victims to the laptop inside the van. [Non-text portions of this message have been removed] 8144 From: Date: Sat Jan 10, 2004 9:36pm Subject: "They were called 'shorties,'" a term he learned from wiretap surveillance Hints and hunches lead to an ID theft ring and an elusive suspect What began in Hudson County as simple bank-fraud case has mushroomed Sunday, January 11, 203 BY TED SHERMAN Star-Ledger Staff Some knew him as Sug, short for Sugar. Others called him Sabor. He was sued under the name Kendall Dailey and indicted as Annur Hamilton. He had an address in Newark, could be found in Baltimore, was living in a Springfield townhouse, and had an apartment in Hamilton Township outside Trenton. From Our Advertiser The credit card in his wallet was in the name of Barnum. He was arraigned last week on a 31-count indictment in Hudson County, where he now sits in jail on $2.5 million bail. His lawyer says he is the victim of mistaken identity. This is a story of how the man of many names came to be arrested in the parking lot of a Dunkin' Donuts in Plainfield. He is accused of heading a multimillion-dollar identity theft ring that used 29 people and a multitude of fake names to clear out bank accounts across the state. Investigators are still trying to unravel the scheme, which first came to light last year. They say it involved a nurse who provided names of terminally ill patients; several bank employees who supplied account numbers of their customers; state motor vehicle agents who provided bogus licenses; a Newark print shop that made phony documents; and a mortgage broker and real estate appraisers who falsified the value of houses that were bought and sold in the names of people whose identities were stolen. Were it not for a detective's hunch and a car -- a $68,500 silver-gray BMW 745i, registered to a sham address -- an arrest may never have been made in the case, law enforcement officials say. THE HOT WHITE-COLLAR CRIME Identity theft targeted nearly 10 million people last year at a cost of $5 billion to the victims and nearly $48 billion to business and financial institutions, the Federal Trade Commission estimates. It is a relatively easy fraud to commit. Personal and credit data are available to just about anyone. Online or telephone transactions require virtually no human contact. Many victims do not know they have been targeted until their money is gone. The ease of changing identities makes it hard for law enforcement to track suspects. "You are dealing with a phantom, basically, and that makes it more difficult," explained Joel S. Lisker, a former FBI special agent who is senior vice chairman of Dudinsky, Lisker and Associates, a Washington, D.C., consulting and lobbying firm. At the same time, identity theft is not a high priority for most law enforcement agencies, notes Robert D. McCrie, an expert in security management at John Jay College of Criminal Justice in New York. "That's why it's the most rapidly growing white-collar crime in the country," he said. Fraud artists who engage in identity theft typically fragment their activities so if someone does start an investigation, the crime will seem of little significance, McCrie pointed out. That was how it began for Hudson County Prosecutor Edward J. De Fazio. When representatives of the Provident Bank of New Jersey, based in Jersey City, came in one day last year to report apparent tampering with several customer accounts, he thought he had a simple fraud case on his hands, he recalled. The accounts had been converted illegally to make them Internet-accessible, enabling checks to be cut electronically and then mailed out. Provident Bank officials declined to explain how that could happen, but noted none of their customers lost money. The prosecutor said money was streaming out of the accounts. "The checks were being made out to various names and apparent businesses, at $8,000 to $9,000 at a clip, but not in even amounts," he said. "Initially we weren't sure what it was all about, but we saw they were going to a Mailboxes Etc. box in South Orange, so we knew we were on to something." The checks were made out to people and businesses that never saw the money -- all identity theft victims. One check for $7,914.30 was made out to a man with cerebral palsy who was a client of Cerebral Palsy of Essex and West Hudson in Belleville, but the check was mailed to the South Orange address. Later on, his name would turn up on several fraudulent real estate transactions. Investigators found a list of other people with cerebral palsy during a search of one suspect's apartment. Officials at the social service agency declined to comment on the matter. No arrests have been made of anyone connected with the center. In the beginning, De Fazio said, there was no paper trail beyond the identity theft victims, and the amounts of money involved were not particularly large. Many of the transactions stretched far beyond Hudson County. Investigators began recording similar transactions -- some linked by the same names -- in a series of thick, black, three-ring binders that now completely fill a bookcase in the sixth-floor office of the prosecutor. What emerged, said Sgt. Thomas Cooney, a member of the special investigations unit, was the discovery that a small network of operatives, most of them women with forged identification, was being used to cash checks on accounts in banks all over New Jersey -- including Provident, Fleet Bank, Sovereign Bank, PNC Bank and the former First Union. "They were called 'shorties,'" Cooney said of the women, a term he learned from later wiretap surveillance. "Some were paid as much as $1,000 per transaction. They would be dropped off and told if there were any problems, to leave the ID and just walk out." SARA MEETS SABOR Sara Henry had a good job. The 28-year-old registered nurse from Lindenwold in Camden County was employed by Cross Country TravCorps, the nation's largest medical staffing firm. She was living in Philadelphia while on assignment at Frankford Hospital, a small critical-care facility in the Northeast section of the city. In February, she went with a girlfriend to Atlanta for the annual NBA All-Star Game -- a glittery all-weekend extravaganza of flashing lights, thumping music and entertainment by Mariah Carey, as Michael Jordan battled it out on the floor of the Philips Arena with Kobe Bryant and Yao Ming. It was there that Henry met her friend's ex-boyfriend and his cousin, who was introduced to her as Sabor, a young man who tooled around in a high-performance BMW sedan. A transcript of Henry's interview with detectives, part of the public record in the state's case to revoke her New Jersey nursing license, outlines how her involvement began. Henry said she started dating Sabor when she got back home. She quickly learned he went by other names. Once, while they were at dinner, he paid for the meal by pulling out a credit card in the name of Barnum. "Did he ever explain to you who Mr. Barnum was?" Henry was asked. "No," she said. The conversation with her new boyfriend eventually turned to the subject of people who might not worry if their names were borrowed. "He said since you're a nurse, that you could get me into people that were maybe gonna be sick for a while; weren't gonna be checking their mail; somebody that may be dying or didn't have any family," she told investigators. "And he said I could take the names. All I would need is a name and a birthdate." No one would be hurt, she said he told her. "He said that he would take a name from someone; sometimes it was his friend's relatives or other people and he would take their names and put them into a mortgage and then, about a year later, they would reappraise the house for more than what they bought it for and they would sell it and then everyone would get money," Henry said. "The person whose name it was in, the loan would be paid off and then their credit would ... be higher." He suggested she could get 20 percent of any profits. She eventually gave him three names -- all gravely ill patients at Frankford Hospital. One was on life support. Two others were terminal, including a man with lung cancer. THE HUNCH Tom Cooney, the Hudson County investigator, felt as if he was tracking a ghost. He had a list of dummy accounts, reams of ATM activity, fraudulent credit cards, and he began to figure someone was at the center of a growing scheme. His suspect did not have a name. No one knew what the suspect looked like. Still, it wasn't exactly as if the guy was lying low. Cooney's gut told him his target was driving a silver-gray BMW 745i that had been leased and registered to one of the fake names and addresses in the binders. No one was making payments on the sedan. Cooney had only the license plate -- a hook he could not reel in without blowing the whole investigation. He didn't want to arrest the driver right away, not if he wanted any chance of unraveling what increasingly appeared to be a sophisticated fraud ring. In an effort to follow the vehicle and the driver, Cooney began trying to trace transactions on credit cards tied to some of his identity theft victims. As cops have for decades, he stuck pins onto a map to determine where money was being spent. Purchases clustered around Route 22, east of Mountainside, in Union County. "There were places he frequented. Restaurants, gas stations, stores," Cooney recounted. "So we staked out the highway, hoping he would drive down one morning." An undercover unit would be ready to roll off the center island of the east-west state highway and begin tailing the silver-gray BMW. It was a shot in the dark, Cooney readily conceded. As he sat there one morning, staking out the crawling, rush-hour traffic, Cooney glumly realized just how many high-end BMWs are out there. And it might well have ended there, a search for the veritable needle in a haystack, when Cooney spotted the familiar BMW logo atop a Springfield car dealership and played a hunch. Cooney decided he had nothing to lose by talking to the service manager. Maybe the manager had seen the car. "We hit pay dirt. It was just plain luck," he said, smiling as he retold the story. Employees at JMK BMW on Route 22 did remember the car and the driver. "We knew him," said a service adviser. "He came in a few times. We gave him a ride home." The address they had was a townhouse complex on the other side of the highway in Springfield. Two other cars leased under false names turned out to be parked there as well -- a Lincoln Navigator SUV and another BMW. Six weeks later, the prosecutor's office obtained a court order to wiretap cell phones. "We knew there were more people involved. We wanted to see who they were," explained De Fazio. CALLING THE BANKS Cooney still was not sure of the name of the suspect, but he concluded the driver of the BMW was the likely boss of the operation. Investigators in the Hudson County Prosecutor's Office said their cell phone surveillance showed calls to the toll-free numbers of several banks, one after another, to obtain account balances on specific customers. The accounts would then be drained. Lt. Timothy Griffin, commander of the special investigations unit, said: "We knew what they were doing, but not where or when." More surprising to investigators were some calls that led to bank employees. At least two bank employees would be charged with feeding account information about customers to the ring. It was not just bank accounts being looted. At the same time, more cars were being leased under assumed names and disappearing, including a Hummer H2, Mercedes-Benzes, Land Rovers and Jaguars. Authorities told a Randolph schoolteacher, Judy Moore, that several luxury cars had been purchased in her name. "For a couple of months, I was the owner of a Mercedes and a Hummer," Moore recalled later. "We would drive down the highway and see one and say, 'Is that one mine?'" Moore's savings account was raided as well -- a money market account that she had never written a check against. "There was nothing I could have done about it," she said. "The money was gone before I knew it." She did not learn of the fraud until she received a call from the prosecutor's office. Moore is not sure why her account and name were targeted, but an employee of Fleet Bank, identified by prosecutors as Shamia Nichole Jones, 24, of Orange, was later indicted. Fleet Bank quickly restored all of the stolen funds, Moore said. Luxury houses also were being purchased, and second mortgages were providing cash to the buyers through fraudulently inflated appraisals, said De Fazio. In one case, a newly built $895,000 beachfront house in Brigantine was bought, and a second $125,000 mortgage was taken out against an inflated value provided by an appraiser allegedly in on the plan. The real estate scheme extended throughout the state. When De Fazio's investigators swooped in, the group was negotiating to buy a $2.6 million house on Chelsea Drive in Livington, De Fazio said. THE MVC LINK Henry had a girlfriend who worked at the New Jersey Motor Vehicle Commission's Mount Holly agency. The woman, Sheilina Moore, could provide registration documents on vehicles with no questions asked, Henry told detectives. Sabor wanted to meet Sheilina Moore. He had a black 2003 Hummer H2, and Moore would provide documentation in the name of Terry C. Moore. Sabor told Henry that Terry Moore was a relative of his. "For doing this for Sabor, was she paid anything?" investigators asked. "Two thousand dollars," replied Henry. "I put it under the mat of her car she left unlocked in the back." Sheilina Moore was arrested in November by the FBI, accused of participating in a separate ring dealing in driver's licenses on the black market. Moore also got Sabor a driver's license, Henry said. She remembered the last name on the license was Hamilton. THE CRACKDOWN He was a man with many names. After hours of surveillance tapes, they knew him as "Sug." They knew he used the name Jamal Barnum. And they knew him as Annur Hamilton. "We weren't quite sure what his name was until we arrested him," said Cooney. As investigators got closer, the man with many names began to get nervous. He told his girlfriend people were following him. "He called me and said that the FBI were following him and his baby's mother," Henry told detectives. "He said that they didn't have anything on him." It was June, and De Fazio decided he had enough to move in. With 25 search warrants and an army of police and agents from the FBI, authorities made more than 20 arrests and seized cars, documents and computers across New Jersey. According to a search warrant report, authorities found keys to a BMW and Jaguar in Henry's apartment, along with computer equipment, digital cameras and lamination devices that investigators said were used to create phony licenses and ID. Photos of women Cooney identified as operatives in the scheme were found on the computer disk drive. Also discovered were automobile registration certificates for Jamal Barnum, blank New Jersey birth certificates with raised seals from the Township of Livingston and the city of Newark, and bank and brokerage account statements for several potential identity-theft victims, according to the report. Cooney arrested the man with many names outside a Dunkin' Donuts in Plainfield. He was booked as Annur Hamilton, 30, of Hamilton Township. Henry would later identify him from a photograph as the man she knew as Sabor. "He was really in shock," said Cooney, remembering the scene as the man was brought down to Jersey City to be booked. He was sitting there, Cooney said, and more than 20 of "his closest friends show up" to be fingerprinted and photographed. Last week, 23 men and women named in a 31-count indictment were arraigned in Hudson County on charges of conspiracy, theft by deception, identity theft, financial facilitation of criminal activity, possession of motor vehicles with altered identification numbers, and receiving stolen property, said Assistant Prosecutor Mary Ellen Gaffney, who is handling the case. Five others still have not been apprehended. Sara Henry, who had no prior criminal record, pleaded guilty Monday to a downgraded charge of conspiracy to commit fraud -- a third-degree crime that could mean no jail time when she is sentenced. She will be expected to testify as a prosecution witness, Gaffney said. Henry's lawyer, Ron Helmer of Haddon Heights, said his client received nothing for her participation in the scheme. The man with many names sits in the Hudson County jail, on $2.5 million bail. According to Cooney, he was charged with forgery in Union County in 1998 under the name of Kendall Dailey. There is a tax lien against him under several names in Essex County, records show, and a string of different addresses under the name of Hamilton. His attorney, Elise DiNardo of Jersey City, says authorities have the wrong man. "He has a college degree. His father is a physician," said the attorney. "They are alleging he's the mastermind of this organization, but I don't see how that's possible." According to DiNardo, Hamilton buys distressed houses in foreclosure, restores them and resells them for a living. DiNardo said the state has been very vague as to what proof it has, and her client did not know any of the co-defendants in the case. "Mr. Hamilton lives a modest life," she said. Cooney is convinced otherwise. "This," he said, "is a case of people where every instance of their lives -- from the time they got up in the morning until they went to bed at night -- was a fraud." Copyright 2004 NJ.com. All Rights Reserved. [Non-text portions of this message have been removed] 8145 From: Date: Sun Jan 11, 2004 1:23am Subject: Al Qaeda hunt follows old tracks -*Al Qaeda hunt follows old tracks Sat January 10, 2004 09:41 PM ET By Simon Cameron-Moore ANGOR ADDA, Pakistan (Reuters) - U.S. troops on the Afghan side of the border have two simple rules to follow: don't cross over, and radio the Pakistan army first before shooting at any suspected al Qaeda militant spotted over there.T The Pakistani general pointed across the dusty plain on the other side of the frontier from the village of Angor Adda, his finger following a jeep hurtling towards the U.S. base of Shikin a few miles to the north in the Afghan province of Paktia. "The camp is there, see that patch of white?" General Shaukat Sultan said, indicating a faintly visible compound near the foot of a range of ochre and grey hills. Everything in South Waziristan, a tribal area in Pakistan's North West Frontier Province has the same two-tone hue, from the high serrated ridges and rocky slopes of the mountains to the dried out riverbeds and mud walls of its isolated settlements. "Over there," he said sweeping round to another range of hills to the west, "is where our troops killed eight al Qaeda and captured 18 two months ago. "That encounter was billed as a demonstration of the Pakistan army's commitment to the U.S. led "war on terror". Two soldiers were killed. A month later a couple more al Qaeda men were gunned down in the same area. Just last week, the Pakistani army launched another operation against suspected Islamic militants in South Waziristan involving troops and helicopters. The army entered the semi-autonomous tribal areas for the first time in mid-2002 to seal the borders against fugitive al Qaeda and Taliban fighters. President Pervez Musharraf told Reuters just days after the first of two assassination attempts on him in December that the last time Pakistan had any substantial clue al Qaeda kingpin Osama bin Laden or his deputy Ayman al Zawahri were in Pakistan was nearly nine months ago. Electronic surveillance, possibly from one of the U.S.-manned listening posts in the tribal areas, put one of them in Waziristan -- but subsequent searches yielded nothing. BYWORD FOR MILITANCY Waziristan is ideal for any seasoned guerrilla fighter, like bin Laden and al Zawahri, to lie low. The region is redolent with conflict and intrigue. The British military intelligence officer T.E. Lawrence, better known as "Lawrence of Arabia", was in Waziristan in 1928 -- when the Raj was unhappy with a troublesome king in Kabul. For more than 150 years the mountain caves of the North West Frontier provided hiding for holy war warriors, or mujahideen, who India's British colonial rulers dubbed "Hindustani Fanatics". Like bin Laden, they were followers of the strict fundamentalist Wahabi sect of Islam that spread out of Arabia to the Indian sub-continent in the early 19th Century. Their running battles with the British lasted over a century. "We found the ashes of his fire still warm in his cave but he had flown. Our informer as usual informed both ways." Jack Lowis, the British Political Agent for South Waziristan, wrote those words 60 years ago about the hunt for the Faqir of Ipi, a Muslim holy man whose fighters took on the British Raj. The Faqir was never caught, but he represents more than just a historical parallel. His son was reportedly a brother-in-arms of bin Laden, fighting with the mujahideen who drove the Red Army out of Afghanistan in the 1980s. FRIEND OR FOE Pakistan says it has captured more than 500 al Qaeda suspects so far, but its army has suffered casualties in the hunt. At another village in South Waziristan 10 troops and two al Qaeda members were killed in a clash last June. But still, U.S. servicemen carry tales back to reporters in Kabul of Taliban militia slipping over the border for sanctuary in Pakistan, unhindered by watching Pakistani troops. General Sultan bristled with indignation: "There is no question of anyone in the Pakistan army assisting the enemy. They owe their loyalty to the flag, not to any individuals. "Pakistan's forces are full of Pashtuns. And the Taliban, an Islamic student militia that emerged less than two decades ago, is also largely Pashtun. While many tribesmen dislike the Taliban for preaching ways that go against traditional Pashtun culture, local leaders say the ethnic ties mean sympathies for the Taliban are there. To add to the complications of making out friend from foe on the border, a string of friendly fire incidents between U.S. and Pakistani forces highlighted a communication gap. On New Year's Eve last year, a U.S. F-16 warplane dropped a bomb on a madrassa near Angor Adda killing two Pakistani troopsafter an exchange of fire in which a U.S. soldier also died. In August, U.S. forces shot dead two Pakistani soldiers in another "friendly fire" incident in Waziristan -- this time provoking a protest from Musharraf. Procedures have been tightened since. U.S. officers from the Shikin base regularly meet their counterparts in Angor Adda, and keep them informed by radio. Pakistani officers say the U.S. troops are also required to alert them first before firing across the border to avoid return fire. STATUS SYMBOLS Bullets fly regularly in Waziristan even without the two friendly armies' crossfire. The tribes have a gun culture that makes Detroit appear tame. "People really do own heavy arms -- rocket and grenade launchers, sometimes even (shoulder-fired) stinger missiles," Sikander Hayat Khan Sherpao, an opposition lawmaker in Peshawar, a city at the southern end of the Khyber Pass. Olaf Caroe, the last British Governor-General on the Frontier and an authority on Pashtun tribes, compared to the Wazir to a panther and the region's other main clan, the Mahsud, to a wolf. He wrote: "The wolf pack is more purposeful, more united and more dangerous. "Angor Adda is in Mahsud territory. As an army patrol passed by, two Mahsud youths lounged around a Frontier Force checkpoint in the village as if they owned it. The Kalashnikovs cradled in their arms gave them the right to act that way, just as the Martini-Henry rifles and the long-barrelled jezails of their forefathers did in bygone eras. A Pakistan army colonel nodded sagely: "This is a very dangerous place. Every child has a gun." [Non-text portions of this message have been removed] 8146 From: James M. Atkinson Date: Sun Jan 11, 2004 10:48am Subject: Thieves plant spy cameras in Hong Kong cashpoint machines http://www.khaleejtimes.com/DisplayArticle.asp?xfile=data/theworld/2004/January/theworld_January165.xml§ion=theworld&col= Thieves plant spy cameras in Hong Kong cashpoint machines (DPA) 8 January 2004 HONG KONG - Pinhole spy cameras capable of filming people tapping in their PIN numbers have been found hidden in two bank cashpoint machines in Hong Kong, a news report said on Thursday. The cameras - discovered in two machines outside a Hang Seng Bank branch - could transmit images to a remote receiver, according to the South China Morning Post. Hundreds of customers who used the cashpoint machines have now been contacted for their cards to be cancelled although no thefts from accounts had been reported, the newspaper said. Similar hidden cameras have been found fitted into cashpoint machines in mainland China and Malaysia but the discovery at the Hang Seng Bank is the first of its kind in Hong Kong. A Hang Seng Bank spokeswoman refused to tell the newspaper where and how the spy cameras had been fitted into the cashpoint machine cubicles. It is believed thieves may have intended to use the information to empty bank accounts after stealing cashpoint cards from customers following their visits. Alternatively, duplicate cards could be produced so that thieves could then use the PIN numbers to access the accounts of customers they have photographed. Less than 50 reports of thefts involving cashpoint machine transactions were reported in Hong Kong last year, police said. However, only three months ago, Hong Kong Monetary Authority officials advised banks to step up cashpoint machine security amid fears of sophisticated new theft attempts. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8147 From: Does it matter Date: Thu Jan 8, 2004 1:55pm Subject: Wiretaps, Feds, voip Hope this interests people. Darren The agencies have asked the Federal Communications Commission to order companies offering voice over Internet Protocol (VoIP) service to rewire their networks to guarantee police the ability to eavesdrop on subscribers' conversations. Without such mandatory rules, the two agencies predicted in a letter to the FCC last month that "criminals, terrorists, and spies (could) use VoIP services to avoid lawfully authorized surveillance." The letter also was signed by the Drug Enforcement Administration. This is not the first time the Bush administration has expressed concern about terrorists and other lawbreakers using VoIP to evade wiretaps. As previously reported by CNET News.com, a proposal presented quietly to the FCC in July sought guaranteed surveillance access to broadband providers. But the latest submission, which follows a recent FCC forum on Internet telephony, is more detailed than before and specifically targets VoIP providers as a regulatory focus. In general, VoIP providers have pledged to work with police, and some, like Level 3 Communications, do not oppose the regulations the FBI is seeking. Others, like a coalition of 12 smaller VoIP providers including BullDog Teleworks and PingTone Communications, have told the FCC that "there are various industry initatives under way and the commission should allow those initiatives time to succeed before preemptively regulating." Federal and local police rely heavily on wiretaps. In 2002, the most recent year for which information is available, police intercepted nearly 2.2 million conversations with court approval, according to the Administrative Office of the U.S. Courts. Wiretaps for that year cost taxpayers $69.5 million, and approximately 80 percent were related to drug investigations. Those statistics do not include approximately the same number of additional wiretaps authorized by the Foreign Intelligence Surveillance Act. When weighing the FBI's request, the FCC will have to decide whether a 1994 law called the Communications Assistance for Law Enforcement Act (CALEA) applies to VoIP providers. The law is ambiguous. It clearly requires "telecommunications carriers" to provide ready wiretapping access while explicitly exempting "information services." If the FCC decides CALEA does not apply, the debate would shift to Congress, which could decide to amend the law. When Internet links are used to carry voice calls that begin and end in the traditional, circuit-switched network--a move that Verizon Communications announced Wednesday--that would easily fall within CALEA's existing definitions. But Internet-to-Internet voice links like those offered by VoIP companies Vonage and Skype are closer to information services and fall into a regulatory gray area. The status of voice conversations carried through instant-messaging programs is even more unclear, as is the FCC's ability to compel overseas VoIP providers to comply with U.S. rules. "The FCC should ignore pleas about national security and sophisticated criminals because sophisticated parties will use noncompliant VoIP, available open source and offshore," said Jim Harper of Privacilla.org, a privacy advocacy Web site. "CALEA for VoIP will only be good for busting small-time bookies, small-time potheads and other nincompoops." One unusual section of the FBI letter is that it claims the bureau is seeking to protect Americans' privacy rights: "Mandatory CALEA compliance by VoIP providers would better protect the privacy of VoIP users than a voluntary approach. CALEA protects the privacy of surveillance suspects by requiring carriers to provision the surveillance in a confidential manner." Otherwise, the FBI argues, a VoIP company might turn over a "full pipe" to police that would include conversations of more people than necessary. At least one FCC commissioner has expressed strong support for sweeping VoIP into CALEA's requirements, which currently apply only to telephone companies. "We must understand the concerns raised by DOJ and FBI that classifying Vonage's VoIP as an information service severely undercuts CALEA," Jonathan Adelstein said last month. "VoIP jeopardizes the ability of federal, state and local governments to protect public safety and national security against domestic and foreign threats. Public safety is not negotiable." 8148 From: Brian Varine Date: Fri Jan 9, 2004 1:23pm Subject: Wireless transmitter intrusions This is pretty comical: http://www.ananova.com/news/story/sm_853744.html?menu=news.latestheadlines Burger King customers told: 'You are too fat to have a Whopper' Police believe teenage pranksters are hacking into the wireless frequency of a US Burger King drive-through speaker to tell potential customers they are too fat for fast food. Policeman Gerry Scherlink said the pranksters told one customer who had just placed an order: "You don't need a couple of Whoppers. You are too fat. Pull ahead." The offenders are reportedly tapping into the wireless frequency at the restaurant in Troy, Michigan. Police believe the culprits are watching and broadcasting from close range. Officer Scherlinck said the men are telling customers who order a Coca-Cola that, "We don't have Coke." And when the customer asks what they do have, the hacker would say: "We don't have anything. Pull ahead." But what has managers concerned is the profanity the hackers are using, according to police. A drive-through customer has told police if he had children with him in the car and someone used profanity, he would have been upset. Burger King franchise owner Tony Versace issued the following statement in response to the incidents: "We apologise to our customers who've been insulted by the use of this drive-through speaker." Management at the fast-food restaurant are reportedly trying to change the radio frequency used for the speakers, reports Local 4. 8149 From: James M. Atkinson Date: Mon Jan 12, 2004 11:49am Subject: The Charge of the Light Brigade The Charge of the Light Brigade by Alfred Tennyson. -------------------------------------------------------------------------------- Half a league, half a league, Half a league onward, All in the valley of Death Rode the six hundred. "Forward the Light Brigade! Charge for the guns!" he said. Into the valley of Death Rode the six hundred. Forward, the Light Brigade!" Was there a man dismay'd? Not tho' the soldier knew Some one had blunder'd. Theirs not to make reply, Theirs not to reason why, Theirs but to do and die. Into the valley of Death Rode the six hundred. Cannon to right of them, Cannon to left of them, Cannon in front of them Volley'd and thunder'd; Storm'd at with shot and shell, Boldly they rode and well, Into the jaws of Death, Into the mouth of hell Rode the six hundred. Flash'd all their sabres bare, Flash'd as they turn'd in air Sabring the gunners there, Charging an army, while All the world wonder'd. Plunged in the battery-smoke Right thro' the line they broke; Cossack and Russian Reel'd from the sabre-stroke Shatter'd and sunder'd. Then they rode back, but not, Not the six hundred. Cannon to right of them, Cannon to left of them, Cannon behind them Volley'd and thunder'd; Storm'd at with shot and shell, While horse and hero fell, They that had fought so well Came thro' the jaws of Death, Back from the mouth of hell, All that was left of them, Left of six hundred. When can their glory fade? O the wild charge they made! All the world wonder'd. Honor the charge they made! Honor the Light Brigade, Noble six hundred! ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8150 From: Michael Puchol Date: Sun Jan 11, 2004 4:37pm Subject: Re: Wiretaps, Feds, voip Hi, The greatest problem with this is the very old saying "if you outlaw xxxx, then only outlaws will have xxxx" (substitute the xxxx for your favourite weapon, device, algorithm or communications technology). In this case, what is to stop a criminal using an SSH session and tunnel the VoIP over it? It would look like normal, SSH-encrypted traffic to anyone watching the packets fly by, so the wiretap technology would be useless - unless the SSH keys could be obtained by some method, it is unlikely that the conversation could be recovered in a timeframe of use in an investigation. I just hope that most criminals stay as technically illiterate as they are now - read the "I was a hacker for the mob" article in Wired a couple months ago (nov. or dec. issue, can't remember right now), it's rather interesting. Best regards, Mike ----- Original Message ----- From: "Does it matter" To: Sent: Thursday, January 08, 2004 8:55 PM Subject: [TSCM-L] Wiretaps, Feds, voip > Hope this interests people. > > Darren > > > > > > The agencies have asked the Federal Communications Commission to > order companies offering voice over Internet Protocol (VoIP) service > to rewire their networks to guarantee police the ability to > eavesdrop on subscribers' conversations. > > Without such mandatory rules, the two agencies predicted in a letter > to the FCC last month that "criminals, terrorists, and spies (could) > use VoIP services to avoid lawfully authorized surveillance." The > letter also was signed by the Drug Enforcement Administration. > 8151 From: human being Date: Mon Jan 12, 2004 11:25am Subject: 'MRI system for semiconductors' saw this article about an ''MRI system for semiconductors'' and wondered exactly what it meant. apparently it is for quality control for chips, yet it also said their product line was related signal analyzers. how is this different from the gear that TSCM equipment works-- does the analysis of the guts of a computer and its signaling ever get review? or is this a part of the profession not meant for common review? why i ask is because i read something about how a single photon can affect a single transistor (in space, on a satellite for instance) and previously i wondered how a speaker can also be used as a microphone (as is said in basic texts i've read) - thus, could it be that a chip may be looking like a simple IC yet perform some dual-function, making a radio into a transmitter? and would a signal analyzer or oscilloscope or other tools find such a thing? or, then again, is this not realistic to the field, (of inquiry). brian 'MRI system for semiconductors' // signal analyzer? 'Leisz, 50, is founder, president and CEO of Wavecrest Corp., an Eden Prairie manufacturer of equipment that is fast enough and accurate enough to detect flaws in even the fastest of the hyper-speed semiconductors now under development.' ... 'Today, the speed of Wavecrest's products is measured in attoseconds, which is the time it takes light to traverse not a hair, but an atom. Whoops, there's that glaze again.' brian thomas carroll: research-design-development architecture, education, electromagnetism http://www.electronetwork.org/bc/ 8152 From: Nicolas Gregoire Date: Mon Jan 12, 2004 2:13am Subject: Re: Gen Hawleys politically incorrect mssg On Mon, 2004-01-05 at 18:33, Mitch D wrote: > The plain fact is that our country has, with all our > mistakes and blunders, always been and always will be the > greatest beacon of freedom, charity, opportunity, and affection > in history. If you need proof, open all the borders on Earth and > see what happens. OK. So let's forget that USA is/was giving money and/or weapons to the School of Americas, to Ben Laden, to the contras, etc. Have you ever heard about state-terrorism ? Please read some Chomsky books about this and give a real look to real life. -- Nicolas Gregoire 8153 From: Does it matter Date: Mon Jan 12, 2004 6:47pm Subject: I can "see" you aren't telling the truth? This takes the cake. One little gadget debuting at CES claims to put truth detection voice analysis on the bridge of your nose. "Voice Analysis Eyeglasses" provide real-time analysis on the inside of the lenses about whoever is talking at the time, says its maker, the Israeli company Nemesysco, which developed the technology for counterterrorism and government customers. "A chip inside the glasses is able to read the voice frequency of the person you are talking to," said Beata Gutman, a spokeswoman for the company. "The voice is analyzed through that chip and there are lights that indicate whether the person is lying." She said the truth specs were expected to be available at the end of January for $400-$500. 8154 From: Thomas Shaddack Date: Mon Jan 12, 2004 7:38pm Subject: Re: Wiretaps, Feds, voip (fwd) ---------- Forwarded message ---------- Subject: Re: [TSCM-L] Wiretaps, Feds, voip Date: Tue, 13 Jan 2004 01:54:57 +0100 (CET) From: Thomas Shaddack To: Michael Puchol On Sun, 11 Jan 2004, Michael Puchol wrote: > > The greatest problem with this is the very old saying "if you outlaw xxxx, > then only outlaws will have xxxx" (substitute the xxxx for your favourite > weapon, device, algorithm or communications technology). In this case, what > is to stop a criminal using an SSH session and tunnel the VoIP over it? Maybe the difference between TCP and UDP. VoIP is almost exclusively UDP-only, as little dropouts don't matter while latency is much more important. TCP, if available, is usually only a fallback mode. > It would look like normal, SSH-encrypted traffic to anyone watching the > packets fly by, so the wiretap technology would be useless - unless the > SSH keys could be obtained by some method, it is unlikely that the > conversation could be recovered in a timeframe of use in an > investigation. There are other possibilities as well. Any VPN system will do; industrial standard is IPSec, available for all major platforms - built-in in Windows, available for Linux 2.4 kernel at www.freeswan.org and either built-in or as different-named add-ons for other systems. Another VPN implementation that looks secure is OpenVPN , based on OpenSSL and running on Windows 2000/XP and Linux/BSD/Solaris/Mac. Any kind of VoIP can be run through a VPN. The VPN supplies the encryption of the call. There are even VoIP programs with strong crypto support. My favorite one is the old but good SpeakFreely (don't believe the rumours it's dead - all that happened is that the original author/maintainer steps away from the development which moves to Sourceforge), which runs in both various unixes and Windows; the problem there is the key handshake, which has to be performed by an external application (which then in turn can run SF process and feed it with the negotiated session key). Another one often suggested is Skype, but I'd be wary about it as it's closed-source. My favorite way is using SpeakFreely with session keys prenegotiated and physically exchanged on strips of paper and manually entered in every couple days, and call negotiation (when to call, and the IP addresses to use) done over Jabber or ICQ; more sophisticated software for this is under slow, relaxed-pace development. Even a combination of methods is possible. Occassionally one of my ISP's routers dies and I lose access to good part of the Net - I don't see most foreign IPs, but I see the office I have a VPN connection into, so by setting up a proxy (and UDP forwarding) I can regain the connectivity for the price of couple dozens milliseconds. With an "accomplice" (or a hired machine in a colocation) in other country, it's possible - for the cost of few dollars and couple milliseconds - foil (to certain degree) even traffic analysis, using the offshore machine as a "meeting point". For further increase of cost and delay and dropped packets it's possible to chain such machines as well. Personally I am pretty excited about the recent development of tiny computers with low power requirements and capability to run eg. Linux; they have lots of applications, including but not limited to low-cost mobile secure telephone devices. If time and money permit, I would like to try to hack together such toy. > I just hope that most criminals stay as technically illiterate as they > are now - read the "I was a hacker for the mob" article in Wired a > couple months ago (nov. or dec. issue, can't remember right now), it's > rather interesting. The state of technological literacy is atrocious in all segments of society. For some real stories from the trenches check http://www.userfriendly.org/community_techtalesarchive.html > Best regards, > > Mike > > ----- Original Message ----- > From: "Does it matter" > To: > Sent: Thursday, January 08, 2004 8:55 PM > Subject: [TSCM-L] Wiretaps, Feds, voip > > > > Hope this interests people. > > > > Darren > > > > > > > > > > > > The agencies have asked the Federal Communications Commission to > > order companies offering voice over Internet Protocol (VoIP) service > > to rewire their networks to guarantee police the ability to > > eavesdrop on subscribers' conversations. > > > > Without such mandatory rules, the two agencies predicted in a letter > > to the FCC last month that "criminals, terrorists, and spies (could) > > use VoIP services to avoid lawfully authorized surveillance." The > > letter also was signed by the Drug Enforcement Administration. > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8155 From: Date: Mon Jan 12, 2004 9:47pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: How much interest do you have in a new model of phone analyser for TSCM? o A. None at all o B. Somewhat Interested o C. Interested o D. Very Interested o E. Extremely Interested To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1170141 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 8156 From: Fernando Martins Date: Tue Jan 13, 2004 1:51am Subject: Re: pinhole camera attached to ATM was transmitting PIN numbers to van this is a present hazard in Europe, i think there is no need but, there are pictures available of the scam "implementation" watch out for strange boxes (like, in a ATM outside a bank, there is no box with the bank documentation/brochures ... the cam is in the bottom) where we insert the card, the gear is a little more fat (there is a fake one on the top) FM ----- Original Message ----- From: To: Sent: Sunday, January 11, 2004 4:38 AM Subject: [TSCM-L] pinhole camera attached to ATM was transmitting PIN numbers to van > > > > Article published January 10, 2004 > ATM thief on probation > > > Paul Raymore > > Valentin Raducan, 31, pleaded no contest to one charge of fraudulent use of > an access card, a misdemeanor, in Nevada County Superior Court Nov. 18. Raducan > had initially been charged with two other felony counts, including > concealing, selling or withholding stolen property and burglary; however, both of these > charges were dismissed. > > Raducan received three years of conditional probation for his plea (the > equivalent of pleading guilty) in addition to 20 days' jail time and a fine of > $708.78. > > Other conditions of his probation: He is required to submit to search and > seizure, he is forbidden to possess any access cards such as credit cards and ATM > cards unless they have been issued to him, and he is forbidden to possess > electronic surveillance equipment. The defendant also agreed to pay restitution, > although that amount had not yet been determined. > > After Raducan's arrest in early November, agents with the FBI were looking > into whether Raducan might have ties to an organized crime ring linked to > similar activities nationwide. After further investigation, the bureau decided that > there was not enough evidence to pursue charges other than those he faced in > the state of California. > > Raducan was arrested Nov. 5 in Truckee after local police noticed him talking > with another man on a two-way radio in the vicinity of the U.S. Bank branch > on Donner Pass Road. A silver van was parked nearby with the motor running and > nobody inside. > > Inside the van, officers found a laptop computer, a suitcase and a new coffee > maker that had recently been purchased from Starbucks Coffee. Further > investigation revealed that Raducan had purchased more than $1,100 worth of coffee > equipment from Starbucks, using two credit cards that had been reported stolen > in the North Lake Tahoe area earlier that day. > > Officers also found a pinhole camera attached to the U.S. Bank ATM machine, > which they believe was transmitting PIN numbers of potential victims to the > laptop inside the van. > > > > > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8157 From: David Alexander Date: Thu Jan 15, 2004 10:24am Subject: man flies Atlantic with 5 bullets in pocket The big news here in the UK this morning is that a man with a Sierra Leone passport arrived at Heathrow Airport (London, England) with 5 rounds of ammunition in his pocket. He arrived on a flight from the USA. I don't know if the US 'readers' of this list are aware of the problems that flights from the UK (and I suspect other countries too) have had. A lot of flights have either been delayed or cancelled. Also we are very unhappy with the (in our opinion) the high-handed way that the US security authorities have been dealing with other countries. For example, the FBI and DHS are insisting that European countries flout their own privacy laws and supply data about passengers that should not be in the public domain. The net result among most people I know is quite simple - we're not coming to America as long as this is in force. We have zero confidence in the security authorities to keep the information safe and not misuse it. I'd just like to say that right now, we are laughing ourselves stupid. I know it's not you guys who read this list, please don't think I'm having a go at you personally, I'm not. Your postings show how dumba** you think most of this is and how ineffective it is on internal flights. Now you know, it's no better on the international ones either. Considering how long your sea and land borders are I'm sure that, if I wanted to, I could get a whole platoon of 'illegals' into the USA without detection or going anywhere near a scheduled flight. I also think that, with the relatively low value of second-hand airliners at the moment, if I was OBL and looking to repeat 9/11 I'd just buy a couple of old soviet Aeroflot transport aircraft and book them on 'one-way cargo runs' into the USA. My 2c. David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8158 From: James M. Atkinson Date: Thu Jan 15, 2004 6:40pm Subject: The leak that went awry http://www.csmonitor.com/2004/0116/p11s03-cods.html Commentary > Daniel Schorr from the January 16, 2004 edition The leak that went awry By Daniel Schorr WASHINGTON - The making of a coverup, like the making of a sausage, is not always pleasant to watch. Attorney General John Ashcroft, who rarely recuses himself from anything, has suddenly decided to get out from under the investigation of who leaked the identity of a CIA covert officer. And Mr. Ashcroft, who rarely misses his turn on camera, left it to Deputy Attorney General James Comey to make the announcement - and also to disqualify himself. Why would the Justice Department pass off what looks like a quintessentially Washington investigation to the US attorney in Chicago? Perhaps for that very reason. Fingering CIA officer Valerie Plame after her husband, former Ambassador Joseph Wilson exploded the administration's African-uranium-to-Iraq theory, smacked of typically Washingtonian bureaucratic revenge. Who in the White House could have picked up the telephone and made that vengeful call to columnist Robert Novak? The FBI has presumably interviewed a lot of officials and subpoenaed a lot of telephone records for the week of the leak last June. Mr. Comey says that what led to the attorney general's withdrawal was "an accumulation of facts." If those facts point to someone in the White House who has a personal relationship with the attorney general, it could present a perceived conflict of interest. As US Attorney Patrick Fitzgerald took over the investigation, word was leaked to The Washington Post that maybe no crime was committed in the first place. The Post's source pointed out that while it is a felony under the 1982 Agents' Protection Act to identify a federal agent undercover, this does not apply if the leaker did not know that Ms. Plame was an undercover operative. Nice try! The original Novak column last July that started all the fuss emphasized the importance of his scoop because "the agency has never before declassified that kind of information." White House spokesman Scott McLellan says that no one wants to get to the bottom of this more than President Bush, and that the president has directed staff members to cooperate with the investigation. But, if everyone on the staff were cooperating, the mystery probably would've been solved by now. Who took it on himself or herself to "declassify" a sensitive national security secret? Stay tuned for the 2004 chapter in the story of the leak that went awry. . Daniel Schorr is a senior news analyst at National Public Radio. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8159 From: James M. Atkinson Date: Fri Jan 16, 2004 3:50pm Subject: CPM-700's and OSCOR's for Sale If any list member is interested I would like to move eight new CPM-700's, three new deluxe OSCOR's, and two new ORION's and can provide a attractive pricing on them along with immediate/next day shipment. All equipment is brand new, unused, unopened, and under a virgin factory warranty I can take all major credit cards, checks, and/or wire transfer. Please email me privately if your interested, -jma ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8160 From: Date: Fri Jan 16, 2004 3:51pm Subject: possible participation of foreign experts in the investigation Eurasia Insight - Wiretap Controversy Flares in Kyrgyzstan Eurasia Insight: WIRETAP CONTROVERSY FLARES IN KYRGYZSTAN 1/16/04 Kyrgyzstan’s presidential and parliamentary votes may be over a year away, but election-related maneuvering is already underway. Both critics and supporters of President Askar Akayev have taken steps in recent days to consolidate their respective forces. Meanwhile, controversy has erupted over the alleged “bugging” of a member of parliament’s office. The bugging controversy began January 14, when MP Ismail Isakov, who chairs the lower house of parliament’s State Security Committee, announced that he had discovered a listening device planted behind a radiator in his office. He hinted the National Security Service (NSS) was responsible for planting the bug, estimating that it had been functioning for up to 18 months, according to a report by the AKIpress news agency. Isakov called for the resignations of Akayev and NSS chief Kalyk Imankulov. Shortly after the initial discovery, bugs were uncovered in the offices of other MPs, including Azimbek Beknazarov and the leader of the Atameken Party, Omurbek Tekebaev. Beknazarov in recent years has been a fierce critic of Akayev’s administration. [For background see the Eurasia Insight archive]. Parliament Speaker Abdigani Erkebayev characterized the discoveries as “anti-constitutional actions,” and the legislature moved to open a probe into the incident. The head of parliament’s International Affairs Committee, Alisher Abdimomunov, suggested that foreign governments were “ready to cooperate with the investigating group,” the Kabar news agency reported January 15. Government officials have rejected the assertion that state security agents were involved. Imankulov, the NNS chief, hinted that government opponents could have staged the incident, insisting that security services haven’t employed “such a technique for the last 10 years,” the Kabar news agency reported. Imankulov went on to say the incident might “be the beginning of a PR campaign” in connection with the scheduled parliamentary vote in early 2005. He also raised the possibility of a “third force” being responsible for the episode. State prosecutors announced that they had opened a formal criminal investigation, citing Criminal Code Article 136, which prohibits unauthorized wiretaps and other invasions of privacy. Imankulov welcomed the possible participation of foreign experts in the investigation. Such experts could “satisfy both parties -- government and opposition -- so that as a result there won’t be doubts about the investigation’s legitimacy,” he said. The bugging controversy flared as political factions started preparing for the parliamentary election. At a January 14 news conference, six opposition parties announced that they were forming a united front called “For People’s Power.” The bloc comprises political movements that have sought to push Akayev from power. On January 12, two pro-government parties Unity and Alga – announced their merger. Such consolidation raises the chances that the political parties will gain a sufficient share of the vote to secure seats in the next parliament. http://www.eurasianet.org/departments/insight/articles/eav011604_pr.shtml [Non-text portions of this message have been removed] 8161 From: James M. Atkinson Date: Sat Jan 17, 2004 11:56am Subject: Profundity GEORGE CARLIN STRIKES AGAIN 1. Ever wonder about those people who spend $2.00 apiece on those little bottles of Evian water? Try spelling Evian backwards: NAIVE. 2. Isn't making a smoking section in a restaurant like making a peeing section in a swimming pool? 3. OK.... so if the Jacksonville Jaguars are known as the "Jags" and the Tampa Bay Buccaneers are known as the "Bucs," what does that make The Tennessee Titans? 4. If 4 out of 5 people SUFFER from diarrhea...does that mean that one enjoys it? 5. There are three religious truths: a. Jews do not recognize Jesus as the Messiah. b. Protestants do not recognize the Pope as the leader of the Christian faith. c. Baptists do not recognize each other in the liquor store or at Hooters. 6. If people from Poland are called Poles, why aren't people from Holland called Holes? 7. Do infants enjoy infancy as much as adults enjoy adultery? 8. If a pig loses its voice, is it disgruntled? 9. Why do croutons come in airtight packages? Aren't they just stale bread to begin with? 10. Why is a person who plays the piano called a pianist but a person who drives a racecar is not called a racist? 11. Why isn't the number 11 pronounced onety one? 12. If lawyers are disbarred and clergymen defrocked, doesn't it follow that electricians can be delighted, musicians denoted, cowboys eranged, models deposed, tree surgeons debarked, and dry cleaners depressed? 13. If Fed Ex and UPS were to merge, would they call it Fed UP? 14. Do Lipton Tea employees take coffee breaks? 15. What hair color do they put on the driver's licenses of bald men? 16. I was thinking about how people seem to read the Bible a whole lot more as they get older; then it dawned on me.... They're cramming for their final exam. 17. I thought about how mothers feed their babies with tiny little spoons and forks, so I wondered what do Chinese mothers use? Toothpicks? 18. Why do they put pictures of criminals up in the Post Office? What are we supposed to do, write to them? Why don't they just put their pictures on the postage stamps so the mailmen can look for them while they deliver the mail? 19. If it's true that we are here to help others, then what exactly are the others here for? 20. You never really learn to swear until you learn to drive. 21. Ever wonder what the speed of lightning would be if it didn't zigzag? 22. If a cow laughed, would milk come out of her nose? 23. Whatever happened to Preparations A through G? ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8162 From: Steve Uhrig Date: Sat Jan 17, 2004 8:25pm Subject: FCC Radio Museum online courtesy of the Radio Club of America newsletter: http://www.fcc.gov/omd/history Covers the history of radio, ideas which made it possible, more. Emphasis on mobile radio and its applications for safety, business and personal use. Hertz, Marconi, Fessenden, Tesla, Alexanderson, DeForest and Armstrong are mentioned. Something to bookmark and read when you're stuck in a hotel room some evening. Good historical info. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8163 From: Date: Sun Jan 18, 2004 5:51am Subject: NSA relents on files' release NSA relents on files' release Secret agency allows EPA, MDE, Fort Meade to view pollution report; Cursory look shows no problems; Edited version planned because of security fears; access later to full study By Rona Kobell Sun Staff January 18, 2004 Baltimore Sun After months of denying regulators access to a key environmental study, the National Security Agency has opened its doors and its files - if only for a peek. Officials from the Environmental Protection Agency, the Maryland Department of the Environment and Fort Meade's environmental office got their first look last week at the super-secret eavesdropping agency's building contamination study, which outlines potential pollution problems. NSA is situated on a corner of the Fort Meade Army post in Odenton, which has been listed since 1998 on the EPA's Superfund list of the nation's most hazardous sites. Although NSA is not near the main areas of concern, regulators long have suspected that NSA has handled some hazardous waste over the years. But their cursory review of the NSA study didn't yield any red flags. "Based on my brief review, I did not see any regional environmental impacts resulting from historical operations at the NSA campus," said Fort Meade environmental engineer Jeffrey Thornburg. NSA expects to release an edited version of the report to regulators and the public next month. That version will include the environmental studies, but not maps, historical data and building function details that the NSA has deemed sensitive. "The study is currently under review to remove information relating to NSA's plans, operations, and potential security vulnerabilities," an NSA spokeswoman said last week. Federal and state regulators will be able to return to NSA and view the full report if they need more information. Historical data, such as the location of a wood-treatment facility or computer chip-making operation, might explain why certain contaminants turn up in certain places. If the edited report does not answer all such questions, Thornburg said, he'll go back to see the full version. For months, the lack of environmental information from the global code-breaking agency has frustrated regulators and citizens who have been working together to clean up the 86-year-old Army post. Over the past five years, the Army's environmental office has identified close to 200 areas of potential contamination that could cause long-term ground-water and soil problems, most stemming from fuel, solvents and munitions dating to the post's years as a major training camp for soldiers. By last summer, only 30 sites still required further cleanup. Board and Army That swift action and exchange of information improved the once-contentious relations between the Army and the Restoration Advisory Board, the citizen-regulator group overseeing the Superfund cleanup. Rather than participating in the Army's study, the NSA conducted its own in 2002. Last year, NSA officials gave the findings to an EPA representative, but abruptly took the report back, noting new post-Sept. 11, 2001, security concerns. NSA said the report revealed too much about its buildings and their functions. NSA told The Sun last month that it launched the study at the advisory board's request and not in response to Superfund requirements. However, EPA officials considered the pollution study a key part of the regulatory process. Advisory board Chairwoman Zoe Draughon said the NSA agreed to release the information only after the news reports circulated and public pressure increased. "The NSA is releasing the report not because it's the right thing to do, but because it's being forced to do it," she said. "But at this point, I'll take anything." Review by regulators Draughon said she doesn't need to see the unedited report as long as the regulators can review it. "NSA can't check themselves and say, 'Oh, we're OK,'" she said. "They have to let the people who are supposed to do the checking do their jobs." Board members hope that the NSA's cooperation is a sign that the agency's door may be opening more than just a crack. In the past few months, NSA and Army officials have met more frequently. "We're bridging any sort of gaps in our relationship," Thornburg said. "This is really setting the tone for future communication between NSA and Fort Meade." [Non-text portions of this message have been removed] From: Mitch D Date: Mon Jan 3, 2005 1:06am Subject: Re: un-bug / VLF reception PS to JMA's answer: if its not tx'ing or powered,only a nljd,or physical search would find it. __________________________________ Do you Yahoo!? Meet the all-new My Yahoo! - Try it today! http://my.yahoo.com 10497 From: Rob Muessel Date: Mon Jan 3, 2005 9:35am Subject: RE: Sweep needed Roger- I can recommend Steve Whitehead and Lorenzo Lombard of TSCM Services in South Africa. I've known these guys for 10+ years and they will do the job quite well. Best Regards, Rob Muessel -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Sunday, January 02, 2005 10:53 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Sweep needed Sweep needed in South Africa. Roger Tolces Electronic Security. Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10498 From: James M. Atkinson Date: Mon Jan 3, 2005 9:25am Subject: Re: un-bug / VLF reception At 02:06 AM 1/3/2005, Mitch D wrote: >PS to JMA's answer: >if its not tx'ing or powered,only a nljd,or physical search >would find it. TDR Analysis of the power lines would have found it, so would thermal imagery, and acoustic sounding. A magnetic analysis of the area with a gauss probe (not a metal detector) would likely have revealed it as well. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10499 From: DJ Date: Mon Jan 3, 2005 6:50pm Subject: Microphones Steve you could probably answer this one. In the movie Enemy of the State (steve did a great job here), I saw many microphones used at long ranges to listen into the subjects conversations. Does anyone have any whitepapers or any other information on the availability of microphones that will work at a distance of over 20 feet from the subject? Thanks, IT2 Garrett 10500 From: fjansgmxnet Date: Tue Jan 4, 2005 8:15am Subject: Re: un-bug / VLF reception > A magnetic analysis of the area with a gauss probe (not a metal detector) would likely have revealed it as well. Very interesting point. If I would use some sensitve hall sensor as a gauss probe, what will I see in what range from the UN-bug? I would expect an AC magnetic field of a few milli-gauss in a range of about 10 to 20 cm apart from this bug, if the bug is in the non transmitting / non batterie loading mode, correct? Best regards, Frank 10501 From: delta Date: Tue Jan 4, 2005 8:33am Subject: looking for a tdr hello everybody i m looking for a little tdr portable to test telephone wire here in france what kind of product can i buy ? any reference ? someone here can help me to find this product at resonnable price ? many thanks david from paris 10502 From: Larry Nevin Date: Tue Jan 4, 2005 9:27pm Subject: Re: looking for a tdr David, I have a Riser Bond TDR that is in great shape. I am no longer in the business and I have not used it in three years. The unit has all of the manuals and cables in its own plastic case. If that fits your need I will sell it at a greatly reduced price. Thanks, Larry Nevin Fire In The Hole Inc. --- delta wrote: > > hello everybody > i m looking for a little tdr portable to test telephone wire here in france > what kind of product can i buy ? any reference ? > someone here can help me to find this product at resonnable price ? > many thanks > david from paris > > > > > ===== "EXPECT MORE THAN OTHERS THINK POSSIBLE!" 10503 From: delta Date: Wed Jan 5, 2005 1:48am Subject: Re: looking for a tdr hello larry and many thanks for your answer can you tell me the model you have to sell to me ? the price of course to buy your tdr here in france ? many thanks please contact me direct with my email agenceadi@o... david from paris 10504 From: James Greenwold Date: Wed Jan 5, 2005 6:31pm Subject: Re: Digital Cell phone scanning In days of old, (the analog days) We had software running a R7000. And could find the number we were looking for and follow the tower pass as the cell taveled along. I get ask regularily about the ability to scan a cell phone. I'm ask mostly by "foil hat club" members. But real or not the question is asked. Now, almost all phones are digital. The common answer would be that a phone could be hacked and turned into a scanner for close proximaty, but I have not seen one. So I ask you guys... How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? -- Thank you for your time James Greenwold Bureau Of Technical Services 715-726-1400 bts@t... 10506 From: J. Coote Date: Wed Jan 5, 2005 9:17pm Subject: RE: looking for a tdr David, You might find a used Tektronix 1502B, 1502C, 1503B or 1503C. These will do a good job on unenergized lines. The TDRs have some front-end voltage protection, but better to be careful. Tektronics had a protector or adapter for live lines, but I don't know the model number. The 1502 series is limited to 2,000 feet I believe but has good resolution. The 1503 series go to many times that. Another name that comes to mind is Riser-Bond. They make several TDRs. The very cheap TDRs only give basics, such as distance to open or distance to short and are unsuitable for TSCM. You might also look for companies who lease or rent test equipment. Jay -----Original Message----- From: delta [mailto:agenceadi@o...] Sent: Tuesday, January 04, 2005 6:33 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] looking for a tdr hello everybody i m looking for a little tdr portable to test telephone wire here in france what kind of product can i buy ? any reference ? someone here can help me to find this product at resonnable price ? many thanks david from paris 10507 From: Ian Wraith Date: Thu Jan 6, 2005 5:18am Subject: Re: Digital Cell phone scanning Hello James Greenwold wrote: > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of > the threat? Can the estranged husband be listening to his wife? Or is the > tech needed place it in the expert mode? With an encrypted digital cell phone systems such as GSM the threat from monitoring comes from Government agencies and there is no risk of estranged husbands listening. There are a few sites on the internet advertising GSM monitoring equipment but usually this equipment looks very suspect. I have been told there are a few digital mobile phone systems in the US which have no encryption but even with those I have yet to see any hobbyist level equipment for monitoring. Regards Ian 10508 From: Hawkspirit Date: Thu Jan 6, 2005 10:48am Subject: Sweeps needed Home sweep needed in Naples Florida Business sweep needed in Flint, Michigan If you can handle these contact me ASAP. Roger Tolces Electronic Security Co. 760-329-4404 HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] 10509 From: James M. Atkinson Date: Thu Jan 6, 2005 10:59am Subject: Warning: Don't brush teeth with toilet brush! http://www.msnbc.msn.com/id/6794153/ Warning: Don't brush teeth with toilet brush! Awards handed out for wackiest consumer warnings The Associated Press Updated: 10:15 a.m. ET Jan. 6, 2005 DETOIT - The sign on the toilet brush says it best: "Do not use for personal hygiene." That admonition was the winner of an anti-lawsuit group's contest for the wackiest consumer warning label of the year. The sponsor, Michigan Lawsuit Abuse Watch, says the goal is "to reveal how lawsuits, and concern about lawsuits, have created a need for common sense warnings on products." The $500 first prize went to Ed Gyetvai, of Oldcastle, Ontario, who submitted the toilet-brush label. A $250 second prize went to Matt Johnson, of Naperville, Ill., for a label on a children's scooter that said, "This product moves when used." No oral use A $100 third prize went to Ann Marie Taylor, of Camden, S.C., who submitted a warning from a digital thermometer that said, "Once used rectally, the thermometer should not be used orally." This year's contest coincides with a drive by President Bush and congressional Republicans to put caps and other limits on jury awards in liability cases. "Warning labels are a sign of our lawsuit-plagued times," said group President Robert Dorigo Jones. "From the moment we raise our head in the morning off pillows that bear those famous Do Not Remove warnings, to when we drop back in bed at night, we are overwhelmed with warnings." The leader of a group that opposes the campaign to limit lawsuits admits that while some warning labels may seem stupid, even dumb warnings can do good. "There are many cases of warning labels saving lives," said Joanne Doroshow, executive director of the Center for Justice and Democracy in New York. "It's much better to be very cautious ... than to be afraid of being made fun of by a tort reform group." The Wacky Warning Label Contest is in its eighth year. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10510 From: secureoffice Date: Thu Jan 6, 2005 1:39pm Subject: Re: Microphones Jim It's not my place to comment on the relationship between two people or how they behave. I was simply pointing out the fact. It was not meant as a condemnation or opposite. As a list owner you are perfectly entitled to do what you see fit. However, it's not my place to comment on who was right or wrong, and I won't. I was simply letting Mr Garrett know that he should contact Steve directly should he require his specific response. I trust the matter requires no further explanation. Kindest regards -Ois --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > Ois, > > The only time that I have ever banned or removed someone from the list is > when that person becomes extremely disruptive and rude or abusive to the > list membership, or if I catch them doing naughty, naughty things. > > Steve was indeed banned from this group a few months back, but only after > his repeat transgressions significantly exceeded his welcome and my > tolerance of his often offensive Prima Donna behavior. tripped the squelch > circuit. He was given ample time to mend his behavior for at least six > month before his being banned. > > "sapiens timet et declinat malum stultus transilit et confidit, > Proverb14:16 > > The list needs good communications, and a place where members can ask > questions and discuss all levels of TSCM from the beginner and apprentice > levels to the Technician and Engineering levels. The list exists to > improve the profession, and for no other purpose. > > Also, greetz to the list members who are going out to the Little Red School > house for the first time, enjoy the daily commute (you know who you are). > > -jma > > > > At 02:26 PM 1/5/2005, secureoffice wrote: > > > >Steve was banned from the group by the group owner, you'll need to > >email him directly if you want his opinion. > > > >Regards > > > >-Ois > > > > > >--- In TSCM-L@yahoogroups.com, "DJ" wrote: > > > > > > > > > Steve you could probably answer this one. In the movie Enemy of the > > > State (steve did a great job here), I saw many microphones used at > > > long ranges to listen into the subjects conversations. Does anyone > > > have any whitepapers or any other information on the availability of > > > microphones that will work at a distance of over 20 feet from the > > > subject? > > > > > > Thanks, > > > IT2 Garrett > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- 10511 From: Dragos Ruiu Date: Thu Jan 6, 2005 0:20pm Subject: Call For Articles: MISC Magazine - CanSecWest/core05 (Details in French Below) Win a trip to attend CanSecWest/core05. Get published in MISC Magazine. Contest Details: You just have to write an original article (3500-4000 words) for publication in MISC Magazine on any topic related to computer security: exploit writing, (anti-)virus, (anti-)forensics, network, protocol manipulation, honeypots, IDS/IPS, reverse engineering, telecoms, and so on... For a list of subjects already covered in the magazine have a look at http://www.miscmag.com/sommaire.php The best submitted article (details below) will win a free trip (airfare, hotel) and conference registration. All contest information available on http://www.miscmag.com/csw05-tc.php The conference website can be found at http://cansecwest.com The CanSecWest/core05 conference consists of tutorials on technical details about current issues, innovative techniques and best practices in the information security realm. Many famous researchers contribute each year. The attendees are a multi-national mix of professionals involved on a daily basis with security work and provide a social networking opportunity to mingle with eminent technical researchers. It will be held on May 4-6 at the Mariott Renaissance hotel in downtown Vancouver, British Columbia, Canada. MISC is a french magazine focusing on information security. Each issue features an in-depth coverage of a specific topic through a series of articles exploring the subject. Beside this key theme regular columns provide the reader with advanced techniques pertaining to information security. Because security can not be limited to technical and scientific aspects MISC also covers domains like law or information warfare. The winning article submission receives: - registration for CanSecWest/core05 donated by the conference - 4 nights in the conference hotel (Mariott Renaissance) paid for by the conference (though incidental costs are still your responsibility). - a round-trip to Vancouver (Canada), paid by Diamond Edition (the winner must have a valid passport and visa if needed) - the publication of your article in MISC, paid at the regular MISC rate (to use as spending money on your trip). The committee will select the best article which will be published in MISC Magazine. The 5 following criteria will guide the committee's choice: 1) education: how much does it teach? 2) innovation: how is it new? 3) technical level: what is the technical level of the article? 4) applicability: does it affect a lot of people? 5) style: grammar, orthography, syntax, clarity, ... More than one article may be published in MISC Magazine, but only the best one will win the trip. To have a chance to win, send article submission by email to csw05@m... along with the following information before the 29th of January 2005: 1) Author, and geographical location (country of origin/passport) and contact info (e-mail, postal address, phone, fax). We need a real name and real contact details or we won't be able to pay for the trip. 2) Employer and/or affiliations. 3) 3 to 5 keywords describing the topic of the proposal 4) The article, written either in French or English, and using the style sheets available at http://www.miscmag.com/styles/ 5) Optionally, any samples (code or whatever) related to the article. 6) The folowing declaration: I, , hereby certify that the submitted article has been written by me and that I own the intellectual property contained in it. I, , give Diamond Editions the right to publish this article in their magazines. If a submission is incomplete, the article will not be considered for the challenge. Only one submission per person is allowed - if there are multiple submissions, only the last one will be considered. Please submit all proposals by January 29 latest. Results will be communicated to the participants on the 15th February 2005. MISC Magazine : http://www.miscmag.com CanSecWest/core05 : http://cansecwest.com --------------------- CanSecWest/core05 - MISC Magazine Gagner un sÈjour pour assister ‡ CanSecWest/core05. Comment faire ? Simplement en Ècrivant un article original de 3500-4000 mots sur le thËme de la sÈcuritÈ informatique : techniques d'exploits, (anti-)virus, (anti-)forensics, manipulation de rÈseau, dÈtournement de protocoles, pots ‡ miel et autres IDS/IPS, reverse engineering, tÈlÈcoms, etc... Pour dÈcouvrir les sujets traitÈs dans MISC, vous pouvez visiter http://www.miscmag.com/sommaire.php. Tous les dÈtails sur : http://www.miscmag.com/csw05-tc.php La confÈrence CanSecWest/core05 se compose de tutoriaux sur les questions actuelles, les techniques innovatrices et les meilleures pratiques dans le domaine de sÈcuritÈ de l'information. De prestigieux orateurs y participent chaque annÈe, permettant ainsi aux auditeurs de se tenir informÈs des derniËres nouveautÈs du secteur. Elle se dÈroule du 4 au 6 Mai 2005 ‡ Vancouver (Canada). Le magazine franÁais ´ 100% sÈcuritÈ informatique ª MISC est composÈ d'un dossier traitant de maniËre approfondie d'un thËme, et de nombreuses rubriques permettant ‡ chacun de dÈcouvrir les techniques avancÈes liÈes ‡ la sÈcuritÈ de l'information. MISC traite Ègalement des domaines connexes (droit ou guerre de l'information par exemple) car la sÈcuritÈ de l'information ne se limite pas ‡ des problËmes techniques et scientifiques. Prix pour le vainqueur : - l'entrÈe ‡ CanSecWest - 4 nuits d'hÙtel ‡ l'hÙtel de la confÈrence (Mariott Renaissance) - le billet d'avion pour se rendre ‡ Vancouver, achetÈ par Diamond Edition (le vainqueur devra disposer, si besoin, d'un passeport valide et d'un visa pour le Canada) - la publication de l'article, rÈmunÈrÈ au tarif normal des auteurs de MISC, dans un numÈro ‡ venir de MISC. Le jury sÈlectionnera la meilleure proposition, qui sera ensuite publiÈe dans MISC Magazine. La barËme se dÈcompose en 5 critËres, d'importance Ègale : 1) Èducation : l'article est-il pÈdagogique ? 2) innovation : quelle(s) part(s) de nouveautÈ ? 3) technicitÈ : quel est le niveau technique de l'article ? 4) portÈe : est-ce que cela concerne beaucoup de personnes ? 5) style : orthographe, grammaire, clartÈ, ... Tous les bons articles seront susceptibles d'Ítre publiÈs dans MISC, mais seul le meilleur remportera le voyage ‡ CanSecWest. Pour participer, il faut envoyer un mail ‡ csw05@m... avec les informations suivantes avant le Samedi 29 Janvier : 1) prÈsentation : nom, prÈnom, ville/pays d'origine, nationalitÈ, contact (e-mail, adresse postale, tÈlÈphone, fax) Attention : sans ces informations, votre prix ne pourra vous Ítre remis. 2) employeur et/ou affiliation 3) 3-5 mots clÈ pour caractÈriser l'article 4) l'article, Ècrit en Anglais ou en FranÁais, et respectant les feuilles de style : http://www.miscmag.com/styles/ 5) Èventuellement, des exemples (codes ou autres) liÈs ‡ l'article 6) La mention suivante : Je soussignÈ dÈclare sur l'honneur Ítre l'auteur de l'article soumis afin de participer au concours, et que j'en dÈtiens donc les droits de propriÈtÈ intellectuelle. En cas de victoire, j'autorise Diamond Edition ‡ faire usage de mon article dans leurs publications. Tout mail incomplet invalidera la participation. Une seule participation par personne est autorisÈe. Date limite de participation : Samedi 29 Janvier 2005, date de rÈception du mail faisant foi. Liens utiles MISC Magazine : http://www.miscmag.com CanSecWest/core05 : http://cansecwest.com -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, CanadaMay 4-6 2005 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 10512 From: delta Date: Thu Jan 6, 2005 0:27pm Subject: Re: looking for a tdr many thanks jay for your help i think i m going to buy a riserbond 3300 here in france thanks to all for your help and your experience with tdr i think this mailing liste is very good david 10513 From: Lawrence Dillard Date: Thu Jan 6, 2005 3:34pm Subject: Lawrence D. Dillard This is to tell all his friends, Larry died in his sleep, sometime last night or early this morning. If you need to know more , or want to contact me, my e-mail address is cdillards@m..., 303-661-0660 Cheryle 10514 From: Hawkspirit Date: Thu Jan 6, 2005 9:00pm Subject: Sweep Needed Anyone have a portable x-ray unit for a sweep in Cincinnati Ohio? Roger Tolces Electronic Security Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 [Non-text portions of this message have been removed] 10515 From: littledog Date: Fri Jan 7, 2005 11:48am Subject: vonage? Hello, could anyone out the give me their insight on the new broadband cable phone services? Are they more or less secure and since it seems that everything is controlled through a website (or is it?) like customizing the service to a record of all incoming and outgoing calls, are they vulnerable to hackers? I'm new and still in the little red schoolhouse..thanx 10516 From: Agent Geiger Date: Fri Jan 7, 2005 6:15pm Subject: Re: vonage? I have been using the service for several months with no problems. --- littledog wrote: > > Hello, could anyone out the give me their insight on > the new broadband cable phone services? Are they > more or less secure and since it seems that > everything is controlled through a website (or is > it?) like customizing the service to a record of all > incoming and outgoing calls, are they vulnerable to > hackers? I'm new and still in the little red > schoolhouse..thanx > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10517 From: James M. Atkinson Date: Fri Jan 7, 2005 6:43pm Subject: Re: vonage? The quality of the audio tends to be less then that of a hard wired dedicated phone line with annoying echo's and barrel effect audio. Security is another question... because there is none. -jma At 12:48 PM 1/7/2005, littledog wrote: >Hello, could anyone out the give me their insight on the new broadband >cable phone services? Are they more or less secure and since it seems that >everything is controlled through a website (or is it?) like customizing >the service to a record of all incoming and outgoing calls, are they >vulnerable to hackers? I'm new and still in the little red schoolhouse..thanx ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10518 From: Agent Geiger Date: Fri Jan 7, 2005 8:51pm Subject: Re: vonage? There is no real security on ANY phone line. However, my line quality has been just as good a traditional landline. It depends on the quality of your Internet connection. The number can also have ANY area code and is very portable. Not to mention, is very cheap. --- "James M. Atkinson" wrote: > > The quality of the audio tends to be less then that > of a hard wired > dedicated phone line with annoying echo's and barrel > effect audio. > > Security is another question... because there is > none. > > -jma > > > > At 12:48 PM 1/7/2005, littledog wrote: > > > >Hello, could anyone out the give me their insight > on the new broadband > >cable phone services? Are they more or less secure > and since it seems that > >everything is controlled through a website (or is > it?) like customizing > >the service to a record of all incoming and > outgoing calls, are they > >vulnerable to hackers? I'm new and still in the > little red schoolhouse..thanx > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10519 From: David Kervin Date: Fri Jan 7, 2005 6:17pm Subject: Technical Surveillance Countermeasure Personnel Technical Surveillance Countermeasure Personnel General Information Document Type: Presolicitation Notice Solicitation Number:HQ0095-05-R-0012 Posted Date:Jan 06, 2005 Original Response Date:Jan 24, 2005 Current Response Date:Jan 24, 2005 Original Archive Date:Feb 08, 2005 Current Archive Date:Feb 08, 2005 Classification Code:R -- Professional, administrative, and management support services Set Aside:Total Small Business Naics Code:561611 -- Investigation Services Contracting Office Address Other Defense Agencies, Washington Headquarters Services, Acquisition and Procurement Office, Acquisition and Procurement Office, RDF, Room 1F1K711B 1155 Defense Pentagon, Washington, DC, 20301-1155 Description The contractor shall provide personnel that are Agilent certified to perform duties of management, coordination, and operation of advanced radio frequency monitoring equipment. The contractor will be responsible for the analysis of all signal data collected. Duties shall include the configuration of equipment to optimize performance, maintenance of a Windows 2000 network server, investigative data analysis, database management, advice and assistance for system development from software packages used to assist in collection and analysis. The contractor shall resolve any anomalies the system may detect and provide monthly progress reports of the systems development to the PFPA Technical Security Program Manager. The contractor shall provide quarterly status briefings to senior Department of Defense executives, policy and decision makers. This requirement will be solicited as a sole source requirement to Vector Technologies, LLC. The NAICS code associated with this requirement is 561611. Point of Contact Patricia Hill, Contract Specialist, Phone 703 614 6354, Fax 703 692 0811, Email patricia.hill.ctr@w... - Jeraline Artis, Procurement Analyst, Phone (703) 697 4350, Fax (703) 692 4091, Email jeraline.artis@w... Place of Performance Address:Pentagon Force Protection Agency 9000 Defense Pentagon, Room 4E139 Washington D.C. Postal Code:20301 [Non-text portions of this message have been removed] 10520 From: dj Date: Fri Jan 7, 2005 7:49pm Subject: Re: vonage? Vonage/Lingo/Primus .. basically all work the same way. The voice quality is a little less because of the compression but these type of q's are right up my alley. I work as a technology consultant and have been working with Voice Over IP for sometime now. The calls are not encrypted by no means and are vulnerable to about any type hack. The boxes that control these are similar in nature to cisco's voip but different in the fact that they provide a client with a dial tone on the down side of the box. The boxes have a mac address and obtain a ip through a dchp server. The big problems with them is that with NAT they tend to loose their stay alive signals. Lets say that the call generates on port 5060 and then another call comes in to the box via call waiting. NAT will migrate that port to lets say 17500 and keep the orginal call at that port. That port is migrated at your local router and not on the service providers end. So the keep alive signal ... (really just a packet) that says that this call shouldn't be disconnected is send to the box at port 5060 and cannot find an active conversation because you hung up with your 3rd party. So the system disconnects you. Also about 9 minutes into a call they boxes all seem to migrate with NAT to a new port number due in part to trying to free up lower level port numbers for use by local apps. Using Cain and Able a program that is readily available you can simply enumerate the MAC and IP of the local box and then using a port scanner see which port it is operating on. Solar Winds does this with no problem but there are a million port scanners and network analyzer/sniffers that one can use. If one does not password protect and encrypt the password of the administration side of the boxes it is simple to take control of ones box. As for putting the packets back together to generate the original call. Well I haven't found a program that will do that very well but let me know if you do. v/r, IT2 Garrett --------------------------------- Do you Yahoo!? Yahoo! Mail - You care about security. So do we. [Non-text portions of this message have been removed] 10521 From: Michael Puchol Date: Sat Jan 8, 2005 4:07am Subject: Re: vonage? Hi, A couple of months ago a phreaker demonstrated that you can give yourself any caller ID you want if you have a Vonage account, at least for a while. He simply called Vonage and gave them the number of a well-known TV actor, and told them it was his landline number, if they could link the caller ID of his VoIP account to this number. Amusingly, they complied without any questions, and he now could make calls using the actor's caller ID, and all calls made on the Vonage network to the actor's phone would be re-routed to the phreaker's VoIP phone. Vonage's comments were that yes, they would put any caller ID a costumer requests, it could even be President Bush's phone number (yes, they did say this!), and then do a check with the phone company involved, which could take some two weeks. So for two weeks you could make phone calls pretending to be anyone you want. Doesn't say much for them IMHO... Regards, Mike 10522 From: Tech Sec Lab Date: Sat Jan 8, 2005 7:49am Subject: RE: Technical Surveillance Countermeasure Personnel Does anyone have any info or experience regarding the Agilent certification? Please respond off list, Kind regards -Ois ******************************************** Message: 5 Date: Sat, 8 Jan 2005 02:17:12 +0200 From: "David Kervin" Subject: Technical Surveillance Countermeasure Personnel Technical Surveillance Countermeasure Personnel General Information Document Type: Presolicitation Notice Solicitation Number:HQ0095-05-R-0012 Posted Date:Jan 06, 2005 Original Response Date:Jan 24, 2005 Current Response Date:Jan 24, 2005 Original Archive Date:Feb 08, 2005 Current Archive Date:Feb 08, 2005 Classification Code:R -- Professional, administrative, and management support services Set Aside:Total Small Business Naics Code:561611 -- Investigation Services Contracting Office Address Other Defense Agencies, Washington Headquarters Services, Acquisition and Procurement Office, Acquisition and Procurement Office, RDF, Room 1F1K711B 1155 Defense Pentagon, Washington, DC, 20301-1155 Description The contractor shall provide personnel that are Agilent certified to perform duties of management, coordination, and operation of advanced radio frequency monitoring equipment. The contractor will be responsible for the analysis of all signal data collected. Duties shall include the configuration of equipment to optimize performance, maintenance of a Windows 2000 network server, investigative data analysis, database management, advice and assistance for system development from software packages used to assist in collection and analysis. The contractor shall resolve any anomalies the system may detect and provide monthly progress reports of the systems development to the PFPA Technical Security Program Manager. The contractor shall provide quarterly status briefings to senior Department of Defense executives, policy and decision makers. This requirement will be solicited as a sole source requirement to Vector Technologies, LLC. The NAICS code associated with this requirement is 561611. Point of Contact Patricia Hill, Contract Specialist, Phone 703 614 6354, Fax 703 692 0811, Email patricia.hill.ctr@w... - Jeraline Artis, Procurement Analyst, Phone (703) 697 4350, Fax (703) 692 4091, Email jeraline.artis@w... Place of Performance Address:Pentagon Force Protection Agency 9000 Defense Pentagon, Room 4E139 Washington D.C. Postal Code:20301 [Non-text portions of this message have been removed] 10523 From: Hawkspirit Date: Sat Jan 8, 2005 0:51pm Subject: TSCM History For those of you who collect TSCM history http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=73336&item=5741413404 &rd=1 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.825 / Virus Database: 563 - Release Date: 12/30/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] 10524 From: Brian Varine Date: Sat Jan 8, 2005 7:35am Subject: Vonage/VoIP ----- Original Message ----- From: To: Sent: Saturday, January 08, 2005 5:21 AM Subject: [TSCM-L] Digest Number 1787 > Hello, could anyone out the give me their insight on the new broadband > cable phone services? Are they more or less secure and since it seems that > everything is controlled > through a website (or is it?) like customizing > the service to a record of all incoming and outgoing calls, are they > vulnerable to hackers? I'm new and still in the little red > schoolhouse..thanx Most VOIP providers are not "secure" but then again, neither are hardwired phones. All VoIP providers are using well known protocols for signalling and codecs so it's not difficult to tap a call. If the attacker can see the packets, they can decode the voice. There is a new VoIP freeware detector and recorder called VoIPong that works off Linux (http://www.enderunix.org/voipong/), it handles G.711 (64k) and they are looking to support G.723 and G.729 (8k). The other part of VoIP to secure is the call manager system. Most vendors are using standard Windows 2000/Windows 2003 Servers so security can vary from non-existant to really good, it all depends. I would ass*u*me companies like Vonage have good security on their call management systems since all of their services are directed at Internet users. I have audited some enterprises with VoIP systems and the security is typically not very good. Their rationale is they are "protected" by a firewall so why secure/harden the servers. A lot don't realize that if their network gets bombed (ala Nimda/Code Red/SQL Slammer), they lose their phone service. A few enterprises fortunately have done it right..secure servers on a protected subnet with the voice traffic going over separate VLAN's and wire. 10525 From: savanted1 Date: Sat Jan 8, 2005 1:46pm Subject: Comments Dear, Esteemed Group Members I have just formed the TICSA Study group on Yahoo. Please by all means feel free to join and participate in educating yourself towards ascertaining the TICSA Certified Associate credential. Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Regards, 10526 From: Date: Sat Jan 8, 2005 11:34am Subject: Security Considerations For VOIP Systems January 2005 http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:11am Subject: Counter-intelligence entity formed Counter-intelligence entity formed http://www.dawn.com/2001/01/06/int11.htm WASHINGTON, Jan 5: President Bill Clinton has ordered the creation of a special entity to make US counterintelligence more responsive to new threats unlike Cold War "cloak and dagger" spy challenges, the White House said on Friday. "A threat today can as easily come from a laptop as it could from an old, cloak-and-dagger spy, and we need a counterintelligence capability that matches that new globalized reality," said Clinton spokesman Jake Siewert. A counterintelligence "czar," will head the special board, comprising top CIA, FBI and Defence Department officials, and will be charged with taking a forward-looking approach to safeguarding the nation's secrets. The move aims to "to create a process through which the agencies that are charged with responsibilities for counterintelligence ... can work together in a way that's more coordinated and looks at new threats, assesses them and decides how to protect our secrets," according to Siewert. "We've moved into a world in which threats are more diverse and diffuse, and we need a counterintelligence capacity that recognizes the realities of the changing world," said the official. The spokesman cited the threat posed by cyber-warfare, pointing to high-profile computer viruses spread globally last year. Siewert said President-elect George W. Bush, who takes office January 20, would likely appoint the first "czar" to head the board. But the Republican could also decide to reverse the order.-AFP -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2253 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:14am Subject: Former Cuban spy testifies against ex-allies on trial Former Cuban spy testifies against ex-allies on trial http://www.miamiherald.com/content/today/news/americas/carib/cuba/digdocs/102513.htm Published Saturday, January 6, 2001, in the Miami Herald Man gives agents' techniques, efforts to infiltrate Pentagon's Southern office BY GAIL EPSTEIN NIEVES gepstein@h... Avoiding eye contact with his former associates, an acknowledged former Cuban intelligence agent gave jurors a quick training course in spying Friday. He was the first witness to testify about personal in-the-field involvement with any of the five accused spies on trial. Joseph Santos, 40, looked toward the defendants only once when he identified accused spy Gerardo Hernandez. Santos said Hernandez was a Miami-based Cuban ``illegal officer,'' or ranking intelligence agent, who in 1995 assigned Santos and his wife, Amarylis, their primary mission: to infiltrate the Southern Command. Prosecutors contend that Havana was intent on penetrating the Pentagon's Southern Command headquarters, which directs U.S. military operations in Latin America and the Caribbean. Southcom announced its move to Miami from Panama in March 1995. Santos and his wife are already serving prison terms after pleading guilty to one count of conspiracy to act as a foreign agent. Their terms are likely to be cut short for their help testifying against Hernandez, who prosecutors say conspired with the Cuban military to murder four Brothers to the Rescue fliers in 1996. Santos was born in New Jersey to Cuban parents who later returned to Cuba. He became a university professor in electrical engineering and was recruited by the Directorate of Intelligence in April 1984, he said. His wife joined later. In 1986, he began ``basic training to work as an intelligence agent'' in Santa Clara. As his agent name, he chose Mario. His wife chose the name Julia. She was sentenced to 42 months in prison. Testifying through an interpreter, Santos said he was trained in all aspects of intelligence gathering, from how to penetrate an organization to how to photograph documents and handle them without leaving fingerprints. He also learned techniques for countersurveillance, recruitment, creating microdots, interpreting Morse code shortwave radio broadcasts, running computer encryption programs and how to pass findings to his fellow agents. The most sought-after morsels? ``Any information that might be classified, restricted or secret,'' he said. A frequent recruitment technique, especially overseas? Not telling the whole truth: ``Quite often the fact that they're working for Cuba is omitted,'' he said. Santos said agents were given a ``communications plan'' that designated permanent meeting places for different scenarios they might encounter. If he somehow lost contact with his handler, for instance, he was to go to the Driftwood Motel at 17121 Collins Ave. in Miami Beach and an intelligence officer would meet him. Santos' testimony was no surprise to the defense. His entire training history was outlined on computer disks that the FBI seized during their investigation of the spy ring. The contents fill three huge volumes that have been provided to jurors. In November 1995, Santos said, he was introduced to Hernandez during a meeting at the Pollo Tropical at Northwest 57th Avenue and Seventh Street. Hernandez -- who used a different name -- directed the Santoses to conduct research comparing FedEx, United Parcel Service and U.S. Postal Service because Cuba's intelligence headquarters was looking for new ways to transport its agents' encrypted computer diskettes. But Hernandez told the couple that their main mission was to penetrate the Southern Command by getting jobs there. They failed at that assignment, though at their sentencing hearing, prosecutors said the couple filed at least one ``detailed'' report on the Southcom headquarters complex in western Miami-Dade County. Prosecutors have said the Santoses were among the least culpable of 14 people indicted in 1998 after a major counterintelligence investigation into the so-called Cuban Wasp Network, La Red Avispa. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2254 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:16am Subject: Newly Created Spy Czar to Help U.S. Modernize Security Efforts Newly Created Spy Czar to Help U.S. Modernize Security Efforts http://www.latimes.com/news/nation/20010106/t000001491.html Espionage: Clinton's order envisions an updated counterintelligence system. It is backed by the CIA and FBI, and Bush is also expected to support it. From Associated Press WASHINGTON--President Clinton has signed an order creating a national counterintelligence executive to oversee the government's efforts to protect its most vital national security secrets, administration officials said Friday. The new executive will have a four-member board composed of the director of the FBI, the deputy secretary of Defense, the deputy director of the CIA and a Justice Department representative. White House spokesman Jake Siewert said Clinton took the action to help adapt U.S. counterintelligence efforts to a post-Cold War era "in which danger could come just as easily from a laptop [computer] and not the traditional cloak-and-dagger spies." "The old system was designed to counter intelligence threats that came from our adversaries in the Cold War," Siewert said. "Now you're in a new era where those threats are not quite as centrally localized and you need a more integrated system." Siewert said that, although the incoming Bush administration could reverse Clinton's decision, that looks doubtful since it is strongly supported by the CIA, the FBI and other agencies involved in counterintelligence matters. He said national security advisor Samuel R. "Sandy" Berger had briefed his anticipated successor, Condoleezza Rice. "They can undo it, but this is not a partisan issue," Siewert said. The organization will reside at CIA headquarters and will replace the CIA's National Counterintelligence Center, according to an administration official who discussed the matter in advance of the White House announcement. The center was created in 1994 after the arrest of Aldrich H. Ames, a longtime CIA officer convicted of spying for the former Soviet Union. The existing counterintelligence center at the CIA focuses on known, suspected or potential intelligence losses. The new organization will take a broader, more forward-looking approach. Siewert said it is unlikely Clinton will name the executive before he leaves office Jan. 20. Before the Ames case, which was one of the worst intelligence disasters in CIA history, the FBI and other government agencies had their own counterintelligence operations, but there was no central, government wide office in charge of protecting secrets. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2255 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:17am Subject: Philippines: 'Bugging' witness a no-show Philippines: 'Bugging' witness a no-show http://www.philstar.com/philstar/news200101060417030.htm 1/6/01 Senators suspended yesterday investigation on the alleged wiretapping and spying operations of the Presidential Anti-Organized Crime Task Force (PAOCTF) after a police official failed to appear at the hearing. Majority Floor Leader Francisco Tatad told reporters yesterday he had moved for a suspension of the investigation because the Senate had not heard from the unnamed police official, who had earlier promised to testify. "We had to suspend the investigation because next week our schedule will be full with the opening of the special session," Tatad said. Senate Secretary Lutgardo Barbo told reporters yesterday the police officer, who he identified only as "Mendoza," had sent feelers that he would like to testify to shed light to allegations that PAOCTF agents had bugged the phones of senators and other government officials. "I am not at liberty to give details but what I learned is that he was volunteered by somebody," he said. Yesterday, Chief Justice Hilario Davide Jr., impeachment court presiding officer, ordered to be make public the testimony of Lt. Col. Disocoro Reyes, PAOCTF chief technical officer, at an executive session of the court,, Earlier, Reyes told the impeachment court that PAOCTF has acquired P60 million worth of electronic surveillance equipment to monitor the operations of criminal syndicates. However, Reyes said that he can only testify about the details in an executive session because the matter is classified and involves national security. Tatad said he saw "nothing secret" about the documents presented by Reyes at the executive session because these contained details on a Kodak 200-mm. digital camera and other electronic surveillance equipment. Last Thursday, Senate President Aquilino Pimentel Jr. informed the impeachment court that a police officer is willing to testify that the senators had been placed under surveillance and that their telephones had been bugged. Pimentel told reporters he would not identify the witness until he had appeared before the Senate and revealed everything he knows about the alleged bugging operation. "I just told the court there is another police officer who is reportedly willing to testify openly that there was such a bugging of senators. If he is available tomorrow he will testify, if not maybe the following day," he said. ≠ Perseus Echeminada -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2256 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 11:23am Subject: TV Recorders Take Quantum Leap TV Recorders Take Quantum Leap by John Gartner 2:00 a.m. Jan. 6, 2001 PST http://www.wired.com/news/technology/0,1282,40493,00.html?tw=wn20010106 LAS VEGAS -- The second generation of personal video recorders (PVR) could give you a better view of football games than if you were on the 50-yard line. At this week's Consumer Electronics Show (CES), hard drive maker Quantum is demonstrating a video system that will enable set-top boxes, televisions, gaming consoles and satellite TVs to provide multiple camera angles, new instant replay features and even more programming. Personal video recording will be one of the many television-computing convergence technologies at CES, which runs through Tuesday. Quantum's (HDD) QuickView IEEE 1394 DVR Subsystem, which was announced earlier this week, extends the VCR-like programming and navigation features made popular by companies such as TiVo and ReplayTV by expanding the storage capacity and adding enhanced streaming video and file management technology. Quantum has added customized software for file management, which controls multiple real-time streams simultaneously and receives television programming schedules to its hard disk technology that was originally developed for PCs, according to Bentley Nelson, director of strategic marketing at Quantum. Nelson said broadcasters will develop new services that will distribute multiple audio- and videostreams in the background for later playback on Quickview-enabled recorders. For example, satellite TV broadcasters can send images from multiple camera angles during a live sporting event or concert into a buffer on their PVR. Fans will be able to select a variety of instant replay views, while the live feed continues to be received by the players. Nelson said that pay-per-view broadcasters could similarly stream multiple movies over a single channel, and customers would then choose any movie to playback at a time of their choosing. Quantum hard drives are used in the majority of PVR systems, including those from TiVo, ReplayTV and DirecTV. Panasonic is the first consumer electronics company to license the Quickview technology, and Nelson expects the first devices to hit store shelves within 6 months. Devices will likely include 40 gigabytes of storage, and Nelson expects that capacity to double within 14 months. Nelson said that PVRs are replacements for VCRs, CD changers, set-top boxes and satellite receivers, and the overall market could be twice that of PC hard disks. According to research firm IDC, the market for PVRs will continue will grow to 14 million units sold per year by the year 2004. Nelson said Quickview works with "5C Content Protection," a copyright technology used in encoding movies. Quickview also supports the 1394 Function Control Protocol that enables multiple devices to be daisy-chained to create an "unlimited" audio or video archive, Nelson said. Other top PVR competitors that will be showing off new products at CES will include Microsoft, TiVo, DirecTV and America Online. Microsoft chief Bill Gates will deliver the Opening Keynote address at CES on Saturday, when he is expected to unveil the much anticipated Xbox gaming console. He will likely demonstrate Microsoft's latest iteration of the WebTV platform, which like the Quantum system, creates an integrated media management platform that links to the TV. Thomson Multimedia has integrated WebTV's Ultimate PC service into its RCA-DIRECTV DWD490RE system, which will be unveiled at CES. The digital satellite TV receiver combines DIRECTV programming, digital video recording, interactive TV and Internet access with a hard disk-based recorder. The system has two digital tuners, enabling viewers to record two shows at the same time or watch one show while recording another. During his Monday morning keynote, Barry Schuler, president of America Online's (AOL) interactive services group, will talk about the company's AOLTV initiative that provides access to the their popular Internet services through set-tops and PVRs. Motorola (MOT) will unveil its Streamaster 5000T set-top box, which will be sold by telecommunications carriers and combines voice, video and data services through Digital Subscriber Line (DSL) connections. Blockbuster announced this week they will use the Streamaster boxes to deliver movies on demand in Portland, Oregon, and Salt Lake City. Other new product areas that will be featured at CES are Bluetooth wireless devices, advances in home networking and portable MP3 players, and components for the digital car such as satellite radios and telematics products. Copyright © 1994-2001 Wired Digital Inc. All rights reserved. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2257 From: Date: Sat Jan 6, 2001 6:48am Subject: Tour The Former NSA Site Pisgah Astro Research Institute Site Tour or http://www.pari.edu/ 2258 From: Edward J. Michaels Date: Sat Jan 6, 2001 8:59am Subject: New to the list My name is Ed Michaels and I am Director of Investigations for General Security Systems, Inc., surveillance & investigations division known as GSSI. We are a 26 year old licensed private detective agency in MD, NJ & PA with corporate offices in our own building located at 1339 Brandywine Street in Philadelphia, PA. We have branch offices located in St. Claire PA, Maplewood NJ, Woodbury NJ and Tinicum, MD. My own background includes over 30 years in private security and investigation as well as public law enforcement and safety. I am not a retiree from law enforcement or public safety as I do not play politics well. I have invested 8 years of my carrier to labor strife security and 13 to defense investigation, surveillance and counter surveillance for corporate America, attorneys, insurance carriers and self insurers. [Non-text portions of this message have been removed] 2259 From: Jason Miles Dibley Date: Sat Jan 6, 2001 0:00pm Subject: Re: New cameras focus on fuel bandits In answer to the question raised regarding the feasibility of a camera to read a tax disc attached to a vehicle. The simple answer is that it doesn't. The cameras in these systems reads the number plate of the vehicle, that acquired image of the number plate is then checked against a number of lists that are loaded into the computer onboard the number plate reading system. These lists will be vehicles wanted by police, customs, security services, etc. Included on this computer will be an current list of all unlicensed vehicles in that area. This list will have come from the Vehicle licensing agency in Swansea (wales). As the system reads the number plate, if it appears on anyone of the lists then an activation will occur alerting the operators what the interest in the vehicle is. They will then stop and approach the vehicle and deal with it accordingly. So it's not that clever really just a shuttered CCD camera that acquires an image illuminated by pulsed infra-red light (so it can operate in the dark), of the vehicle number plate. The ANPR (Automatic Number Plate Recognition) software will then work out what letters and numbers appear on the plate. Once this is done it simply checks the number against the lists that have been loaded into the system. If the plate appears on the system that the machine shouts at the operators. Who will take the appropriate action. I hope this answers your question. Signed J M Dibley QCC Interscan Ltd. ************************************************************** Please visit our associates Web site at http:\\www.qcc.co.uk You can view our digitally signed reports and other documents using Adobe Acrobat Version 4 or greater. You can obtain this for free from the following web site: http://www.adobe.co.uk/products/acrobat/readstep.html This message is intended only for the use of the person(s) to whom it is addressed. It may contain information which is privileged and confidential or material which is protected under attorney-client privilege. In addition, this message may not necessarily represent the views of QCC. Accordingly any unauthorised use is strictly prohibited. If you are not the Intended Recipient, please contact QCC Interscan Ltd as soon as possible or send mail to contact@q.... QCC Information Security Ltd. Registered in England and Wales No. 03773029 ----- Original Message ----- From: "Craig Snedden" To: Sent: Friday, January 05, 2001 2:36 PM Subject: Re: [TSCM-L] New cameras focus on fuel bandits > I can see that a recognition system would be able to pick up the pre-printed > portion of the tax disc and the colour (different colours for different > validity periods), which may catch out quite a number of defaulters, but in > my experience, only an inspection with the "mark one eyeball" will ascertain > if the handwritten portion (the vehicles details) has been tampered with or > not. > > It is a common method of alteration for a stolen tax disc to be treated with > a substance to fade or remove the pen ink, then fill in the details for the > car that it is going to be displayed on. Such alterations are easily > spotted by close visual inspection and touching the disc, but I can't see a > camera system being able to pick up on these. > > I'm sure the Government "boffins" will be looking at an RF device (passive > or active) embedded in the vehicle which will be validated by some means and > if invalid will send out a signal to static speed cameras, police cars etc. > > This raises questions of civil rights and freedom of movement....... > > Local authorities in the U.K. have just been given powers to raise revenue > from taxing vehicles entering certain areas, commonly city centres, > supposedly in a move to combat congestion. The U.K. has just recently > adopted the European Convention of Human Rights. Does the imposition of a > tax on my freedom of movement on the public highway, when there is no > alternative route to my destination, not impose on my Human Rights? > > I know our cousins in the US have been tackling these sorts of questions for > years now. Any comments? > > Sorry this got a bit off topic, but in a way it's still to do with > surveillance..... ;-) > > Craig > > ----- Original Message ----- > From: "Talisker" > To: "TSCM-L Mailing List" ; "James M. Atkinson, > Comm-Eng" > Sent: Thursday, January 04, 2001 6:22 PM > Subject: Re: [TSCM-L] New cameras focus on fuel bandits > > > I saw a TV programme on this recently, and know that the number plate > > reading is working well, however, I really can't see that reading the tax > > disc is feasible, in the UK the lettering is just over an inch tall and on > > top off hard to copy colouring making the letter outline difficult to > read, > > add to this that the disc is displayed inside the windscreen at a variety > of > > positions and angles. Also the disc is displayed in a portion of the > > windscreen outside the coverage of the wipers. > > > > Any opinions from the CCTV geeks out there? Oh and the range from camera > to > > windcreen is 10,s of metres > > > > Andy > > http://www.networkintrusion.co.uk > > Talisker's Network Security Tools List > > ''' > > (0 0) > > ----oOO----(_)---------- > > | The geek shall | > > | Inherit the earth | > > -----------------oOO---- > > |__|__| > > || || > > ooO Ooo > > talisker@n... > > > > The opinions contained within this transmission are entirely my own, and > do > > not necessarily reflect those of my employer. > > > > > > > > > > > > ----- Original Message ----- > > From: "James M. Atkinson, Comm-Eng" > > To: "TSCM-L Mailing List" > > Sent: Thursday, January 04, 2001 12:19 AM > > Subject: [TSCM-L] New cameras focus on fuel bandits > > > > > > > > New cameras focus on fuel bandits > > > > http://www.thisislondon.co.uk/dynamic/news/story.html?in_review_id=347661 > > > > by David Williams, > > Motoring Editor > > > > Twenty-four surveillance is being launched by police at London filling > > stations to combat a huge rise in the number of people stealing fuel - > > following a year of sharp petrol price rises. > > > > Up to £2 million worth of fuel is now being stolen from forecourts in the > > capital every month. Motorists are driving off with up to £60 of fuel at a > > time, although the average haul in London is £26. > > > > The boom in "drive-offs" has doubled since the problem was reported in the > > summer, when 1,200 garages within the M25 were losing between £750,000 and > > > £1 million every month. > > > > Then the British Oil Security Syndicate (Boss) said thousands of > drive-offs > > were occurring every four weeks. Nationally the crisis cost petrol > retailers > > at least £11.2 million last year. > > > > New Year figures, however, are expected to show a doubling in drive-offs > in > > the past eight months, and police say the crimewave is nationwide. > > > > Now the Met has begun fighting back by installing high-resolution spy > > cameras linked to a powerful mobile police computer, and arrests have > > already been made. The computer reads every car number plate entering a > > forecourt and checks them against lists of known offenders who have > > previously been reported to police following drive-offs. > > > > Police also programmed the computer to issue an alert if it spots vehicles > > involved in other crimes or with no valid tax disc. > > > > In most cases offenders are approached by plain-clothes officers before > they > > drive off. Backed by the oil industry, the operation was launched secretly > > at 30 south London forecourts and is expected to spread throughout London > > before going nationwide. Detective Inspector Larry Lawrence said: "The > > computer works in the blink of an eye and has proved very successful. > > > > "We are pleased to be working with Boss to tackle forecourt crime. The > > figures are quite high but this type of crime is preventable. > > > > "We believe the pattern we have found in south London reflects a > London-wide > > problem." > > > > Tom Sterling, Boss chief, said: "The habitual drive-off offender is the > tip > > of the iceberg as forecourt crime goes. People who do this normally engage > > in other crimes too." Earlier this year Boss reported that since 1998 > credit > > card fraud at filling stations across Britain leapt from £12.2 million to > > £19 million. > > > > Drivers claiming to have "forgotten their wallet" and driving off rose to > £5 > > million this year. > > > > Police also urged oil firms to install barriers at petrol station > > forecourts. They feel that with further rises in the cost of petrol, > > drive-offs will continue to soar. > > > > In January 2000 a litre of unleaded cost 72.9p a litre. Now it is around > > 77.9p. > > > > -- > > > > ======================================================================= > > Sed quis custodiet ipsos Custodes? > > "In a time of universal deceit, telling the > > truth is a revolutionary act" - George Orwell > > ======================================================================= > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > ======================================================================= > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Technical Security, and Counterintelligence Site on the Internet. > > ======================================================================= > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2260 From: Jordan Ulery Date: Sat Jan 6, 2001 10:04pm Subject: Re: Digest Number 475 Florida has an extensive web site that may answer your question. You may also wish to direct the question to PI-Digest for comment from PIs from FL. Message: 3 > Date: Wed, 3 Jan 2001 21:34:36 -0500 > From: "Gerard P. Keenan" > Subject: FL licensing for security/Brad Robinson 2261 From: James M. Atkinson, Comm-Eng Date: Sat Jan 6, 2001 10:52pm Subject: Book Recommendation - Spooked: Espionage in Corporate America Good evening, Here is another book that I think list members will find really interesting as it is right on target as to what we are all about, and what we do to stop or at least neutralize technical espionage. It's also a good book to give to potential customers along with your business card, and a company brochure regarding your TSCM and bug detection services. One of the authors is actually a list member, and at least one list member is quoted in several cases. Spooked: Espionage in Corporate America Adam L. Penenberg Marc Barry Barnes and Noble Price: $20.80 (20% Discount) Retail Price: $26.00 In-Stock: Ships 2-3 days Format: Hardcover, 288 pp. ISBN: 0738202711 Publisher: Perseus Publishing Pub. Date: December 2000 You can order it directly on the Barnes and Noble website by clicking on the following link... and let me know what you think after you read it. http://barnesandnoble.bfast.com/booklink/click?sourceid=324303&bfpid=0738202711&bfmtype=BOOK -------------------------------------------------------------------- List members should also know that the classic eavesdropping movie "The Conversation" was recently released on DVD, and this movie is something every TSCM'er should have. It is rumored that the movie was actually based on the experiences of one of the members of this list. The Conversation Francis Ford Coppola, Gene Hackman, John Cazale, Allen Garfield http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0097360230741&bfmtype=dvd Barnes and Noble Price: $24.99 (16.6% Discount) Format: Wide Screen / Dolby 5.1 / Surround Sound Region Code: 1 Original release date: 1974 Video/DVD Release Date: 12/12/2000 UPC: 97360230741 PARAMOUNT Includes: Production and Technical Notes: Aspect Ratio: 1.85.1 Presentation: Wide Screen Sound: Dolby Digital, Surround Sound Language: English, FranÁais Subtitles: English Time: 1 Hour 53 Minutes or if you prefer a VHS cassette version: http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0097360230789&bfmtype=dvd Barnes and Noble Price: $12.99 (13.3% Discount) In Stock: 24 hours (Same Day) Original release date: 1974 UPC: 97360230789 PARAMOUNT -------------------------------------------------------------------- There was a recent variation of the above movie, which also had Gene Hackman in it (playing a character very similar to that he played in "The Conversation"), and it is a MUST HAVE for anybody in the TSCM or technical security professions. On an added note two list members were technical consultants to the movie. Enemy of the State Tony Scott, Will Smith, Gene Hackman, Jon Voight http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0717951001634&bfmtype=dvd Barnes and Noble Price: $24.99 (16.6% Discount) In Stock: 24 hours (Same Day) Format: Wide Screen / Dolby 5.1 Region Code: 1 Rating: Original release date: 1998 Video/DVD Release Date: 6/15/1999 UPC: 717951001634 WALT DISNEY VIDEO Includes Production and Technical Notes: Aspect Ratio: 2.35:1 Presentation: Wide Screen Sound: Dolby Digital Features: Closed Caption, movie trailer, featurette, Language: English, FranÁais Time: 2 Hours 12 Minutes or if you prefer a VHS cassette version: http://service.bfast.com/bfast/click?bfmid=2181&sourceid=324303&bfpid=0786936091526&bfmtype=dvd Barnes and Noble Price: $12.99 (13.3% Discount) In Stock: 24 hours (Same Day) Original release date: 1998 Video/DVD Release Date: 11/2/1999 UPC: 786936091526 WALT DISNEY VIDEO -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2262 From: James M. Atkinson, Comm-Eng Date: Mon Jan 8, 2001 9:24am Subject: Pentagon Traffic Jam A Marine colonel, on his way home from work at the Pentagon, came to a dead halt in traffic and thought to himself, "Wow, this traffic seems worse than usual. Nothing's even moving." The colonel noticed a police officer walking back and forth between the lines of cars, so he rolled down his window and asked, "Officer what's the hold up?" The officer replied, "The President is just so depressed about the thought of moving with Hillary to New York that he stopped his motorcade in the middle of the Beltway and he's threatening to douse himself in gasoline and set himself on fire. He says his family hates him and he doesn't have the money to pay for the new house. We're taking up a collection for him." Oh really? How much do you have so far?" " About three hundred gallons, but a lot of folks are still siphoning." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2263 From: Elliott & Associates, Ltd. Date: Mon Jan 8, 2001 0:01pm Subject: The Conversation A couple of weeks back there was some discussion about the movie The Conversation with Gene Hackman. A comment was made to the effect that it was rumored that the movie was based on the life of a TSCM list member. The facts are that the movie was patterned after the life of Hal Lipset who was a PI in San Francisco for years. In fact Hal Lipset served as an advisor on the movie. Hal Lipset died a couple of years back, but was playing with recording/video devices up to the end. In the mid 60s Hal Lipset was one of several people who testified before Congress about eavesdropping devices, bugging, etec. Up to this point (60s) there had been no federal law prohibiting use of bugging devices. Hal got national attention because of his Martini Olive bug which was really a toy and good for 10 to 20 feet and that was if it hadn't been eaten The Martini Olive bug should not be confused with the Vagina transmitter designed by Winston Arrington. The Vagina transmitter will go 500 feet or better to a receiver. Just setting the record straight. Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com 2264 From: 1RCM <1RCM@M...> Date: Mon Jan 8, 2001 5:55pm Subject: Information Needed Hi List, I'm looking for any list member who might be located in the Boise, ID. area. I'm contemplating an equipment deal with an individual at that location and would be interested in any possible local reputation information and/or paying for someone's time to have them check the piece before I buy it. The items' cost isn't that extravagant but still is far more than I care to lose blindly. Please respond directly and off-list. Thanks, Bob 1RCM@M... 2265 From: Ray Fitgerald Date: Mon Jan 8, 2001 6:34pm Subject: Re: The Conversation One of my favorite movies.I have two copies. Your info is right on the mark. Another good one more up to date is "Sneakers" with Robt Redford.And "Enemy of the State" Raymond J. Fitzgerald Bureau Of Special Services bosspi@i... http://business.inc.com/bosspi 845-543-6487 --- 845-534-1060 FAX Licensed & Bonded Investigators in N.Y. since 1973 Member: NALI,ALDONYS,NAPPS,COIN,EPIC. " Truth Never Fears Detection " -----Original Message----- From: Elliott & Associates, Ltd. To: TSCM-L@egroups.com Date: Monday, January 08, 2001 1:03 PM Subject: [TSCM-L] The Conversation >A couple of weeks back there was some discussion about the movie The >Conversation with Gene Hackman. A comment was made to the effect that it was >rumored that the movie was based on the life of a TSCM list member. > >The facts are that the movie was patterned after the life of Hal Lipset who >was a PI in San Francisco for years. In fact Hal Lipset served as an >advisor on the movie. > >Hal Lipset died a couple of years back, but was playing with recording/video >devices up to the end. > >In the mid 60s Hal Lipset was one of several people who testified before >Congress about eavesdropping devices, bugging, etec. Up to this point >(60s) there had been no federal law prohibiting use of bugging devices. Hal >got national attention because of his Martini Olive bug which was really a >toy and good for 10 to 20 feet and that was if it hadn't been eaten > >The Martini Olive bug should not be confused with the Vagina transmitter >designed by Winston Arrington. The Vagina transmitter will go 500 feet or >better to a receiver. > >Just setting the record straight. > > >Bill Elliott, CII >ELLIOTT & ASSOCIATES, Ltd. (GMT -7) >http://www.prvt-eye.com > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 2266 From: William Knowles Date: Mon Jan 8, 2001 8:58pm Subject: Documentary Examines NSA Role, History http://ap.tbo.com/ap/breaking/MGAY80WKNHC.html [I see this will be on again at 10:00pm C.S.T. -WK] By Eun-Kyung Kim Associated Press Writer Jan 6, 2001 - 12:11 PM WASHINGTON (AP) - The National Security Agency, the supersecret intelligence mission most Americans do not even know exists, gives some explanation in a television documentary for its tightlipped behavior. "It's really important that the American people understand what we do, that we are in fact a relatively powerful organization. And it's absolutely critical that they don't fear the power that we have," the agency's director, Lt. Gen. Michael V. Hayden, says in a rare interview. The History Channel program, airing Monday as part of the network's "History's Mysteries" series, seeks to explain the agency's mission and examines recent controversies. Considered the eavesdropping branch of the intelligence community, the NSA gathers information through satellites, telephone intercepts and other methods. Not much else is known about the NSA, which employees joke stands for "No Such Agency" Hayden offers little more. "We intercept communications of adversaries of the United States and attempt to turn that into wisdom for American policy-makers and commanders," he said, according to a transcript of the show. "By the same token, we attempt to prevent other nations from doing that to the United States of America. That's what we do." Congress recently resolved a budget battle over funds for the NSA when President Clinton signed legislation authorizing money for intelligence agencies, including the NSA and CIA. He had vetoed the original spending bill because of a provision that would have made the leaking of government secrets a felony offense. The exact budget figure included in the bill is classified. "If you were comparing NSA to a corporation in terms of dollars spent, floor space occupied and personnel employed, it would rank in the top 10 percent of the Fortune 500 companies," said Judith Emmel, a spokeswoman for the agency, which has its headquarters in Fort Meade, Md. Last year, the NSA defended itself against allegations it illegally snooped into e-mail messages and other communications between ordinary Americans. On the cable program, Hayden denied such action. "I'm here to tell you that we don't get close to the Fourth Amendment," he said, referring to the constitutional provision prohibiting unreasonable search and seizure. "We, for better or worse, stay comfortably away from that line." The program recounts the agency's history and the codes it has deciphered from Japanese, German, Vietnamese and other foreign governments during past conflicts. "The ability to do communications intelligence has saved lives. It has kept us out of war. It has shortened war when we've been in it," said David Hatch, NSA senior historian. The NSA had to revise its mission after the 1991 collapse of the Soviet Union. The agency soon shifted its focus to terrorists, drug traffickers and the threat of war over the Internet. "Cyberwar is a term that you hear today a lot. And the business we're in is to counter the effectiveness of cyberwarfare against our infrastructures," said Michael Jacobs, deputy director of information assurance. "We acquire information, we determine its value and we pass it on," said Maureen Baginski, who heads NSA's Office of the Director. "Really, what you have here is a bunch of Americans that are safeguarding Americans." -- On the Net: National Security Agency: http://www.nsa.gov History Channel: http://www.historychannel.com/ *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2267 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 0:48am Subject: Shake-up could revive KGB Shake-up could revive KGB By Andrew Jack in Moscow http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3PE8PLQHC&live=true&tagid=ZZZAFZAVA0C&subheading=europe Published: January 8 2001 20:35GMT Last Updated: January 8 2001 22:31GMT The Russian government is considering reorganising its special services organisations, triggering concerns from critics about the re-creation of the Soviet-era KGB. Quoted on Russian press agencies, Sergei Ivanov, secretary of the advisory Security Council, said that strengthening links between the special services was one of the priority issues for the coming six months. The agencies involved would include the FSB, responsible for intelligence gathering, the Border Guards, and Fapsi, the agency in charge of interception of communications. Mr Ivanov's statement sparked a warning from Sergei Yushenkov, deputy chairman of the Russian parliament's security committee, that in the wake of the restoration of the music of the Soviet-era national anthem, the KGB's name - meaning the committee for state security - could also be reintroduced. Mr Yushenkov said the recreation of a single agency might make the activities more efficient, but it would reduce the control of civil society over their operations. Since the appointment of Vladimir Putin, a former KGB agent and one-time head of the FSB, as president, there has been growing concern by liberal critics over the power of the security services. Former president Boris Yeltsin broke up the KGB after the 1991 coup against the ex-Soviet leader Mikhail Gorbachev, although he never fully disbanded its constituent parts. Mr Yushenkov said the government had proposed draft legislation in the parliament last November on the reunification of the special services, but it had triggered too much concern to be passed. Mr Ivanov, himself a former KGB agent and long-standing colleague of Mr Putin, has been tipped as a possible future defence minister, prime minister or head of the presidential administration. He has been active in building up the influence of the Security Council. The council has been instrumental in developing Russia's national security, military and information doctrines, and has expanded its role into the social sector, politics and other areas. The Russian daily newspaper Sevodnya, which is owned by Vladimir Gusinsky, the exiled media tycoon who has been critical of Mr Putin's administration, last week warned of the risk of a return of the KGB. However, Konstantin Preobrazhensky, a security analyst and former KGB agent who has become a strong critic of the organisation, said he doubted that the former special services would be formally reunited into a single organisation. He said that each division - including the SVR or foreign espionage network - had its own ministerial-level chief, all of whom would be reluctant to share information or give up their power in favour of a single head. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2268 From: Date: Mon Jan 8, 2001 1:47pm Subject: New Member - UK. ISDN I'm a well established P.I in the UK and looking for any info on the systems alternative use of ISDN lines. I'm told that this now has the same use as the old analogue Infinity Transmitter. I appreciate your all mostly from the States but any idea's ? 2269 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:42pm Subject: History Looks at the NSA History Looks at the NSA http://www.wired.com/news/politics/0,1283,41063,00.html by Declan McCullagh 2:00 a.m. Jan. 9, 2001 PST WASHINGTON -- As anyone who watched Enemy of the State knows, the National Security Agency is a rapacious beast with an appetite for data surpassed only by its disregard for Americans' privacy. Or is the opposite true, and the ex-No Such Agency staffed by ardent civil libertarians? To the NSA, of course, its devilish reputation is merely an unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden, has taken every opportunity to say so, most recently on a History Channel documentary that aired for the first time Monday evening. "It's absolutely critical that (Americans) don't fear the power that we have," Hayden said on the show. He dismissed concerns about eavesdropping over-eagerness and all but said the NSA, far from being one of the most feared agencies, has become one of the most handicapped. One reason, long cited by agency officials: Encryption. The show's producers obligingly included stock footage of Saddam Hussein, saying that the dictator-for-life has been spotted chatting on a 900-channel encrypted cell phone. That's no surprise. The NSA, as Steven Levy documents in his new Crypto book (which the documentary overlooks), has spent the last 30 years trying to suppress data-scrambling technology through export regulations, court battles, and even personal threats. Instead of exploring that controversial and timely subject that's tied to the ongoing debate over privacy online, "America's Most Secret Agency" instead spends the bulk of an hour on a history of cryptography starting in World War II. Most of the documentary could have aired two decades ago, and no critics are interviewed. One of the few surprises in the otherwise bland show is the NSA's new raison d'etre -- infowar. Since its inception in the dark days of the Cold War, the NSA has had two missions, protecting the government's communications while tunneling through the ciphers that guard the enemy's. (Occasionally the two have conflicted.) "The business we're in is to counter the effectiveness of cyberwar against our infrastructure," said Michael Jacobs, the NSA's deputy director for information systems security. Jacobs cited power grids, transportation, air traffic, energy and health services as examples of industries "which have information that is critical to some segment of our society" and must be protected from terrorists, criminals and hackers. In the agency's National Cryptologic Strategy for the 21st Century document, the NSA says it will "develop applications to leverage emerging technologies and sustain both our offensive and defensive information warfare capabilities." One part of the NSA, the Information Systems Security Organization, is devoted to just that. The group even has an outreach program to take advantage of the "talents of government and industry partners" in secure system design, evaluation, and testing. Another program (call 800-688-6115) even offers two-day training classes. If all this sounds like a tremendously geeky community college, the NSA doesn't seem to mind. "I'm here to tell you we don't get close to the Fourth Amendment," says the NSA's Lt. Gen. Hayden. The Fourth Amendment, as we learned in civics classes, explicitly prohibits "unreasonable" searches and seizures, and implicitly allows reasonable ones. What that means in practice is that the NSA is not permitted by law to spy on American citizens. But that broad prohibition, codified in the Foreign Intelligence Surveillance Act, hasn't stopped fears of NSA overzealousness, fueled by persistent reports of the Echelon data-reporting system. In early 2000, the House Intelligence committee held hearings after an outcry over a reported NSA global surveillance system called Echelon. Few legislators asked tough questions. In fact, the National Commission on Terrorism recommended last summer that Congress should give federal police more eavesdropping abilities and increase the budgets of spy agencies. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2270 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:45pm Subject: Nowhere to hide / A special report on privacy Nowhere to hide / A special report on privacy http://www.thestar.com/apps/AppLogic+FTContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=978841852931&call_page=TS_@Biz&call_pageid=971794782442&call_pagepath=Business/@Biz As monitoring tools multiply, society weighs your privacy against profit, public interest in knowing Tyler Hamilton TECHNOLOGY REPORTER A SPECIAL REPORT ON PRIVACY Two astronauts hold a secret meeting in a tightly sealed space pod, detailing through whispers a plan to seize control of their computer-hijacked vessel. In the background, the hijacker - a malfunctioning supercomputer named HAL 9000 - silently observes the movement of their lips, processes the data and analyzes the meaning of their supposedly private conversation. It's a chilling scene. As filmmaker Stanley Kubrick demonstrated in his sci-fi movie classic, 2001: A Space Odyssey, it's virtually impossible to conceal one's privacy in an age where technology rules the day - and in many cases, runs amok. In the 33 years since Kubrick released his film, our technological odyssey has become more science than fiction. The year is 2001. We live in a highly connected digital society, one that's capable of peeking into our personal worlds, taking detailed snapshots and following the trail of electronic cookie crumbs we leave behind. The threat to individual privacy is more real than ever, as more consumer, financial and medical data is collected as fuel for our burgeoning electronic economy. Governments watch and track us in the name of health and welfare. Businesses monitor and study us to sell more goods and keep their employees honest. ---------------------------------------------------------------------------- `If there is no demonstrated need for the information, it should be gone.' - Bruce Phillips, Canada's former privacy commissioner `It's not like there's this evil intention. Part of (the fear) is that nobody actually follows the data trail.' - Valerie Steeves, Carlton University law professor ---------------------------------------------------------------------------- Sometimes we know it's happening. Sometimes we don't. Either way, privacy breaches are being felt and noticed. Consider the following: The U.S. Federal Bureau of Investigation has called ``identity theft'' - a form of fraud through impersonation - the fastest growing crime in North America, partly because of the ease with which personal data can be accessed through computer systems and the Internet; A perceived lack of privacy and security on the Internet continues to be cited in Canadian and U.S. studies as the leading factor holding back the growth of e-commerce. Meanwhile, a recent Canadian study found that half of commercial Web sites in Canada don't have policies aimed at protecting consumer privacy; According to Denver-based research firm The Privacy Foundation, workplace surveillance was the leading privacy concern in 2000, an issue that has lowered staff morale at many companies. Privacy advocates say the need to protect our lives from unwanted, unnecessary and malicious intrusions has come to a critical juncture. But where do we draw the line? And what are the rules for crossing that line? The answers will have profound social, economic and legal implications for businesses, governments, consumers and citizens. ``We have an enormous obligation to get it right,'' says Marc Rotenberg, executive director of the Electronic Privacy Information Center in Washington, D.C. ``Privacy has become a global issue. It has become a political issue. It has become a technological issue. It has become an issue for the courts.'' In the United States, more than two dozen companies have been sued for tracking online consumers without their consent, including Internet advertising firm DoubleClick Inc. and defunct e-tailer Toysmart.com. More than 65 privacy-related bills are currently pending in Congress. Meanwhile, the U.S. Federal Trade Commission has unofficially accepted a role as privacy watchdog. So far, it has taken action against nearly 200 companies. ``Yes, we actually pay people to surf the Net,'' says FTC commissioner Mozelle Thomson. ``This issue is on the front burner.'' In Canada, the legislators have been busier than the lawyers. Last week, a new federal law - formerly known as Bill C-6 - came into force that gives Canadian consumers more control over how their information is collected and used in the private sector. The new legislation, which complements the existing public sector Privacy Act, aims to promote electronic commerce by creating an online environment of trust and respect. But that's just the beginning of Canada's privacy odyssey. The provinces - except for Quebec, which already has private-sector legislation - will soon be jumping in with their own draft bills, laying the foundation for future laws to deal with health records, genetic testing and surveillance in the workplace. ---------------------------------------------------------------------------- `These are huge issues that as a society we have to confront. Privacy will be the defining issue of this new decade we're entering.' - George RadwanskI, Canada's privacy commissioner ---------------------------------------------------------------------------- ``These are huge issues that as a society we have to confront,'' says George Radwanski, the country's new federal privacy commissioner, whose policing powers now extend to the private sector. ``Privacy will be the defining issue of this new decade we're entering,'' he says. ``My role is to be the champion of Canadians in this regard and to make them aware of these issues.'' A fishbowl society Radwanski points out that privacy is not absolute. We reveal much about ourselves by simply opening up a bank account, handing in a rÈsumÈ for a job, or walking out our front door to pick up the daily newspaper. Still, he says privacy in the electronic age is deteriorating at an alarming rate. To make matters worse, it has become increasingly difficult to pinpoint just who's watching us and where our personal information is flowing. Stealth video cameras record us in parking lots, elevators and office buildings. Software keeps track of our keystrokes, e-mails and the Web sites we visit. Radio scanners frequently intercept our wireless phone calls, and satellite-tracking technologies can trace the location of vehicles, not to mention the fashionable ``smart'' devices we carry with us. In the United States, the FBI is using a technology called Carnivore that can target and randomly read e-mail as it passes through gateways to the Web. The software was designed to net criminals, but critics charge that it catches much more than it should. As the motto on one electronic surveillance Web site reads: ``In God we trust. All others we monitor.'' Biometric technologies have even made it possible for computers to spot us in crowds, recognize us through our own unique odours and identify us through the rhythm of our walk. About a year ago, a computer scientist at Carnegie Mellon University in Pittsburgh taught a computer to read lips - just like HAL. Sadly, real-time surveillance is just the tip of the iceberg. Below the surface lie large masses of personal databanks, increasingly organized and often unprotected from hackers, disgruntled employees and old-fashioned criminals. Governments, businesses and law enforcement agencies use powerful, memory-rich databases known as ``data warehouses'' to electronically store and analyze this information, creating a way to sketch eerily accurate profiles of our lives. ``This is all being linked together,'' says Austin Hill, president of Montreal-based Zero-Knowledge Systems Inc., a developer of software that lets people conceal their online identities. Hill says the Internet, helped by its multimedia cousin the World Wide Web, has made it easier than ever to collect, share, replicate, move and link this information. And it can do it at lightning speeds, thanks to advances in fibre-optic technologies that transport data as pulses of light. The Internet has essentially become a universal repository for personal data, easily accessible by a growing number of Web-enabled devices - from laptops and Palm organizers to ``smart'' phones and fridges. Michael Power, a privacy expert and partner with Canadian law firm Gowlings, likes to think of data as a liquid. ``Information flows like water,'' he explains. ``If it hits something it just finds another way to get around it.'' Still, the question remains: Why collect all this data in the first place? In the public sector, politicians argue that getting a better understanding of constituents allows them to do their jobs properly and keep the streets safer at night. Whether it's a gun registration database, a criminal DNA repository or the latest Statistics Canada census, the idea is to use this data to shape policy, improve government services and limit dangers to society. ``The policy-makers are very much into an efficiency mode of thinking,'' says Valerie Steeves, a law professor at Ottawa's Carleton University and a specialist in privacy policy. ``There's a real resistance to stopping the flow.'' In Ontario, the government is pushing through a plan to issue multi-purpose ``smart cards'' that would combine a person's photograph with health, driver's license, birth certificate and other information. A computer chip embedded within the card would keep updated records of an individual's interaction with hospitals, courts and traffic cops. The provincial government is also building a network that would integrate information flowing through the justice system, meaning lawyers, courts and police could access a common pool of data. A similar network is planned for health care. Nationally, the federal government has been no less active. Its Government On-Line initiative aims to provide electronic access to all federal programs and services by 2004, changing the way citizens file taxes or apply for passports. This spring, Ottawa will spend about $400 million and employ 40,000 staff to collect personal data for this year's Statscan census. Beginning May 15, more than 30 million Canadians will be asked intimate questions about their lives, and many will be legally required to divulge their income, ethnicity, disabilities - even sexual orientation. In exchange for the intrusive questionnaire, the government promises confidentiality. Where does the information end up? In a database where it undergoes statistical analysis, just like all census information from the past. And for the first time, Statscan will allow certain individuals to file their information over the Internet. ``It's not like there's this evil intention,'' says Steeves, referring to the many instances where governments collect sensitive personal information. ``Part of (the fear) is that nobody actually follows the data trail.'' That said, the Big Brother envisioned by George Orwell in his book 1984 doesn't look so threatening when measured against big business. The desire to monitor employees and the thirst for consumer data has grown to unprecedented levels in the corporate world. Video surveillance, keystroke monitoring, e-mail filtering and voice-mail recording are now common features in the workplace, where an increasing number of employers are asserting their right to audit the productivity of their staff and protect themselves from potential lawsuits. In the United States alone, two-thirds of corporations monitor their employees to some degree, according to the American Management Association. Meanwhile, the value of personal information as a well-focused marketing and advertising tool has soared in the Internet and computing age. Data mining and analysis software is helping online and off-line companies know their customers better, whether the goal is understanding buying behaviour, making note of product preferences or anticipating future purchases. Ultimately, advertising can be directed and personalized to build stronger customer relationships and sell more Gap jeans, Coke products or Trojan condoms. This explains why more than 85 per cent of all Web sites collect personal information from online visitors. For dot-coms such as DoubleClick and Amazon.com, this information is critical to their existence. For loyalty programs like Air Miles, such information is their existence. The threat Jason Catlett, a leading privacy guru south of the border and founder of advocacy firm Junkbusters Corp., says the detail and quality of information being collected is becoming more and more invasive, and it's doubling every two years. ``There's a real danger here of concentration of information, because it provides a single point of failure,'' says Catlett. ``If there's no one watching the shop, then the shoplifters are going to run amok.'' For many people, the response is: so what. How, they ask, can something as simple as data represent a threat or danger? The answer to this question goes far beyond the annoyance of spammers, junk mailers and telemarketers. Rather, it deals with the risks posed by stalkers, thieves, suspicious lovers, curious employers and overly snoopy insurance companies. Consider the following two cases: Last month, it was discovered that an outlaw biker gang had infiltrated Quebec's automobile-insurance board and, by accessing its computer systems, tracked down the addresses and phones numbers of rival gang members, police officers and journalists. Police suspect that confidential data was wrongfully obtained on Journal de Montreal reporter Michel Auger - who was shot five times on Sept. 13 in his newspaper's parking lot - and may have been passed along to his assailants, making it easier to track him. In 1997, a grandmother from Ohio received a letter from a prison inmate in Texas who knew intimate details about her life, such as how often she uses sleeping aids, deodorizers and hemorrhoid medication. The inmate, a convicted rapist, also offered in his letter to fulfill her sexual desires and fantasies when he was eventually released from prison. Needless to say, the woman suffered months of emotional and psychological torture. It was eventually discovered that the inmate bought the data from another prisoner. Apparently, the second inmate had a data entry job as part of a prison-labour program. The data in question was an elaborate consumer survey the woman had filled out earlier. ``Don't blame things like the Internet,'' says Catlett. ``Blame the increase in the amount of data, and the lack of controls in handling it.'' It's not that consumers never knowingly hand over their information. Generally, people don't hesitate to participate in online surveys or loyalty programs if it means discounts on merchandise or better, more personalized customer service. What many don't know is where their personal data could end up. The cases, unfortunately, are plentiful. In British Columbia in the mid-1990s, three staff at a Vancouver abortion clinic found out that their license plate numbers had been obtained through an RCMP computer system. It was later discovered that the officer who accessed the records had passed along the personal data to his mother - a worker with an anti-abortion group. David Flaherty, then privacy commissioner of British Columbia, used that case as part of a larger investigation into the abuses with motor vehicle databases. ``I've done some work more recently with abortion clinics,'' says Flaherty, who now works as a privacy consultant. ``Their staff literally have to look under their cars for bombs before they get into them.'' Flaherty - who considers privacy a human right - says there is a blind assumption among many individuals that safeguards for protecting personal information are being followed. He says most organizations have no interest in unnecessarily invading people's privacy, but mistakes do happen. ``I'm surprised at how many people work in some of these database-intensive industries with access to information,'' he says. ``Sure, they all have confidentiality agreements - big deal.'' Whether it's an innocent slip of the mouse, a case of taking kickbacks, or a security oversight that is sniffed out by hackers, employees that have access to computer systems within an organization are often the weakest link when it comes to protecting privacy. Network firewalls, biometric technologies, security passwords and encryption software can help, but only if processes and procedures are closely followed and audited. According to research firm IDC Canada Ltd., accidents and human error - not hackers - pose the biggest security threat to business computer networks and Web sites in Canada. When such systems hold vast amounts of personal data, a security risk instantly becomes a privacy risk. It's no wonder Bruce Phillips, Canada's former privacy commissioner, decided last spring to blow the whistle on a huge database system created by Human Resources Development Canada. The database, designed for no apparent purpose, carried detailed profiles on more than 33 million Canadians - information gathered without their knowledge or consent. ``If there is no demonstrated need for the information, it should be gone,'' says Phillips, explaining that purpose and consent are two basic principles to which organizations should adhere. HRDC tried to defend the database as a research tool, but two weeks later, under the weight of public criticism, it pulled the plug. Privacy risks grow even larger when such information is being gathered by profit-driven Web ventures that are far less stable than government. Take Toysmart.com, an online retailer that filed for bankruptcy in June. Despite assurances in its privacy policy that it would protect the personal information of its customers and never share that data with third parties, Toysmart decided to auction off its customer list to the highest bidder as a way to help pay off its debts. Last year, more than 210 ``dot-coms'' went belly up, according to San Francisco-based consulting firm Webmergers.com. The closures left 15,000 people out of work and hundreds of detailed customers lists at the mercy of disgruntled employees and anonymous buyers. ``There is an awful lot of data out there floating around with nobody willing to protect it,'' says Catlett, adding that the Toysmart.com case demonstrates what companies are willing to do when backed against a wall. ``You don't want some pervert calling up your kids pretending to be Ken and asking for Barbie. (The Toysmart customer list) deserves protection.'' But even genuine attempts at protection often fail: In January, 1999, a security oversight with the Airmiles.ca Web site exposed detailed personal information on tens of thousands of Canadians who had filled out a ``confidential'' survey for the popular rewards program. In all, 82 categories of information were open for view, including data about types of credit cards held, the number of cars owned and whether the person was a pet owner or mobile-phone user. Fortunately, credit card numbers and data on specific product purchases were not revealed; Last April, Toronto-based wireless service provider Look Communications also blamed human error for a security breach that left hundreds of customer files - including phone and credit card numbers - exposed on the Internet. Amazom.com, Microsoft Corp., Yahoo Inc., AT&T Corp. and Nissan Motor Co. Ltd. are among a list of well-known companies that have experienced similar goof-ups. Then there are the blatant attacks. Online auction site Egghead.com admitted last month that someone had breached their computer systems and possibly stolen up to 3.7 million credit card numbers and other customer information. The fact that so much data is floating around unguarded or under attack explains why identity theft - the use of another person's identity to commit fraud - has quickly become the fastest growing crime in North America. These days, crawling around in garbage dumpsters, picking pockets and raiding mailboxes has been replaced by Internet search engines, do-it-yourself hacker kits and online services that do all the dirty work for a nominal fee. ---------------------------------------------------------------------------- `As search engines become more powerful, they become a way to aggregate that information. That's how you create a profile on somebody.' - Michael Power, partner with Gowlings law firm ---------------------------------------------------------------------------- ``If it goes into a computer system, you never know where it's going to show up,'' explains Power, the partner with Gowlings. ``As search engines become more powerful, they become a way to aggregate that information. That's how you create a profile on somebody.'' Once that profile is created, it's easy for someone you've never met to impersonate you, make purchases under your name, access bank accounts and commit other crimes. Then one day, you get an unpleasant surprise: Your bank account is empty, your credit cards are run up, your credit record is shot and you've been wrongfully linked to a number of criminal offences. Clearing up that mess and trying to restore your reputation often creates emotional, psychological and economic suffering . In one high-profile case, Mari Frank, an attorney from Laguna Niguel, Calif., discovered that someone had purchased a sports car, spent more than $10,000 at Toys ``R'' Us Inc., damaged a rental car and accumulated $50,000 in debt using personal information that could have easily been found on the Internet. Many novice Internet users respond to unsolicited e-mails that promise rewards in exchange for detailed data about them. Others fill out information to gain access to certain sites on the Web. Where this information ends up is anyone's guess. In Canada, cases of identity theft have been harder to track because most law enforcement authorities here lump the crime under the umbrella of general fraud. ``There's no program to deal specifically with the issue of identity theft,'' says Sgt. Paul Marsh, spokesperson for the RCMP. ``Our current reporting does not break out fraud done online.'' Marsh says the offences of personation and fraud currently found in the Criminal Code have been considered adequate to address the question of identity theft, but he adds that the RCMP is examining ways of statistically distinguishing off-line and online fraud within its computer systems. Such statistics may be necessary to prepare for tomorrow. Many privacy advocates point out that the fears we exhibit today are largely related to the dangers that lie in the future if the privacy issue isn't adequately addressed. For example, the collection of health and medical information by governments, non-profit groups, pharmacies, doctors, hospitals and medical information Web sites raises the issue of how this information - if it's stolen, monitored, leaked, shared or sold - can be used to discriminate against people. ``It's particularly difficult with health care to guard against secondary uses, because the insurance and drug industries are so much a part of the medical sector,'' says Steeves, the Carleton University law professor. Steeves says the spectre of eugenics is very real in an age where animals have already been cloned and genetic defects can be easily recorded. In the workplace, drug tests that can also detect whether a woman has stopped taking the birth control pill could easily lead to dismissal in advance of maternity leave. Getting a job or life insurance could also become more difficult if a genetic flaw that ``may'' lead to future illness raises a red flag. A new dot-com in the United States called First Genetic Trust has created what it calls a ``genetic banking'' service. For a fee, the company collects, analyzes and maintains an individual's genetic data for confidential and secure storage, or use in ongoing clinical trials. The potential value of the service is compelling when applied to medical research, drug discovery and personalized diagnosis and treatment of genetically related illness. But what if the company goes bankrupt? It begs the question at a time when bankrupt companies like Toysmart.com are making headlines by trying to sell off customer lists. ``There's all sort of privacy rhetoric,'' says Steeves. ``But very little privacy protection.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2271 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 6:59pm Subject: Trial turns spotlight on US-Cuban espionage Trial turns spotlight on US-Cuban espionage http://www.boston.com/dailyglobe2/009/nation/Trial_turns_spotlight_on_US_Cuban_espionage+.shtml By Richard ChacÛn, Globe Staff, 1/9/2001 IAMI - One Cuban man pretended to be a Puerto Rican, memorizing a 30-page phony life story. Another landed a janitor's job at a US naval base in Key West, keeping an eye on military activity. And a third posed as a Cuban defector so that he could infiltrate Cuban-American exile groups and send information back to Havana. These are just some of the eyebrow-raising stories emerging from a federal trial here. The case, which resembles a John le Carre thriller, offers a rare glimpse into the modern world of US-Cuban espionage. The three men are among five accused of being Cuban spies - part of an espionage ring known to US intelligence officials as the Wasp Network. According to the US government, more than a dozen Cuban secret agents tried to infiltrate US exile groups and military bases in Florida through most of the last decade until law enforcement agents broke up the ring in 1998. Four of the suspects - including Juan Pablo Roque, who defected to Miami from Cuba amid much fanfare by exile leaders - have been indicted in absentia because they escaped to the island nation before being arrested. Five others, including two married couples, have pleaded guilty and are expected to testify against their former comrades. But it's the trial of the remaining five that is drawing the most attention now from leaders and curious intelligence spectators hoping to peer into the shadowy world of US and Cuban espionage operations. In testimony last week, Joseph Santos, an agent who confessed to authorities, said he and his wife received orders from an alleged ringleader, Gerardo Hernandez, to penetrate the US military's Southern Command headquarters in Miami. Santos said he also was assigned to study Federal Express, United Parcel Service, and the US Postal Service for mailing some of the information they gathered. Authorities and prosecutors are relying on thousands of pieces of evidence that were gathered from court-ordered apartment searches or through routine intelligence work, such as intercepting short-wave radio signals, computer messages, or coded phone conversations. Government attorneys have assembled several thick binders of transcripts of messages between the spies and their bosses in Havana. Some of the transmissions talk in flowery language about the importance of their work for Cuba's 41-year-old Communist revolution, while others deal with more mundane things, like what clothes they wore that day, where they shopped, or their constant need for more money from Havana. Prosecutors accuse the men of having prior knowledge of plans by Cuba to shoot down two planes belonging to the Miami-based exile group Brothers to the Rescue on Feb. 24, 1996. Hernandez, a Cuban who prosecutors say posed as a Puerto Rican to hide his true identity, is charged with conspiracy to murder in connection with that incident. The suspects admit they were working on orders from Havana but deny obtaining classified information from the exile community or from any US military facility. In an encrypted message shown in testimony last week, Cuban intelligence officials in Havana tell their workers in Miami to ''uncover plans for acts of aggression against Cuba'' by the United States by keeping an eye out for increased military training, the movement of personnel or an increase in flights from the US naval base in Boca Chica, Fla. The agents kept meticulous notes of their actions and expenses. Among the notes confiscated by authorities are envelopes and small scraps of paper carefully detailing money distributed to all of the ring's participants. Using a network that stretched from Mexico City to Miami and New York, agents were given specific instructions from Havana on where to meet other Cuban officials to pass information or collect money. According to government transcripts released this week, meetings were held in the frozen food section of a Queens supermarket, in a men's restroom at a Bronx diner and at a McDonald's restaurant in Miami. All of the agents tried hard to blend in into their American surroundings as much as possible, renting apartments in Hollywood, Fla., and in Miami; taking out memberships at local video stores; and, in some cases, finding girlfriends or getting married even if they had spouses back home in Cuba. The trial has also been a delicate matter for US officials, who worry about publicly divulging too much of their intelligence techniques. Over the years, FBI officials intercepted the group's calls and short-wave radio messages, conducted apartment searches, and confiscated about 1,000 encrypted computer disks. Questions have also been raised in local media over whether the FBI knew about plans to shoot down the exile plans and whether the incident could have been avoided. US authorities have denied withholding any information. The realization that Havana's spies worked and lived among them has stung the anti-Castro Cuban exile community here, which has suffered setbacks following the Elian Gonzalez saga last year and the death in 1997 of its most colorful leader, Jorge Mas Canosa, longtime president of the Cuban American National Foundation. ''There is a willingness in this community to give people from Cuba the benefit of the doubt and to welcome them,'' said Dennis Hays, vice president of the foundation, adding that Cuban-Americans may be more cautious of new arrivals. ''A case like this shows how cold-blooded people can be and creates a huge sense of betrayal and bewilderment.'' This story ran on page A08 of the Boston Globe on 1/9/2001. © Copyright 2001 Globe Newspaper Company. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2272 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 7:01pm Subject: Jailed Cuban spy identifies his `handlers' Jailed Cuban spy identifies his `handlers' Published Tuesday, January 9, 2001, in the Miami Herald http://www.miamiherald.com/content/today/news/dade/digdocs/067701.htm He said both directed him to get a job at the Southern Command's Miami headquarters. BY GAIL EPSTEIN NIEVES gepstein@h... A former Cuban intelligence agent on Monday identified two more defendants in the Cuban spy trial as his ``handlers'' and said both of them directed him to get a job at the Southern Command's Miami headquarters so he could snoop for the Cuban government. The testimony of acknowledged ex-agent Joseph Santos, 40, was the first to link accused spies RamÛn LavaniÒo and Fernando Gonz·lez with in-the-trenches intelligence activity. On Friday, Santos similarly implicated co-defendant Gerardo Hern·ndez. The trial's opening weeks focused on documentary and physical evidence against the five accused spies. With Santos, jurors are hearing firsthand accounts about the inner workings of Cuba's intelligence apparatus, from spy recruitment to training to work assignments. In the case of Santos and his wife, Amarylis -- also a Cuban agent -- their achievements were far less illustrious than their assignments, according to testimony. Santos said he successfully completed a research project on the Southern Command while its new headquarters were being built in Miami's Doral section in early 1997. He and his wife took photographs of all the surrounding buildings, between Northwest 87th and 99th avenues and 25th and 40th streets, ``to provide a pretty clear idea to anyone'' what the area looked like. Santos said he gave the report to his handler LavaniÒo, an ``illegal agent'' or ranking Cuban intelligence operative who also went by the name Luis Medina. But more importantly, LavaniÒo told the Santos couple that their ``supreme task'' was to get jobs at the Pentagon's SouthCom headquarters, which directs U.S. military operations in Latin America and the Caribbean. Accused spy Gonz·lez -- who also went by the name RubÈn Campa -- gave them the same task, Santos testified. ``Penetrating'' SouthCom was a high priority set by Cuba's intelligence chiefs, according to Havana-to-Miami directives seized by the FBI and read to jurors Monday. MISSION FAILED The Santos failed at that assignment. They were too busy trying to make a legitimate living and never found a place to apply for a job, Santos said. But on cross-examination, the defense attorney for accused spy Hern·ndez scoffed at the notion that Santos could have obtained anything important -- let alone national defense secrets, a key factor for proving espionage -- even if he had managed to get hired at SouthCom. Santos does not speak English. Before his arrest, he was working as a laborer at Goya Foods and the Miami Arena. Attorney Paul McKenna read jurors a report in which Hern·ndez directed Santos to obtain ``public information'' about SouthCom. ``In fact, none of your handlers ever tasked you with getting national security information, did they?'' McKenna asked Santos. Santos responded that it was implicit that he was supposed to get information that could not be obtained ``by conventional means.'' SERVING SENTENCES Santos and his wife are already serving prison sentences after pleading guilty to one count of conspiracy to act as a foreign agent. Their terms are likely to be cut short for their help testifying against Hern·ndez, who prosecutors say conspired with the Cuban military to murder four Brothers to the Rescue fliers in 1996. McKenna cross-examined Santos about the plea agreement for a long time in an apparent bid to undermine his credibility. Under sentencing guidelines, Santos faced 60 months but prosecutors recommended he serve 48. U.S. District Judge Joan Lenard agreed. ``So these people here,'' McKenna said, naming prosecutors Caroline Heck Miller, John Kastrenakes, David Buckner and FBI Agent Al Alonso -- ``are all your friends that are helping you, correct?'' ``They're not my friends,'' Santos responded through an interpreter. ``I met those people during the investigation of the case.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2273 From: James M. Atkinson, Comm-Eng Date: Tue Jan 9, 2001 9:03pm Subject: Man charged with making tape of patrons in athletic club Man charged with making tape of patrons in athletic club Associated Press, 01/09/01 BOSTON -- A Cambridge man has been charged with secretly taping men in the locker room of a Boston fitness club. Evans Mojica, 41, was arrested at about 6:30 p.m. Monday, after he was seen walking around the men's locker room at Boston Sports Clubs carrying a black toiletry bag, police said. Patrons of the athletic club had earlier complained about a man fitting Mojica's description who was believed to be videotaping in the locker room. The club's management approached him and found that he was videotaping people through a hole in the bag, said James Borghesani, spokesman for the Suffolk County District Attorney's office. He pleaded innocent Tuesday in Boston Municipal Court to a charge of recording oral information without consent, as well as charges of lewd and lascivious behavior and disorderly conduct. Authorities said the videotape included an audio recording. He was ordered held on $500 cash bail. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2274 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 10:51am Subject: 'Soprano' Tapes Sing - Mob snitch cripples Jersey crime family Thursday, December 16, 1999 'Soprano' Tapes Sing Mob snitch cripples Jersey crime family http://www.nydailynews.com/1999-12-16/News_and_Views/Crime_File/a-50555.asp By GREG SMITH Daily News Staff Writer They are the "Soprano" tapes ≠ hours of video and audio tapes revealing the inner workings of a New Jersey-based crime family that sees itself as the inspiration for one of TV's hottest shows. The recordings were key in bagging 41 reputed mobsters in a massive organized crime bust earlier this month, but they also give a rare glimpse into what the alleged criminal class likes to watch on television. http://www.nydailynews.com/1999-12-16/News_and_Views/Crime_File/soprano.jpg Members of the reputed DeCavalcante crime family believe they have a lot in common with the characters in 'The Sopranos, above. In this case, fact seems to follow fiction. "Hey, what's this f---ing thing, 'Sopranos'?" asks Joseph (Tin Ear) Sclafani, a reputed mob soldier with a hearing aid as he waits in a car March 3 for a sitdown with another mob family. "Is that supposed to be us?" "You're in there," responds reputed capo Anthony Rotondo, as both men erupt in laughter before going on to point out several characters on the show they believe were taken whole-cloth from their real-life crime family. "Every show you watch, more and more you pick up somebody," Rotondo says. "One week it was Corky. One week it was, well, from the beginning it was ... Albert G," he says, comparing fictional mobsters to apparent real ones. Sclafani and Rotondo might not have laughed so loud had they known another companion, identified only as Ralphie, was wearing an FBI recording device. Because of Ralphie's work as an informant, Rotondo, Sclafani and 39 other members and associates of the DeCavalcante crime family were charged Dec. 2 in four real-life racketeering indictments. On the HBO show "The Sopranos," Anthony Soprano, an aging Jersey mob capo with a paunch, suffers panic attacks because of the pressures of his work. He sees a shrink, confronts the price of betrayal, considers whether it's all worthwhile. He hangs out in a topless bar called Ba Da Bing! with his cronies, who are all in construction or carting businesses. On the "Soprano" tapes, the alleged capos are all middle-aged guys with paunches who spend hours betraying one another and discussing the intricacies of how to bury a body. They hang out in a restaurant called Sacco's, and all claim legitimate jobs in construction ≠ except at least one, who runs a casino boat. They love the HBO show ≠ "great acting," Rotondo comments ≠ and point out one similarity to their lives after another, such as a TV mobster who dies of cancer just as one did in real life. But the feds are quick to say that these tapes are not fiction, and they allege that people actually ended up dead. The most jarring recordings concern the life and death of Joseph (Joey O) Masella, a 49-year-old bookie who owed everybody ≠ the DeCavalcantes, the Colombos, the Gambinos. Masella borrowed hundreds of thousands from the three mob families, hoping to hit it big as a bookie, according to the tapes. He failed. "This guy is breaking my b---s," Masella told Ralphie in the summer of 1998, referring to one of his any mob pursuers. "All I need is just three thousand. He's calling me, and calling me and calling." That June, Masella approached acting DeCavalcante boss Vincent Palermo, claiming he simply could not pay his debts. "By all rights, by all the rules, I have to kill you," Palermo replied, according to court testimony. One afternoon, Masella got a call from Steve, an alleged debtor. Steve was going to hand Masella $10,000 in cash, which Masella would immediately turn over to his creditors. But Steve was really Westley Paloscio, Masella's bookmaking partner, who masked his voice, Assistant U.S. Attorney Maria Barton alleged in court last week. Paloscio told Masella to meet Steve at the Marine Park Golf Course parking lot in Brooklyn, prosecutors alleged. Masella pulled into the dark lot around 9:30 p.m. When a red two-door sedan pulled up, Masella bounded forth to meet Steve.. He saw a man with a mustache and dark hair at the wheel, and then several flashes from a gun. Motorists rushed to the scene as the red car sped away. Masella was alive, his body riddled with bullets. He described Steve and his car and gave up Paloscio's beeper number. He died four hours later. Paloscio learned Masella survived for a while, and he worried that the botched hit could result in his death. "Somebody's going to get shot," Paloscio told Ralphie. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2275 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 3:25pm Subject: Court Rejects Psychic Appeal Court Rejects Psychic Appeal http://abcnews.go.com/sections/us/DailyNews/scotus000118.html#psychic The Supreme Court today refused to revive a lawsuit in which 16 former employees of a California psychic hotline accused ABC television of unlawfully using a hidden camera to videotape them at work. The court, without comment, turned away the former employees' argument that they should be allowed to sue ABC under a federal eavesdropping law. The secret recordings were used by ABC's PrimeTime Live program for a 1993 expose on whether employees at the hotline believed in the service. An ABC reporter had gotten a job at the Psychic Marketing Group, which advertised telephone psychic advice for $3.95 a minute. The employees sued ABC under a federal eavesdropping law that lets people tape conversations in which they are a party, unless the taping is intended to help commit a crime or damage another person. Five of those who sued were shown in the broadcast, while the rest were videotaped but did not appear in the program. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2276 From: James M. Atkinson, Comm-Eng Date: Wed Jan 10, 2001 3:53pm Subject: Cordless Phones: Who's Listening? Cordless Phones: Who's Listening? http://abcsource.starwave.com/sections/2020/2020/diaz000322.html It is not so difficult - or uncommon - for others to listen to your calls on a wireless phone. According to the Privacy Rights Clearinghouse, here's how you can protect yourself. How Others Listen - And Is It Legal? Cordless phones operate like mini-radio stations. They send radio signals from the base unit to the handset and from the handset back to the base. The signal carrying your conversation can usually be transmitted and overheard a quarter of a mile away, and can sometimes travel up to two miles. Signals from cordless phones can be picked up by a number of other devices including radio scanners, baby monitors, radios and other cordless phones. Federal law prohibits the intentional eavesdropping of cordless and cellular telephone conversations and it is also illegal to use a radio scanner "knowingly and with the intent to defraud" to eavesdrop on wire or electronic communication. Penalties for the intentional interception of cordless and cellular telephones range from fines to imprisonment. Individual states also have varying laws about intercepting phone calls. What You Can Do In most cases, your cordless phone conversations are probably overheard only briefly and accidentally. But there are people who make it a hobby to listen to cordless and cellular phone calls, so here are some tips: Cordless phones with numerous channels (25 or more) and those that automatically switch between channels are not as easily monitored as the older one- or two-channel analog models. Be aware that anyone using a radio scanner can easily eavesdrop on conversations on older model cordless phones. The newest cordless phones give a high level of protection against eavesdropping. They are digital, use a higher frequency and spread-spectrum technology, and have as many as 40 channels. (They are also more expensive than analog wireless phones.) Since there is no inexpensive way to ensure privacy on either cordless or cellular phone calls, if you do not want to take the chance that others may be listening to your call, be sure both you and the person you are talking to are on standard wire phones. Avoid discussing financial or other sensitive personal information on a cordless or cellular phone. For example, if you buy something over the phone and give your credit card information, your cordless or cellular call could be monitored, leaving you the victim of credit card fraud. When shopping for a cordless or cellular phone, insist that the manufacturer or salesperson provide you with clear explanations of any privacy protection claimed for their products. Baby monitors, children's walkie-talkies and some home intercom systems may be overheard in the same manner as cordless phones. If you are concerned about being overheard on one of these devices, be sure to turn it off when it is not in use. You might want to consider purchasing a wired unit instead. Copyright © 2000 ABC News Internet Ventures -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2277 From: Ray Van Staden Date: Thu Jan 11, 2001 8:25am Subject: Fw: ARROGRANCE Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. Transcript released by the Chief of Naval Operations RCN 10/10/95. Printed in "Rendezvous" December 1999. Canadians: "Please divert your course 15 degrees north to avoid collision". Americans: "Recommend you divert course 15 degrees north to avoid collision". Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" Canadians: "No. I say again, you must divert your course". Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic Fleet. We are accompanied by three cruisers, three destroyers and numerous support vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees north or countermeasures will be taken to ensure the safety of this ship". Canadians: "This is a lighthouse. Your call!!" --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 2278 From: Richard Thieme Date: Thu Jan 11, 2001 11:27am Subject: Re: Fw: ARROGRANCE - urban legend alert! this story has been around for a long time set in many locales. My suspicion is that the "transcript" is tongue in cheek. At 04:25 PM 01/11/2001 +0200, Ray Van Staden wrote: > >Transcript of an actual radio conversation which took place during >October 1995 between a USN War Ship sailing off the coast of >Newfoundland and the Canadian authorities. > >Transcript released by the Chief of Naval Operations RCN 10/10/95. > >Printed in "Rendezvous" December 1999. > >Canadians: "Please divert your course 15 degrees north to avoid collision". >Americans: "Recommend you divert course 15 degrees north to avoid collision". >Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". >Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" >Canadians: "No. I say again, you must divert your course". >Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic > Fleet. We are accompanied by three cruisers, three destroyers and numerous support > vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees > north or countermeasures will be taken to ensure the safety of this ship". >Canadians: "This is a lighthouse. Your call!!" > > >--- > >>From the desk of Raymond van Staden >Van Staden and Associates cc > >P.O. Box 1150 >Amanzimtoti >4125 >South Africa > >Tel: +27 (0)31 916-1262 >Fax: +27 (0)31 916-1263 > >Email: raymond@v... >Internet: http://www.vanstaden.co.za > > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > Richard Thieme ThiemeWorks ... professional speaking and business consulting: ThiemeWorks P. O. Box 170737 the impact of computer technology Milwaukee Wisconsin on people in organizations: 53217-8061 helping people stay flexible voice: 414.351.2321 and effective fax: 414.351.5779during times of accelerated change. cell: 414.704.4598 http://www.thiemeworks.com http://www.richardthieme.com - for information on Professional Speaking 2279 From: St. Clair, James Date: Thu Jan 11, 2001 10:33am Subject: RE: Fw: ARROGRANCE No -it's not. Every version of this story changes.. By the way, Lincoln has never sailed off of Newfoundland. J -----Original Message----- From: Ray Van Staden [mailto:secdep@v...] Sent: Thursday, January 11, 2001 9:25 AM To: TSCM-L Subject: [TSCM-L] Fw: ARROGRANCE Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. Transcript released by the Chief of Naval Operations RCN 10/10/95. Printed in "Rendezvous" December 1999. Canadians: "Please divert your course 15 degrees north to avoid collision". Americans: "Recommend you divert course 15 degrees north to avoid collision". Canadians: "Negative. You will have to divert your course 15 degrees north to avoid a collision". Americans: "This is the Captain of a US Navy ship. I say again, divert YOUR course!" Canadians: "No. I say again, you must divert your course". Americans: "This is the Aircraft Carrier USS Lincoln the second largest ship in the USN Atlantic Fleet. We are accompanied by three cruisers, three destroyers and numerous support vessels. I demand you change your course 15 degrees north. I say again that's 15 degrees north or countermeasures will be taken to ensure the safety of this ship". Canadians: "This is a lighthouse. Your call!!" --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2280 From: Date: Thu Jan 11, 2001 7:27am Subject: Re: Fw: ARROGRANCE In a message dated 1/11/01 8:48:38 AM Pacific Standard Time, secdep@v... writes: << Transcript of an actual radio conversation which took place during October 1995 between a USN War Ship sailing off the coast of Newfoundland and the Canadian authorities. >> Sounds like an "urban legend" to me. 2281 From: 1RCM <1RCM@M...> Date: Thu Jan 11, 2001 5:18pm Subject: A Public Thank You Hi List, Last week I posted with a request to be contacted off-list by any list member in the Boise, Idaho area. To make a long story short, I had stumbled across a very good deal on a piece of TSCM test equipment but I was very hesitant to send the asking price for something unseen to someone unknown. I was contacted back by list member Mike Arnell. Mike was of great assistance in allowing me to close the deal in a manner that I felt quite comfortable with. And for that I would like to thank him very much. I chose to thank Mike publicly on the list as well as privately off-list for a reason. This list, like most others, sees its periods of negativity spawned by arguments, disgruntled posters, mis-information, etc., etc. But it also sees more than its fair share of that which I assume that it was originally founded for: the sharing of TSCM-related information, thoughts and ideas. I have no idea whether or not when the list was founded the moderator envisioned its usage for 'blind' business contacts or the requesting of 'professional favors'. But I for one found it very beneficial for just that purpose. And so, as long as the moderator does not disapprove, I would not hesitate to recommend to any list member that if he/she has a problem, concern or issue that another list member in a specific area might be able to help with - then simply put out the feeler. Of course remember to request the return contact and conduct your business off-list, but don't hesitate to give that first 'call for help' via a posting on the list a try! Bob Motzer From: James M. Atkinson Date: Tue Jan 8, 2002 9:54pm Subject: Re: Rent A sweep Bwwahh ha-ha-ha, ROTFLMAO -jma At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >Check this one out, you can now rent sweep equipment for the techno >do-it-yourselfer! > >http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4474 From: Steve Uhrig Date: Wed Jan 9, 2002 9:59am Subject: Gingrich's intercepted cell phone call Hill Tape Dispute Allowed to Continue Appeals Court Clears GOP Member's Suit By Juliet Eilperin Washington Post Staff Writer Wednesday, January 9, 2002; Page A17 A 1996 phone call that inadvertently bounced to a Florida couple's scanner is still echoing in political and judicial chambers, feeding a long-running lawsuit between two members of Congress. A federal court panel recently ruled that Rep. John A. Boehner (R-Ohio) can amend and go forward with his complaint against Rep. Jim McDermott (D-Wash.). The lawsuit stems from the public release of a December 1996 phone conversation involving Boehner, then-House Speaker Newt Gingrich (R-Ga.) and other House GOP leaders discussing how best to respond to an ethics committee ruling against Gingrich. A Florida couple recorded the conversation off their scanner and gave it to McDermott, then the top Democrat on the House ethics panel. Accounts of the conversation soon appeared in news articles. ============================= ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4475 From: Steve Uhrig Date: Wed Jan 9, 2002 10:21am Subject: Re: NEW APCO 25 DIGITAL SCANNER Once upon a midnight dreary, James M. Atkinson pondered, weak and weary: > Title: UNIDEN DEBUTS NEW APCO 25 DIGITAL SCANNER MODELS It is an FCC mandate for all government and public safety users to shift over to to narrow band digital. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4476 From: Hawkspirit Date: Wed Jan 9, 2002 2:53pm Subject: Theory Could someone explain the theory of what this guy is saying? Roger COMSEC C3I Wiretap Detector The Latest High Tech Wiretap Detector. -Protect yourself from legal and illegal wiretaps http://www.spycompany.com/tapdet.htm The C3I is most effective at detecting wiretaps / eavesdropping at the beginning and ending of a telephone call. At the beginning of a telephone call when someone is calling you, watch for a remote extension drawn loop wiretap to seize the line between the cadence ringing, usually between the first and third ring, creating a connection reaction. At the conclusion of any telephone call, by observing the C3I and counting / timing the number of disconnection reactions on the telephone line. The C3I will detect illegal and legal wiretapping / eavesdropping on your telephone line by establishing either a normal signature pattern or an abnormal signature pattern. 4477 From: Hawkspirit Date: Wed Jan 9, 2002 3:08pm Subject: BridgeTaps What do you make of this comment? "Telcordia reports that a significant portion of the loop population (56 percent) has bridge taps" http://www.iec.org/online/tutorials/xdsl_test/topic06.html. 4478 From: Date: Wed Jan 9, 2002 9:57am Subject: Re: Theory In a message dated 1/9/02 11:55:19 AM Pacific Standard Time, hawkspirit@e... writes: << Could someone explain the theory of what this guy is saying? >> Carefully perusing the website, he's saying send me your money. It's a piece of junk packaged in a $30 box. I've seen the prototype in it's plastic packaging. It didn't work then and I'm sure it doesn't work now. 4479 From: Date: Wed Jan 9, 2002 9:59am Subject: Re: BridgeTaps In a message dated 1/9/02 12:08:50 PM Pacific Standard Time, hawkspirit@e... writes: << What do you make of this comment? "Telcordia reports that a significant portion of the loop population (56 percent) has bridge taps" >> I think it's way out of whack. I'd say less than 5% 4480 From: Steve Uhrig Date: Wed Jan 9, 2002 3:33pm Subject: Re: BridgeTaps Once upon a midnight dreary, MACCFound@a... pondered, weak and weary: > What do you make of this comment? "Telcordia reports that a > significant portion of the loop population (56 percent) has > bridge taps" 56% of the loop population has called the FBI saying they are tapped. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4481 From: Charles P Date: Wed Jan 9, 2002 7:51pm Subject: Re: Re: BridgeTaps Perhaps that should "56% of the 'loopy' population" Actually, they are not talking at all about illegal wiretaps. There are a large number of bridge taps on older cables out there, and many new cable plants too. In new residential neighborhoods I typically find the lines to a home are tapped into a 50 or 100 pair feeder that runs down the street popping up in the pedistals along the way. When someone has multiple lines and later cancels some, the pair is free to use for their neighbor's new 2nd line- yet still accessable from the home where the pair was used last year, the telco guys are happy to find an unused pair and don't care if it was tapped off somewhere else. They show up on TDR runs often. This can be true for business lines as well. It becomes a problem for the installation of dsl lines as it can reduce the bandwith available. Small taps don't make a big difference but longer ones can be a problem. This is what the original quote was refering to. Charles Global Communications Tarrytown, NY charles@t... www.telephonesecurity.com > > What do you make of this comment? "Telcordia reports that a > > significant portion of the loop population (56 percent) has > > bridge taps" > > 56% of the loop population has called the FBI saying they are > tapped. > > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 4482 From: James M. Atkinson Date: Wed Jan 9, 2002 7:55pm Subject: Re: Theory At 12:53 PM -0800 1/9/02, Hawkspirit wrote: >Could someone explain the theory of what this guy is saying? Roger > >COMSEC C3I Wiretap Detector >The Latest High Tech Wiretap Detector. >-Protect yourself from legal and illegal wiretaps > >http://www.spycompany.com/tapdet.htm > >The C3I is most effective at detecting wiretaps / eavesdropping at the >beginning and ending of a telephone call. At the beginning of a telephone >call when someone is calling you, watch for a remote extension drawn loop >wiretap to seize the line between the cadence ringing, usually between the >first and third ring, creating a connection reaction. At the conclusion of >any telephone call, by observing the C3I and counting / timing the number >of disconnection reactions on the telephone line. The C3I will detect >illegal and legal wiretapping / eavesdropping on your telephone line by >establishing either a normal signature pattern or an abnormal signature >pattern. *** Private and Confidential *** You know the funny thing is that I spoke to the owner of the company who makes the thing a few months back as to how his product detect bugs, and he gave me one hell of a song and dance routine. He refused to discuss the technology in any way, shape, form, or manner, and tried to intimidate me by attempting to pull the "I worked for the phone company for umpteen years" crap, and the "I don't know who you think you are" game. I got the distinct impression that most of the people he deals with don't have a technical background, and when I started to ask even basic questions he started acting like an asshole and just completely stone-walled me (which made my bullshit detector go off). Sadly, instead of answering some basic questions he went on a rant about how I had to come to his offices to see the thing (for what I suspect was a controlled demo), and then he totally blew his credibility with me when he told me about the crackpot who had evaluated the thing (and was endorsing it "as an expert", bwahhh ha-ha-ha). I feel kind of sorry for the guy, and I tried to take him seriously, but from what he was describing it sounds like little more then just another blinky-box. I am more then happy to review any actually technical specifications or white papers the guy is willing to provide, but all he would provide me with was marketing hype, hyperbole, and similar crap (which of course kept making my bullshit detector go off ). The product may indeed do what they claim, hell it may even cure acne, wart, and baldness, but as an engineer I have to see technical stats on the thing, marketing hype means nothing to me. Lets see some credible stats and technical stuff. None of this marketing mumbo-jumbo foolishness, if it does what he claims then I am interested, plain and simple. The funny thing, is that the guy I talked to seemed obsessed with finding shoddy workmanship, an less considered with finding bugging devices. The "line signature box" seems like a good idea, but in reality it is actually of minimal value, and has been offered by dozens of other companies in the past (usually in the form of an impedance tester). Yes, such boxes will impress people with little or no experience under their belts, but a real TSCM professional will find it of minimal value, and usually a source of great amusement. There are even boxes that watch currently flow at the on-hook/off-hook transition point, but they are of minimal value for detecting anything other then sloppy workmanship (shucks, even simple cap meter will detect such things). You can actually buy a $20 box at Radio Shack that will detect remote extensions, so if that is all the box is doing it would explain why the guy got his panties in a bunch when I started asking questions. Your money would probably be better spent on a decent TDR, a giga-ohm test set, or even a rubber chicken.. However, I'll keep an open mind, and would encourage other to do the same; but before you part with any cash you had better ask some technical questions and get some second opinions. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4483 From: James M. Atkinson Date: Wed Jan 9, 2002 8:07pm Subject: Re: BridgeTaps At 1:08 PM -0800 1/9/02, Hawkspirit wrote: >What do you make of this comment? > >"Telcordia reports that a significant portion of the loop population (56 >percent) has bridge taps" > >http://www.iec.org/online/tutorials/xdsl_test/topic06.html. It is usually just a result of sloppy workmanship by outside plant folks. Sadly, most of them have no idea what a TDR is, let along actually use one. The percentage of "sloppy loops" varies widely. In older urban areas it may be 50-60%, but in newer suburban areas and industrial parks it may be completely zero. Any TSCM'er with a TDR can find the easily find the stuff. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4484 From: John McCain Date: Wed Jan 9, 2002 11:01am Subject: Re: Rent A sweep The really funny part is that this is apart of a NASDAQ listed company ( CGPN) selling for about 0.011 USD per share :). Cheers, JohnM At 10:54 PM 1/8/02 -0500, you wrote: >Bwwahh ha-ha-ha, > >ROTFLMAO > >-jma > > >At 7:47 PM -0800 1/8/02, Hawkspirit wrote: > >Check this one out, you can now rent sweep equipment for the techno > >do-it-yourselfer! > > > >http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts. > asp?idCategory=12 > > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > >-------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 4485 From: kirk Date: Wed Jan 9, 2002 0:33pm Subject: Re: Rent A sweep I went to their website and enlarged the picture of the phone line sweeper. GUESS who makes it?.......... CCS, hahahaha. -w--------- Original Message ---------------------------------- From: "James M. Atkinson" Date: Tue, 8 Jan 2002 22:54:09 -0500 >Bwwahh ha-ha-ha, > >ROTFLMAO > >-jma > > >At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >>Check this one out, you can now rent sweep equipment for the techno >>do-it-yourselfer! >> >>http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 > > >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > -------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX LLC Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 310-388-5886 F: 310-388-5886 W: www.tactronix.com -- 4486 From: James M. Atkinson Date: Wed Jan 9, 2002 8:22pm Subject: Re: Rent A sweep What is really funny is that if you know the TSCM business several "devices" on their website stand out as being eavesdropping toys sold/"made" by CCS. The entire "rental site" read just like a CCS catalog.down to the fantasy pricing. So just how many times do you have to see the Brooklyn Bridge get sold to a tourist before you realize that something just isn't right? -jma At 1:33 PM -0500 1/9/02, kirk wrote: >I went to their website and enlarged the picture of the phone line >sweeper. GUESS who makes it?.......... CCS, hahahaha. > > >-w--------- Original Message ---------------------------------- >From: "James M. Atkinson" >Date: Tue, 8 Jan 2002 22:54:09 -0500 > >>Bwwahh ha-ha-ha, >> >>ROTFLMAO >> >>-jma >> >> >>At 7:47 PM -0800 1/8/02, Hawkspirit wrote: >>>Check this one out, you can now rent sweep equipment for the techno >>>do-it-yourselfer! >>> > >>http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp?idCategory=12 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4487 From: Bug Sweeper Date: Thu Jan 10, 2002 0:51am Subject: DNR? Does anyone know of an inexpensive and simple DNR? Friend wants to keep tabs on outgoing calls while someone is housesitting over a weekend. Thanks, E. Leonard 4488 From: iDEN-Test Port-Marcelrf Date: Thu Jan 10, 2002 1:14am Subject: Re: DNR? Here is a cheap & dirty unit that interfaces to a PC. This easily installed kit logs information on all outgoing and incoming calls, as well as any tone, from either MS-DOS or Windows. This kit and provided software indicate on your computer screen the date and time of each outgoing call, the length of the call and the number dialed. Credit card numbers also are logged. For incoming calls, the device even shows how many times your phone rang. Connect this kit to a parallel port on your PC. This unit requires 12-18Vdc/200mA wall transformer or 10-12Vdc. (Includes: 3 1/2" disk, case and instruction manual. Size: 1 1/2x5x5 1/4" (HWD) http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=&product%5Fid=990%2D0080 Bug Sweeper wrote: > Does anyone know of an inexpensive and simple DNR? Friend wants to keep > tabs on outgoing calls while someone is housesitting over a weekend. > > Thanks, > > E. Leonard > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 4489 From: iDEN-Test Port-Marcelrf Date: Thu Jan 10, 2002 1:17am Subject: Re: DNR? Let me try this again: This easily installed kit logs information on all outgoing and incoming calls, as well as any tone, from either MS-DOS or Windows. This kit and provided software indicate on your computer screen the date and time of each outgoing call, the length of the call and the number dialed. Credit card numbers also are logged. For incoming calls, the device even shows how many times your phone rang. Connect this kit to a parallel port on your PC. This unit requires 12-18Vdc/200mA wall transformer or 10-12Vdc. (Includes: 3 1/2" disk, case and instruction manual. Size: 1 1/2x5x5 1/4" (HWD).) http://www.radioshack.com/product.asp?catalog%5Fname=CTLG&category%5Fname=&product%5Fid=990%2D0080 Bug Sweeper wrote: > Does anyone know of an inexpensive and simple DNR? Friend wants to keep > tabs on outgoing calls while someone is housesitting over a weekend. > > Thanks, > > E. Leonard -- "NEXTEL1 IT'S NOT JUST NEXTEL" Subscribe to Nextel1: http://www.groups.yahoo.com/subscribe/NEXTEL1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 4490 From: greendots . Date: Wed Jan 9, 2002 9:03pm Subject: [HUMOR] - How to put up a tower antenna Apologies for wasting bandwidth with humor. --- Subject: Fw: How to put up a tower antenna I am writing in response to your request for additional information on my recent accident. In block No. 3 of the accident reporting form I put "poor planning" as the cause of the accident. You said in your letter that I should explain more fully and I trust that the following details will be sufficient. I am an amateur radio operator.. On the day of the accident, I was working alone on the top section of my new 80 foot antenna tower. When I had completed my work, I discovered that I had, over the course of several trips up the tower, brought up about 300 pounds of tools and spare hardware. Rather than carry the now unneeded tools and hardware down by hand, I decided to lower the items in a small barrel by using a pulley which, fortunately, was attached to the gin pole at the top of the tower. Securing the rope at the ground level, I went up to the top of the tower and loaded the tools and hardware into the barrel. Then I went back to the ground and untied the rope holding tightly to insure a slow descent of the 300 pounds of tools and hardware. You will note in block No. 11 of the accident form that I weigh 155 pounds. Due to my surprise at being jerked off the ground so suddenly, I lost my presence of mind and forgot to let go of the rope. Needless to say, I proceeded at a rather rapid rate up the side of the tower. In the vicinity of the 40 foot level, I met the barrel coming down. This explains my fractured skull and broken collarbone. Slowed only slightly, I continued my rapid ascent, not stopping until the fingers of my right hand were two knuckles deep into the pulley. Fortunately by this time I had regained my presence of mind and was able to hold tightly to the rope in spite of my pain. At approximately the same time, however, the barrel hit the ground and the bottom fell out of the barrel. Devoid of the weight of the tools and hardware, the barrel now weighed 20 pounds. I refer you again to my weight in block 11. As you might imagine, I began a rapid descent down the side of the tower. In the vicinity of the 40 foot level, I met the barrel coming up, This accounts for the two fractured ankles and lacerations of my legs and lower body. The encounter with the barrel slowed me enough to lessen my injuries when I fell onto the pile of tools and hardware and, fortunately, only three vertebras were cracked. I am sorry to report however that as I lay there on the tools and hardware, in pain, unable to stand, and watching the empty barrel 80 feet above me, I again lost my presence of mind, I let go of the rope. _________________________________________________________________ Join the worldís largest e-mail service with MSN Hotmail. http://www.hotmail.com 4491 From: Aimee Farr Date: Thu Jan 10, 2002 11:54am Subject: FW: Secrecy News -- 01/10/02 [A vote among my female cohorts suggested that 80% of us would voluntarily enroll in such a program. The other 20% indicated they qualify for involuntary commitment. ~Aimee] > BILL WOULD BAN SPACE-BASED MIND CONTROL WEAPONS > > Rep. Dennis Kucinich (D-OH) introduced a bill in the House of > Representatives late last year that would ban weapons in space. But > while there have been many similar legislative initiatives in the past, > Rep. Kucinich's bill is distinguished by its unusually expansive > definition of "weapons." > > Among the weapons that it would proscribe the new measure includes > "psychotronic" devices that are "directed at individual persons or > targeted populations for the purpose of ... mood management, or mind > control." > > No explanation for this peculiar proposal was immediately available. > But the text of "The Space Preservation Act of 2001" (H.R. 2977), > introduced on October 2, may be found here: > > http://www.fas.org/sgp/congress/2001/hr2977.html > > The Kucinich bill was hailed by Citizens Against Human Rights Abuse, one > of a number of organizations of people who say they are victims of > government experimentation involving electromagnetic and other > psychotronic weapons. See their web site here: > > http://www.dcn.davis.ca.us/~welsh/ 4492 From: Miguel Puchol Date: Thu Jan 10, 2002 1:12pm Subject: Re: Rent A sweep I sometimes feel like buying some of these things, so that when I retire I can get some extra income from my own "Worthless Pseudo-TSCM Junk Museum" - members of this list will get free entrance :-) Cheers, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Wednesday, January 09, 2002 4:47 AM Subject: [TSCM-L] Rent A sweep > Check this one out, you can now rent sweep equipment for the techno > do-it-yourselfer! > > http://www.spyamericaonline.com/store/comersus_listcategoriesandproducts.asp ?idCategory=12 > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4493 From: James M. Atkinson Date: Thu Jan 10, 2002 4:29pm Subject: A Wiretap In Every Home http://www.washingtonpost.com/wp-dyn/articles/A22888-2002Jan9.html A Wiretap In Every Home By Richard Cohen Thursday, January 10, 2002; Page A19 If it is true that all trends start in California, then the rest of the country had better pay attention. Gray Davis has proposed that his state's police agencies be given the same authority to fight terrorism that Congress recently gave the feds. If this keeps up, there won't be an untapped phone in the nation. It's not that what Davis proposes is so awful. What he has in mind is a state version of the insultingly named USA Patriot Act, which among other things expanded wiretap authority at the federal level. It also permits the government to monitor e-mail and Internet sites. Uncle Sam is going to know if you've been bad or good -- so be good for goodness' sake. But you better watch out. Because already other states are asking for the same authority. All this is being done in the name of anti-terrorism, but the expanded powers could be used for any purpose approved by a court -- a state court at that. You need only peer back in history to wonder if we are going to be any safer or, maybe, much worse off. Here I must state a prejudice. Having once been a statehouse correspondent (Maryland), I am underwhelmed by the competence and professionalism of state government. Most legislators are part-time, but the lobbyists are not. Often, they lead the representatives around by the nose -- offering expertise, advice and, in a pinch, a free vacation to somewhere very nice. Similarly, state judges do not match the caliber of their federal counterparts. Unlike federal judges, who are appointed for life, state judges usually are elected. ... [...] So it is not surprising that in the past, various states have mimicked the federal government -- hunting reds, anarchists, syndicalists and, later, integrationists. States, even cities, had their own red squads, persecuting or, on rare occasion, prosecuting alleged subversives or mere dissidents. There was hardly a major city in the country that didn't have some palooka in a fedora following some bookworm in a beret. [...] Yes, I know. That was then and this is now. But even now police power can be awesome if unchecked. The power to tap phones, to accumulate damaging personal information, to track your Internet habits is the stuff of Orwell and Kafka. It was also the stuff of the late Richard Daley of Chicago and the equally late Gov. Ross Barnett of Mississippi. Police power needs to be rationed, to be monitored. ... ...The last thing we need is 50 FBIs, some of them effectively accountable to no one. Let the feds handle terrorism. That way, we'll all be safer. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4494 From: James M. Atkinson Date: Thu Jan 10, 2002 4:25pm Subject: Judge: Ohio Ban on Concealed Weapons Unconstitutional http://www.foxnews.com/story/0,2933,42654,00.html Judge: Ohio Ban on Concealed Weapons Unconstitutional Thursday, January 10, 2002 Respond to Editor Email this Article CINCINNATI - A fitness trainer, hairdresser and pizza shop owner are all breathing easier after a judge in Ohio ruled they have a right to carry concealed weapons to protect themselves. "There is no doubt that the very thought a potential victim might possess a firearm deters that element of our society that cares nothing about laws or human life but rather understands only one thing - brute force," Hamilton County Judge Robert Ruehlman wrote. The common pleas judge ruled that Ohio's law against carrying concealed weapons violates the state constitution. Lawyers for the city of Cincinnati, the county and state said they would appeal the ruling. The lawsuit was filed in July 2000 by a private investigator and four other workers who said their jobs required them to carry weapons for self-defense. The workers say the Ohio Constitution allows citizens to bear arms and doesn't say the weapons cannot be concealed. But Ohio allows only law enforcement officials or officers of the state and federal government to carry concealed weapons. The workers argued that the ban subjects people to arrest before they get a chance in court to clear themselves by arguing they had legitimate self-defense reasons to be armed. Lawyers for Cincinnati, Hamilton County and the state countered that the right to bear arms does not prevent the state from regulating how people may carry guns. They said concealed weapons pose a threat to police officers and others. "Amidst all of the baying from gun opponents is the irrefutable fact that there will always be people in our society who refuse to follow any rules and how can never been reasoned with or rehabilitated," Ruehlman wrote. "These people have no conscience and no qualms about doing harm to innocent persons. As a consequence, every law-abiding citizen of this state has the right to protect him or herself with a concealed firearm." Ruehlman defined law-abiding people as those not otherwise prohibited by federal, state or local law from possessing firearms. Ruehlman heard testimony over four days in December. After the trial, lawyers defending the state law asked the judge to remove himself from the case. They said he couldn't make a fair ruling because his wife and baby were kidnapped at gunpoint outside a strip-mall camera shop in 1989. Ruehlman's wife, Tia, said a gun probably wouldn't have helped her overcome her assailant. She said she believes that residents should be able to carry concealed weapons but had not discussed the case with her husband. Ruehlman declined to comment on the request. Anti-gun groups said they were worried about the concealed weapons case because of Ruehlman's past rulings. Those include his dismissal of Cincinnati's lawsuit against gun manufacturers two years ago. The Associated Press contributed to this report. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4495 From: John McCain Date: Thu Jan 10, 2002 2:59pm Subject: Theory (brought to mind by Comsec C3I discussion) JMA's thoughts on the Consec device brought to mind a few thoughts that we might discuss a bit on the list. It's been kinda quiet lately anyway, but if this is too far off topic for you, trash it. We, as techies and engineers, tend to think in the ways we learned the laws of elementary physics . We (ok, technically "I" instead of "we", but I'll assume others fit the pattern) have been conditioned over the years to focus on steady-state activity instead of transients; for example we usually see a series circuit in its steady-state conditions... not it's dynamic response. A good example would be closing a switch on a circuit with a battery, capacitor, and resistor. We (at least I) first think that ok, there's a fast transient, then no current flows (other than perhaps some minor leakage through the cap). But, I conceptualize the no-current state of this circuit as it's "normal" state... not the transient state. In reality, both the initial transients as well as the steady state are the "normal" states for this circuit. Only rarely do I conceptualize things in their transient, dynamic conditions. I think of an oscillator as always oscillating, a transmitter as always transmitting, receiver as always receiving, etc. I even think of office politics and inter-personal dynamics as a sort of steady-state dynamic... not a series of transient events. I rarely even consider the "steady state" of oscillators, receivers, even LEDs, etc. starting up or shutting down. Finally getting to the point! I suspect that we should consider the transient, dynamic responses in the things we analyze and pay more attention to those transients. Looking very carefully at what fast transients occur when a phone goes off hook is something I've never done. Using a TDR or SA, we look at transients (since the dynamic is their "steady state"), but do you carefully observe the first pulse of that TDR trace to see what effect the circuit under test has on the TDR instrument? Or, do you just adjust magnitude to make it look "normal" and start looking at returns? I suspect those transients are sometimes telling us things that we don't hear. Am I off base here. Do others not fall into this trap? Any thoughts? JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 4496 From: david_johnrobinson Date: Thu Jan 10, 2002 4:11pm Subject: The "Big " rental sweep debate Two things hit me regarding this listing; A) so what is new? this stuff has been out there advertised for years. B) Why does every one immediatly jump and say CCS? Let me put my cards on the table, I was the operations manager for CCS for a time here in London, and they realy do not deserve the bad mouthing they get from the group, OK so most of the stuff they provide is "crap" from a professional point of veiw, but to most of their clients it's exactly what they want (most of them are Mr and Mrs Joe schmo ) Any one wanting professional equipment would /should come to professional suppliers like our company Department Q who only deal with Government level bugs , covert equipment and GSM tracking. I don't think it is CCS for several reasons, Firstly they have exactly this type of thing on their already long established web site ; www.spyzone.com which for the genre has some very nice products. Secondly we are told by the group these are CCS type prices - wrong! when I worked there the prices were much higher - try 800% mark up and dollar prices quoted as pounds in UK, and lastly they only ask for $500 dealer price - a CCS licence costs $150.000 with no stock. So I think it's time the "farmer and the cowboy should be friends", get off CCS back , there prices and equipment will kill them and the other dinosores off soon enough. If you want to worry, and it seems you do , try talking to professional covert suppliers - if you call us a spy shop you had better duck, ask us what we can do with your GSM phone and why we have stopped telebanking and wap messaging. There will always be some one out there who wants Kiddy toys and some one who will supply them - so let them , they deserve each other. Thanks for letting me have a say, I'll sneak back into the shadows now and watch the sparks fly. Dr David J Robinson Department Q (international HQ) England +44 1903 787943 Over 25 years covert experience with British forces 4497 From: Thomas Conlon Date: Thu Jan 10, 2002 4:51pm Subject: Re: local CO Info DSLReports has the best CO info I've seen, but it relies on user input quite a bit. Are there any public resources to research a given CO for profitability and co-locations, for example, or the consumer could research like before they move? That would be sweet. -tc syseng@m... __________________________________________________ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ 4498 From: Date: Thu Jan 10, 2002 1:05pm Subject: Re: The "Big " rental sweep debate In a message dated 1/10/02 3:29:16 PM Pacific Standard Time, david_johnrobinson@h... writes: << Any one wanting professional equipment would /should come to professional suppliers like our company Department Q who only deal with Government level bugs , covert equipment and GSM tracking. >> Thank you for the ad. 4499 From: James M. Atkinson Date: Thu Jan 10, 2002 6:35pm Subject: Re: The "Big " rental sweep debate Well, OK, let's take an objective look at this. If I lay my copy of the CCS and G-Com's catalog down next to my monitor, and then pull up the pages in question the images and specs look exactly like those in the CCS listings. In fact pretty much everything on the site looks like it was lifted right off the CCS book (with a bad scanner) , and marked up 30% over confidential dealer cost. If we then review the "spyzone" website we see almost identical items being offered, but at much higher prices. If we further go to the TSCM database of eavesdropping threats (called "Raphael") we find that several very specific items being offered on the website in question are proprietary to CCS, and CCS dealers, and that all roads lead back to CCS (do you see where I am going?). In my professional opinion virtually everything on the site in question is CCS products. Well, OK... it is actually someone else product with a CSS logo on it, a fancy box, and a ridiculous price tag; but for all practical purposes it is CCS stuff. A CCS "franchise" can be had for as little as nothing, or $500, or $1500 depending on what mood strikes that day, and if you have a good cigar with you. If someone pays much more then a few grand for a "dealership" they should also be investing in several bridges and tunnels I am offering at a good price. Personally, I think it is more of a case of "Cowboy verses Cattle Rustler" -jma At 10:11 PM +0000 1/10/02, david_johnrobinson wrote: >Two things hit me regarding this listing; A) so what is new? this >stuff has been out there advertised for years. >B) Why does every one immediatly jump and say CCS? Let me put my >cards on the table, I was the operations manager for CCS for a time >here in London, and they realy do not deserve the bad mouthing they >get from the group, OK so most of the stuff they provide is "crap" >from a professional point of veiw, but to most of their clients it's >exactly what they want (most of them are Mr and Mrs Joe schmo ) >Any one wanting professional equipment would /should come to >professional suppliers like our company Department Q who only deal >with Government level bugs , covert equipment and GSM tracking. >I don't think it is CCS for several reasons, Firstly they have >exactly this type of thing on their already long established web >site ; www.spyzone.com which for the genre has some very nice >products. Secondly we are told by the group these are CCS type >prices - wrong! when I worked there the prices were much higher - try >800% mark up and dollar prices quoted as pounds in UK, and lastly >they only ask for $500 dealer price - a CCS licence costs $150.000 >with no stock. >So I think it's time the "farmer and the cowboy should be friends", >get off CCS back , there prices and equipment will kill them and the >other dinosores off soon enough. >If you want to worry, and it seems you do , try talking to >professional covert suppliers - if you call us a spy shop you had >better duck, ask us what we can do with your GSM phone and why we >have stopped telebanking and wap messaging. >There will always be some one out there who wants Kiddy toys and some >one who will supply them - so let them , they deserve each other. >Thanks for letting me have a say, I'll sneak back into the shadows >now and watch the sparks fly. >Dr David J Robinson >Department Q (international HQ) >England >+44 1903 787943 >Over 25 years covert experience with British forces -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4500 From: James M. Atkinson Date: Thu Jan 10, 2002 7:07pm Subject: Re: Theory (brought to mind by Comsec C3I discussion) One of the things I look for during a sweep of the phone lines is how the CO relay reacts to various levels of current. What I am in interested in the electrical behavior of a line during the loop relay seizing the line, and releasing it, and more specifically the "overshoot" areas of the signal. I am also interested in the frequencies that appear right at the moments of making, and then of breaking the line. Also, during this transition point you can usually bounce several TDR pulses down line and pick out mouse feces from miles away. If done properly the multi-mega ohm devices (typical LEO devices or slaves) stand out like a sore thumb, and you can see virtually anything of interest along the line. The key is to get a really good impedance match (for the transition point), and then only trigger the TDR during the transient or ringing, and preferably during the zero crossing. Remember, the phone line BORSCHT operates in milliseconds, but TDR operated in pico and nano seconds. For a millisecond or so you have a dry line, and if you can get two lines to "go dry" at the same time you can do some really wonderful thing to find bugs or other mischief. -jma At 2:59 PM -0600 1/10/02, John McCain wrote: >JMA's thoughts on the Consec device brought to mind a few thoughts that we >might discuss a bit on the list. It's been kinda quiet lately anyway, but >if this is too far off topic for you, trash it. > >We, as techies and engineers, tend to think in the ways we learned the laws >of elementary physics . We (ok, technically "I" instead of "we", but I'll >assume others fit the pattern) have been conditioned over the years to >focus on steady-state activity instead of transients; for example we >usually see a series circuit in its steady-state conditions... not it's >dynamic response. > >A good example would be closing a switch on a circuit with a battery, >capacitor, and resistor. We (at least I) first think that ok, there's a >fast transient, then no current flows (other than perhaps some minor >leakage through the cap). But, I conceptualize the no-current state of >this circuit as it's "normal" state... not the transient state. In >reality, both the initial transients as well as the steady state are the >"normal" states for this circuit. > >Only rarely do I conceptualize things in their transient, dynamic >conditions. I think of an oscillator as always oscillating, a transmitter >as always transmitting, receiver as always receiving, etc. I even think of >office politics and inter-personal dynamics as a sort of steady-state >dynamic... not a series of transient events. I rarely even consider the >"steady state" of oscillators, receivers, even LEDs, etc. starting up or >shutting down. > >Finally getting to the point! I suspect that we should consider the >transient, dynamic responses in the things we analyze and pay more >attention to those transients. Looking very carefully at what fast >transients occur when a phone goes off hook is something I've never done. > >Using a TDR or SA, we look at transients (since the dynamic is their >"steady state"), but do you carefully observe the first pulse of that TDR >trace to see what effect the circuit under test has on the TDR >instrument? Or, do you just adjust magnitude to make it look "normal" and >start looking at returns? I suspect those transients are sometimes >telling us things that we don't hear. > >Am I off base here. Do others not fall into this trap? Any thoughts? >JohnM > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-352-0350 >807 >Pioneer Web: >http://www.dcbnet.com >Champaign, IL. 61820 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4501 From: James M. Atkinson Date: Thu Jan 10, 2002 7:40pm Subject: Spy hunt sparked by 'fight with wife' http://www.ananova.com/news/story/sm_491601.html?menu= Spy hunt sparked by 'fight with wife' A man who sparked a spy alert apparently to cheer himself up after a row with his wife may have to pay thousands in compensation. The Japan Coast Guard spent more than L52,000 dispatching 17 vessels, launching aircraft 10 times, and mobilising 380 personnel. The man had reported seeing suspicious people in wet suits landing on an island. Police plan to send the case to prosecutors and charge the unidentified man. The Japan Times says he told police he hatched the story in an attempt to cheer himself up after a quarrel with his wife. It is reported the 41-year-old claimed five or six people wearing what looked like wet suits had emerged from what appeared to be a miniature submarine and landed on Enoshima Island, in Kanagawa. The coast guard then searched the North Korean freighter Sonamu. Nothing out of the ordinary was found on the ship which was first seen anchored near Enoshima just after the man made the report. The incident followed the sinking in late December of an unidentified but suspected North Korean spy ship in the East China Sea after a brief firefight with Japanese authorities. Story filed: 09:32 Thursday 10th January 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4502 From: Steve Uhrig Date: Thu Jan 10, 2002 8:49pm Subject: Re: Attacking CCS? Yes, exactly that Once upon a midnight dreary, david_johnrobinson pondered, weak and weary: > Two things hit me regarding this listing; A) so what is new? this > stuff has been out there advertised for years. B) Why does every > one immediatly jump and say CCS? Because some of us have been around a long time and have seen this stuff over and over and over. I'm talking longer than some of the players in this industry have been alive and longer than practically anyone in the industry has been in business. > Let me put my cards on the table, I was the operations > manager for CCS for a time here in London Then pardon me for being forthright, but either you were incredibly naive or you are a crook. > and they realy do not deserve the bad mouthing they get from > the group, See comment above. If you really believe this, I will go with naive. > OK so most of the stuff they provide is "crap" from a > professional point of veiw, but to most of their clients it's > exactly what they want One could make the same argument about illegal drugs or abortion. That doesn't justify it. > Any one wanting professional equipment would /should come to > professional suppliers like our company Department Q who only > deal with Government level bugs , covert equipment and GSM > tracking. Now I will change my opionion back to crook. If you only deal with 'Government level bugs', why are you inviting anyone to come to you. Do you claim to be supplying 'Government level bugs' to anyone? In the unlikely event you supply anything at all, I would expect it would be to anyone *other* than the government. Remember, there are a (very) few people around who actually work in these technologies, with government clients on a daily basis, and cannot be fooled. Most of them are smarter than me and keep their mouths shut. I speak my mind. > I don't think it is CCS for several reasons For all the reasons you mention, it absolutely fits the pattern of CCS. Lie to someone with money, schmooze them, pump up their egos and convince them they will make outrageous profits dealing with CCS. The ignorant fool (and ANYONE who deals with CCS/G-COM in ANY way is an ignorant fool) hands CCS five or six figures for the 'privilege' of acquiring their absolutely worthless but impressive boxes of nonfunctional bells and whistles. At that point the relationship, such as it was, is over unless CCS feels they can extract/extort even more money from the ignorant fool. In this case apparently, and I have seen it more times than I could count, the ignorant fool private labeled the crap because he wants the other ignorant fools who might buy it to think he manufactured it. CCS doesn't care. They got their money. They probably charged the guy extra for private labeling it, which in itself is funny because CCS was the original king of repackaging and slapping their name on standard products from other manufacturers and claiming it as their own. CCS cheated the guy pushing this private labeled crap, because he was an ignorant fool and had more money than he had brains. ANYONE who does any homework on CCS would never deal with them on any level. > a CCS licence costs $150.000 with no stock. A CCS 'license' or 'distributorship' or whatever they choose to call it costs precisely as much money as they can extract from the ignorant fool who gets involved with them. They (CCS) are very good at developing financial information on their victims, and this is how much they charge. Same with 'exclusive' rights to distribute CCS's vaporware in a particular country. I had the distinct pleasure at a trade show in New Delhi some years ago of introducing three 'exclusive distributors for all of India' to each other. Each had paid, as I recall, sums between the rupee equivalent of USD $50,000 and $200,000 for the alleged privilege of having an 'exclusive' representation for CCS in all of India. None received anything in return. Nada. If I called them tomorrow, I could purchase the exclusive rights to distribute their products in any country you could name, and I likely would be the 50th person to purchase the exclusive. You were a member of the den of thieves. You know how the game is played. You just have to pretend to defend them to justify stealing money from your victims. If you led the victim (ignorant fool) to believe something which was not true, either from a product representation standpoint or from an equipment performance standpoint, then you committed fraud. Whether you believe it or not, some day there will be a day of judgement, and you will have to provide an accounting, before man possibly and to God definitely, for your actions. You do have the opportunity to escape those penalties and erase the slate, and if you wish to discuss this issue only via PRIVATE email with me I will be glad to do so. > If you want to worry, and it seems you do , try talking to > professional covert suppliers - if you call us a spy shop you > had better duck You already provided substantial incontrovertible testimony that you are a crook, and your likely fictitious claims indicate you still are operating in the mode you learned from CCS. Therefore you fit this list's generic, and my personal, definition of a spy shop. This month is 30 years I have been manufacturing electronic surveillance and intelligence gathering products for government agencies. Do some research and you will find that is true. Manufacturing is starting with a blank CAD screen, component manufacturer's data books, designing a prototype, breadboarding and debugging a few, building the prototype, debugging it, putting a few beta test units into hands of professional users, getting their feedback and incorporating that into the design, refining the design, getting circuit boards etched and stuffed with components, firmware written, the incredibly difficult job of doing an effective job of packaging, documenting everything for small or medium scale production, writing instruction manuals, technical manuals, writing test procedures, setting up boxing and labeling and all the other tasks which exist between a wet dream and a workable effective product shipping to market. It is not taking some other company's product, repackaging it, and slapping your own name on it. Your claim of dealing in covert electronics is not the claim someone would make who genuinely does that work, but is the claim of someone who is playing the same CCS game of dealing in sensitive and restricted equipment as a sales tactic to make ignorant fools believe they are getting something they're not supposed to have. CCS caters to Walter Mittys, people who have more money than brains, and people who want to throw money at something and think they are going to get rich overnight. CCS sells dreams. They play on the mystique of dealing in sensitive and restricted technology. And ignorant fools fall for it, don't do any homework, and lose their investment. CCS plays a psychology game more than anything else. You know it and I know it and a good number of others know it. Denying it just digs your grave deeper. Some of us have been around for a while. All over the world, dealing with governments who have been cheated by CCS and seeing their tactics firsthand. I have visited most of CCS' shops around the world, played the game, flashed some cash and pretended to believe them just to see how bold they would get. I've witnessed and exposed phony government demos of theirs over and over, and some were impressingly cleverly staged. Don't forget that. There are others on this list who read your comments the same way I interpret them, who have similar backgrounds. They just, as mentioned above, have the discretion to just let you play your little spy groupie game and keep quiet. I don't often blatantly attack crooks, but you provided sufficient evidence to where a reasonable man who is familiar with this industry would believe you were and are a crook and a prevaricator (polite word for liar). I've made my comments, and of course you will have to jump in and whine and threaten and bluff and try to save face and convince all 1000+ of us who follow this excellent list that you are not a crook claiming to manufacture all sorts of secret squirrel devices but are just a bold groupie pretending to play a man's game and thinking you will fool us. You may fool some of us. You will not fool all of us. Maybe you're just mentally deficient. Maybe you are merely delusional. I don't know. More likely, you learned how to extract money from ignorant fools from your time at CCS, and are continuing to pretend, now that you have your own business card, letterhead and probably a combination phone and fax machine operating in some corner of your flat. Do you have full time employment somewhere else to earn enough money to pay the light bill and feed your fantasy of peddling vaporware to alleged government agencies? You're really only fooling yourself. You can reply however you wish, but I will not be baited and will say no more on the subject. The above represents 30 years of watching this industry and being intimately involved in the very issues I discussed, and knowing of whence I speak. The very best move you could make at this point would be to drop the issue and just back off and fade back into your 'lab' in the spare bedroom of your flat. I will work patiently for years mentoring someone who genuinely wants to start a business, pay his dues, build it on a firm foundation and, above all, be honest with everyone. I have done this with a number of members on this list, behind the scenes, for no reason other than I wanted to give something back to the younger fellows and help them get started along the right path. No one on the list knows it because I don't do it for money or to feed my ego. If someone wants to start an *honest* business and understands it takes years of work, I'm glad to share with them some of my experiences, mistakes and successes. But I give no quarter to the crooks in this industry. A former sales manager I had commented that this was the scummiest industry in which he ever had been involved. This message seems to confirm his observation. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: James M. Atkinson Date: Sat Jan 8, 2005 6:29pm Subject: Once more into the breach ACT III. SCENE I. France. Before Harfleur King Henry urging his men on at the siege of Harfleur. Once more unto the breach, dear friends, once more; Or close the wall up with our English dead. In peace there's nothing so becomes a man As modest stillness and humility; But when the blast of war blows in our ears, Then imitate the action of the tiger: Stiffen the sinews, summon up the blood, Disguise fair nature with hard-favour'd rage; Then lend the eye a terrible aspect; Let it pry through the portage of the head Like the brass cannon: let the brow o'erwhelm it As fearfully as doth a galled rock O'erhang and jutty his confounded base, Swill'd with the wild and wasteful ocean. Now set the teeth and stretch the nostril wide; Hold hard the breath, and bend up every spirit To his full height. On, on, you noblest English, Whose blood is fet from fathers of war-proof- Fathers that like so many Alexanders Have in these parts from morn till even fought, And sheath'd their swords for lack of argument. Dishonour not your mothers; now attest That those whom you call'd fathers did beget you. Be copy now to men of grosser blood, And teach them how to war. And you, good yeomen, Whose limbs were made in England, show us here The mettle of your pasture; let us swear That you are worth your breeding- which I doubt not; For there is none of you so mean and base That hath not noble lustre in your eyes. I see you stand like greyhounds in the slips, Straining upon the start. The game's afoot: Follow your spirit; and upon this charge Cry 'God for Harry, England, and Saint George!' ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10528 From: Hawkspirit Date: Sun Jan 9, 2005 0:31am Subject: E-bay Bug Sweep How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] 10529 From: Date: Sun Jan 9, 2005 5:46am Subject: TICSA Can anybody tell me what a TICSA is please, sounds like a nasty illness. David McGauley England [Non-text portions of this message have been removed] 10530 From: Date: Sun Jan 9, 2005 5:55am Subject: Re: Once more into the breach In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com writes: ACT III. SCENE I. France. Before Harfleur King Henry urging his men on at the siege of Harfleur. Once more unto the breach, dear friends, once more; Or close the wall up with our English dead. In peace there's nothing so becomes a man As modest stillness and humility; But when the blast of war blows in our ears, Then imitate the action of the tiger: Stiffen the sinews, summon up the blood, Disguise fair nature with hard-favour'd rage; Then lend the eye a terrible aspect; Let it pry through the portage of the head Like the brass cannon: let the brow o'erwhelm it As fearfully as doth a galled rock O'erhang and jutty his confounded base, Swill'd with the wild and wasteful ocean. Now set the teeth and stretch the nostril wide; Hold hard the breath, and bend up every spirit To his full height. On, on, you noblest English, Whose blood is fet from fathers of war-proof- Fathers that like so many Alexanders Have in these parts from morn till even fought, And sheath'd their swords for lack of argument. Dishonour not your mothers; now attest That those whom you call'd fathers did beget you. Be copy now to men of grosser blood, And teach them how to war. And you, good yeomen, Whose limbs were made in England, show us here The mettle of your pasture; let us swear That you are worth your breeding- which I doubt not; For there is none of you so mean and base That hath not noble lustre in your eyes. I see you stand like greyhounds in the slips, Straining upon the start. The game's afoot: Follow your spirit; and upon this charge Cry 'God for Harry, England, and Saint George!' ------------------------------------------------------------------------------ ---------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ------------------------------------------------- --------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ------------------------------------------------------------------------------ ---------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ------------------------------------------------------------------------------ ---------------------- ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Well said Jim but there were Scots Welshmen and Irishmen there at the time so you may get a few complaints. I am seriously considering the AOR SR 2000 Surveillance Receiver due out early this year Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same spec as both I asked this question a few months ago nobody had an opinion so I am trying again I have no experience of AOR David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10531 From: Andy Moore Date: Sun Jan 9, 2005 11:26am Subject: Re: Once more into the breach Dave, we had cause to look at the birdies within the AR5000+3 recently and there plenty of them - given that the 5000 is 'top of the range' it seems fair to conclude that all other AOR radios will harbour similar birdies thus you need to consider the possibility of missing some signals (for whatever purpose you might be using the receiver). Andy M PS No complaints about the Shakespeare quotation but I'm a bigger fan of the Corries' writings myself! ----- Original Message ----- From: To: Sent: Sunday, January 09, 2005 4:55 PM Subject: Re: [TSCM-L] Once more into the breach > > > > In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com > writes: > > > > ACT III. > SCENE I. > France. Before Harfleur > King Henry urging his men on at the siege of Harfleur. > > Once more unto the breach, dear friends, once more; > Or close the wall up with our English dead. > In peace there's nothing so becomes a man > As modest stillness and humility; > But when the blast of war blows in our ears, > Then imitate the action of the tiger: > Stiffen the sinews, summon up the blood, > Disguise fair nature with hard-favour'd rage; > Then lend the eye a terrible aspect; > Let it pry through the portage of the head > Like the brass cannon: let the brow o'erwhelm it > As fearfully as doth a galled rock > O'erhang and jutty his confounded base, > Swill'd with the wild and wasteful ocean. > Now set the teeth and stretch the nostril wide; > Hold hard the breath, and bend up every spirit > To his full height. On, on, you noblest English, > Whose blood is fet from fathers of war-proof- > Fathers that like so many Alexanders > Have in these parts from morn till even fought, > And sheath'd their swords for lack of argument. > Dishonour not your mothers; now attest > That those whom you call'd fathers did beget you. > Be copy now to men of grosser blood, > And teach them how to war. And you, good yeomen, > Whose limbs were made in England, show us here > The mettle of your pasture; let us swear > That you are worth your breeding- which I doubt not; > For there is none of you so mean and base > That hath not noble lustre in your eyes. > I see you stand like greyhounds in the slips, > Straining upon the start. The game's afoot: > Follow your spirit; and upon this charge > Cry 'God for Harry, England, and Saint George!' > > > > > -------------------------------------------------------------------------- ---- > ---------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------- > --------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ---- > ---------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- ---- > ---------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > > > Well said Jim but there were Scots Welshmen and Irishmen there at the time > so you may get a few complaints. > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year > Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same > spec as both > I asked this question a few months ago nobody had an opinion so I am trying > again > I have no experience of AOR > > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > The manufacture and installation of custom designed covert electronic audio > and video devices. > Sweep Services - Professional physical and Electronic countermeasures > utilising state of the art laboratory radio scanning and detection equipment. > Note: Any fellow WAPI and UKPIN members welcome to phone or call in to > discuss projects and applications or simply for free advice. > Workshop located alongside M58 junc 3. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10532 From: G P Date: Sun Jan 9, 2005 0:50pm Subject: Re: vonage? Depends on who the threat is. If you're concerned about crusty lawyers and their linemen buddies from the local telco, then broadband is the way to go. If your opponent is more high tech and has access to a skilled hacker, then sniffing SIP is trivial, especially on shared layer-2 segments such as broadband cable. A Russian group disassembled the Motorola cable modem firmware a few years ago and discovered most cable modems are running a VXworks RTOS variant; after hacking the hardware, they released several new firmware images and a special cable (http://www.tcniso.net) which allows for sniffing of broadband network traffic from a cable modem (as well as a host of other features, such as unlimited bandwidth etc). Most providers don't have encryption turned on via DOCSIS, in addition if you aren't statically hardcoding the MAC address of your default route then any one of a number of tools can be used to redirect traffic on a broadband cable segment, to and from your PC, via ARP cache poisoning. Same thing on DSL segments, although it's a bit more complicated and depends on how the DSLAM is configured. VoIP via leased line circuit (T1 for example) would be the safest, especially if you are quashing or rewriting CLID on outbound VoIP calls so people can't track back the toll records tied to a specific phone number account. Do a Google for "Fox News" +AMDOCS, toll records are pretty easy to gain access to, and lots of foreign companies are handling the processing of telephone billing records. Our national comms are as porous as our physical borders. Asterisk to Asterisk (http://www.asterisk.org) gateways, with encrypted VPN links in the middle are very secure for interoffice comms, provided each branch network is secured from outside attack with a stateful inspection firewall. --- littledog wrote: > > > Hello, could anyone out the give me their insight on > the new broadband cable phone services? Are they > more or less secure and since it seems that > everything is controlled through a website (or is > it?) like customizing the service to a record of all > incoming and outgoing calls, are they vulnerable to > hackers? I'm new and still in the little red > schoolhouse..thanx > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10533 From: Tech Sec Lab Date: Sun Jan 9, 2005 2:19pm Subject: Comments... Anyone know anything about these people...? http://www.tscmnetwork.com/ TSCM Network Post Office Box 842 Millbrook, AL 36054, USA. 10534 From: Date: Sun Jan 9, 2005 10:17am Subject: Re: Comments... In a message dated 1/9/2005 12:20:26 PM Pacific Standard Time, tscmteam@o... writes: http://www.tscmnetwork.com/ website picture [Non-text portions of this message have been removed] 10535 From: John and Sheryl Date: Sun Jan 9, 2005 1:04am Subject: RE: E-bay Bug Sweep Now I have seen everything, just last week he was selling shoes, now sweep, next week.....to be continued... John -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: January 8, 2005 11:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] E-bay Bug Sweep How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10536 From: mark de Boer Date: Sun Jan 9, 2005 3:14am Subject: Re: E-bay Bug Sweep Interesting company, and very inexpencive too, 125 dollar per our rate, how can they bring 250000 dollar in equipment and then stil make some money. M.de Boer RRB security Hawkspirit wrote: How about an e-bay bug sweep HYPERLINK "http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=317&item=3865048754& rd=1&ssPageName=WDVW"http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category= 317&item=3865048754&rd=1&ssPageName=WDVW Electronic Surveillance - Counter Measures - Services Item number: 3865048754 You are signed in Highborne F. S. Inc. is a company specializing in Electronic Countermeasures to detect, locate, and eleminate unwanted and illegal wireless devices to protect your privacy. Hidden video and voice transmission devices can compromise your privacy through anything you say or do in the vacinity of a hidden microphone, camera , or other transmitting devices. We are not a company that sends a technician out with a little $100 or $200 hand held detector that in most cases will miss 90% of the hidden devices. We are backed with approximately $250,000.00 is test equipment to analyze buildings, boats, ships, aircraft, homes, and cars. The picture was taken at the last home contracted. Pricing will depend on the magnitude of the surveillance requirements. For example a "FULL SPECTRUM" analysis (covers billions of frequencies) for a 3 bedroom 2 bath home, with approximately 1800 sq ft, would require about 8 hours at $125.00 per hour. Accordingly the price shown as a 'Buy it Now' price represents one hour and travel / per diem is over and above the hourly rate on site. Counter measure surveillance can be conducted in one hour for all common hidden transmitter frequencies for a 800 sq ft area, however we strongly recommend a "Full Spectrum" analysis to ensure full coverage of the billions of frequency possibilities. A certified engineer with over 15 years plus experience will conduct the analysis and a report will be issued along with any immediate remedial actions required to eliminate discovered RF devices. In addition to this service, we can analyze any radio transmission device up to and including 40 Ghz for field strength, frequency, spurious radiation, bandwidth, stability etc. Contract with confidence to acquire the best in professional services! Call 918/688-3978 _____ --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.830 / Virus Database: 565 - Release Date: 1/6/2005 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- ALL-NEW Yahoo! Messenger - all new features - even more fun! [Non-text portions of this message have been removed] 10537 From: Ian Wraith Date: Sun Jan 9, 2005 11:26am Subject: Re: Once more into the breach Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian 10538 From: Robin Hunter Date: Sun Jan 9, 2005 0:55pm Subject: Re- One more into the Breach Well spotted Dave McGauley, any reading of the history of the British Army will illustrate that the Scots Irish and Welsh played a disproportionate part in the building of 'Empire' and this continues today, for example the recent move of the Black Watch in Iraq and the subsequent announcement by President Blair's government of their proposed disbandment. For hundreds of years, wherever Britain has been involved in conflict the 'Jocks' have been in the frontline, I am pretty sure Shakespeare's military record is as distinguished as Tony Blair's. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. [Non-text portions of this message have been removed] 10539 From: cornolio Date: Sun Jan 9, 2005 2:56pm Subject: Best wishes and some info Hello List, First of all I would like to whish you all the best for 2005! I hope the list will keep up the high quality postings I have seen last year. I would like to point a few things that caught my attention lately. The first one is Tor: An anonymous Internet communication system. This is very promising, especially since here in Holland providers are (going to be) forced to keep huge traffic logs of all sites and URL's visited by their customers! I have TOR running here, and they are not going to snoop my web behavior , and keep the logs till the end of times :) TOR now sponsored by the EFF : http://tor.eff.org/ And together with my friend Rop I wrote a small whitepaper on a new lock vulnerability. With this technique you can open practically any pin tumbler lock, including some (very) high security ones, in seconds, without leaving (much of) a trace. What is needed is a prepared key, a hammer and little training. A video shot at the CCC congress in Berlin will be online soon, but in the meantime you might want to read the whitepaper and upgrade your locks! http://www.toool.nl/bumping.pdf (less then one Mb) Greetings, Barry Wels 10540 From: Samuel Hayes Date: Sun Jan 9, 2005 8:57pm Subject: Re: Re: Microphones This string of responses seems to have gotten away from the original question about the microphones, so to divert attention back to that I will attempt to answer as a TSCM neophyte. I would think that a microphone placed more then 20 ft from the subject would not be efficient due to the amount of ambient noise in the environment. It would probably take a professional sound engineer and alot of expensive CSI like doohickeys to filter out the surounding noise and gain access to the relevant audio...but I could be wrong. Just an educated guess ( i hope). --- secureoffice wrote: > > Jim > > It's not my place to comment on the relationship > between two people or > how they behave. I was simply pointing out the fact. > It was not meant > as a condemnation or opposite. As a list owner you > are perfectly > entitled to do what you see fit. However, it's not > my place to comment > on who was right or wrong, and I won't. > > I was simply letting Mr Garrett know that he should > contact Steve > directly should he require his specific response. > > I trust the matter requires no further explanation. > > Kindest regards > > -Ois > > > > > > > > > > --- In TSCM-L@yahoogroups.com, "James M. Atkinson" > wrote: > > > > Ois, > > > > The only time that I have ever banned or removed > someone from the > list is > > when that person becomes extremely disruptive and > rude or abusive to > the > > list membership, or if I catch them doing naughty, > naughty things. > > > > Steve was indeed banned from this group a few > months back, but only > after > > his repeat transgressions significantly exceeded > his welcome and my > > tolerance of his often offensive Prima Donna > behavior. tripped the > squelch > > circuit. He was given ample time to mend his > behavior for at least six > > month before his being banned. > > > > "sapiens timet et declinat malum stultus > transilit et confidit, > > Proverb14:16 > > > > The list needs good communications, and a place > where members can ask > > questions and discuss all levels of TSCM from the > beginner and > apprentice > > levels to the Technician and Engineering levels. > The list exists to > > improve the profession, and for no other purpose. > > > > Also, greetz to the list members who are going out > to the Little Red > School > > house for the first time, enjoy the daily commute > (you know who you > are). > > > > -jma > > > > > > > > At 02:26 PM 1/5/2005, secureoffice wrote: > > > > > > >Steve was banned from the group by the group > owner, you'll need to > > >email him directly if you want his opinion. > > > > > >Regards > > > > > >-Ois > > > > > > > > >--- In TSCM-L@yahoogroups.com, "DJ" > wrote: > > > > > > > > > > > > Steve you could probably answer this one. In > the movie Enemy of the > > > > State (steve did a great job here), I saw many > microphones used at > > > > long ranges to listen into the subjects > conversations. Does anyone > > > > have any whitepapers or any other information > on the availability of > > > > microphones that will work at a distance of > over 20 feet from the > > > > subject? > > > > > > > > Thanks, > > > > IT2 Garrett > > > > > > > ---------------------------------------------------------------------------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, > and Real Wiretappers. > > > ---------------------------------------------------------------------------------------------------- > > James M. Atkinson > Phone: (978) 381-9111 > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 > Web: > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > > > ---------------------------------------------------------------------------------------------------- > > World Class, Professional, Ethical, and > Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > > > ---------------------------------------------------------------------------------------------------- > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10541 From: Date: Sun Jan 9, 2005 10:07pm Subject: Re: Once more into the breach In a message dated 09/01/2005 17:30:06 GMT Standard Time, ASMoore@A... writes: Dave, we had cause to look at the birdies within the AR5000+3 recently and there plenty of them - given that the 5000 is 'top of the range' it seems fair to conclude that all other AOR radios will harbour similar birdies thus you need to consider the possibility of missing some signals (for whatever purpose you might be using the receiver). Andy M PS No complaints about the Shakespeare quotation but I'm a bigger fan of the Corries' writings myself! ----- Original Message ----- From: To: Sent: Sunday, January 09, 2005 4:55 PM Subject: Re: [TSCM-L] Once more into the breach > > > > In a message dated 09/01/2005 00:44:05 GMT Standard Time, jmatk@tscm.com > writes: > > > > ACT III. > SCENE I. > France. Before Harfleur > King Henry urging his men on at the siege of Harfleur. > > Once more unto the breach, dear friends, once more; > Or close the wall up with our English dead. > In peace there's nothing so becomes a man > As modest stillness and humility; > But when the blast of war blows in our ears, > Then imitate the action of the tiger: > Stiffen the sinews, summon up the blood, > Disguise fair nature with hard-favour'd rage; > Then lend the eye a terrible aspect; > Let it pry through the portage of the head > Like the brass cannon: let the brow o'erwhelm it > As fearfully as doth a galled rock > O'erhang and jutty his confounded base, > Swill'd with the wild and wasteful ocean. > Now set the teeth and stretch the nostril wide; > Hold hard the breath, and bend up every spirit > To his full height. On, on, you noblest English, > Whose blood is fet from fathers of war-proof- > Fathers that like so many Alexanders > Have in these parts from morn till even fought, > And sheath'd their swords for lack of argument. > Dishonour not your mothers; now attest > That those whom you call'd fathers did beget you. > Be copy now to men of grosser blood, > And teach them how to war. And you, good yeomen, > Whose limbs were made in England, show us here > The mettle of your pasture; let us swear > That you are worth your breeding- which I doubt not; > For there is none of you so mean and base > That hath not noble lustre in your eyes. > I see you stand like greyhounds in the slips, > Straining upon the start. The game's afoot: > Follow your spirit; and upon this charge > Cry 'God for Harry, England, and Saint George!' > > > > > -------------------------------------------------------------------------- ---- > ---------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------- > --------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ---- > ---------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- ---- > ---------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > > > Well said Jim but there were Scots Welshmen and Irishmen there at the time > so you may get a few complaints. > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year > Its marketed as a cross bt the AR-ONE and the AR8600MK2 pretty much same > spec as both > I asked this question a few months ago nobody had an opinion so I am trying > again > I have no experience of AOR > > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > The manufacture and installation of custom designed covert electronic audio > and video devices. > Sweep Services - Professional physical and Electronic countermeasures > utilising state of the art laboratory radio scanning and detection equipment. > Note: Any fellow WAPI and UKPIN members welcome to phone or call in to > discuss projects and applications or simply for free advice. > Workshop located alongside M58 junc 3. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks for that Andy and noted Many thanks Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10542 From: Date: Sun Jan 9, 2005 10:13pm Subject: Re: Once more into the breach In a message dated 10/01/2005 00:27:22 GMT Standard Time, i.wraith@s... writes: Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks Ian Yes I also found the AOR agent here very friendly and helpful. I would not use this device to replace my Spectrum Analyser. I have not heard anything to put me off buying the SR2000 yet Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10543 From: Date: Sun Jan 9, 2005 10:22pm Subject: AOR 2000 Photo In a message dated 10/01/2005 09:14:09 GMT Standard Time, DEMTEC@A... writes: In a message dated 10/01/2005 00:27:22 GMT Standard Time, i.wraith@s... writes: Hello DEMTEC@A... wrote: > I am seriously considering the AOR SR 2000 Surveillance Receiver due out > early this year Its marketed as a cross bt the AR-ONE and the > AR8600MK2 pretty much same spec as both > I asked this question a few months ago nobody had an opinion so I am > trying again I have no experience of AOR I haven't used a SR-2000 and I don't think AOR had one at the Leicester show this year. I have used the AOR SDU-5000 at work and that is easy to use and understand if a little slow. However the SDU-5500 seems to have cured the speed problem. If the SR-2000 is what it appears to be (a SDU-5500 mated to a AOR-8600) then it will be a nice bit of kit. Obviously not as good as an Agilent analyser but a lot cheaper. As for AOR I am a big fan and the support here in the UK (provided by an office in Derby) is fantastic and they are always very helpful to users when other manufacturers just ignore you. I always recomend AOR receivers to customers who ask me which tracking receiver to use. Regards Ian ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Thanks Ian Yes I also found the AOR agent here very friendly and helpful. I would not use this device to replace my Spectrum Analyser. I have not heard anything to put me off buying the SR2000 yet Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> In low income neighborhoods, 84% do not own computers. At Network for Good, help bridge the Digital Divide! _Click Here!_ (http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links I have a very good quality A4 sized picture of the SR2000 supplied by AOR UK if any body would like a copy please let me know Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10544 From: Date: Mon Jan 10, 2005 8:38am Subject: Re: TICSA It stands for "TruSecure ICSA Certified Security Associate". It's a certification that complements the CISSP. More details are at: http://www.trusecure.com/knowledge/ticsa/index.shtml Note that TruSecure recently merged with Betrusted and now they go by the name Cybertrust, so the acronym may change to "CICSA" soon. 10545 From: Date: Mon Jan 10, 2005 9:19am Subject: Re: Vonage/VoIP Am I mistaken: I understood that Skype (another VoIP service) IS encrypted and thus much harder, if not impossible, to hack compared to Vonage or Pulver or... Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217) 524-6079 office (217) 467-4211 pager (217) 836-0919 mobile 10546 From: Tech Sec Lab Date: Mon Jan 10, 2005 11:38am Subject: RE: One more into the Breach [OT] LOL, reminds me of Rowan Atkinson's line, something like: ...and look, the machine gunning of 20,000 young men in 20 seconds just so Field Marshall Hague can move his drinks cabinet 6 inches closer to Berlin.... -Ois ********************************** Message: 10 Date: Sun, 9 Jan 2005 18:55:03 -0000 From: "Robin Hunter" Subject: Re- One more into the Breach Well spotted Dave McGauley, any reading of the history of the British Army will illustrate that the Scots Irish and Welsh played a disproportionate part in the building of 'Empire' and this continues today, for example the recent move of the Black Watch in Iraq and the subsequent announcement by President Blair's government of their proposed disbandment. For hundreds of years, wherever Britain has been involved in conflict the 'Jocks' have been in the frontline, I am pretty sure Shakespeare's military record is as distinguished as Tony Blair's. regards from Edinburgh, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com 10547 From: Tech Sec Lab Date: Mon Jan 10, 2005 11:51am Subject: Boeing probe intensifies over secret Lockheed papers Boeing probe intensifies over secret Lockheed papers By David Bowermaster Seattle Times aerospace reporter When Boeing fired a 60-year-old engineer named Ken Branch in 1999, he was cited for possessing proprietary Lockheed Martin rocket data in violation of company policy. Boeing and Lockheed were rival contenders for an enormous Air Force rocket program that both considered key to their future military and space prospects. And Branch, who had previously worked for Lockheed, apparently brought the documents with him when he joined the competition. Despite the intense rivalry over the rocket program, Boeing promptly alerted Lockheed and the Air Force that it had found the documents in Branch's files - a total of seven pages. That disclosure seemed like an impressive act of corporate honesty - until three years later, when Boeing attorneys let slip that the document trove found in Branch's cubicle actually contained 3,000 pages of Lockheed papers. When the Air Force later asked Boeing for a complete accounting, the tally mushroomed to 25,000 pages. Troubled by Boeing's constantly changing story and the massive quantity of purloined Lockheed trade secrets unearthed by subsequent reviews - more than 66,000 pages to date, held by at least five different Boeing workers - the Justice Department and Lockheed are investigating exactly how Branch came to join Boeing, how much information he may have taken with him and how it was used. And because of the document scandal, the Pentagon in 2003 stripped Boeing of launches worth $1 billion and suspended its rocket division from bidding for new government business. But the worst may be yet to come. Ongoing criminal and civil inquiries have spread into many corners of Boeing's $27 billion Integrated Defense Systems unit. Current and former Boeing executives could face indictments, and Boeing could owe Lockheed billions of dollars in damages. Additionally, the probes have intersected with the ever-expanding investigations of Darleen Druyun, the former Air Force acquisitions officer who is serving a nine-month prison sentence for improperly negotiating a job with Boeing. Branch's story is an intriguing tale of corporate spies, whistle-blowers, big-dollar defense contracts and alleged cover-ups. Yet most of it might have remained secret had Boeing not chosen to fight a legal battle with Branch after firing him. High-stakes rivalry Acquisition of McDonnell Douglas keeps Boeing in the running Boeing's all-out effort to win the Air Force's massive new rocket program began as a four-way competition. The Air Force had started the so-called Evolved Expendable Launch Vehicle (EELV) program in 1995 to create a new generation of advanced yet affordable rockets. At the time, the government was racing to build new space-based defense and spy networks, and telecommunications providers were planning scores of commercial-satellite systems. Boeing's space and defense revenues in 1996 were $5.8 billion, small compared with its commercial aerospace sales of $16.9 billion. To capitalize on the massive growth opportunities it saw in space, Boeing had purchased the rocket divisions of Rocketdyne in 1996 and would acquire the satellite-making arm of Hughes in 2000. Anticipating a winner-take-all contract that the Air Force estimated would be worth more than $15 billion over 20 years, as well as a leg up in the commercial launch business, Boeing and its three rivals saw the EELV as a pivotal project. Boeing and one other contender were eliminated in the Air Force's first cut, on Dec. 20, 1996. But Boeing stayed in the game because five days earlier it had announced plans to merge with McDonnell Douglas, one of the two EELV finalists. Boeing formally inherited McDonnell's Delta IV rocket program when the merger closed in August 1997. At the same time the merger was being hammered out, another fateful decision was being made much lower in the ranks at McDonnell: the hiring of Ken Branch away from rival Lockheed. Nearly everyone involved in Branch's hiring and in the subsequent investigations and lawsuits declined to comment for this story, citing the litigation. But documents in the case show how Boeing's pursuit of the rocket contract may have led it beyond aggressive competition and into industrial espionage and deception. Roots of a scandal Job applicant hints he can bring Lockheed secrets with him Branch joined the Delta IV team in January 1997, not long after the Air Force selected the Delta IV and the rival Lockheed Atlas V as finalists for EELV. He was paid $77,220, a 7.5 percent raise over his salary at Lockheed. In his first job interview with future boss Bill Erskine, a manager on the Delta IV ground-operations crew, Branch displayed samples of proprietary Lockheed data and hinted he could provide more if he got a job, according to a deposition by Erskine in Branch's wrongful-termination suit. Ex-Lockheed workers were prized commodities at the time. It was not unusual for them to turn up at Boeing. With only a handful of rocket builders in the United States, job switchers often moved from one competitor to another. In March of that same year, Frank Slazer, director of Delta IV business development, instructed his staff to interview former Lockheed employees "regarding their thoughts and impressions of Lockheed Martin's probable approach" to the EELV program. He cautioned, though, that they should follow the company's ethical guidelines and not seek any proprietary information. "Whatever it took" Manager pumping for information had just completed ethics training Though Branch worked on the Delta IV ground operations crew in Titusville, Fla., he traveled 43 times to the project's headquarters in Huntington Beach, Calif., during the 18 months that Boeing was preparing its formal bid to the Air Force, according to Lockheed's civil suit. The purpose of the visits is not clear from the public record. Erskine's depositions indicate he believed Branch was being pumped for information by Boeing executives, including Larry Satchell, leader of the "capture team" tasked with gathering data about the rival Atlas V. "As far as getting competition information out of Mr. Branch, the folks in Huntington Beach were the kings," Erskine later told a Boeing lawyer during an internal investigation. In October 1998, the Air Force awarded portions of the EELV contract to both finalists. Lockheed was widely considered the superior rocket builder, but the Pentagon cited Boeing's lower prices and gave it the lion's share - 19 of the first 28 EELV launches to Lockheed's nine. The Lockheed documents in Branch's files remained a closely held secret, even within the Delta IV project, for another eight months. But in June 1999, Erskine allegedly told fellow Delta IV worker Steve Griffin about Branch's job interview, and his offer to bring the entire Lockheed rocket proposal with him if he were hired. Branch has denied any such quid pro quo. In a later deposition, Griffin said he was stunned by Erskine's story, especially since he and Erskine had just completed ethics training. But he said Erskine told him he was "hired to win" and "was going to do whatever it took." Griffin alerted Boeing's legal department. Boeing had to confront a troubling internal issue - and the likelihood of leaks: Griffin's wife, Bridget, worked for Lockheed, and Boeing feared she would tell her employer what her husband had learned. Boeing attorney Mark Rabe was dispatched to investigate. He quickly found documents marked "Lockheed proprietary" in both Branch's and Erskine's offices. That triggered the calls to Lockheed and the Air Force. Boeing attorney Gary Black informed Lockheed that Boeing had found seven pages of harmless data, and said no one except Branch or Erskine had seen or used it. Boeing Delta IV program manager Michael Kennedy called the Air Force to report the same thing. Those calls, however, vastly understated the proprietary data found in Rabe's original investigation. In a later deposition, Rabe said there was a "five- to six-inch stack" of Lockheed material on Branch's desk, and "approximately one additional box of Lockheed Martin marked information" found in subsequent searches. But an investigator for the Pentagon's Defense Criminal Investigative Service said later in a separate affidavit that Rabe's initial search turned up "approximately 3,000 pages of material and filled two document storage boxes." And when the Air Force investigated the document theft in summer 2003, it concluded that Rabe had found eight boxes containing 24,500 pages of Lockheed material. Seven pages? Or 25,000? Many documents were at first considered nonproprietary What exactly Rabe found, and when, are crucial issues as investigators try to answer a fundamental question: Did Boeing orchestrate a cover-up to deceive Lockheed and the Pentagon about the quantity of stolen data in its hands? Or, as Boeing claims, did the company innocently misclassify much of the information in Branch's cubicle as nonproprietary and thus insignificant? Five months after alerting Lockheed to the seven pages, Black called again in November 1999 to say an exhaustive investigation had revealed 197 more pages of proprietary Lockheed data at Boeing. Again, Black said no one outside of Branch or Erskine had seen or used it, and the documents were of little relevance. Boeing stuck to that story for two years. But when Boeing began fighting the wrongful-termination suit that Branch and Erskine filed over their 1999 firing, the company inadvertently revealed the full scale of the document theft. Specifically, two Florida lawyers hired to defend Boeing in March 2002 filed a "statement of undisputed facts" that acknowledged the full box of Lockheed data that Rabe had found. They notified Lockheed in November 2001 and sent it 2,700 additional pages of material beyond the 204 Black had returned in 1999. Suddenly alerted that Boeing had at least 10 times as much confidential Lockheed data as previously acknowledged, Lockheed asked for full disclosure from Black and Valerie Schurman, who was the lead lawyer for all Boeing space and communications businesses at the time. Although the two Boeing attorneys were privy to Rabe's findings from the start, they reiterated that Boeing had turned over everything it had found to Lockheed - about 3,000 pages, or 22,000 pages less than it would turn over in April 2003. Boeing explains these early discrepancies this way: It says attorney Black was aware of the roughly 3,000 pages of Lockheed material found in Branch's office in 1999. But he believed only 204 pages were truly proprietary, and those were the ones he returned to Lockheed in November 1999. Black never updated the Air Force that Boeing had found material beyond the original seven pages, but the company insists that was merely an oversight. "We've been very candid with the Air Force," said Boeing spokesman Dan Beck. "Mistakes were made, follow-ups were not done that ought to have been done." The Air Force, in April 2003, made a specific written request to see all Lockheed material found in the offices of Branch and Erskine. A new Boeing attorney handling the case then sent the Air Force and Lockheed 22,000 pages of data. This massive document dump prompted Air Force deputy general counsel Steven Shaw to conclude in an investigative report that Boeing hadn't been straight with the government from 1999 to 2003. "The information Boeing provided to [Lockheed] and the Air Force was false and misleading," he wrote. Boeing insists those thousands of pages beyond the initial 3,000 found by Rabe were not reported because they were innocently misplaced. In 1999, Rabe retrieved everything in Branch's office that he believed might be sensitive Lockheed material, said Boeing spokesman Beck. But around 15,000 pages of Lockheed material from Branch's office were deemed inconsequential, so a member of Boeing's security staff boxed them up and sent them to external Boeing lawyers for storage. An additional 7,000 pages of documents found in a technical library, and allegedly brought to Boeing by Branch, were sent to the same lawyers. There, they were ignored for more than three years. More to come "Substantial violations of federal law," Air Force undersecretary charges The Air Force came down hard on Boeing after the April 2003 disclosures. Within three months, Undersecretary of the Air Force Pete Teets stripped Boeing of seven launches worth $1 billion and reallocated them to Lockheed. He also suspended Boeing from bidding for new government launch business until the criminal investigation is complete and the Air Force is satisfied Boeing has changed its ways. That suspension has stretched for more than 19 months, and its endpoint is unknown. "Boeing has committed serious and substantial violations of federal law," Teets said at a news briefing in July 2003. The Air Force also referred the case to federal prosecutors. The U.S. Attorney in Los Angeles charged Branch and Erskine in 2003 with conspiracy to steal trade secrets. Satchell, chief of the "capture team," is a target of the probe and is likely to be charged as well, said his attorney in court papers. Branch and Erskine will be tried in March, and the criminal investigation remains active. Prosecutors have amassed more than 160,000 pages of evidence and at least nine current or former Boeing employees have testified before a federal grand jury, according to court filings last year. The same court papers revealed that Boeing acknowledged to the U.S. Attorney in 2003 that at least 10 of its workers were aware Branch possessed stolen Lockheed documents during his tenure at Boeing. Yet Boeing continues to insist that the papers were not used to determine the pricing it offered the Air Force in 1998. Meanwhile, Lockheed is pressing a civil racketeering suit that claims Branch's delivery of documents was part of a "pattern and practice by Boeing to engage in economic espionage" to win government contracts. By bringing its case under racketeering statutes, which are more often applied to organized-crime cases, Lockheed can seek triple damages if it wins. Lockheed has not specified any damages, though it claims simply developing the Atlas V cost $1 billion. A trial wouldn't begin before 2006. To prevail, Lockheed must show Boeing is a "corrupt organization" with a pattern of illegal behavior. Toward that end, Lockheed is seeking to demonstrate that Boeing has repeatedly used stolen trade secrets to win government contracts. Lockheed's civil suit cites other cases in which Boeing has been sanctioned by the government for possessing a competitor's trade secrets, most notably Raytheon documents related to a competition to build a missile that would destroy enemy warheads in flight. Boeing was forced to withdraw from the competition in December 1998 when the Air Force discovered that the company had improperly obtained and disseminated Raytheon data. And the Darleen Druyun scandal that erupted in December 2003 unexpectedly provided additional material for Lockheed investigators seeking to establish a pattern of Boeing improprieties. The former Air Force procurement official was hired by Boeing and then fired 11 months later, along with Boeing Chief Financial Officer Michael Sears. Both have pleaded guilty to holding improper job negotiations while Druyun was at the Air Force. Significantly for Lockheed's case, Druyun has admitted giving Boeing preferential treatment in the award of more than $5 billion of Air Force contracts in return for jobs for herself and members of her family. She also acknowledged that while negotiating Boeing's proposal to lease 100 767 refueling tankers to the Air Force, she gave Boeing "what at the time she considered to be proprietary pricing data supplied by another aircraft manufacturer," according to the Justice Department. Airbus, the European airplane maker, was bidding against Boeing on the tankers at the time. Lockheed made an even graver allegation in November when it asked the court in Florida to allow it to file evidence that it claims demonstrates Druyun gave Boeing Chairman Harry Stonecipher and IDS chief Jim Albaugh insights into the launch prices Lockheed had proposed during the 1998 EELV competition. Boeing has filed a that accuses Lockheed of overstating Branch's conduct. It calls the Lockheed suit "an opportunistic attempt to use the acknowledged facts surrounding the Branch incident to inflict reputational and competitive harm upon Boeing." And Boeing flatly denies that Druyun played any role in the company's EELV bidding. Battling perception Just engineers bringing samples of their work from job to job? When Stonecipher replaced Phil Condit as CEO in 2003 after the firings of Druyun and Sears, he said his top priority was "dealing with this perception that we're a bunch of crooks." That task is likely to remain on Stonecipher's "to-do" list for some time, because the outcomes of the various investigations triggered by Branch are a long way off. Since Lockheed filed its racketeering suit in 2003, Boeing has conducted several more searches for Lockheed data in its employees' files and computers. For instance, one ex-Lockheed engineer, Donald Deming, turned over more than 11,000 pages of Atlas V material he had brought with him when he joined Boeing. Another, Dean Farmer, had 24,000 pages dealing with Lockheed satellite programs. Boeing says the incidents are harmless cases of engineers innocently bringing their own work papers from one job to another. But Lockheed has used each of these incidents to expand the scope of its racketeering suit, and the U.S. Attorney is expected to investigate each Boeing worker who improperly held or used Lockheed data. A source close to the investigations indicated Lockheed believes the number could reach as high as 20 to 25 Boeing workers. David Bowermaster: dbowermaster@s... 10548 From: James M. Atkinson Date: Mon Jan 10, 2005 0:07pm Subject: Computer crime to cost exec $27,000 Computer crime to cost exec $27,000 Date: January 09, 2005 Source: NOLA.com http://www.nola.com/ By: Mary Swerczek A Luling man who was accused of digitally spying on his former company has been sentenced to home imprisonment and must pay $27,000 for breaking into the company's computer system, the U.S. attorney's office said. David W. Avgikos, 42, was sentenced Wednesday by U.S. District Judge Lance M. Africk to six months home detention with electronic monitoring and four years probation. Avgikos also must pay Turbo Squid Inc. $17,000, the amount it cost the company to secure its computer system. After Avgikos pays the restitution, he also must pay a $10,000 fine. He could not be reached for comment Friday. Avgikos had been an owner of Turbo Squid, a company that sells three-dimensional images and software online, and left after he had differences with others at the company, Assistant U.S. Attorney Tony Gordon Sanders said. While he was still at Turbo Squid, Avgikos created passwords to access the company's database and Turbo Squid's bank account maintained by Whitney National Bank, Sanders said. As head of Digimation, a company that also sells 3-D images over the Internet, Avgikos accessed those databases to spy on his former company's movements and their finances, Sanders said. The FBI began investigating after Turbo Squid found the security breech. Avgikos was indicted by a federal grand jury and pleaded guilty Sept. 22 of last year. Turbo Squid's CEO, Andy Wisdom, wouldn't comment Friday. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10549 From: James M. Atkinson Date: Mon Jan 10, 2005 5:01pm Subject: Little cloak, less dagger http://www.sptimes.com/2005/01/09/Perspective/Little_cloak__less_da.shtml Little cloak, less dagger An ex-CIA agent talks about the real life of a spy and why she left the agency. By BILL ADAIR, Times Washington Bureau Chief Published January 9, 2005 Lindsay Moran, 35, wrote about her experiences with the CIA in "Blowing My Cover: My Life as a CIA Spy." Lindsay Moran decided she wasn't cut out to be a spy. She was drawn to the CIA by the cloak-and-dagger image and a sense of patriotism. She survived grueling training at "the Farm," the agency's famous boot camp, and ended up in Macedonia as a case officer, recruiting foreign agents to spy for the United States. But she quit after five years, unhappy with the CIA's Cold War culture, its sluggish response to terrorism and the heavy demands on her personal life. Moran, 35, has written about her experiences in a surprisingly funny book called Blowing My Cover: My Life as a CIA Spy. She spoke last week with Times Washington Bureau chief Bill Adair. Here is an edited version of that interview: Adair: Your basic cover was that you were an American diplomat. But you also pretended to be a travel writer, right? Moran: Generally you are left to make up your own cover story, which I actually think is good. It enables you to form an alias that is comfortable to you. I had always been a writer of sorts and enjoyed writing, so (being a travel writer) felt comfortable to me. Was it hard to remember who you were at any given moment? Yes it was. That was the biggest stress for me. While I was traveling, I would repeat to myself what my name was, what my birthday was. What could you tell your friends and family about your job? The agency kind of leaves it up to you to make those decisions. Some people don't tell anyone. They don't even tell anyone in their immediate family. Other people tell everyone - and that can be a problem. My mother, my father, my brother knew that I was working at the agency . . . and that I was overseas ostensibly as a diplomat. Your training at the Farm made the job look so sexy. But when you finally got overseas, it didn't seem nearly as exciting. Why? We were all aware that training didn't have a lot of relevance on what our jobs would be. It was more of a confidence builder or an Outward Bound sort of thing. Actually being a spy is a lot more banal. You are not crashing your car through barriers; you are not jumping out of planes. You are basically preying on people you think have vulnerabilities. That means spending a lot of time with people you might think are losers. I tried to target people that I thought would be interested in working for the U.S. out of ideological inspiration. But the reality of espionage is that most people do it for the money. Your job reminded me of selling Amway. You were recruiting these people, trying to build your team, paying them and buttering them up. That's a great analogy. The agency is a little bit cultish. You have to believe in what you're selling. When I got to the point where I felt like I didn't really have confidence in what I was selling, it made it 10 times more difficult for me to go out and sell. I could see why people at the agency are very nostalgic for the Cold War. That was a time when everything was so clear-cut. We were the good guys, (the Soviets) were the bad guys, and everybody really did believe in what we were selling. What about the mission didn't you believe in? I am a very patriotic person and have always believed that, no matter the faults with the American system of government, it's still the absolute best that there is. But on a personal level, it was hard for me to make an argument to people that I was targeting (that they would benefit from spying for the United States). You said the job left you "desperately lonely." Why? I cut off most of my friendships outside the agency. A friendship is obviously affected when, on some fundamental level, you are lying all the time. And that's what I was doing in all my relationships. I became increasingly uncommunicative and insular. The agency does become your family in a way. Those are the only people who know what you're doing and those are the people that you can talk to. But by the same token, it's a paranoid and secretive environment and nobody really trusts anybody else. So it's a big family, but a dysfunctional family because everybody is sort of jockeying for their own position and you all know that the rest of you are all liars. You describe lots of waste and excess - handing out $100 bills to informants who give worthless or inaccurate information. Is the CIA spending our money wisely? I don't think so. One of my personal beefs, both as a former CIA employee but also as a citizen, is that the intelligence budget remains classified, and the agency claims that it's classified because to reveal that information would be some kind threat to national security. My feeling is the threat to national security is having an intelligence agency that is not accountable for the, perhaps, $40-billion that it gets a year. There is incredible waste at the agency. One friend who worked at the agency told me that, at the end of the year, everybody got a free Palm Pilot. The deal was that they had this money they hadn't used. But they wanted to use it so that the following year, they could still get the same amount of money. Stuff like that, I'm sure, happens everywhere, but in the wake of Sept. 11, which was such a devastating intelligence failure, you would think there would be a lot more scrutiny on how money was spent. Is it true that when you paid cash to a foreign agent, you had to get them to sign a receipt? Yeah. (She laughs.) It's kind of funny that you have to cross your t's and dot your i's in that way. But at the end of the day, it's still government funds and, even if they sign it Mickey Mouse, you've got to get some sort of receipt. Why did you ultimately leave? I was in Russian language training, and we started this buildup to go to war. I wasn't an Iraqi expert, I wasn't a WMD expert. But it seemed kind of crazy that we were going to war. (Then) I was taken out of language lessons right as the war was starting and put in Iraqi Operations - not in Iraq, because we didn't have anyone in Iraq then, but in Headquarters. I thought, this is good, because now I'm going to see why we're going to war. I was really astounded. The agency tends to be a really hawkish, conservative environment. But I couldn't find anyone there who was gunning for this war. Everybody who was in the agency knew we were already really spread thin by Afghanistan. We were sending every yahoo and his brother to Kabul. And all of a sudden, we were going to start this other initiative in Iraq. The agency didn't have the people. Even though I'm critical of the agency, I'm really protective of it in terms of being portrayed as having provided the president faulty intelligence. When we were first going into Baghdad and it wasn't a cakewalk, I said to one of the heads of Iraqi Operations, "Did we say this was going to be a cakewalk?" He said, "No, we were very explicit with the administration that this is a clan society, it's going to break down." It's not going to be easy to go in there and set up a democracy, as the administration seemed to be advocating. Having very conflicted feelings about the war - my brother was a fighter pilot in the war - what I saw was that I had joined this organization to serve my country. And over the course of the five years I was there, I realized that you end up serving the organization over your country. And once I realized that I didn't know who the CIA was serving I just decided I didn't want to be a part of it any more. It seemed like there was a personal side to your departure, too. When I met the man who became my husband, he was such an example to me of someone who lived by his own terms. It reminded me who I had been before I joined the agency. It was so refreshing and relaxing to actually just be myself. In the agency, I was very reticent to speak my mind - as almost everybody was - because people are so distrustful and ready to jump on you. Plus, I was virtually living like a double or triple life. You were required to submit your manuscript to the CIA before it could be published, to make sure it did not reveal classified information. Tell me about that. One of the persons on the review board put it to me this way. He said, if you want to write everyone at the CIA is a drunk, you can write that because it might be true or it might not be true. But it's not classified information. I think there is a misperception that a lot of people have that when you join the agency, you sign away your right to ever say anything. Certainly there is the secrecy agreement, which is a very serious thing. I took it seriously. But ultimately, unless they can prove that what you're writing is classified or is in some way a threat to national security, they can't keep you from expressing your opinion or telling about your experiences. Would you recommend the CIA as a career? You know, after all that's been said and done, I probably still would. If you can hack the lying and the leading a double life and all the sacrifices you make, it's not a bad life. You're living overseas, you're probably doing well financially and there's always that reassurance you have that you are doing something that very few people in the world will ever be able to do. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10550 From: G P Date: Mon Jan 10, 2005 11:02pm Subject: Re: Vonage/VoIP Skype is in fact heavily encrypted, and functions as a peer-to-peer VoIP system. It can't really be considered VoIP in the sense that it is not compatible with the other standards and protocols, such as SIP and Asterisk's IAX. Skype was initially designed as a P2P voice communications system, but now they are going to be offering Skype-to-landline calls in the immediate future, with support for lots of different PDAs and GPRS-enabled cellphones. Skype is a neat concept, although there have been some security flaws in the application itself (leading to system compromise via buffer overflow attacks on the local listening service). Skype could very well replace the conventional telco, the vocoder they use is very high quality (better than a regular landline), and they've partnered I think with Siemens to produce a low cost and simple USB gadget that turns your USB port into an RJ11 POTS line so you can plug a cordless phone or whatever into it. --- sewellr@i... wrote: > > > > > > > Am I mistaken: I understood that Skype (another VoIP > service) IS encrypted > and thus much harder, if not impossible, to hack > compared to Vonage or > Pulver or... > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10551 From: G P Date: Mon Jan 10, 2005 11:06pm Subject: Wackenhut founder dies http://www.washingtonpost.com/wp-dyn/articles/A54899-2005Jan6.html By Matt Schudel Washington Post Staff Writer January 7, 2005 George R. Wackenhut, the founder of a global security company that has guarded U.S. embassies, nuclear power plants and the trans-Alaska oil pipeline as well as neighborhood malls and countless private homes, died Dec. 31 of a heart ailment in Vero Beach, Fla. He was 85. A hard-nosed businessman who began his career as an FBI agent tracking down counterfeiters and check forgers, Mr. Wackenhut capitalized on the nation's growing concern about corporate and personal security as he expanded his Florida-based company from a four-man operation in 1954 to a multibillion-dollar corporation. In 1984, he launched a subsidiary to design and manage jails and detention centers for the burgeoning private prison market in the United States and abroad. In time, Wackenhut Corp. became the nation's second-largest private prison operator. When Mr. Wackenhut sold his company to a Danish firm in 2002, it operated in 54 countries and had $2.8 billion in revenue. Mr. Wackenhut was an outspoken political conservative with ties to powerful Republicans and high-ranking leaders of the military, FBI and CIA. His office, with chairs carved in the shape of elephants, reflected his political leanings. Frequent rumors that his company was in the employ of the CIA were never substantiated, but Mr. Wackenhut, who was obsessive about high-tech security gadgets in his private life, seemed to relish the suggestion. Several of his senior executives were, in fact, former CIA operatives, and his company's board of directors included former FBI director Clarence Kelly, former National Security Agency director Bobby R. Inman, and former Defense secretary and deputy CIA director Frank Carlucci. On rare occasions, his company's clandestine work did land in the headlines. In 1991, a U.S. House committee investigated charges that a Wackenhut executive, working for a consortium of oil companies, illegally spied on a whistleblower exposing environmental damage caused by the oil industry. The executive, who had also discussed trying to implicate a California congressman in his sting, resigned immediately after a meeting with Mr. Wackenhut. Wackenhut-operated prisons have had problems as well. In 1999, the company lost a $12 million annual contract to run a jail in Texas when several Wackenhut guards were indicted for having sex with female inmates. Nonetheless, Mr. Wackenhut cultivated an image of probity, toughness and precise military order. His teak-and-granite office was spotless, and he kept a barber's chair in his private bathroom to avoid leaving the office for a haircut. George Russell Wackenhut grew up in Upper Darby, Pa., outside Philadelphia. An outstanding athlete, he was a professional soccer goalie with the Philadelphia Nationals in his youth. He graduated from what is now West Chester University in Pennsylvania. Stationed in Hawaii with the Army Corps of Engineers, Mr. Wackenhut was present at the Japanese attack on Pearl Harbor on Dec. 7, 1941. He recalled that he was so close to a Japanese warplane that he could see the face of the pilot. After serving in the Pacific, he moved to Baltimore, where he received a master's degree in education from Johns Hopkins University and taught classes in physical education and health. In 1951, Mr. Wackenhut joined the FBI as a special agent in Indianapolis and Atlanta, resigning in 1954 to launch a company in Coral Gables, Fla., with three other former agents. At one point, they had to pass the hat to meet payroll, and the company's total assets amounted to $1.56. After early struggles -- including a fistfight between Mr. Wackenhut and one of his partners -- he took sole control of the company in 1958, naming it for himself. After working all day in the office, he sometimes worked as a security guard at night. By 1964, he had contracts to guard the Kennedy Space Center in Florida, as well as the Atomic Energy Commission's nuclear test site in Nevada. He branched out to include food service for prisons and to provide protection for companies going through labor strikes. The core of his business, though, was providing security guards to watch out for criminal activity. Ironically, his company moved from the Miami suburb of Coral Gables to Palm Beach Gardens, Fla., in part because Miami's high crime rate made it difficult to attract good workers. In 1994, an 800-page biography of Mr. Wackenhut, called "The Quiet American," [1] was published. When he sold his company for $570 million in 2002, he owned more than 50 percent of its stock. Even with a tight profit margin of 2.5 percent, the company's earnings allowed Mr. Wackenhut to live lavishly in homes scattered throughout the country. Until he moved to Vero Beach nine years ago, his primary residence was a $10 million turreted mansion near Miami decorated with firearms and medieval suits of armor. His house was wired with infrared and laser sensors, closed-circuit television monitors and photo-cell surveillance and had private radios for his family. Survivors include his wife of 61 years, Ruth Wackenhut of Vero Beach, who was the company's secretary for many years; two children, Janis Ward and Richard Wackenhut; seven grandchildren; and three great-grandchildren. 10552 From: fjansgmxnet Date: Tue Jan 11, 2005 4:14am Subject: Re: Digital Cell phone scanning > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? Well, the tricks changed. In the digital world the estranged husband or the engaged investigator has to place a conventional bug in the cell phone of his wife. The best type of bugs I have seen are very small transmitters hidden in the accumlator pack of the cell phone, which could switched into a sleep mode to save power: Very fast to install and the victim feeds the bug with power in regular intervals whereever it goes. On Contras website (www.tetrascanner.com) there was a video from the German BSI showing this type of bug for a Motorola gsm phone. But I don't remember the exact link. The equipment to monitor digital cell phones at the air interfaces is expensive. Therefore I would expect it only at the "agency" level, if the folks don't know the current phone number you are using. Regards, Frank 10553 From: Tech Sec Lab Date: Tue Jan 11, 2005 11:36am Subject: List Member Craig...YOUR FAMOUS!!! :D Congrats! -Ois ********************** HEADLINE: Walls do have ears in industry BYLINE: BATHGATE Adrian BODY: Recent accusations made about the SIS spying on citizens has thrown up the question of espionage, something most Kiwis think belongs in the shadowy world of cold war movies. ADRIAN BATHGATE takes a look at what companies can do about the threat of bugs in the boardroom. Shaken, but not stirred. According to the experts, this is the response of many executives on being told they have been bugged. It's a scenario that's played out more often than you might think as about 3 to 5 per cent of "bug sweeps" turn up listening devices. Bugs can be planted for several reasons, say de-buggers. It may be competitors looking to assess what a company is up to, or it could be a party to negotiations, wanting to see what the opposition is thinking. Sometimes companies will sweep for bugs after a senior executive leaves, to make sure no secrets leave with them. Or perhaps a business partnership has fallen apart acrimoniously. Most companies are aware they have sensitive information, but not all would think of bugging as risk to them, says Craig Meldrum, the managing director of bug detecting firm Communications Security. "It's not the way most people get attacked. The high risk areas are things like documents rubbish or people selling secrets to competitors." Meldrum says his company detects devices in "about 3%" of the checks they do. Increasingly diverse technology has made catching the bugs that little bit harder, says Steve Willetts, managing director of Confidential Security Services. Advanced camera phones and advances in electronics means listening devices can either be more secretive or more blatant. For instance "hopping bugs", with a transmitter and a receiver which will constantly change frequency to attempt to foil detection. Willetts estimates his company has about a 5% hit rate with discovering bugs. "The proper way to do a sweep is if you're going to do the office, it's good to also do the home. Today, everybody takes work home." Meldrum says 80% of his firm's business is "precautionary". Large companies and government departments will have their headquarters "swept" for bugs every six or 12 months. Most of his clients are larger firms or those in "high value industries", such as financial institutions or lawyers. The most common form of bugging is via audio devices, usually in the boardroom or office, Meldrum says. "You don't have to enter a building to bug it," Willetts says. One of his checks is to the phone line entering a building which can be easily tapped. Devices can be planted in several ways by several people. Possibly they could be left during a visit, or someone could disguise themselves as a tradesman or cleaner. It can be surprisingly easy to gain access to many corporate head offices in New Zealand, the professionals say. It can range from a bug stuck with Blu-tack and "palmed" onto the bottom of the boardroom table. Or at the other end of the spectrum, someone could hire a professional with sophisticated method and equipment. There is no doubt the threat from espionage has changed, Meldrum says. The rise of the internet means a lot of information theft comes in the form of "hacking". "It doesn't mean that threat's gone away, because a lot of things are said that won't get written down." The problem, says Willetts, is people who plant devices often return to retrieve them, so there can be no confirmation that an office has been previously bugged. "If they've got access to it, it'll be in, do what they want it to, and it'll be gone again." According to the web, starting prices for counter-surveillance sweeps start at $ 250 per hour. Meldrum declined to go into the specifics of pricing, but says an organisation with a boardroom and six to 12 executives could be charged between $ 2000 and $ 5000. Willetts says his company will charge from around $ 250 an office. Bug sweeping involves using hi-tech equipment to conduct a "spectrum analysis" which can detect any transmission from very low to very high frequencies. A device called a non- linear junction detector can detect the presence of an electronic circuit, even in the absence of electricity. This can detect devices planted behind walls or inside false ceilings. Besides this, looking in all the usual places is a factor, Meldrum says. "A large proportion is actually physical search, crawling around the place." Some of New Zealand's larger companies spoken to by the Dominion Post all indicated the threat of espionage is something they take seriously. They were also united by being reluctant to divulge details of steps they take to combat the threat of spying. A spokesman for Carter Holt Harvey said the company did not comment on security matters. Fonterra also were unable to comment. A Lion Nathan spokesman said the company was confident it had the measures in place to combat any such incidents. One corporate that did not want to be named said it frequently checks for surveillance devices but has yet to turn anything up. Telecom spokesman John Goulter said the company takes the issue of security of information very seriously. Goulter says Telecom has a risk management team who look at threats to the company across a broad range of issues. "We have a number of policies and practices in place and we audit them against international benchmarks," he said. Goulter says this is an ongoing process and has been the focus of more attention over time. The idea of using covert surveillance devices is by no means a new one. Recent publicity over the alleged activities of the Security Intelligence Service has prompted former Labour Cabinet Minister Richard Prebble to say that during the Lange era in the 1980s, Government ministers were instructed to use payphones for confidential conversations. Allegations of bugging go right to the top, with a former British Cabinet minister alleging earlier this year that eavesdropping on the Secretary- General of the United Nations was a "tradition". New Zealand was alleged to be among countries shown transcripts of current Secretary-General Kofi Annan's phone calls. Then there's Watergate, perhaps the most famous bugging incident of them all. In 1972 five men were caught breaking into and bugging the offices of the Democrat Party at the Watergate Hotel in Washington. Republican president Richard Nixon was forced to resign in 1974 after secret tapes brought to light by the Washington Post showed Nixon had known about attempts to cover up the break-in for two years. Meldrum has been in the business with Communications Security for 20 years. The early days of "frantic corporate activity" of the mid-1980s, and early 1990s was the busiest period, he says. Business for his company has declined over time, Meldrum says, which is a function of the changing nature of our economy. "There are so few major corporates left in New Zealand compared to 10 years ago. Everything's a branch office now." But he is confident his services will always be required, pointing to the fact that most major companies and Government departments will de-bug their offices at least once a year. While the idea of espionage may be somewhat romanticised, debugging experts agree the threat is real, and some awareness is there. While the companies with sophisticated search devices do their periodical checks the best defence against espionage is not in high tech electronics, but vigilance of staff. "If somebody wants a conversation bad enough, and it's important enough, they're going to find a way to get it," Willetts says. Maybe it's time to check out where your nearest phone box is. 10554 From: Tech Sec Lab Date: Tue Jan 11, 2005 1:51pm Subject: IR Risk Comments? LENGTH: 597 words HEADLINE: LIGATT Issues Computer Security Alert; Computer Infrared Ports Can Be Used to Hack Into Your Computer DATELINE: Sep. 14, 2004; LOS ANGELES, CA; MARKET WIRE BODY: Laptops have increased business productivity in countless ways. No longer does an employee sit on an airplane content to watch a movie or read or a book. Many professionals are increasingly using travel time to finalize presentations or write memos to staff members or catch up with email after a busy day of meetings. How could this be a security issue? The example below illustrates such an occurrence. While traveling to a job site a LIGATT security team member was finishing a presentation on a flight and all of a sudden an icon popped up which notified her that she was attached to another person's computer via the infrared port. "Sure enough, the person sitting in the aisle next to me was on his laptop. Another few minutes passed and his head popped up and he started glancing around -- he had also just realized that our computers were now connected and communicating," says LIGATT security team member Merike Kaeo. The good news is that Microsoft has been careful in deploying appropriate defaults so that it would not be easy for someone to maliciously send you a virus or worm. Amazingly enough, little attention is paid to the infrared port that comes standard with most laptops on the market. As a method of research LIGATT security team members walked into a Borders bookstore where students were studying and placed our PDA next to a laptop with infrared port. We wrote a script that would copy all of the files from the "My Documents" folder. Our PDA running Windows CE connected to the infrared port and began copying the files. After a period of time we were able to gain entry into two out of ten computers and started copying files. We then showed potential victims how to go into Windows and turn on security for infrared port. Once files are received on PDA the files can be emailed to another destination. This could be used in an industrial espionage situation. How do you protect yourself? The first step in the process is to make Windows aware of your computer's infrared port. If you're running Windows on a notebook PC with a built-in infrared port, then Windows will probably detect the port automatically. You can verify this by going into the Control Panel and double-clicking on the System icon. When you do, you'll see the System Properties sheet. Select the Hardware tab and click the Device Manager button. If Windows recognizes your infrared port, there will be a category within the Device Manager called Infrared Devices. If you expand the Infrared Devices category, you'll see the infrared port. 10555 From: Michael Puchol Date: Tue Jan 11, 2005 4:16pm Subject: Re: IR Risk Jeeez...this vulnerability has existed ever since IrDA was invented. They should have done some homework before issuing a "security alert". For starters, a lot of laptops nowadays don't even have IrDA ports, as WiFi and Bluetooth are taking over. Security-conscious admins will disable IrDA altoghether. Sync/data to cellphones can be done with serial and more commonly USB cables, so no need for IrDA. Also notice how IR is less and less common in cellphones, and some PDAs are dropping it too. In all, a well-trodden subject. Best regards, Mike Tech Sec Lab wrote: > Comments? > > > LENGTH: 597 words > > HEADLINE: LIGATT Issues Computer Security Alert; > Computer Infrared Ports Can Be Used to Hack Into Your Computer > > DATELINE: Sep. 14, 2004; LOS ANGELES, CA; MARKET WIRE > > BODY: > Laptops have increased business productivity in countless ways. No longer > does an employee sit on an airplane content to watch a movie or read or a > book. Many professionals are increasingly using travel time to finalize > presentations or write memos to staff members or catch up with email after a > busy day of meetings. > > How could this be a security issue? The example below illustrates such an > occurrence. > > While traveling to a job site a LIGATT security team member was finishing a > presentation on a flight and all of a sudden an icon popped up which > notified her that she was attached to another person's computer via the > infrared port. "Sure enough, the person sitting in the aisle next to me was > on his laptop. Another few minutes passed and his head popped up and he > started glancing around -- he had also just realized that our computers were > now connected and communicating," says LIGATT security team member Merike > Kaeo. > > The good news is that Microsoft has been careful in deploying appropriate > defaults so that it would not be easy for someone to maliciously send you a > virus or worm. Amazingly enough, little attention is paid to the infrared > port that comes standard with most laptops on the market. > > As a method of research LIGATT security team members walked into a Borders > bookstore where students were studying and placed our PDA next to a laptop > with infrared port. We wrote a script that would copy all of the files from > the "My Documents" folder. Our PDA running Windows CE connected to the > infrared port and began copying the files. After a period of time we were > able to gain entry into two out of ten computers and started copying files. > We then showed potential victims how to go into Windows and turn on security > for infrared port. Once files are received on PDA the files can be emailed > to another destination. This could be used in an industrial espionage > situation. > > How do you protect yourself? The first step in the process is to make > Windows aware of your computer's infrared port. If you're running Windows on > a notebook PC with a built-in infrared port, then Windows will probably > detect the port automatically. You can verify this by going into the Control > Panel and double-clicking on the System icon. When you do, you'll see the > System Properties sheet. Select the Hardware tab and click the Device > Manager button. If Windows recognizes your infrared port, there will be a > category within the Device Manager called Infrared Devices. If you expand > the Infrared Devices category, you'll see the infrared port. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10556 From: James M. Atkinson Date: Tue Jan 11, 2005 5:18pm Subject: Ruling gives cops leeway with GPS http://timesunion.com/AspStories/story.asp?storyID=322152 Ruling gives cops leeway with GPS Decision allows use of vehicle tracking device without a warrant By BRENDAN LYONS, Staff writer First published: Tuesday, January 11, 2005 In a decision that could dramatically affect criminal investigations nationwide, a federal judge has ruled police didn't need a warrant when they attached a satellite tracking device to the underbelly of a car being driven by a suspected Hells Angels operative. The ruling by U.S. District Judge David N. Hurd clears the way for a federal trial scheduled to begin next month in Utica in which seven alleged Hells Angels members and associates, including several from the Capital Region, face drug-trafficking charges. The use of satellite tracking devices has stirred controversy and Hurd's ruling differs from a decision last spring by a Nassau County Court judge, who decided police needed a warrant when they used the technology to follow a burglary suspect. The biker case broke open here last year with a series of raids and arrests across upstate New York. The case began in Utica, but was expanded to include an organized crime task force that spent more than a year building a methamphetamine-trafficking case against a group of alleged outlaw bikers from Troy to Arizona. During surveillance of the group, detectives attached a global positioning satellite device to a vehicle driven by Robert P. Moran Jr., an Oneida County attorney and Hells Angels associate with a law office in Rome. They put the device on Moran's car for two days in July 2003 after he returned from a one-day trip to Arizona, where police say he purchased a large quantity of methamphetamine. Over those two days, Moran drove across New York state and allegedly made drug deals with suspected Hells Angels members in places such as New York City and Troy, according to court records. Hurd opined that authorities wouldn't need a warrant had they decided to follow Moran, so using a GPS device was merely a simpler way to track his car "as it traveled on the public highways," he wrote. "Moran had no expectation of privacy in the whereabouts of his vehicle on a public roadway. Thus, there was no search or seizure and no Fourth Amendment implications in the use of the GPS device." Hurd's ruling follows a line of reasoning that's widely supported by many law enforcement agencies. Police contend using tracking devices is no different than if they followed a suspect's vehicle in their own cars or by using helicopters. Kevin Mulroy, Moran's attorney, said the issue, which has brought conflicting rulings across the nation, is unsettling. "I think it's something the Supreme Court of the United States is going to have to hear," said Mulroy, a Syracuse attorney who was formerly an Onondaga County Court judge and assistant prosecutor. "One would think that before the police could install devices on your property, to monitor your movements, they would need a court order." A similar controversy arose in Washington two years ago, when that state's Supreme Court determined police had the right to attach a satellite tracking device to a murder suspect's car, but only after obtaining a warrant. Detectives attached a GPS device to the man's car for almost three weeks. When they downloaded the data, it indicated he had driven to an isolated area north of Spokane. Police searched the area and found the body of the man's 9-year-old daughter. He later was convicted of her murder, and the verdict was upheld. GPS devices are increasingly becoming a tool for law enforcement. Still, their use has been controversial because police agencies are not routinely obtaining court orders to install the devices, which rely on orbiting satellites and cellular phone networks to pinpoint their target. In many states, law enforcement agencies also are using them for less surreptitious missions, such as tracking sex offenders and parolees who are enrolled in electronic monitoring programs. It's not clear what effect Hurd's decision will have on their use, but it's apparently the first federal ruling regarding GPS devices and the need for search warrants. Assistant U.S. Attorney David Grable, who is prosecuting Moran and the others, did not return a telephone call for comment. The use of GPS devices by police most recently made national news in the Laci Peterson case. Scott Peterson, the Modesto, Calif., woman's husband, was convicted of murdering her on Christmas Eve 2002. In that case, police obtained a court order to attach tracking devices to three vehicles driven by Peterson, who drove to a waterfront near where the bodies of his wife and the baby boy she was carrying were later found. While the GPS data was admitted in the Peterson case, courts across the country are tackling the issue as defense lawyers challenge their reliability and whether police have a right to install them without a warrant. Similar technology helps police track cellular telephones, which also are being used by police to find fugitives and others. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- From: James M. Atkinson Date: Thu Jan 10, 2002 9:42pm Subject: You Might Be A Redneck If (2002 Edition) You Might Be A Redneck If (2002 Edition) You take your dog for a walk and you both use the same tree. You can entertain yourself for more than an hour with a fly swatter. Your property has been mistaken for a recycling center. Your boat has not left the driveway in 15 years. You burn your yard rather than mow it. You think the Nutcracker is something you did off the high dive. The Salvation Army declines your mattress. Your entire family sat around waiting for a call from the governor to spare a loved one. You offer to give someone the shirt off your back and they don't want it. You have the local taxidermist on speed dial. You come back from the dump with more than you took. You keep a can of Raid on the kitchen table. Your wife can climb a tree faster than your cat. Your grandmother has "Ammo" on her Christmas list. You've been kicked out of the zoo for heckling the monkeys. You think a subdivision is part of a math problem. You've bathed with flea and tick soap. You've been involved in a custody fight over a hunting dog. Your kids take a siphon hose to show and tell. You think a hot tub is a stolen indoor plumbing fixture. You took a fishing pole to Sea World. You go to the stock car races and don't need a program. You know how many bales of hay your car will hold. You have a rag for a gas cap. Your father executes the "Pull my finger" trick during Christmas dinner. Your house doesn't have curtains but your truck does. You wonder how service stations keep their restrooms so clean. You can spit without opening your mouth. You consider your license plate personalized because your father made it. Your lifetime goal is to own a fireworks stand. You sit on your roof at Christmas time hoping to fill your deer quota. You have a complete set of salad bowls and they all say Cool Whip on the side. The biggest city you've ever been to is Wal-Mart. Your working TV sits on top of your non-working TV. You thought the Unibomber was a wrestler. You've used your ironing board as a buffet table. You think a quarter horse is that ride in front of K-Mart. Your neighbors think you're a detective because a cop always brings you home. A tornado hits your neighborhood and does a $100,000 worth of improvement. You've used a toilet brush as a back scratcher. You've asked the preacher "How's it hangin'?" You missed 5th grade graduation because you had jury duty. You think fast food is hitting a deer at 65 mph. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4504 From: Shawn Hughes Date: Thu Jan 10, 2002 11:58pm Subject: Re: CCS/D.Robinson&Steve You know, I was going to comment on what Mr. Robinson stated. Then, I read Mr. Uhrig's response (I'm on digest, sometimes it runs late.) I started in computers before pc's had hard drives. However, in the years of pine, elm, irc, and all these new listservs, I have NEVER read such a thorough, complete, and utterly resounding response. No stone left unturned, or flung. Not even room for a cogent response. However, to defend the radio shack of surveillance/cs (ccs), this Robinson fellow has got to be a trouble-starting troll. What other reason would he have to make the statements he made? Shawn 4505 From: David Alexander Date: Fri Jan 11, 2002 9:21am Subject: Re: attacking CCS Steve, I just read your comprehensive demolition of David Robinson. Very, very well said sir. I just wish I could figure out how to send you a standing ovation from a 70,000 seater stadium, because that's what you deserve for having the guts to say what most people were thinking. We need more people like you who can expose the charlatans and con artists to give the rest of us a chance. Very best wishes and have a good weekend. David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4506 From: Hawkspirit Date: Fri Jan 11, 2002 11:04am Subject: Theory (brought to mind by Comsec C3I discussion From: John McCain Using a TDR or SA, we look at transients (since the dynamic is their "steady state"), but do you carefully observe the first pulse of that TDR trace to see what effect the circuit under test has on the TDR instrument? Or, do you just adjust magnitude to make it look "normal" and start looking at returns? I suspect those transients are sometimes telling us things that we don't hear. Am I off base here. Do others not fall into this trap? Any thoughts? JohnM John, The first large pulse is the sending pulse and it's wave form is not changed by the line parameters. At least to the best of my knowledge/experience. Transients are really important in the area of detecting frequency hopping and spread spectrum transmitters, On an aside, in 1968 I was designing recording studio equipment in Hollywood. The bandwidth of frequency response of professional audio in those days was about out to 18k. I designed equipment at that time with high speed opamps that would pass 60k square waves. When I presented my equipment at the audio engineering convention in New York all the engineers from other companies would come to my booth ask why bother having extended bandwidth if the human hearing goes only to 18k. The answer is that the human ear perceives high frequency transients as holes in the complex waves that it can perceive in the 30hz to 18khz hearing range. Within a year all professional audio equipment had bandwidths of at least 60k. Best, Roger 4507 From: Hawkspirit Date: Fri Jan 11, 2002 11:18am Subject: Re: Theory (brought to mind by Comsec C3I discussion) From: "James M. Atkinson" "What I am in interested in the electrical behavior of a line during the loop relay seizing the line, and releasing it, and more specifically the "overshoot" areas of the signal. I am also interested in the frequencies that appear right at the moments of making, and then of breaking the line." Jim, Could you amplify on this, what kind of line behavior, in what form of result, would indicate what form of intercept? Thanks, Roger 4508 From: Steve Uhrig Date: Fri Jan 11, 2002 11:20am Subject: Creative assistance needed Hi all, I'm asking here because this list is now approximately 1200 members strong, and this is somewhat of an appropriate place to pose a request. Beginning in May, I will be publishing a monthly column in Police & Security News Magazine with questions and answers on surveillance and related technical investigation technology, to include TSCM. Readers of the magazine will ask questions of me by email, and I will answer several selected questions each month and print the questions and answers in the magazine. Here's what I need: > A name for the column ! Unfortunately I cannot solicit subscriptions to the magazine as it is controlled distribution to law enforcement only. Please feel free (per Jim, owner of this list) to post suggestions here to the list. That may encourage other suggestions and avoid redundancy. I'll select one or two of my favorites from those submitted here, and run them by the editor of the magazine. If your name is selected, I'll compensate you in some way via my used equipment page or something similar. The only one I've thought of so far, and I am not creative, is 'Everything you wanted to know about surveillance technology, but didn't know who to ask'. Feel free to reply to me directly if you do not want your name to appear on the list. Otherwise, please post your reply to the list. Note to do that, you can't merely reply to this message or your reply will come to me, not to the list (this measure was instituted for security reasons some time back). Address any suggestions to TSCM-L@yahoogroups.com. Picking names for products is one of the more difficult tasks in engineering. Same thing with newsletters and columns. I do not have a creative bone in my body. Can't draw stick figures. Thanks all. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4509 From: William Knowles Date: Fri Jan 11, 2002 11:37am Subject: Re: Creative assistance needed On Fri, 11 Jan 2002, Steve Uhrig wrote: Hello Steve & All! I haven't had enough Red Bull yet, but off the top of my mind comes... Off The Wire! Cheers! William Knowles wk@c... > I'm asking here because this list is now approximately 1200 > members strong, and this is somewhat of an appropriate place to > pose a request. > > Beginning in May, I will be publishing a monthly column in > Police & Security News Magazine with questions and answers on > surveillance and related technical investigation technology, to > include TSCM. Readers of the magazine will ask questions of me > by email, and I will answer several selected questions each > month and print the questions and answers in the magazine. > > Here's what I need: > > > A name for the column ! > > Unfortunately I cannot solicit subscriptions to the magazine as > it is controlled distribution to law enforcement only. > > Please feel free (per Jim, owner of this list) to post > suggestions here to the list. That may encourage other > suggestions and avoid redundancy. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4510 From: Steve Whitehead Date: Fri Jan 11, 2002 0:59pm Subject: France 'spied on food whistleblower' "A scientist who suggested that the French food industry was cashing in by over-salting products, claims he was spied on by France's security services. Pierre Meneton said in a report to the government that excessive use of salt could be blamed for 75,000 heart attacks each year, a third of which were fatal. Yet the food industry deliberately opposed cutting back on the salt as it benefited from the sale of soft drinks to parched customers, he alleged. The latest issue of Le Point magazine claims France's security agency put him under surveillance once the report was completed. It says spies from the agency placed bugs on his office phone, intercepted calls to his mobile phone and monitored his relatives, friends and colleagues. The report is denied by the French Interior Ministry, the security agency - the Renseignements Generaux (Central Directorate of General Information) - and the French police. 'Security threat' "I noticed that it was from the time that we wanted to hand the file to AFSSA (the French Food Safety Agency) in 2000 that we started to have problems," Mr Meneton told La Chaine Info television. "It is surprising for a researcher who works for a public research institute that public authorities would take such a measure when one tries to improve a public health problem." His report said that a 30% cut in food salting would hit water and soft drinks sales by $5.4bn a year. Le Point says the Interior Ministry classified him as a level-two threat to national security on a par with foreign spies and terrorists. Salt risk Mr Meneton's report to AFSSA was carried in Le Point in February 2001. A month later, AFSSA said it backed reductions on salt levels in food. Sodium is one of salt's major constituents and has been linked to high blood pressure, strokes and heart attacks. But companies say salt is used not only to help taste, but as a preservative and to improve texture" Full Story at http://news.bbc.co.uk/hi/english/world/europe/newsid_1753000/1753433.stm Steve Whitehead TSCM Services URL : http://www.tscm.co.za [Non-text portions of this message have been removed] 4511 From: Aimee Farr Date: Fri Jan 11, 2002 4:34pm Subject: Scum, etc. Many of your vendor gripes fall into deceptive advertising and deceptive trade practice territory -- state and federal. In five-stars. Other pressure groups have been extremely successful. ~Aimee http://www.newsbytes.com/news/02/173556.html FTC Taking 'Seriously' Request To Probe Firearms Sites By Robert MacMillan, Newsbytes WASHINGTON, D.C., U.S.A., 10 Jan 2002, 11:08 AM CST The Federal Trade Commission today acknowledged it has received a written request from a new gun-safety organization asking the agency to expand its post-Sept. 11 probe of false and misleading Web advertising claims to include firearms Web sites. The agency said today it is giving the matter "serious consideration." [...] 4512 From: James M. Atkinson Date: Fri Jan 11, 2002 5:07pm Subject: Re: Theory (brought to mind by Comsec C3I discussion) At 9:18 AM -0800 1/11/02, Hawkspirit wrote: >From: "James M. Atkinson" > >"What I am in interested in the electrical behavior of a line during >the loop relay seizing the line, and releasing it, and more >specifically the "overshoot" areas of the signal. >I am also interested in the frequencies that appear right at the >moments of making, and then of breaking the line." > >Jim, Could you amplify on this, what kind of line behavior, in what form of >result, would indicate what form of intercept? Thanks, Roger Sure, First I apply a slowly increasing resistance to the line until I seize the line. I repeat this several times until I have a fairly good calculation of the amount of current i need to get flowing to size the line, and the delay between the current draw and the seizure. I then sync my TDR to the circuit so that I start pounding the line with TDR pulse as I approach the seizing current. I then disregard the TDR pulses gathered just prior to the seize so that I am actually looking at TDR pulses during the zero crossing (when it should be really quiet). I can usually grab several hundred usable "pings" during the transition period, and have found it helpful for each "ping" to have a slightly offset rise/fall time or pulse width. The whole goal is to force a predictable zero crossing, and shoot pings into the line during the zero crossing. I start with a 5 pico second ping (using a high energy 90 volt tunnel diode), and slowly increase the rise time and/or pulse width to several milliseconds as I look down the line. I am not using a "sampling" circuit, but actually digitizing and capturing the TDR wave forms directly into a laptop in real time. This way I can see "mouse feces" laying against the wire, and can see any kind of resistive, inductive, or capacitive breach with some extreme resolution. The further down the line I am looking the less the resolution and the wider the pulses. If I can get two lines on the same cable I can ping on one line, and listen to the crosstalk of the signal on the other pair, I can also split the pairing and shoot them that way as well (while in transition). Either way the goal is to locate where the twisting of the pair has been compromised, and not just look for resistive faults. Most sweep methods are obsessed with finding resistive devices in series with the line, or some variation thereof. Sadly, the methods used to find resistive devices are worthless in finding something that is capacitively or inductively isolated (most professional eavesdropping devices are 10-40+ megaohms of impedance, or isolated in such a way that a regular TDR is worthless). The "virgin pair' vs "split pair" TDR will find any kind of inductive coupling on the line (of more then one loop), but you have to do it during the zero crossing. Inductive loading of less then one loop (such as in the case of a linear ferrite pickup) your going to have sweep more then the two wires your looking at (you need a total of four conductors, plus a good ground). Crosstalk analysis will detect any kind of separation or disturbance of the pairs of more then a mm, or even disturbance of the wire insulation (but you have to do it during the zero crossing). It's also helpful to "listen in" to the line with both an audio amp, AND a spectrum analyzer. After you have performed your regular non alerting phone sweep... disconnect the load (or phones), then "listen" to the line with a high impedance audio amp (like Kaisers 1059 or Alan's uAmp), then slowly tune something like the SCD-5 across the line. Next connect your AUDIO (100 Hz to about 10 kHz) spectrum analyzer to the line (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of control or command tones such as DTMF-C, 2100 Hz, etc (typically appearing as crosstalk). Then switch your your RF spectrum analyzer (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of RF present on the line. Hint: if someone attaches a transmitter to the line some of the RF will bleed back over the line and you will be able to see it.... however your going to have to "tune" the line to see it reliably. The determine how much current draw you need to seize the line card (remember the phone system works on current draw, not voltage) and bounce some TDR pulses down the line during the zero crossings to see what a regular wet line TDR might miss. The key in all of this is your ability to match the impedance of the line during the transition. This is not just a case of "cranking up the voltage", but one of "tuning up the TDR circuit" though a variable capacitor/varistor and resistor/inductor. You want a near perfect coupling between the TDR (or pulse generator) and the line. To look at it another way, consider that the line is an antenna, and you want a perfect impedance match between a radio, the feed line, and the antenna so you can maximize the signal your giving off or collecting. If you simply crank up your transmit power, but have a bad feed line all you will end of doing is heating up some wire. On the other hand if the feed line has a near perfect match to the radio, and the antenna has a near perfect mach to the feed line all kinds of wonderful things can be done. If you go one step further and fiddle with the antenna and use it at its precise resonant frequency you can work the world with just a small amount of power. Along the same lines if you filter out all the thunder-lizards, tune up your antenna, use good feed lines, and have a good LNA on the antenna you can hear extremely low poer things many thousands of miles away. Now, we take this and apply it to sweeping phone lines: First we find the "quietest time" on the line, which is during the transition point (the loop voltage and dial tone is our thunder lizard). Next we match the impedance of our TDR to the line impedance. Then we "tune" the line by bouncing TDR pulses down the line (with various pulse widths and rise times) while we tweak a capacitor/varactor for clean return (sort of like adjusting an SWR meter). The end result is a super precise series of pulses, clean TDR wave forms, and the exact position of anomalies along the line (including mouse feces touching the line). -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4513 From: James M. Atkinson Date: Fri Jan 11, 2002 4:00pm Subject: Re: Creative assistance needed How about these: "The Straight Poop" "Crow Whisperings" "Yoda Speaks" "Wizards Corner" "The Teachings of Obi Wan Uhrig" "Teachings of the Black Bag" ;-) -jma At 12:20 PM -0500 1/11/02, Steve Uhrig wrote: >Hi all, > >I'm asking here because this list is now approximately 1200 >members strong, and this is somewhat of an appropriate place to >pose a request. > >Beginning in May, I will be publishing a monthly column in >Police & Security News Magazine with questions and answers on >surveillance and related technical investigation technology, to >include TSCM. Readers of the magazine will ask questions of me >by email, and I will answer several selected questions each >month and print the questions and answers in the magazine. > >Here's what I need: > >> A name for the column ! > >Unfortunately I cannot solicit subscriptions to the magazine as >it is controlled distribution to law enforcement only. > >Please feel free (per Jim, owner of this list) to post >suggestions here to the list. That may encourage other >suggestions and avoid redundancy. > >I'll select one or two of my favorites from those submitted >here, and run them by the editor of the magazine. If your name >is selected, I'll compensate you in some way via my used >equipment page or something similar. > >The only one I've thought of so far, and I am not creative, is >'Everything you wanted to know about surveillance technology, >but didn't know who to ask'. > >Feel free to reply to me directly if you do not want your name >to appear on the list. Otherwise, please post your reply to the >list. Note to do that, you can't merely reply to this message or >your reply will come to me, not to the list (this measure was >instituted for security reasons some time back). > >Address any suggestions to TSCM-L@yahoogroups.com. > >Picking names for products is one of the more difficult tasks in >engineering. Same thing with newsletters and columns. I do not >have a creative bone in my body. Can't draw stick figures. > >Thanks all. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4514 From: James M. Atkinson Date: Fri Jan 11, 2002 11:43pm Subject: Boss hid spy camera http://www.theadvertiser.news.com.au/common/story_page/0,5936,3569734%255E421,00.html Boss hid spy camera By CHRISTINE CAULFIELD 11jan02 A FACTORY owner installed a video camera in female change rooms to spy on his staff for sexual gratification, a court heard yesterday. Peter Taylor, 50, set up the surveillance camera in a ceiling fan directly above the only female toilet in his car detailing shop. But defence counsel Nicola Gobbo told the Ballarat Magistrates' Court Mr Taylor suspected the staff at Southern Vehicle Enhancements, at Delacombe, were lazing around in the change room. She said Mr Taylor's intention was to monitor staff productivity, and to ensure none were using or dealing drugs on the premises. Magistrate Paul Grant said he could see no need to mount the camera above the toilet if Mr Taylor's aim was to check staff were working. Mr Grant said, on the evidence, it seemed more likely Mr Taylor derived some sexual pleasure from watching staff in the toilet. "It seems to me there is only one thing this person is trying to achieve, and that is to view people," Mr Grant said. In response to Ms Gobbo's claim that her client did not install the camera for some sinister sexual reasons, Mr Grant said: "It seems to me it was". Ms Gobbo said her client, who has also settled a civil suit over the matter, was anxious his staff did not have to give evidence in a criminal court. She said he did not want them to be subject to cross-examination, potentially causing them further distress. But Mr Grant said if Mr Taylor suspected the women were using or dealing drugs in the change room, they had a right to defend themselves. Mr Taylor, of Wiltshire Lane, Sebastopol, has been charged with installing and using a surveillance device and possessing an unregistered firearm, which was also found in the ceiling. The case has been adjourned to February 13. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4515 From: Steve Uhrig Date: Sat Jan 12, 2002 0:05am Subject: NSA Crypto museum reopening NSA MUSEUM OPEN AGAIN FOR VISITORS: The National Cryptologic Museum has opened to the public again on 13 December but for only on weekdays 9 to 4 as before: no Saturday hours. They are expecting to be open on Saturdays again this spring. Happy New Year! [Jack Ingram, NSA Curator] =========================== ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4516 From: Steve Uhrig Date: Sat Jan 12, 2002 0:13am Subject: Hi-res commercial satellite http://news.bbc.co.uk/hi/english/sci/tech/newsid_1755000/1755356. stm Worth a read. Impressive. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4517 From: Date: Sat Jan 12, 2002 5:23am Subject: Steve Uhrig Column Name. -----BEGIN PGP SIGNED MESSAGE----- My suggestion is: Www.swssec.com Hardware Intel. Counter-intel. Q and A Hosted by Steve Uhrig -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wlwEARECABwFAjxAHFwVHGRhZW1vbjdAaHVzaG1haWwuY29tAAoJEIqGlhRaN0MTjHQA oINlJfqqrFe36CY1SeUsn8A2pselAJ9hge7ce7XSqEyRjOsnabN9az382Q== =OlJH -----END PGP SIGNATURE----- 4518 From: James M. Atkinson Date: Sat Jan 12, 2002 11:34am Subject: How Many Dogs Does It Take HOW MANY DOGS DOES IT TAKE TO CHANGE A LIGHT BULB? Golden Retriever: The sun is shining, the day is young, we've got our whole lives ahead of us, and you're inside worrying about a stupid burned out bulb? Border Collie: Just one. And then I'll replace any wiring that's not up to code. Dachshund: You know I can't reach that stupid lamp! Rottweiler: Make me. Lab: Oh, me, me!!!! Pleeeeeeze let me change the light bulb! Can I? Can I? Huh? Huh? Huh? Can I? Malamute: Let the Border Collie do it. You can feed me while he's busy. Jack Russell Terrier: I'll just pop it in while I'm bouncing off the walls and furniture. Poodle: I'll just blow in the Border Collie's ear and he'll do it. By the time he finishes rewiring the house, my nails will be dry. Cocker Spaniel: Why change it? I can still pee on the carpet in the dark. Doberman Pinscher: While it's dark, I'm going to sleep on the couch. Boxer: Who cares? I can still play with my squeaky toys in the dark. Mastiff: Mastiffs are NOT afraid of the dark. Chihuahua: Yo quiero Taco Bulb. Irish Wolfhound: Can somebody else do it? I've got this hangover. Pointer: I see it, there it is, there it is, right there. Greyhound: It isn't moving. Who cares? Australian Shepherd: First, I'll put all the light bulbs in a little circle.... Old English Sheep Dog: Light bulb? I'm sorry, but I don't see a light bulb. Hound Dog: ZZZZZZZZZzzzzzzzzz Cairn Terrier: I'll bet there's a light bulb in a hole in the back yard. I can get it, I can get it. Bichon Frise: Check the pedigree: "...Non-working breed" -- Now, fluff my pillow. Cat: Dogs do not change light bulbs. People change light bulbs. So the question is: how long will it be before I can expect light? -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4519 From: Miguel Puchol Date: Sat Jan 12, 2002 0:38pm Subject: Steve's column name Hi Steve, A few suggestions... "The Wired Guy" "1984" <= Maybe not all will get this one on the first issue... "Intel scene" All the best, Mike 4520 From: Jordan Ulery Date: Sat Jan 12, 2002 4:50pm Subject: Name Perhaps a little more formal under Order of the Court or Technical Surveillance Black Box [Non-text portions of this message have been removed] 4521 From: Information Date: Sat Jan 12, 2002 2:18pm Subject: Re: Steve's column name How about Now Hear This! Regards, Bill Elliott, CII ELLIOTT & ASSOCIATES, Ltd. (GMT -7) http://www.prvt-eye.com http://www.cybercrimeinternational.com 2002 SUPER CONFERENCE - ROYAL SONESTA HOTEL - NEW ORLEANS, LA - AUGUST 20-24, 2002 -http://www.intersurf.com/~nosuper/index.html ----- Original Message ----- From: "Miguel Puchol" To: Sent: Saturday, January 12, 2002 11:38 AM Subject: [TSCM-L] Steve's column name 4522 From: Hawkspirit Date: Sat Jan 12, 2002 10:23pm Subject: Equipment Interesting equipment website http://www.fuhs.de/en/products/fsc3000.asp 4523 From: Hawkspirit Date: Sat Jan 12, 2002 11:37pm Subject: Teddy Cam Watch out for Teddy for he be watch'n you! http://www.lacasadelespia.com/detalle.asp?det=93 4524 From: Hawkspirit Date: Sat Jan 12, 2002 11:40pm Subject: Cellular Scramblers Anyone know how effective these scramblers are? CELLULAR SCRAMBLER SPECIFICATIONS Circuit size: 50 mm ¥ 35 mm ¥ 5 mm Audio range: 300 up to 3000 Hz Telephone lines: Cellular Consumption: 5 Vdc, 80 mA of the battery Stand-by consumption: 5 Vdc, 80 mA of the battery Selling Price: $5800 Prod. Code: HS-7000 Security level: III ( High security) Hop rate: up to 150 times per second Purchase only on request The cellular scrambler offers a universal security solution for conversations carried out in cellular phones. The cellular scrambler comes in a Star Tac. The circuit inside the cell phone provides nivel III voice security. Level III, that uses the same frequency alteration principle than levels I and III, provides the highest security level, hopping from one code to the other 150 times per second, 9000 per minute. This high frequency hop rate offers protectiona against virtually all determined listeners. Each scrambler is installed in the Star Tac and the scrambler will function only in the case that the two devices that are communicating have the same scrambling system, which is called "Point to Point?. The scrambler adds negligible weight and no size to the phone and is activated when the user enters a code on the phone's keypad. A red LED indicator confirms that communication is secure. The PX40's low power consumption maximizes talk time on each portable phone. This scrambling system is used by top entities and companies, where nowadays information is the most valuable asset. These cellular scramblers are sold only by pairs. Features and benefits: Portable Security - provides much needed security to highly accessible portable phone conversations. The activated module offers a defense system against a variety of interested parties. ? Low Power Requirements - offers little additional drain upon the portable phone's battery; thus, allowing the phone to perform and operate at its optimum level. ? Internally Embedded - allows sophisticated voice security to be added without cumbersome external devices. ? Optional Security Levels - offer varying levels of security to meet the specific privacy needs of a variety of end users. ? Keypad Activation - allows the portable phone user to activate security by simply entering a code on the phone's keypad. A red LED indicator confirms that communication is secure. ? Voice Quality - delivers recovered audio which is clear and natural sounding, while providing coded audio which is virtually indecipherable by unwanted listeners. This is the best scrambler offered in the market and its purchase is only on request.For further information, see our product in: http://www.lacasadelespia.com/detalle.asp?det=137 4525 From: Hawkspirit Date: Sat Jan 12, 2002 11:44pm Subject: CELLULAR DETECTOR Another interesting product MICRO-CELLULAR DETECTOR Detection range: 5 Mhz - 2.6 Ghz Energy supply: A23 / 12 volts alkaline battery Antenna: flexible gel Duration: 20 hrs Stand by Selling Price: $420 Prod. Code: HS-7020 The Micro- Detector is an electronic device capable of detecting risky 5 mhz to 2.5 ghz radio frequencies within reach ( hidden transmissions of your conversations) created by your cellular telephone. This unit can be carried on the body or placed on the desk, always near the cellular phone, so that if the cellular phone emits a hidden transmission of your conversation, when it is in stand-by mode ( when it should not transmit data), the Micro- Detector will adopt the RF emitted by the cellular phone and will automatically start to vibrate silently. This is an equipment that can detect and alert you about the most simple to the most sofisticated tappings of cellular telephones as intruder microphones. NOTE: When the batteries of cellular telephones are removed during meetings, this is no guarantee that the conversation that is taking place is not being transmitted to a third party, since with today?s technology it is very easy to place a microphone that transmitts at a distance of up to 500 m. With the Micro- Detector you are able to confirm, after you have removed the batteries, that no cellular phone is transmitting a confidential conversation to another place that is not within the environment where the meeting is taking place; if this is the case, the device will start to vibrate on the table alerting the user that no confidential issues should be discussed in that meeting.For further information, see our product in: http://www.lacasadelespia.com/detalle.asp?det=73 4526 From: James M. Atkinson Date: Sun Jan 13, 2002 0:33am Subject: Re: Cellular Scramblers Virtually worthless, and for all practical purposes a scam. The people trying to market the bloody thing don't seem to realize that cell phones do not hot, and voice level encryption does not result in frequency hopping. -jma At 9:40 PM -0800 1/12/02, Hawkspirit wrote: >Anyone know how effective these scramblers are? > >CELLULAR SCRAMBLER > > > >SPECIFICATIONS >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm >Audio range: 300 up to 3000 Hz >Telephone lines: Cellular >Consumption: 5 Vdc, 80 mA of the battery >Stand-by consumption: 5 Vdc, 80 mA of the battery > >Selling Price: $5800 >Prod. Code: HS-7000 > > > >Security level: III ( High security) >Hop rate: up to 150 times per second > >Purchase only on request > >The cellular scrambler offers a universal security solution for >conversations carried out in cellular phones. The cellular scrambler comes >in a Star Tac. >The circuit inside the cell phone provides nivel III voice security. Level >III, that uses the same frequency alteration principle than levels I and >III, provides the highest security level, hopping from one code to the >other 150 times per second, 9000 per minute. This high frequency hop rate >offers protectiona against virtually all determined listeners. >Each scrambler is installed in the Star Tac and the scrambler will function >only in the case that the two devices that are communicating have the same >scrambling system, which is called "Point to Point?. The scrambler adds >negligible weight and no size to the phone and is activated when the user >enters a code on the phone's keypad. A red LED indicator confirms that >communication is secure. The PX40's low power consumption maximizes talk >time on each portable phone. >This scrambling system is used by top entities and companies, where >nowadays information is the most valuable asset. > >These cellular scramblers are sold only by pairs. > >Features and benefits: >Portable Security - provides much needed security to highly accessible >portable phone conversations. The activated module offers a defense system >against a variety of interested parties. >? Low Power Requirements - offers little additional drain upon the portable >phone's battery; thus, allowing the phone to perform and operate at its >optimum level. >? Internally Embedded - allows sophisticated voice security to be added >without cumbersome external devices. >? Optional Security Levels - offer varying levels of security to meet the >specific privacy needs of a variety of end users. >? Keypad Activation - allows the portable phone user to activate security >by simply entering a code on the phone's keypad. A red LED indicator >confirms that communication is secure. >? Voice Quality - delivers recovered audio which is clear and natural >sounding, while providing coded audio which is virtually indecipherable by >unwanted listeners. >This is the best scrambler offered in the market and its purchase is only >on request.For further information, see our product in: >http://www.lacasadelespia.com/detalle.asp?det=137 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4527 From: Tom Lusk Date: Sat Jan 12, 2002 1:59pm Subject: RE: Creative assistance needed Mybe "Bugs and Thugs"? Cheers, Tom -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Friday, January 11, 2002 12:21 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Creative assistance needed Hi all, I'm asking here because this list is now approximately 1200 members strong, and this is somewhat of an appropriate place to pose a request. Beginning in May, I will be publishing a monthly column in Police & Security News Magazine with questions and answers on surveillance and related technical investigation technology, to include TSCM. Readers of the magazine will ask questions of me by email, and I will answer several selected questions each month and print the questions and answers in the magazine. Here's what I need: > A name for the column ! Unfortunately I cannot solicit subscriptions to the magazine as it is controlled distribution to law enforcement only. Please feel free (per Jim, owner of this list) to post suggestions here to the list. That may encourage other suggestions and avoid redundancy. I'll select one or two of my favorites from those submitted here, and run them by the editor of the magazine. If your name is selected, I'll compensate you in some way via my used equipment page or something similar. The only one I've thought of so far, and I am not creative, is 'Everything you wanted to know about surveillance technology, but didn't know who to ask'. Feel free to reply to me directly if you do not want your name to appear on the list. Otherwise, please post your reply to the list. Note to do that, you can't merely reply to this message or your reply will come to me, not to the list (this measure was instituted for security reasons some time back). Address any suggestions to TSCM-L@yahoogroups.com. Picking names for products is one of the more difficult tasks in engineering. Same thing with newsletters and columns. I do not have a creative bone in my body. Can't draw stick figures. Thanks all. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4528 From: Miguel Puchol Date: Sun Jan 13, 2002 3:54am Subject: Re: Creative assistance needed Well, don't laught too hard but.... > "The Teachings of Obi Wan Uhrig" In reference to this: http://www.thesmokinggun.com/archive/obiwan1.shtml Makes you wonder :-) Cheers, Mike 4529 From: Miguel Puchol Date: Sun Jan 13, 2002 4:05am Subject: Re: Cellular Scramblers Well, looks to me like an overpriced Transcrypt board, which true, does inversion scrambling with rapidly hopping patterns, which could be OK for your average listener - but don't bet your life on it. In any case, it is VERY expensive, the best Transcrypt board you can buy commercially will set you back less than $1000, and you'll need an end-user certificate to get it. I don't know the price of the DES board, but I don't imagine it running past the $1k mark too much. I like the "purchase on request" part, how could I purchase if it wasn't on request? They have mind readers that work over IP nets now? Ahem, just another spy shop.....same oppinion goes for your second message. For more info, http://www.transcryptsecure.com/products/lmr_security.html MHO, all the best, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Sunday, January 13, 2002 6:40 AM Subject: [TSCM-L] Cellular Scramblers > Anyone know how effective these scramblers are? > > CELLULAR SCRAMBLER > > > > SPECIFICATIONS > Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > Audio range: 300 up to 3000 Hz > Telephone lines: Cellular > Consumption: 5 Vdc, 80 mA of the battery > Stand-by consumption: 5 Vdc, 80 mA of the battery > > Selling Price: $5800 > Prod. Code: HS-7000 > > > > Security level: III ( High security) > Hop rate: up to 150 times per second > > Purchase only on request > > The cellular scrambler offers a universal security solution for > conversations carried out in cellular phones. The cellular scrambler comes > in a Star Tac. > The circuit inside the cell phone provides nivel III voice security. Level > III, that uses the same frequency alteration principle than levels I and > III, provides the highest security level, hopping from one code to the > other 150 times per second, 9000 per minute. This high frequency hop rate > offers protectiona against virtually all determined listeners. > Each scrambler is installed in the Star Tac and the scrambler will function > only in the case that the two devices that are communicating have the same > scrambling system, which is called "Point to Point?. The scrambler adds > negligible weight and no size to the phone and is activated when the user > enters a code on the phone's keypad. A red LED indicator confirms that > communication is secure. The PX40's low power consumption maximizes talk > time on each portable phone. > This scrambling system is used by top entities and companies, where > nowadays information is the most valuable asset. > > These cellular scramblers are sold only by pairs. > > Features and benefits: > Portable Security - provides much needed security to highly accessible > portable phone conversations. The activated module offers a defense system > against a variety of interested parties. > ? Low Power Requirements - offers little additional drain upon the portable > phone's battery; thus, allowing the phone to perform and operate at its > optimum level. > ? Internally Embedded - allows sophisticated voice security to be added > without cumbersome external devices. > ? Optional Security Levels - offer varying levels of security to meet the > specific privacy needs of a variety of end users. > ? Keypad Activation - allows the portable phone user to activate security > by simply entering a code on the phone's keypad. A red LED indicator > confirms that communication is secure. > ? Voice Quality - delivers recovered audio which is clear and natural > sounding, while providing coded audio which is virtually indecipherable by > unwanted listeners. > This is the best scrambler offered in the market and its purchase is only > on request.For further information, see our product in: > http://www.lacasadelespia.com/detalle.asp?det=137 > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4530 From: Steve Uhrig Date: Sun Jan 13, 2002 10:34am Subject: Re: Cellular Scramblers Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > Anyone know how effective these scramblers are? Will only work on analog. It is extremely difficult to get any sort of privacy beyond simple inversion working on cellular. Go to CDMA and you're safe from virtually anything not covered by a Title III court order served on the service provider. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4531 From: A Grudko Date: Sun Jan 13, 2002 3:02am Subject: Re: Cellular Scramblers - Original Message - >> Anyone know how effective these scramblers are? I don't know the product but I don't know of any space inside a Motorolla Star-Tac, never mind 50 mm x 35 mm x 5 mm. Perhaps the US model is different to ours. The terminology used sounds like techno-babble, but if fairness, this can happen innocently. I used to be the agent here for Cony and I termed their instruction manuals 'Janglish' - Japanese English, translated litterally from a dictionary. I re-wrote some of their manuals for them. I would expect a large company offering a serious product to have a decently worded technical discription. That's also a heck of a price to pay - especially if in fact all it does is light an LED up! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" 4532 From: A Grudko Date: Sun Jan 13, 2002 3:24am Subject: Re: Creative assistance needed - Original Message - > The only one I've thought of so far, and I am not creative, is > 'Everything you wanted to know about surveillance technology, > but didn't know who to ask'. Mmmm - doesn't really roll off the tongue... I've had a few articles published and non technical people might read past 'TSCM 101' - using a layman's term like 'bug' will attract readers. Some of the tiles I've used include: A Plague of Bugs Who's Bugging You? To Bug or Not To Bug? (feel free to use them) or how about: The Sweeper The Sweeper Speaks Bugland Wired The Receiver Detection and Deception Or a bit more off the wall: Bug Off! Sex, Lies and Audio Tape Where's Mike's Mike? Mikes, Cameras, Action! Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 5:59pm Subject: Re: A Public Thank You Bob (and other list members), All to often TSCM'ers tend to be isolated, and even between government TSCM'ers there was/is little or no communications between them outside of their own agency (sad, but true). The list was founded to help facilitate communications between TSCM people who tend to be scattered all over the world. So long as the subject related to TSCM, TSCM related news, TSCM equipment, the occasional quip of humor, and related information it is OK to post it to the list. If you have questions about doing business with a TSCM firm, or a firm selling/buying TSCM gear such queries are also OK for the list. Of course classified information needs to be kept off the list, but in reality only a very, very tiny portion or sliver of TSCM actually involves even remotely classified materials. -jma At 6:18 PM -0500 1/11/01, 1RCM wrote: >Hi List, > >Last week I posted with a request to be contacted off-list by any list >member in the Boise, Idaho area. To make a long story short, I had stumbled >across a very good deal on a piece of TSCM test equipment but I was very >hesitant to send the asking price for something unseen to someone unknown. I >was contacted back by list member Mike Arnell. Mike was of great assistance >in allowing me to close the deal in a manner that I felt quite comfortable >with. And for that I would like to thank him very much. > >I chose to thank Mike publicly on the list as well as privately off-list for >a reason. This list, like most others, sees its periods of negativity >spawned by arguments, disgruntled posters, mis-information, etc., etc. But >it also sees more than its fair share of that which I assume that it was >originally founded for: the sharing of TSCM-related information, thoughts >and ideas. I have no idea whether or not when the list was founded the >moderator envisioned its usage for 'blind' business contacts or the >requesting of 'professional favors'. But I for one found it very beneficial >for just that purpose. And so, as long as the moderator does not disapprove, >I would not hesitate to recommend to any list member that if he/she has a >problem, concern or issue that another list member in a specific area might >be able to help with - then simply put out the feeler. Of course remember to >request the return contact and conduct your business off-list, but don't >hesitate to give that first 'call for help' via a posting on the list a try! > >Bob Motzer -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2283 From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 6:06pm Subject: Re: Fw: ARROGRANCE [ships passing in the night] At 1:27 PM -0500 1/11/01, MACCFound@a... wrote: > In a message dated 1/11/01 8:48:38 AM Pacific Standard Time, >secdep@v... writes: > > << Transcript of an actual radio conversation which took place during > October 1995 between a USN War Ship sailing off the coast of > Newfoundland and the Canadian authorities. >> > > > Sounds like an "urban legend" to me. Actually I think it falls under the header of [humor]... it's a story i have heard dozens of times, and in dozens of variations, but it is always funny and is worthy of re-telling periodically. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2284 From: James M. Atkinson, Comm-Eng Date: Thu Jan 11, 2001 6:42pm Subject: System of Signals Emission Classification WARC-79, the World Administrative Radio Conference that rewrote many of the world's radio regulations, adopted a new system of emission classification. The traditional A (Amplitude), F (Frequency), and P (Pulse) was intuitive, but limited and clumsy when dealing with new modes. The world's radio bodies, including the FCC, gradually phased in the new system until today it completely replaces the old one. The formula for the new designations, loosely from ITU radio regulations 264 through 273, and Appendix 6, Part A, is: [BBBB]MNI[DM], where [] means optional when writing emission specs. [BBBB] = Necessary Bandwidth (shown in FCC records, but is often omitted elsewhere) Uses a letter and three numbers. The letter goes where the decimal point should be placed, and denotes a magnitude: H Hz K kHz M MHz G GHz Some common bandwidths are: 400 Hz 400H 2.4 kHz 2K40 12.5 kHz 12K5 6 MHz 6M00 M = Modulation Type N None A AM (Amplitude Modulation), double sideband, full carrier H AM, single sideband, full carrier R AM, single sideband, reduced or controlled carrier J AM, single sideband, suppressed carrier B AM, independent sidebands C AM, vestigial sideband (commonly analog TV) F Angle-modulated, straight FM G Angle-modulated, phase modulation (common; sounds like FM) D Carrier is amplitude and angle modulated P Pulse, no modulation K Pulse, amplitude modulation (PAM, PSM) L Pulse, width modulation (PWM) M Pulse, phase or position modulation (PPM) Q Pulse, carrier also angle-modulated during pulse W Pulse, two or more modes used X All cases not covered above N = Nature of modulating signal 0 None 1 Digital, on-off or quantized, no modulation 2 Digital, with modulation 3 Single analog channel 7 Two or more digital channels 8 Two or more analog channels 9 Composite, one or more digital channel, one or more analog X All cases not covered above I = Information type N None A Aural telegraphy, for people (Morse code) B Telegraphy for machine copy (RTTY, fast Morse) C Analog fax D Data, telemetry, telecommand E Telephony, voice, sound broadcasting F Video, television W Combinations of the above X All cases not covered above [DM] = additional details, not used by FCC, optional elsewhere D = Detail RTTY/modems: A Two condition code, differing numbers or durations (Morse) B Two condition code, same number and duration, no error check C Two condition code, same num & dur, error check D Four condition code, 1 or more bits per condition E Multi condition code, 1 or more bits per condition F Multi condition code, conditions may combine Audio: G Broadcast quality (mono) H Broadcast quality (stereo/multichannel) J Commercial quality K Commercial quality, analog freq inversion or band scrambling L Commercial quality, FM pilot tone (i.e. Lincomprex) Video: M Monochrome N Color W Combination X All cases not covered above M = Multiplex type N None C Code division F Frequency division T Time division W Combination of above X All other types ----------------------------------------------------------------------- Converting Between Old & New Systems ----------------------------------------------------------------------- USE OLD NEW Pure carrier A0,F0 N0N Morse telegraphy (by ear) A1 A1A Modulated CW Morse A2 A2A AM voice A3 A3E SSB, suppressed carrier A3J J3E SSB, reduced carrier A3R R3E SSB, full carrier A3H H3E Television A5 C3F RTTY (F.S.K.) F1 F1B RTTY (A.F.S.K.) F2 F2B FM voice (Narrowband) F3 F3E, 20K0F3E Packet Data/Teleprinters with Audio Sub-Carrier 20F2 20K0F2B Data with Audio Sub-carrier 3F2 3K00F2D 6F2 6K00F2D 20F2 20K0F2D Analog Voice 20F3 20K0F3E Digital Voice 20F3Y 20K0F1E Digital Facsimile without Audio Sub-Carrier 20F4 20K0F1C Digital Facsimile with Audio Sub-Carrier 20F4 20K0F2C Analog Facsimile 20F4 20K0F3C Composite of Digital & Analog Information 3F9 3K00F9W 6F9 6K00F9W 20F9 20K0F9W Packet Data/Teleprinters without Audio Sub-Carrier 20F9Y 20K0F1B Digital Data 20F9Y 20K0F1D LAND MOBILE EMISSIONS MICROWAVE EMISSIONS old new old new old new A0 N0N P0 P0N F9 F8W (If bw is less than A1 A1A P9 P0N 50 convert to F2D) A3 A3E A2J J2B F9Y F7W (If bw is less than A3J J3E A3H H3E 50 convert to F2D) A7J J8W A9J J9W F3 F3E A9 A9W P1 P1D A9Y A7W A9Y A1D F2Y F2D A5 A3F F0 N0N A0H H0N A9 A8W F1 F1B A7 A8D A5C C3F F2 F2D F7 F8D F2 F2D F3 F3E F5 F3F F3Y F1E F4 F3C F9 F9W F9Y F1D A2H H2D A2 A2D ---------------------------------------------------------------------- And here is the relevant section of FCC rules: ---------------------------------------------------------------------- From General Docket No. 80-739 Section 2.201 Emission, modulation, and transmission characteristics. The following system of designating emission, modulation, and transmission characteristics shall be employed. (a) Emissions are designated according to their classification and their necessary bandwidth. (b) A minimum of three symbols are used to describe the basic characteristics of radio waves. Emissions are classified and symbolized according to the following characteristics: (1) First symbol - type of modulation of the main carrier; (2) Second Symbol - nature of signal(s) modulating the main carrier; (3) Third symbol - type of information to be transmitted. NOTE: A fourth and fifth symbol are provided for additional information and are shown in Appendix 6, Part A of the ITU Radio Regulations. Use of the fourth and fifth symbol is optional. Therefore, the symbols may be used as described in Appendix 6, but are not required by the Commission. (c) First Symbol - types of modulation of the main carrier: (1) Emission of an unmodulated carrier N (2) Emission in which the main carrier is amplitude- modulated (including cases where sub-carriers are angle modulated): - Double-sideband A - Single-sideband, full carrier H - Single-sideband, reduced or variable level carrier R - Single-sideband, suppressed carrier J - Independent sidebands B - Vestigial sideband C (3) Emission in which the main carrier is angle-modulated: - Frequency modulation F - Phase modulation G NOTE: Whenever frequency modulation "F" is indicated, Phase modulation "G" is also acceptable. (4) Emission in which the main carrier is amplitude and angle-modulated either simultaneously or in a pre- established sequence D (5) Emission of pulses:* - Sequence of unmodulated pulses P - A sequence of pulses: - Modulated in amplitude K - Modulated in width/duration L - Modulated in position/phase M - In which the carrier is angle-modulated during the period of the pulse Q - Which is a combination of the foregoing or is produced by other means V (6) Cases not covered above, in which an emission consists of the main carrier modulated, either simultaneously or in a pre-established sequence, a combination of two or more of the following modes: amplitude, angle, pulse W (7) Cases not otherwise covered X *Emissions where the main carrier is directly modulated by a signal which has been coded into quantizied form (e.g., pulse code modulation) should be designated under (2) or (3). (d) Second Symbol- nature of signal(s) modulating the main carrier: (1) No modulating signal 0 (2) A single channel containing quantized or digital information without the use of a modulating sub- carrier, excluding time-division multiplex 1 (3) A single channel containing quantized or digital information with the use of a modulating sub-carrier, excluding time-division multiplex 2 (4) A single channel containing analogue information 3 (5) Two or more channels containing quantized or digital information 7 (6) Two or more channels containing analogue information 8 (7) Composite system with one or more channels containing quantized or digital information, to-gether with one or more channels containing analogue information 9 (8) Cases not otherwise covered X (e) Third Symbol - type of information to be transmitted: (1) No information transmitted N (2) Telegraphy - for aural reception A (3) Telegraphy - for automatic reception B (4) Facsimile C (5) Data transmission, telemetry, telecommand D (6) Telephony (including sound broadcasting) E (7) Television (video) F (8) Combination of the above W (9) Cases not otherwise covered X (f) Type B emission: As an exception to the above principles, damped waves are symbolized in the Commission's rules and regulations as type B emission. The use of type B emissions is forbidden. (g) Whenever the full designation of an emission is necessary, the symbol for that emission, as given above, shall be preceded by the necessary bandwidth of the emission as indicated in Section 2.202 (b) (1). Section 2.202 Bandwidths. (b) Necessary bandwidths. (1) The necessary bandwidth shall be expressed by three numerals and one letter. The letter occupies the position of the decimal point and represents the unit of bandwidth. The first character shall be neither zero nor K, M or G. - -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2285 From: Shawn Hughes Date: Fri Jan 12, 2001 9:01am Subject: damped waves? >(f) Type B emission: As an exception to the above principles, damped waves >are symbolized in the Commission's rules and regulations as type B >emission. The use of type B emissions >is forbidden. kay, what is a 'damped wave'? Why would they want to forbid it? What would one look like on a spec an? Shawn [Non-text portions of this message have been removed] 2286 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:33am Subject: Lamaze Class The room was full of pregnant women and their partners, and the Lamaze class was in full swing. The instructor was teaching the women how to breathe properly, along with informing the men how to give the necessary assurances at this stage of the plan. The teacher then announced, "Ladies, exercise is good for you. Walking is especially beneficial. And, gentlemen, it wouldn't hurt you to take the time to go walking with your partner!" The room got quiet. Finally, a man in the middle of the group raised his hand. "Yes?" replied the teacher. "Is it all right if she carries a golf bag while we walk?" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2287 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:36am Subject: Computer Terms for Southerners Computer Terms for Southerners "Keyboard" ----- Place to hang your truck keys. "Window" ----- Place in the truck to hang your guns. "Floppy" ----- When you run out of Polygrip. "Modem" ----- How you got rid of your dandelions. "ROM" ----- Delicious when you mix it with coca cola. "Byte" ----- First word in a kiss-off phrase. "Reboot" ----- What you do when the first pair gets covered with barnyard stuff. "Network" ----- Activity meant to provide bait for your trot line. "Mouse" ----- Fuzzy, soft thing you stuff in your beer bottle in order to get a free case. "LAN" ----- To borrow as in, "Hey Bubba! LAN me yore truck." "Cursor"----- What some guys do when they are mad at their wife and/or girlfriend. "Bit" ----- A wager as in, "I bit you can't spit that watermelon seed across the porch longways." "Digital Control" ----- What yore fingers do on the TV remote. "Packet"----- What you do to a suitcase or Wal-Mart bag before a trip. "Hard drive" ----- Trying to climb a steep, muddy hill with 3 flat tires and pulling a trailer load of fertilizer. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2288 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:39am Subject: Native New Yorkers What would you call it when a Native New Yorker has one arm shorter than the other? A speech impediment. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2289 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 8:44am Subject: Assorted Tidbit of Wisdom and Such THE INTERNET ~~~~~~~~~~~~ Customer: I'm trying to connect to the Internet with your CD, but it just doesn't work. What am I doing wrong? Tech Support: OK, you've got the CD in the CD drive, right? Customer: Yeah.... Tech Support: And what sort of computer are you using? Customer: Computer? Oh no, I haven't got a computer. It's in the CD player and all I get is weird noises. Listen..... Tech Support: Aaaarrrrgggghhhh!!! THE DOCTOR'S DAUGHTER ~~~~~~~~~~~~~~~~~~~~ On the way to preschool, the doctor had left her stethoscope on the car seat, and her little girl picked it up and began playing with it. "Be still, my heart," thought the doctor, "my daughter wants to follow in my footsteps!" Then the child spoke into the instrument, "Welcome to McDonald's. May I take your order?" COMPUTER CONFUSION ~~~~~~~~~~~~~~~~~~ Don was on duty in the main computer lab on a quiet afternoon. He noticed Putty Duh sitting in front of one of the workstations with his arms crossed across his chest, staring at the screen. After about 15 minutes he noticed that Putty was still in the same position, only now he was impatiently tapping his foot. Finally, Don approached Putty and asked if he needed help. He replied, "It's about time! I pressed the F1 button over twenty minutes ago!" HAIR LOSS ~~~~~~~~~ Sabra was eating breakfast one morning and got to thinking about things. "Mommy, mommy, why has daddy got so few hairs on his head?" she asked her mother. "He thinks a lot," replied her mother, pleased with herself for coming up with a good answer to her husband's baldness. Or she was until Sabra thought for a second and asked, "So why do you have so much hair?" TRUTHS ~~~~~~ * Raising teenagers is like nailing JELLO to a tree. * There is always a lot to be thankful for if you take time to look for it. For example, I am sitting here thinking how nice it is that wrinkles don't hurt. * The best way to keep kids at home is to make the home a pleasant atmosphere and let the air out of their tires. * Car sickness is the feeling you get when the monthly car payment is due. * Families are like fudge... mostly sweet with a few nuts. * Laughing helps. It's like jogging on the inside. * My mind not only wanders, sometimes it leaves completely. * If you can remain calm, you just don't have all the facts. WHY IS IT? ~~~~~~~~~~ Why is it that if someone tells you that there are 1 billion stars in the universe you will believe them, but if they tell you that a wall has wet paint you will have to touch it to be sure? -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2290 From: Date: Fri Jan 12, 2001 6:19am Subject: warrantless searches of computers for L.E. covered here http://www.cybercrime.gov/searchmanual.htm The U.S. Department of Justice this week published new guidelines for police and prosecutors in cases involving computer crimes. The 500 KB document includes a bevy of recent court cases and covers new topics such as encryption, PDAs and secret searches. It updates a 1994 manual, which the Electronic Privacy Information Center had to file a Freedom of Information Act request to obtain. No need to take such drastic steps this time: The Justice Department has placed the report on its cybercrime.gov site. 2291 From: Talisker Date: Fri Jan 12, 2001 11:18am Subject: Virus Alert - Humour I saw this and thought I'd pass it on :o) >you have just received the "Kansas Virus" As we ain't got no programming >experience, this virus works on the honor system. Please delete all the >files from your hard drive and manually forward this virus to everyone on >your mailing list. >Thanks for y'all for cooperating, >University of Kansas Computer Engineering Dept. No offence intended to anyone from Kansas Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List ''' (0 0) ----oOO----(_)---------- | The geek shall | | Inherit the earth | -----------------oOO---- |__|__| || || ooO Ooo talisker@n... The opinions contained within this transmission are entirely my own, and do not necessarily reflect those of my employer. 2292 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 11:44am Subject: Chicago Cops' Spying Curbs Eased Chicago Cops' Spying Curbs Eased http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,667737,00.html Friday January 12, 2001 4:40 am CHICAGO (AP) - Police can more easily monitor criminals after a federal appeals court on Thursday lifted restrictions imposed on the Chicago force two decades ago to stop mistreatment of Communists and other suspected subversives. Among the changes under the ruling: police will be allowed to investigate people photographed near crime scenes, keep records of suspects' gang affiliations and keep files on known associates of organized crime figures. The city's ``Red Squad,'' established in the 1920s, was designed to keep tabs on radical groups then viewed as enemies of the state. But over 50 years it also began keeping files on critics of City Hall. A 1981 agreement with the federal government required the police department to stop interfering with freedom of expression and to stop several types of intelligence-gathering. Thursday's decision leaves intact prohibitions against police harassment or retaliation against freedom of expression. The department must conduct an audit to see that it is in compliance with the decree and a federal court will continue to have oversight under the decision. But the 7th U.S. Circuit Court of Appeals ruling said the restrictions should be lifted because police were no longer interested in harassing people who had unpopular views. ``The culture that created and nourished the Red Squad has evaporated,'' the court said. ``The city does not want to resurrect the Red Squad. It wants to be able to keep tabs on incipient terrorist groups.'' ``Every major city in the United States is allowed to collect this kind of intelligence data,'' said police Superintendent Terry Hillard. ``We will continue to respect First Amendment rights while using the investigative tools to responsibly fight crime.'' The American Civil Liberties Union expressed dismay that the restrictions were lifted. ``We respectfully disagree with the 7th Circuit that they hampered the Chicago police from conducting effective law enforcement,'' spokesman Edward Yohnka said. =================================== Court upends spying rules imposed on Chicago cops http://www.chicago.tribune.com/news/metro/chicago/article/0,2669,ART-49184,FF.html By Matt O'Connor and Gary Washburn Tribune Staff Writers January 12, 2001 Restrictions on Chicago police because of their infamous Red Squad that spied on political activists in the 1960s and 1970s have left police "helpless" to combat terrorist groups and should be eased, a federal appeals court ruled Thursday. Lawyers for the city and Police Department hailed the decision, saying it will allow officers to provide surveillance of hate groups, photograph and videotape public demonstrations and share information with police across the country in monitoring suspected terrorists. Under a federal consent decree in effect for the last two decades, the city said its efforts to investigate gangs, terrorism and demonstrations had been hampered by requirements it first must have a reasonable suspicion of criminal activity. In its ruling, a three-judge panel of the 7th Circuit U.S. Court of Appeals said the onerous decree "renders the police helpless to do anything to protect the public" against terrorism. "The decree impedes efforts by the police to cope with the problems of today because earlier generations of police coped improperly with the problems of yesterday," said the opinion, written by Richard A. Posner, until recently chief judge. Judges William J. Bauer and Frank H. Easterbrook concurred. The ruling overturns a decision for the decree by former U.S. District Judge Ann Williams, who now sits on the 7th Circuit bench. Richard Gutman, an attorney for the lead plaintiff, Alliance to End Repression, who has been involved in the litigation from its inception in 1974, fears a return to the police tactics of the Red Squad, the intelligence-gathering unit that spied on, infiltrated and harassed a variety of political groups as far back as the 1920s. In its heyday in the 1960s, the special police detail was set up to watch over possibly violent anti-Vietnam War activists, but it quickly expanded to include spying on church organizations, community activists and opponents of Mayor Richard J. Daley's administration. "For all practical purposes, it eliminates any restrictions on political spying and it would permit the city to re-create the Red Squad," Gutman said. "So far as I'm concerned, the consent decree is dead." The ACLU of Illinois, another plaintiff in the lawsuit, disagreed with the court's finding that the limitations "hampered the city's ability to engage in effective law enforcement," said spokesman Edwin Yohnka. The plaintiffs said they haven't decided if they would ask the court to reconsider its decision or appeal to the U.S. Supreme Court. Lawyers for the city and the Police Department as well as the court ruling emphasized that the consent decree is being modified, not eliminated. Audits of the department's conformance with the decree won't be altered, making it more difficult for constitutional violations to go undetected, the court said. Thomas Needham, the Police Department's chief of staff, said he has been instructed by Supt. Terry Hillard to meet with city attorneys and come up with written procedures on how to conduct these investigations. Hillard wants to take "a cautious, go-slow approach," Needham said. "He wants this studied carefully." Mara Georges, the city's corporation counsel, said the court decision simply "unties the hands of the Chicago Police Department and allows it to engage in the kind of routine police work that every other police department does." Deputy Corporation Counsel Lawrence Rosenthal, who led the fight to ease the restrictions, acknowledged "very serious misconduct gave rise" to the consent decree. But from the start, the decree was "extremely restrictive," he said. Citing a recent example of how it hamstrung police efforts, Rosenthal pointed to white supremacist Benjamin Smith, whose two-state shooting spree over the 4th of July weekend in 1999 killed two, including former Northwestern University basketball coach Ricky Byrdsong, and wounded nine. When Smith had passed out inflammatory leaflets, Rosenthal said, "we couldn't even keep the leaflets, much less gather intelligence about who this guy was and what he was up to." "If somebody paints a swastika in Rogers Park, we have no idea what hate groups are operating in Rogers Park," Rosenthal said. "That is why we almost never solve those crimes. If you don't have a notion of what people you ought to be interviewing, you are not going to solve the crime." The court perceived a greater threat if the police couldn't keep tabs on terrorist groups. "Until the group goes beyond the advocacy of violence and begins preparatory actions that might create reasonable suspicion of imminent criminal activity, the hands of the police are tied," the decision said. "And if the police have been forbidden to investigate until then, if the investigation cannot begin until the group is well on its way toward the commission of terrorist acts, the investigation may come too late to prevent the acts or to identify the perpetrators." Plaintiffs' lawyers pointed out that Williams and U.S. Magistrate Judge Edward Bobrick concluded the decree in no way restricted Chicago police from investigating criminal activity. Gutman said one Chicago police sergeant who was a veteran of 15 years on the Counter-Terrorism Task Force said in a deposition the consent decree never stopped him from pursuing what he wanted to pursue. Gutman said the city in court filings indicated it wanted to investigate the extremist beliefs of individuals who aren't suspected of criminal activity. "They're going to be defining who's extremist," he said. "They can spy on anybody they want." Mayor Richard M. Daley began a campaign to lift the restrictions more than a decade ago. His administration believed the court might lift the limits if the city demonstrated a solid record of compliance. The city abided by the terms of the decree even though it hamstrung police, city officials declared Thursday. The court also concluded that the limits had worked. "The culture that created and nourished the Red Squad has evaporated," the court found. "The consent decree has done its job." =================================== Police spying rules eased http://www.suntimes.com/output/news/red12.html January 12, 2001 BY FRAN SPIELMAN AND STEVE WARMBIR STAFF REPORTERS Chicago police should have more freedom to investigate terrorist and hate groups because threats from them are more pressing than past police spying abuses, a federal appeals court ruled Thursday. In a controversial decision, the 7th Circuit Court of Appeals agreed to the city's request to modify a 1981 consent decree that had reined in the Chicago Police Department's notorious Red Squad. The unit spied on, infiltrated and harassed political groups. Under the consent decree, police could not start spying on a group until they had a reasonable belief a crime was occurring. But with a terrorist or hate group, "if the investigation cannot begin until the group is well on its way toward the commission of terrorist acts, the investigation may come too late to prevent the acts or to identify the perpetrators," Appellate Court Judge Richard Posner wrote. "The decree impedes efforts by the police to cope with the problems of today because earlier generations of police coped improperly with the problems of yesterday." Police and city officials praised the decision, while civil rights groups said it gutted an important safeguard. "I think it's a significant setback for these guidelines that have been in place protecting the people of Chicago these many years," ACLU spokesman Ed Yohnka said. The ACLU is considering an appeal. Tom Needham, chief of staff for police Supt. Terry Hillard, called the decision "a tremendous victory for common sense." "Less than 5 percent of the people currently on the police department were on the job when the city entered into this consent decree," Needham said. "There's a whole new generation of younger, better-educated police officers who can't even understand why we have these restrictions that other law enforcement agencies don't have. It's a historical relic." The ruling was a resounding victory for Mayor Daley, who has spent four years trying to modify the consent decree, which he contends "ties the hands" of police. As recently as last fall, violence in the Middle East prompted a Rogers Park rabbi to come under gunfire and Jewish pedestrians to be victimized by a slingshot attack. Daley said it was an example of how the court order had hamstrung police attempts to combat hate crimes. The rabbi's attackers are still at large. Currently, the police department is prohibited from retaining intelligence files, but now it will be able to create comprehensive databases on terrorist and hate groups. Hillard has asked his staff to put together a committee to determine how internal orders and procedures should be rewritten. The modified consent decree is expected to be written by U.S. District Judge Joan Gottschall at the appellate court's direction. Gottschall recently rejected claims by protesters that police violated the consent decree by spying on them during the 1996 Democratic National Convention. Corporation Counsel Mara Georges stressed the decree is not being scrapped. Chicago police still won't be permitted to gather intelligence to harass, intimidate or prohibit activities protected by the First Amendment. And the police will still be subject to court-monitored annual audits. "It's an entirely different atmosphere now. The city has been able to show that, for two decades, police have not engaged in such conduct." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2293 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 4:54pm Subject: Cuba's spy network revealed Published Friday, January 12, 2001, in the Miami Herald Cuba's spy network revealed http://www.miamiherald.com/content/today/news/dade/digdocs/057047.htm BY GAIL EPSTEIN NIEVES gepstein@h... Cuba's foreign intelligence agency devotes an entire department to infiltrating exile groups and another department to getting inside the FBI, CIA, State Department and other U.S. governmental agencies, an expert in Cuban spy matters testified Thursday. Stuart Hoyt Jr., a retired FBI agent, unraveled the hierarchy of Cuba's intelligence services from ``Commander in Chief'' Fidel Castro on down. His testimony provided some context for jurors in the Cuban spy trial, who every day read or hear another acronym related to Cuban intelligence. None of the jurors is Cuban- American, so they probably would not be expected to know that the Directorate of Intelligence, or DI, is Cuba's main foreign espionage agency. Within the DI are eight departments, all of which start with the letter M followed by a Roman numeral, said Hoyt, who retired from the FBI in 1994 after 24 years of foreign counter-intelligence work, first against the Soviet Union and later against Cuba. Hoyt was assigned to field offices in New York, Boston, San Juan and Washington, D.C., and for three years he supervised the agency's anti-Cuba efforts. He still works under contract with the FBI. Hoyt named the intelligence departments as follows: MX is the office of the DI's chief, Brig. Gen. Eduardo Delgado Rodriguez. The indictment in this case used the code ``MX'' for the Havana chief who directed the accused spies to gather information that allegedly helped Cuban MiG warplanes shoot down and kill four Brothers to the Rescue pilots in 1996. MI is responsible for infiltrating U.S. government agencies. MIII collects and analyzes all information coming into the DI. MV supports ``illegal'' intelligence officers, or those who enter the U.S. illegally. ``Legal officers'' arrive legally and operate in official diplomatic missions, including M15, the Cuban mission to the United Nations in New York City; M2, the Cuban embassy in Mexico City; and M6, the Cuban embassy in Madrid. MIX is ``active measures,'' which refer to the use of disinformation, threats and violence to discredit enemies or otherwise influence someone's actions. MXI monitors phone calls and airplane radio communications. MXV handles communications between Havana and agents in the United States. MXIX infiltrates ``counter-revolutionary'' Cuban exile groups that oppose the Castro regime. Cuba has another group with a name similar to the DI but with a very different function. The Directorate of Counter Intelligence, called CI, works within Cuba handling ``internal control to ensure people don't speak out against the government,'' Hoyt said. Both the DI and the CI are part of the Ministry of the Interior, MINIT, one of the two most powerful ministries, or departments, in the Cuban government. The second is the Ministry of the Revolutionary Armed Forces, MINFAR, or the Cuban military, Hoyt said. The five men on trial are accused of spying for Cuba as part of La Red Avispa, the Wasp Network, whose members allegedly tried to penetrate U.S. military installations and Cuban exile groups. Hoyt said the network used typical spying techniques, including writing secrets on water-soluble paper that could quickly be destroyed. Jurors saw four such papers. The network also used ``compartmentalization,'' or limiting each person's knowledge, so that ``in case one is arrested, he will not be able to identify the other.'' The accused spies also communicated with beepers and pay phones, used counter-surveillance measures, post office boxes, fake documents and concealment devices, he said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2294 From: St. Clair, James Date: Fri Jan 12, 2001 8:39am Subject: FW: CellPhone in luggage allegedly scrambles avionics CellPhone in luggage allegedly scrambles avionics: Mobile phone brings down Slovenian airplane By Kieren McCarthy, The Register, 01/11/2001 http://www.theregister.co.uk/content/5/15995.html According to Reuters, a Slovenian airplane had to make an emergency landing on Tuesday because a ringing mobile phone had corrupted an electronics system and caused a fire-on-board light to switch on. Adria Airways admitted the plane bound for Sarajevo turned back shortly after take-off and made an emergency landing in Ljubljana. The airline said it had been caused by a phone in the luggage compartment that had been left on. Now, we can take this one of three ways. Either we should be extremely grateful to airlines' anal rules that stop you using mobiles and loads of other electrical equipment (note that laptops are alright because business customers make airlines profitable), thereby making the flight even more depressing and uncomfortable. Or, we should be very, very concerned about getting onto an Adria Airways plane in the future. Or, we should stop using our mobile phones very soon because if they can disrupt electrical systems while in a suitcase while in a hold - just imagine what they're doing to your brain. Æ 2295 From: James M. Atkinson, Comm-Eng Date: Fri Jan 12, 2001 9:26pm Subject: Secrets and Lies January 12, 2001 Secrets and Lies http://thestandard.com/article/display/0,1151,21428,00.html Clinton recently appointed a national counterintelligence executive. But will protecting national secrets only create more leaks? By Richard Martin Two weeks ago, as one of his last acts in office, President Clinton created a position ñ "national counterintelligence executive" ñ with a broad mission to identify potential security threats and beef up protection for national secrets deemed vital to the security of the U.S. Coming after the bungled FBI investigation at the Los Alamos National Laboratory, this lame-duck maneuver is designed to combat a largely vaporous menace. It bears the fingerprints of FBI Director Louis Freeh, who as chairman of the proposed National Counterintelligence Board of Directors would select and oversee the secrecy czar. The directive also follows years of thwarted efforts by Congress to enact a law resembling Britain's notorious Official Secrets Act. Technology and business leaders should press the new Bush administration to reverse it forthwith. If there's one lesson that American companies have learned from the economic boom of the past decade it's that the free flow of information in any system ñ whether it's an internal network, a far-flung multinational corporation, a market or a government ñ benefits all parts of the system. Transparent markets function better than closed ones, as travel agents and stockbrokers are finding out. And transparent governments outlive secretive ones: "There seems to be no doubt," wrote former Sen. Daniel Patrick Moynihan in his foreword to the 1997 report from the Commission on Protecting and Reducing Government Secrecy, "that the Soviet Union deteriorated not least because the responsible actors rarely really knew what was going on." Unfortunately, the culture of secrecy that took hold in Washington after World War II did not evaporate with the end of the Cold War. Intelligence spending rose 120 percent between 1980 and 1996, a period when defense spending increased 40 percent. Today there are some 3 million people, inside and outside the federal government, with the authority to classify information as "Top Secret." But recent intelligence foul-ups, including the Los Alamos fiasco, prove that that expansion has not resulted in increased security. That's because of a paradox long understood by students of counterintelligence: The more secrets there are, the less secure they are. "Unless secrecy is reduced," wrote Moynihan, "it cannot be protected." Centralizing the government's counterintelligence efforts is a good idea. (One of the main recommendations of the 1997 secrecy commission was to rationalize procedures for classifying government information and to create a National Declassification Center.) Appointing a new secrecy czar to make the U.S. government more opaque, rather than less, is a lousy one. Ironically, in November, Clinton vetoed the Intelligence Authorization Act, which contained a provision to make any unauthorized disclosure of classified information a felony. Among other things, the law would have reversed the Supreme Court's historic decision in the Pentagon Papers case, which affirmed that freedom of the press and the public's right to know outweigh the specific crime of divulging government secrets. In vetoing the intelligence bill, Clinton quoted Justice Potter Stewart's opinion in that case: "The only effective restraint on executive policy in the areas of national defense and international affairs may lie in an enlightened citizenry." In other words, more secrecy only begets ignorance. And knowledge is always better than ignorance. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2296 From: Andre Holmes <1ach@g...> Date: Sat Jan 13, 2001 8:00am Subject: Re: FW: CellPhone in luggage allegedly scrambles avionics We should be very concerned about getting onto a Airways plane in the future. Lesson learned= after reading the post I could only conclude: 1 The Slovenian Airplane was rigged in such away that if there is any transmitting on board then it had better be from the transceiver in the cockpit. 2 There is a good likely hood that a frequency registering instrument was wired to the lights and or warning system of the airplane. 3 Electrical power to the airplane is generated from a generator which is mounted under the Jet Engines. All cables are shielded from heat,oil,water,vibration etc meaning nothing should be able to penetrate the shielding. The cables from the generator is routed to a box on the side of the Engine its a distribution center, from there the wire routes can go every where needed. 4 The airliner feels safer to turn the plane around to locate the source of the xmitter or bomb in the hopes of lowering liability. ----- Original Message ----- From: "St. Clair, James" To: Sent: Friday, January 12, 2001 9:39 AM Subject: [TSCM-L] FW: CellPhone in luggage allegedly scrambles avionics CellPhone in luggage allegedly scrambles avionics: Mobile phone brings down Slovenian airplane By Kieren McCarthy, The Register, 01/11/2001 http://www.theregister.co.uk/content/5/15995.html According to Reuters, a Slovenian airplane had to make an emergency landing on Tuesday because a ringing mobile phone had corrupted an electronics system and caused a fire-on-board light to switch on. Adria Airways admitted the plane bound for Sarajevo turned back shortly after take-off and made an emergency landing in Ljubljana. The airline said it had been caused by a phone in the luggage compartment that had been left on. Now, we can take this one of three ways. Either we should be extremely grateful to airlines' anal rules that stop you using mobiles and loads of other electrical equipment (note that laptops are alright because business customers make airlines profitable), thereby making the flight even more depressing and uncomfortable. Or, we should be very, very concerned about getting onto an Adria Airways plane in the future. Or, we should stop using our mobile phones very soon because if they can disrupt electrical systems while in a suitcase while in a hold - just imagine what they're doing to your brain. Æ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 2297 From: Jonathan D. Alvord Jr. Date: Fri Jan 12, 2001 10:29pm Subject: pgp encryption Just something I thought worthy of discussion!! Anyone else know about this ?? heimdall58@h... Found this while surfing the web. [Note: there are many commercial programs available which may provide additional features not found in PGP 5.5, such as automatic encryption of an entire drive. A review of some of these programs for Windows 95 can be found in the cryptome. I have been advised that the Triple DES algorithm is probably the most secure.] For those who are not familiar with it, I would like to briefly describe encryption and how it works, and then suggest how the freeware program pgp could be used to encrypt an internet mailing list, so that third parties would not be able to decode and read messages broadcast within a private group. As far as I know, no one is using pgp to encrypt a mailing list at this time - but it's easy to do so, and a foolproof way to prevent big brother wannabies in spy agencies from sticking their noses where they don't belong -- politics. If this is beginning to sound like a conspiracy theory, then a few historical references are in order. The FBI performed over 10,000 illegal black bag jobs (break-ins to gather intelligence) during the cointelpro period of the sixties and seventies, and most of those were for political purposes. Fighting communism, fighting the Black Panthers and the American Indian Movement, the murders of Martin Luther King and Malcolm X -- there are many examples of the use of surveillance and counter- intelligence for political purposes, the shameful underside and shadow of twentieth century American politics. Today, with almost everyone going online, even ordinary people are taking great risks in their personal conversations, because email can be so easily intercepted and cataloged. And it's not just a rogue law enforcement officer we have to be afraid of; the APEC scandal provides a perfect example of the unethical use of our intelligence community for commercial purposes, and in that case, for the purpose of campaign finance. Well, if someone wants to read my email, they're going to have to get a warrant to steal my computer. Without the private key I keep on my hard drive (which itself is password protected), even an acre of cray computers at Fort Meade couldn't crack my code. That's how powerful this technology is. Louie the Freeh and other top cops have tried to make this illegal, but it is not illegal, at least in the U.S. [There may be countries where the use of unlimited strength crypto is illegal, however. These programs may be considered to be weapons of war, due to the historical importance of secret codes in wars.] You don't need to have any secrets to need encryption. One good reason to use encryption is the NSA database of private email (and etc), which can be searched for keywords, just like dejanews is used by regular folks, to search through public usenet posts. By keying in on your email address and name as keywords, anyone with access to their system could read all your incoming and outgoing email (all the mail, from day one) as well as all the emails in which someone else mentions your name. A search on your name would probably turn up things other people have said about you that you don't even know about. OK, let's discuss pgp. PGP, which stands for Pretty Good Privacy, is a freeware program available for IBM, Mac, and Unix computers at http://www.pgp.com/products/personal/products.cgi. Older versions and newer versions of pgp seem to be incompatible, and people with older versions need to update to version 5.5 to stay current. When the program installed itself on my Windows 95 machine, it generated a pair of keys. A key is a long sequence of characters generated by complex mathematical formulas. The two keys generated by the formulas have a mathematical relationship to each other, and pgp can tell that they are a pair by applying its equations - the puzzle is solved! One of the keys is public and the other is private. You give key away to your friends, and you keep the other one for yourself. The private key is never given to anyone else. Then the only way a third party would be able to decode messages encrypted to you would be to get a hold of your private key - and they would have to steal your computer for that. If this ever happens to you, remember to tell your lawyer about the Steve Jackson Games case, which set a precedent for the legal grounds required for a federal agency to confiscate a person's computer. The private key on your computer requires a password to use, which should be something you can remember and don't need to write down. If they have your computer, they can probably hack this password, but it would require serious effort. Some people encrypt everything on their computer and keep the key on a floppy disk. That would be the safest way to go. Then they would need to steal the floppy disk -- does this sound like James Bond yet? Let's say you want to send me an encrypted message. You will need to have my public key. You may have seen people who post on the internet with signatures like BEGIN PGP PUBLIC KEY BLOCK, then a lot of characters in a row, then END PGP PUBLIC KEY BLOCK. This public key is public information, and providers are beginning to archive them for their customers. A public key is used by other people to encrypt a message that only you can decode, using the private key that is the other half of the pair. Once someone encrypts a message to you, they can't decrypt it and read it afterwards, because they don't have the private key. That's how pgp works. Now, for me to send an encrypted reply to your message, I need your public key. I encrypt my message with your public key, paste it into an email message, and you will be able to decode it with your private key. We would use four keys to have this conversation. As I mentioned, they are automatically generated by the pgp program, and you just select "encrypt contents of clipboard" and "decrypt contents of clipboard" from a menu in pgp and select the proper keys from a list the program keeps, like a telephone directory. Apparantly, the way to crack encrypted messages is to use the formulas in pgp and try every combination to see if it works. But with this particular program (pgp), each key is so long that it would be an astronomical computer problem to try every combination. Many nonsense plaintext solutions are generated by shotgun type approaches, and a computer can't determine if it has a correct answer unless it can verify that the syntax of the message is gramatically correct; this is not easy, and even gramatically correct solutions could be found randomly, which have no relation to the real message. It's the same idea as a million monkeys (or more) with typewriters producing a Bible by accident. Imagine how many guesses an acre of cray computers could make in just one moment. Imagine the late Carl Sagan telling you how big the universe is - there must be a huge number of possible pgp keys. When they talk about unlimited strength crypto, they mean programs that can overpower supercomputers using trial and error methods, simply by using very long keys. Obviously, longer keys are harder to guess than shorter ones. Without getting any more technical, that is the basic idea of pgp. A numerical sequence is used to scramble your message, and a corresponding sequence, which is mathematically related to it, is used to unscramble it. The sequences used are too long to make guessing practical, even by the most powerful networks of computers. I have an idea for how to use pgp to encrypt a mailing list. Members of a mailing list all have to be able to read the messages on the list. In pgp terms, everyone needs to use the same public key to encrypt messages for the list, and everyone uses the same private key to read them. So everyone needs to have copies of the same "master keys" for the list. Here's how it would work. First, a group of people all download a copy of pgp and get it working on their machines. PGP is available for IBM, Mac, and Unix, and the members can have a mixture of these different operating systems. Each person will generate a pair of keys, public and private - that's part of the installation. After reading this story, you're now familiar with pgp, and your friends will undoubtedly expect you to take the lead as organizer of the mailing list. The first thing for you to do is to generate another pair of keys - these will be the master keys. Next, send copies of both of keys to everyone on the list, using your newfound encryption technology. Sending keys in the mail may sound like a dangerous idea, but because your friends all have their own sets of keys, you can *italics* use their personal public keys to encrypt the master keys for the list *end italics* and send the master keys securely to each of the members. Now everyone has an identical pair of master keys, and they've never even met face to face. These keys are in addition to their own personal keys, which they can use for personal encrypted mail. Emails sent to the mailing list are encrypted by the public master key and broadcast to the list members, who use the private master key to decode them. This is a perfect information security system, as long as no one's computer gets bagged. Our private communications are none of the government's business. Of course, the legality of using encryption depends upon what it is you're encrypting. This is a technology that can be used for all kinds of criminal purposes. But at the same time, it protects us from criminal acts by unethical people in positions of power in our government. That's a compromise I am willing to make. Paul Wolf _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com 2298 From: Paolo Sfriso Date: Sat Jan 13, 2001 8:31am Subject: Re: Cellphone in lugagge allegedly scrambles avionics. In Italy (and I think in some other EU countries too) it is a criminal offence to keep your cellphone activated during a commercial flight. At take-off and landing a standard "cellphones off/on" warning is given over the plane's PA system. In fact, GSM cellphones do disturb (even when idle and give their "here I am" transmittion burst") a number of electronic systems. You can typically "hear" a call arriving on your GSM cellphone by the rasping noise that enters your phone, PC, stereo system, etc. I assisted on a case a couple of years ago where a GSM/GPS bug had been planted by the Carabinieri CID in a hold-up gang's car and one of the suspects says, after hearing the "hear I am " rasp interfere with the car's stereo, "Sh** I sure hope this noise comes from one of our cellphones and not some big planted in the car"...You can imagine the surveillance team's reaction... Analog cellphones (such as E-TACS) dont seem to disturb nearby electronics. Have a nice weekend. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 (0)335 5257308 paulsfriso@t... 2299 From: William Knowles Date: Sun Jan 14, 2001 2:48am Subject: Re: pgp encryption On Fri, 12 Jan 2001, Men in with black helicopters working with the Greys made Jonathan D. Alvord Jr. write: > Just something I thought worthy of discussion!! Anyone else know about this > ?? heimdall58@h... > > Found this while surfing the web. > > [Note: there are many commercial programs available which may > provide additional features not found in PGP 5.5, such as > automatic encryption of an entire drive. A review of some of > these programs for Windows 95 can be found in the cryptome. I > have been advised that the Triple DES algorithm is probably the > most secure.] Currently PGP 7.0 is the most recent commercial release of PGP. > For those who are not familiar with it, I would like to briefly > describe encryption and how it works, and then suggest how the > freeware program pgp could be used to encrypt an internet mailing > list, so that third parties would not be able to decode and read > messages broadcast within a private group. > > As far as I know, no one is using pgp to encrypt a mailing list at > this time - but it's easy to do so, and a foolproof way to prevent > big brother wannabies in spy agencies from sticking their noses > where they don't belong -- politics. If this is beginning to > sound like a conspiracy theory, then a few historical references > are in order. Actually there are quite a few lists using PGP for a mailing list, and you can install a program to make this eaiser. PGPdomo: pgpdomo is a set of replacement programs for Majordomo version 1.93 that allows you to perform PGP encrypted administration and distribution of encrypted messages on selected lists while still retaining (mostly) normal operation of your cleartext lists. Unless you're checking the backround of everyone signing up for your publically available mailing list, all PGP would do is keep curious onlookers of the mail in transit from looking at your messages, PGP won't stop a FBI agent from submitting a PGP key and signing onto your list. > Well, if someone wants to read my email, they're going to have to > get a warrant to steal my computer. Warrants? We don't need no STINKING WARRANTS! http://www.cybercrime.gov/searchmanual.htm > Without the private key I keep on my hard drive (which itself is > password protected), even an acre of cray computers at Fort Meade > couldn't crack my code. That's how powerful this technology is. Acre of Cray computers? Maybe less then 100 square feet of would crack your message, But if we have your computer whole, intact, and not blown in a million pieces from a chunk of RDX next to your harddrive, Then maybe a couple of Pentium class workstations because it all falls down to the quality of your passphrase, which for the most part are less than 8-10 characters long and usually in plaintext with no special cH@RaC73r$ to slow down the process of cracking the passphrase. > OK, let's discuss pgp. PGP, which stands for Pretty Good Privacy, > is a freeware program available for IBM, Mac, and Unix computers > at http://www.pgp.com/products/personal/products.cgi. I point people towards: http://www.pgpi.org/ for PGP and GPG information. > Older versions and newer versions of pgp seem to be incompatible, > and people with older versions need to update to version 5.5 to > stay current. PGP is available for many different platforms, including Unix, MS-DOS, Windows 3.x, 95, 98, & NT, 2000, BeOS, OS/2, Macintosh, Amiga, Newton, Atari Psion, and even Palm. I have one client that is so paranoid about PGP that he changes his PGP keys as often as he changes his underwear (1-2 times a day) and generates keys on a HP200LX. I tell people that PGP is secure enough for 95% of the world's prying eyes, That the other 5% is the world's various governments, intelligence agencies, and larger corporations that have the way and the means to find out what that encrypted message says in plaintext. Think I'm kidding? http://www.eff.org/descracker.html To prove the insecurity of DES, EFF built the first unclassified hardware for cracking messages encoded with it. On Wednesday, July 17, 1998 the EFF DES Cracker, which was built for less than $250,000, easily won RSA Laboratory's "DES Challenge II" contest and a $10,000 cash prize. It took the machine less than 3 days to complete the challenge, shattering the previous record of 39 days set by a massive network of tens of thousands of computers. The research results are fully documented in a book published this week by EFF and O'Reilly and Associates, entitled "Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design." Its a good rule of thumb not to trust any encryption program that wasn't written by someone that hasn't done years of cryptoanalysis, and Phil Zimmermann isn't one of those guys I really trust his software with my life, Zimmermann was an anti-war/nuclear protester. On the other hand, the NSA is having a hard time retaining their personal and losing quite a few to the private sector, and if I felt I needed an encryption program that strong, I would be recruiting around the Fort George G. Meade campus. :) Sorry to rail on about off this, I'm a little hungover from a night of sake and sushi, and I have to redo a Powerpoint presentation for a talk next week. :) Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2300 From: 1RCM <1RCM@M...> Date: Sun Jan 14, 2001 9:33am Subject: What would YOU do? Hi List, Let's see if we can't spawn some creative debate here. Many on this list have run across these type instances which fall right in that blurry area somewhere between standing on true ethics and paying the bills. What do YOU do?? Ah yes, before you consider both scenarios think back to all of the debate that has taken place on this list over the past year relating to professionals vs. charlatans; just what constitutes performing a proper sweep; enlightening a potential client; fees vs. services performed; etc., etc. Then respond honestly! Scenario #1 ..... You are contacted by a potential client who feels that he/she has reason to have a sweep done. During the discussion that follows you are convinced that a sweep is legitimately needed, but also that the potential client does not have the foggiest idea of what is involved. And so you do a bit of education before you quote a fee. At the end of the discussion the client states that he/she fully understands what you have explained but has reached this decision: "Instead of the 6 hours that you quoted I want you to do the best that you can in 2 hours with your fee being reduced accordingly. I understand what you have explained to me and I accept the fact that I will be receiving less than what you recommend - but as the client that's my decision to make". Now remember that the office copy machine needs repair and you could use those few extra $$$'s to buy that new piece of equipment you want - all to the tune of about what you would make doing this 'mini-sweep'; the location is only 15 minutes from your office; you are satisfied that the client is making an 'informed decision'; and you have absolutely nothing work-wise going on the next day. What would YOU do??? Scenario #2 ...... You are contacted by a PI firm regarding handling a referral job. After a discussion regarding your services, fees and recommendations they want you to do: " a check of a hotel meeting room for transmitters and a quick look-around with a flashlight - bring just your sp ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us you have that you want to use, and your flashlight - we want this done very low-keyed. And you will only have about an hour alone in the room". After explaining your feelings regarding doing 'proper' sweeps the PI that you are talking to states emphatically that it is he who has been retained to look after the best interests of the client; no, you may not speak with the client; he is making his request based upon an investigation that he is conducting for the client; and yes, it is his neck on the line and not yours as the client will not know who you are. However, at the end of this discussion you are not really sure whether or not the PI fully understands what you had attempted to explain to him regarding TSCM and you have this lingering feeling that he is to a high degree basing his request on what he is willing to pay out of his billable fee for your services. But still, he is offering a decent buck for the work that you will actually have to do. Same conditions exist for this one as for the scenario above. What do YOU do???? Respond or not; do it on or off list; included your name or be anonymous - your choice. I'm not trying to embarrass anyone or to pry. I have my own reasons for posing these questions. But I truly believe that the diverse answers - and accompanying debate - that hopefully will be generated can benefit us all. Bob Motzer 1RCM@M... 2301 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 10:46am Subject: Re: What would YOU do? At 10:33 AM -0500 1/14/01, 1RCM wrote: >Hi List, > >Let's see if we can't spawn some creative debate here. Many on this list >have run across these type instances which fall right in that blurry area >somewhere between standing on true ethics and paying the bills. What do YOU >do?? Ah yes, before you consider both scenarios think back to all of the >debate that has taken place on this list over the past year relating to >professionals vs. charlatans; just what constitutes performing a proper >sweep; enlightening a potential client; fees vs. services performed; etc., >etc. Then respond honestly! >Scenario #1 ..... You are contacted by a potential client who feels that >he/she has reason to have a sweep done. During the discussion that follows >you are convinced that a sweep is legitimately needed, but also that the >potential client does not have the foggiest idea of what is involved. And so >you do a bit of education before you quote a fee. At the end of the >discussion the client states that he/she fully understands what you have >explained but has reached this decision: "Instead of the 6 hours that you >quoted I want you to do the best that you can in 2 hours with your fee being >reduced accordingly. I understand what you have explained to me and I accept >the fact that I will be receiving less than what you recommend - but as the >client that's my decision to make". > >Now remember that the office copy machine needs repair and you could use >those few extra $$$'s to buy that new piece of equipment you want - all to >the tune of about what you would make doing this 'mini-sweep'; the location >is only 15 minutes from your office; you are satisfied that the client is >making an 'informed decision'; and you have absolutely nothing work-wise >going on the next day. What would YOU do??? I would politely explain to the client that he is wasting my time, and would tell him to call me when he is finished playing games and wants to deal with reality. While you may think this is shocking the potential client will actually be more impressed that you stuck with your guns. Sure you may not get THIS projects, but you will probably get future projects from him. I would tell him that it will take a minimum or 4 hours for any TSCM project, and that I can do the job in a minimum of hours or not at all. Two hours would give me just enough time to unload the truck, set up for the first test, and then reload it with no time to actually turn the equipment on. It is a case of the client just being too cheap, and trying to manipulate how you apply your skills. At no time has he indicated that your time on target is restricted, or that there is some legitimate reason why you can get such limited time. It is a very slippery slope when you bow in to the pressures and influence of HOW you perform your job. >Scenario #2 ...... You are contacted by a PI firm regarding handling a >referral job. After a discussion regarding your services, fees and >recommendations they want you to do: " a check of a hotel meeting room for >transmitters and a quick look-around with a flashlight - bring just your sp >ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us >you have that you want to use, and your flashlight - we want this done very >low-keyed. And you will only have about an hour alone in the room". After >explaining your feelings regarding doing 'proper' sweeps the PI that you are >talking to states emphatically that it is he who has been retained to look >after the best interests of the client; no, you may not speak with the >client; he is making his request based upon an investigation that he is >conducting for the client; and yes, it is his neck on the line and not yours >as the client will not know who you are. However, at the end of this >discussion you are not really sure whether or not the PI fully understands >what you had attempted to explain to him regarding TSCM and you have this >lingering feeling that he is to a high degree basing his request on what he >is willing to pay out of his billable fee for your services. But still, he >is offering a decent buck for the work that you will actually have to do. Simple... he pays for a minimum of four hours at the full base rate, but get only one on hour on target. If he is unwilling to pay for the four hours then you politely refuse to help him. If there is a legitimate reason why you can only get limited access to the area then you work with what you have, in the amount of time you have. I would however, encourage the PI to allow full access to the hotel room 4 hours in advance, encourage In-Place monitoring during the actual meeting, and would encourage him to obtain control of all nearby rooms for the duration of the meeting. The second situation is similar to the first, but you are more likely for the PI to relent and let you have the room for at least four full hours or more. If you only have an hour on target, then you only have an hour on target. But by adopting the "I don't leave my house for anything less then 4 billable hours" you will find the client will let you do your job in a professional manner, and on your terms. It's a bit like me telling my dentist how to perform a root canal, and requiring it to be finished in 120 seconds. >Same conditions exist for this one as for the scenario above. What do YOU >do???? It's not the same conditions, but close. If there is a legitimate reason that is one thing, but if it is a case of the client simply being to cheap then you should walk away. >Respond or not; do it on or off list; included your name or be anonymous - >your choice. I'm not trying to embarrass anyone or to pry. I have my own >reasons for posing these questions. But I truly believe that the diverse >answers - and accompanying debate - that hopefully will be generated can >benefit us all. > > >Bob Motzer >1RCM@M... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2302 From: factfind Date: Sun Jan 14, 2001 11:34am Subject: Re: What would YOU do? It strikes me that this question requires an answer which may seem simplistic but I believe it reflects the approach taken by most people on this list. The practice of ethical business whether by TCSM practioners or PI's or Lawyers (no jokes now) should not be a matter of "situational ethics" You have invested time and money in your experience and training. No one knows better the value of your services than you. Price services and products accordingly. Do the right thing, both for yourself and our profession. Be fair, but then you knew that. Fraternally Dave ----- Original Message ----- From: "1RCM" <1RCM@M...> To: "TSCM List - Post" Sent: Sunday, January 14, 2001 10:33 AM Subject: [TSCM-L] What would YOU do? > Hi List, > > Let's see if we can't spawn some creative debate here. Many on this list > have run across these type instances which fall right in that blurry area > somewhere between standing on true ethics and paying the bills. What do YOU > do?? Ah yes, before you consider both scenarios think back to all of the > debate that has taken place on this list over the past year relating to > professionals vs. charlatans; just what constitutes performing a proper > sweep; enlightening a potential client; fees vs. services performed; etc., > etc. Then respond honestly! > > Scenario #1 ..... You are contacted by a potential client who feels that > he/she has reason to have a sweep done. During the discussion that follows > you are convinced that a sweep is legitimately needed, but also that the > potential client does not have the foggiest idea of what is involved. And so > you do a bit of education before you quote a fee. At the end of the > discussion the client states that he/she fully understands what you have > explained but has reached this decision: "Instead of the 6 hours that you > quoted I want you to do the best that you can in 2 hours with your fee being > reduced accordingly. I understand what you have explained to me and I accept > the fact that I will be receiving less than what you recommend - but as the > client that's my decision to make". > > Now remember that the office copy machine needs repair and you could use > those few extra $$$'s to buy that new piece of equipment you want - all to > the tune of about what you would make doing this 'mini-sweep'; the location > is only 15 minutes from your office; you are satisfied that the client is > making an 'informed decision'; and you have absolutely nothing work-wise > going on the next day. What would YOU do??? > > Scenario #2 ...... You are contacted by a PI firm regarding handling a > referral job. After a discussion regarding your services, fees and > recommendations they want you to do: " a check of a hotel meeting room for > transmitters and a quick look-around with a flashlight - bring just your sp > ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us > you have that you want to use, and your flashlight - we want this done very > low-keyed. And you will only have about an hour alone in the room". After > explaining your feelings regarding doing 'proper' sweeps the PI that you are > talking to states emphatically that it is he who has been retained to look > after the best interests of the client; no, you may not speak with the > client; he is making his request based upon an investigation that he is > conducting for the client; and yes, it is his neck on the line and not yours > as the client will not know who you are. However, at the end of this > discussion you are not really sure whether or not the PI fully understands > what you had attempted to explain to him regarding TSCM and you have this > lingering feeling that he is to a high degree basing his request on what he > is willing to pay out of his billable fee for your services. But still, he > is offering a decent buck for the work that you will actually have to do. > > Same conditions exist for this one as for the scenario above. What do YOU > do???? > > Respond or not; do it on or off list; included your name or be anonymous - > your choice. I'm not trying to embarrass anyone or to pry. I have my own > reasons for posing these questions. But I truly believe that the diverse > answers - and accompanying debate - that hopefully will be generated can > benefit us all. > > > Bob Motzer > 1RCM@M... > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2303 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 2:17pm Subject: Re: pgp encryption [snip] > > Without the private key I keep on my hard drive (which itself is >> password protected), even an acre of cray computers at Fort Meade >> couldn't crack my code. That's how powerful this technology is. > >Acre of Cray computers? Maybe less then 100 square feet of would crack >your message, But if we have your computer whole, intact, and not >blown in a million pieces from a chunk of RDX next to your harddrive, >Then maybe a couple of Pentium class workstations because it all falls >down to the quality of your passphrase, which for the most part are >less than 8-10 characters long and usually in plaintext with no >special cH@RaC73r$ to slow down the process of cracking the >passphrase. You really do not need a computer any larger then one of the cube "dorm" refrigerators about two foot cubical, but it depends on the size of the key that the target is using (the longer and more complex the key, the more horsepower you need). Also, if the investigator or espionage practitioner has any kind of physical access to the original computer the task or other "comprising fragments" the decrypt becomes several orders of magnitude simpler. [snip] >I have one client that is so paranoid about PGP that he changes his >PGP keys as often as he changes his underwear (1-2 times a day) and >generates keys on a HP200LX. [snip] If your client is serious about security he will not use PGP, any other other method of public key encryption, or any encryption methodology generally available to the public. >I tell people that PGP is secure enough for 95% of the world's prying >eyes, That the other 5% is the world's various governments, >intelligence agencies, and larger corporations that have the way and >the means to find out what that encrypted message says in plaintext. PGP is only appropriate when you want to protect the materials from someone who is an amateur, and is not at all appropriate for protecting materials where a professional spy may have an interest in obtaining. [snip] >Its a good rule of thumb not to trust any encryption program that >wasn't written by someone that hasn't done years of cryptoanalysis, >and Phil Zimmermann isn't one of those guys I really trust his >software with my life, Zimmermann was an anti-war/nuclear protester. [snip] Good point, but using strong encryption algorithms is only part of the security equation, and any weakness in ANY SEGMENT can render all other segments completely worthless. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2304 From: Steve Uhrig Date: Sun Jan 14, 2001 3:42pm Subject: Re: What would YOU do? Once upon a midnight dreary, 1RCM pondered, weak and weary: > Scenario #1 ..... You are contacted by a potential client who > feels that he/she has reason to have a sweep done. During the > discussion that follows you are convinced that a sweep is > legitimately needed, but also that the potential client does not > have the foggiest idea of what is involved. This is fairly common. > And so you do a bit of education before you quote a fee. At > the end of the discussion the client states that he/she fully > understands what you have explained but has reached this > decision: "Instead of the 6 hours that you quoted I want you > to do the best that you can in 2 hours with your fee being > reduced accordingly. My answer: "I quoted the time I expect it will take to do the job properly, and my fee to do it. If you cannot agree to both, I am sorry, I cannot help you." > but as the client that's my decision to make". And if you miss something which later comes back to bite you in the ass, can you hide behind this? The client will deny ever saying it. Sometimes you have to protect these people from themselves. > Now remember that the office copy machine needs repair and you > could use those few extra $$$'s to buy that new piece of > equipment you want - all to the tune of about what you would make > doing this 'mini-sweep'; the location is only 15 minutes from > your office; you are satisfied that the client is making an > 'informed decision'; and you have absolutely nothing work-wise > going on the next day. What would YOU do??? The client IS NOT making an informed decision. The client is making a decision based on fiscal considerations. As far as trying to make excuses for taking his or her money anyway, when you know you will not be doing the job properly, that makes you a whore and no different from the rest of the TSCM scum pretenders. Your financial situation should not make any difference in your ethics. If you have any. > Scenario #2 --- And you will only have about an hour alone in the > room". After explaining your feelings regarding doing 'proper' > sweeps the PI that you are talking to states emphatically that it > is he who has been retained to look after the best interests of > the client; no, you may not speak with the client; he is making > his request based upon an investigation that he is conducting for > the client; and yes, it is his neck on the line and not yours as > the client will not know who you are. Same answer as #1. I have quoted the time and cost it will take to do the job properly. I only accept work where I am able to do my job properly. If this is unacceptable, find yourself another sweeper. Then give them CCS' phone number. If I cannot speak with the client, I will not accept the assignment. Someone has something to hide. The PI will not have enough info for me to even know what I am facing technically. I have to talk to the client directly. That is one of my litmus tests. If that is a problem, find another sweeper. When I do talk to the client, I am perfectly willing to do so under the PI agencies' name. I do not have an identity problem like a lot of those guys do. I am not another PI and will not steal their client. If they can't trust me to speak to the client, they shouldn't be hiring me. Whose neck will be on the line if you miss something? I guarantee the PI will be the Teflon Don, and it will be you making excuses and trying to justify why you accepted a job you admitted you could not do properly. It is YOUR job to look out for the ultimate client's best interests. You need a certain amount of info to be able to do that. If something can go wrong, and things do, you can be sure you will be living in the valley and you'd better have your bases covered. All these PIs and clients can come and go. You have to live with yourself and whatever reputation you develop. You want to develop the reputation for being absolutely ethical and not willing to compromise your ethics, your fee or your (ultimate) client's best interests. Both scenarios you described would cause me to invite the PI or whomever to lose my phone number, if they are unwilling to let me do my job the way I know it needs to be done. I think you know this, and it does make for interesting discussion. First rule of sweeping is money up front. Second rule is always CYA (Cover Your Ass). You will be surprised how few friends and how many adversaries you will have if something goes wrong. Don't expect anyone else, like PI middlemen, to take a bullet for you. If I feel uncomfortable, even hold harmless agreements will not change that feeling. Just don't let situations develop where you have to compromise your ethics or your fees, or your the end user's best interests. And if you feel uncomfortable about a situation, trust your instincts and pass it by. Not worth it. Street smarts have kept a lot of us alive. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2305 From: Nick Robson Date: Sun Jan 14, 2001 4:08pm Subject: Re: What would you do. Here is another scenario for discussion. This happened to me. A very large multinational accounting firm asked me to write them a report stating that they were clean. They wanted no sweep done and were willing to pay reasonably for the report. -- ************************* The Security Centre Ltd ************************** *************Grand Cayman, Cayman Islands, British West Indies************** 2306 From: James M. Atkinson, Comm-Eng Date: Sun Jan 14, 2001 4:26pm Subject: Re: What would you do. At 5:08 PM -0500 1/14/01, Nick Robson wrote: >Here is another scenario for discussion. This happened to me. > >A very large multinational accounting firm asked me to write them a report >stating that they were clean. They wanted no sweep done and were willing to >pay reasonably for the report. Explain to the person at the large multinational accounting firm that you are not a whore, and that they should spend their money elsewhere. Additionally, you should document the incident, and write a "memo for record" that you have signed and notarized in case the guy tries anything cute in the future. If you have had previous contact with the company you may find it prudent to inform senior management and their legal department in writing of the incident. Such a request is obviously fraudulent, and as such is strictly taboo. Of course the person who made the request may simply be trying to test your ethics, or perhaps not... but watch it either way. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2307 From: Miguel Puchol Date: Sun Jan 14, 2001 5:12pm Subject: RV: What would YOU do? Bob & list, I will try to give an inbetween point here, although I agree more with what James has expressed in his message - if you know what you're doing is a waste of your time and your client's money, then better not take the job. Picture scenario #1, and after a couple of days, the costumer calls you to say that he has been bugged with a high grade bug that you didn't (and quite possibly couldn't given the time allowed) detect, and this has caused an important leak of information, etc. etc. Then, your costumer will start to tell anyone within hearing distance what a con you are, and so on, and news travel fast. Result: your reputation and good name tarnished. The inbetween point I wanted to make is: why not offer different 'grades' of sweep, depending on the level of the threat? If your costumer is willing to discuss the type of information he's protecting, you can estimate - approximately - the level of risk and likelyhood of advanced bugging techniques being used, and plan a sweep accordingly. Then, get your costumer to sign a document to the tune of 'I have been informed that, given the risk level assesed, a sweep lasting X hours using Z equipment is needed to minimize to a good extent the risk of interception of confidential information. I hereby state that I assume the risk of a sweep being performed which does not meet the required level, and understand the implications' etc. etc. (A lawyer may come in handy here) This is just an idea, it may not fall well with purists, and each one of us should set his own standards regarding this point. James states a minimum of 4 hours, and I understand that it's a very light sweep. In some countries, one hour or two may be enough, as eavesdropping is not so technologically advanced - given the same level of 'risk'. Well, that's my oppinion, and like everyone else, I have a nose too :-)) All the best, Mike > -----Mensaje original----- > De: 1RCM [mailto:1RCM@M...] > Enviado el: domingo, 14 de enero de 2001 16:34 > Para: TSCM List - Post > Asunto: [TSCM-L] What would YOU do? > > > Hi List, > > Let's see if we can't spawn some creative debate here. Many on this list > have run across these type instances which fall right in that blurry area > somewhere between standing on true ethics and paying the bills. > What do YOU > do?? Ah yes, before you consider both scenarios think back to all of the > debate that has taken place on this list over the past year relating to > professionals vs. charlatans; just what constitutes performing a proper > sweep; enlightening a potential client; fees vs. services performed; etc., > etc. Then respond honestly! 2308 From: Rick Hofmann - MICROSEARCH Date: Sun Jan 14, 2001 5:41pm Subject: E.S.I. telephone instruments During an inspection yesterday one of two telephone instruments was passing room audio while on hook. This is an E.S.I. telephone system. The instruments are model EKT-A, and the KSU is a model number IVX (letters, not roman numerals). The instrument was left in place with the idea of passing false information. When the instruments are eventually replaced I will examine them both in an attempt to locate any modifications. I will pass on the information to this list. In the mean time, any information about E.S.I. telephones would be appreciated. Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 2309 From: Steve Uhrig Date: Sun Jan 14, 2001 6:18pm Subject: Re: What would you do? Once upon a midnight dreary, Nick Robson pondered, weak and weary: > Here is another scenario for discussion. This happened to me. > A very large multinational accounting firm asked me to write > them a report stating that they were clean. They wanted no > sweep done and were willing to pay reasonably for the report. What is there to discuss? You are an honest man, and as such would have denied their request. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2310 From: Hoffman Date: Sun Jan 14, 2001 8:03pm Subject: Re: What would YOU do? > > Ah yes, before you consider both scenarios think back to all > > of the debate that has taken place on this list over the past > > year relating to professionals vs. charlatans; just what > > constitutes performing a proper sweep; enlightening a > > potential client; fees vs. services performed; etc., > > etc. Then respond honestly! > > blurry area somewhere between standing on true ethics > > and paying the bills. What do ------------------------------- A. Hoffman replies: I don't believe "ethics", in the sense that I use the word, has much bearing on the matter. It's a pure business decision. (1) Is it economically profitable to perform the service for the client for such a trivial fee which borders on break-even? (2) Will it negatively impact your reputation? (3) How will it hurt your reputation; does this client have connections in the corporate community from whence you derive your work? (4) Is there a realistic liability which you may incur if it is found at a later time that the technician did not locate a threat? (5) Last on my list is my personal ethics regarding the matter. There's something to be said for having pride in ones work and being noble by trying to be the absolute best at what you do....but more often than not....such beliefs are purely a figment of ones own imagination; and it leads to extremely big ego complexes when people become overly self-righteous about their abilities and their so-called "reputation". I say, just bury the client in a half inch of paperwork; which if your a thorough businessman; thats probably what you should be doing already. You should have dozens of checklists; forms; summaries; client reports which fully detail every aspect of the sweep or other security services your may perform. Included on the forms should be the equipment you used, serial numbers, when your units were calibrated; what range of frequencies were swept; what telephones were analyzed, if any. In addition, there should be a half dozen standard forms which the client should be signing which fully explains that in no way is the customer entitled to "getting results" (as private investigators are always fond of saying "their being payed for their time, not based on undetermined outcomes or results..") Nothing wrong with pride in ones work; but the question is.... Who's interest are you REALLY serving best?... The clients, or your own ego? If a customer wants or NEEDS work done.... even if they want a half-assed job.. "IF" it pay's; and if you need the money; then why not do it? If you refuse to do the job; then your not really serving your customers needs. Yes, you might know better than them... and you might not be serving their "best interest", but in some cases, something is better than nothing; even a half-assed job. I speak in this matter as a businessman; a white collar worker; and a blue collar worker who has been involved in a half dozen unique fields of service work. Like the Rolling Stones song, "You can't always get what you want." Many times I have had to "swallow my pride", and do jobs for customers which I did not feel felt met my personal criteria.... I didn't particularly like what the customer suggest to me... but in the end; I realized I was there not exclusively to feed my own ego, but to serve the customers needs... and if they want it. Give it to them. It's money in your pocket. 2311 From: Steve Uhrig Date: Sun Jan 14, 2001 9:06pm Subject: Re: What would YOU do? Once upon a midnight dreary, Hoffman pondered, weak and weary: > I don't believe "ethics", in the sense that I use the word, > has much bearing on the matter. It's a pure business > decision. There unfortunately are a number of "TSCM practitioners" who feel the same way. > There's something to be said for having pride in ones work and > being noble by trying to be the absolute best at what you > do....but more often than not....such beliefs are purely a > figment of ones own imagination; They may be figments of *your* imagination. Having pride in one's work and trying to be the absolute best at what you do is a sign of a quality practitioner. Some of us strive for that constantly. What do you propose -- strive to be mediocre? > If a customer wants or NEEDS work done.... even if they want > a half-assed job.. "IF" it pay's; and if you need the money; > then why not do it? > if they want it. Give it to them. It's money in your pocket. Why is this not the definition of a whore? What does YOUR need for money have to do with whether you do an honest job or not? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: J. Oquendo Date: Tue Jan 11, 2005 2:24pm Subject: RE: IR Risk I ran into this scenario a while back and offered it to a compsecurity list I am on. Here is the original message: /// http://securityfocus.com/archive/82/383110/2004-11-26/2004-12-02/1 Figured I would send this to the vuln-dev list after rambling on about it on a firewalls list, so apologies to those who see this as a cross-post dupe. [RECENTLY] I ran across what I believe is an irftp based worm. While cleaning two laptops one day (one connected to a secure VLAN the other not connected), I noticed the connected machine flash its irftp sensor and task manager showed it was running. Few seconds later the connected machine stopped beeping, the disconnected one started, and it too showed irftp sessions. After checking around the premises for infrared *anything*, I dug up all I could from both machines. The disconneted machine had already been cleaned, and the connected one was infected with all sorts of SDBOT worms, Spyware, *crapware*foo*. Something to think about if you're sitting in the park one day disconneted from any network and someone's infected machine sends you via IRFTP some crap. irftp C:\evil_at_script \\victim\C:\WINDOWS\run_me Where some at script would run something like: net user luzer something /ADD /FULLNAME:"Admin Account" /COMMENT:"Admin" /h I'm almost positive something like this is what happened. I believe its possible to have that machine run whatever you would want it to, and since IRFTP has no authentication (that I know of) what is needed to perform such nonsense. A machine name, share name, not that big of a deal. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How a man plays the game shows something of his character - how he loses shows all" - Mr. Luckey 10558 From: James M. Atkinson Date: Tue Jan 11, 2005 5:54pm Subject: Moran: 'It's a dirty business' http://www.cnn.com/2005/US/01/11/spy.life/index.html Moran: 'It's a dirty business' (CNN) -- Lindsay Moran read "Harriet the Spy" as a girl and dreamed of growing up to join the CIA. After graduating from Harvard, she did just that. In her new book, "Blowing My Cover: My Life as a CIA Spy," Moran shows readers the real world of espionage is quite different from the Hollywood version. CNN national security correspondent David Ensor spoke with Moran about her career as a spy. ENSOR: What made you decide to apply to the CIA? MORAN: It had been a lifelong dream of mine. I grew up reading this series of books called "Harriet the Spy," and I just thought they were the neatest things and Harriet was the neatest little girl, and she had a spy kit and would spy on everybody. And I sort of modeled my early life after Harriet the Spy, and my fascination with espionage never really went away as I was a teenager and went to college -- it kind of always remained there in the back of my head. ENSOR: Tell us a little about the training. MORAN: We jumped out of planes and drove cars real fast. ... A lot of it essentially was training people to have social skills. We went down and lived at the CIA's facility, "the Farm" for several months, and we lived on this alternative reality with a fake country, a number of fake countries and fake heads of state, and we were expected to sort of embrace this alternative reality and live and breathe it as if it was true. ENSOR: Was the training useful for what you subsequently did as an officer? MORAN: Some aspects of the training were useful, and some aspects of the training that probably weren't useful to me were useful to other people. A lot of the training about detecting surveillance, being able to tell if you're being followed. ... And while it's not difficult, it does take a lot of practice to sort of become uber-aware of everything going on around you, and being able to take notes while you're driving, at the same time looking around. And also at the same time trying to appear natural, so that if you are being followed the person following you doesn't perceive that you know you're being followed. ENSOR: Hollywood presents the career you had as an enormously glamorous and dangerous profession. Is it? MORAN: It's not nearly as glamorous as it's portrayed in Hollywood -- the career of being a spy -- and that was kind of eye opening to realize. You know, certainly I didn't expect it to be James Bond to a T, but at the end of the day the CIA is a lot of people in sensible shoes sitting in cubicles, and that's kind of a reality that's probably a shock to a lot of people like me who come into the agency expecting something more glamorous. ... I've heard my book compared to the real-life "Alias" and I tend to think of it as the "anti-Alias." ENSOR: What's dirty about the business? MORAN: It's a dirty business because you're lying to people and you're using them, and that's what your job is. That's the reality of being a spy. You're not befriending people because you like them, or because you want to be friends with them, you think that they have some information that will be of value to the U.S. government. ENSOR: Do you think it's an organization that is broken? MORAN: I guess I do. I don't have the answers as to how the agency can adequately infiltrate terrorist networks or combat terrorism. I think that's an incredibly difficult question, but they certainly seem to be dragging their feet on addressing what is the most pressing issue for them as an organization and for us as a country, which is how do we get into these, how do we get information, how do we gather human intelligence on these terrorist networks. I feel that the agency has been incredibly slow to respond or change either its management style or its training or even the type of people that it recruits in order to combat that threat. ENSOR: Do you think Porter Goss might change it in a good way? MORAN: No. I would have been the first one to advocate changes at the agency on the heels of George Tenet's resignation. It doesn't seem to me -- and now I'm speaking obviously from an outsider's perspective -- that Porter Goss is taking the agency in a good direction. And from what I understand, he's sort of hunkering down, blaming a lot of leaks from within the agency to the press on problems the agency is having. I think what's going to occur is it will again become an organization that rather than trying to excise its warts will try to cover them up. ENSOR: What kind of an impact did having a secret career like this have on your personal life? MORAN: It's hard to lie to pretty much everybody who's important to you. My immediate family knew that I worked at the CIA but that was all they knew. They certainly had no idea what I was actually doing and probably would have been horrified if they did. So I ended up cutting off a lot of relationships with both friends and, to a certain extent, family members too as I became an increasingly insular person. ENSOR: Do you believe in espionage? MORAN: I still believe in the organization, I believe that it's necessary. Every country is going to have a spy service and ours should be the best. You know we're the last remaining superpower, we should have one of the best spy services there is and we don't. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10559 From: G P Date: Tue Jan 11, 2005 6:49pm Subject: Re: Ruling gives cops leeway with GPS Absolute insanity. > http://timesunion.com/AspStories/story.asp?storyID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device > without a warrant > > By BRENDAN LYONS, Staff writer 10560 From: Greg Horton Date: Tue Jan 11, 2005 9:26pm Subject: Re: Ruling gives cops leeway with GPS G P wrote: > Absolute insanity. > I am not so sure about that. In California, you don't need a warrant to put a tracker on unless you hardwire it to the vehicle. So instead of fielding a six man surveillance team for thousands of dollars and maybe a helo or plane, you do the same thing for pennies. You are going to follow the suspect anyway, why not do it in a way that saves the taxpayer a heap o' money? Greg 10561 From: Agent Geiger Date: Wed Jan 12, 2005 0:40am Subject: Re: Ruling gives cops leeway with GPS Yeah, that freedom thing is so expensive these days. --- "James M. Atkinson" wrote: > > > http://timesunion.com/AspStories/story.asp?storyID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device > without a warrant > > By BRENDAN LYONS, Staff writer > First published: Tuesday, January 11, 2005 > > In a decision that could dramatically affect > criminal investigations > nationwide, a federal judge has ruled police didn't > need a warrant when > they attached a satellite tracking device to the > underbelly of a car being > driven by a suspected Hells Angels operative. > > The ruling by U.S. District Judge David N. Hurd > clears the way for a > federal trial scheduled to begin next month in Utica > in which seven alleged > Hells Angels members and associates, including > several from the Capital > Region, face drug-trafficking charges. > > The use of satellite tracking devices has stirred > controversy and Hurd's > ruling differs from a decision last spring by a > Nassau County Court judge, > who decided police needed a warrant when they used > the technology to follow > a burglary suspect. > > The biker case broke open here last year with a > series of raids and arrests > across upstate New York. The case began in Utica, > but was expanded to > include an organized crime task force that spent > more than a year building > a methamphetamine-trafficking case against a group > of alleged outlaw bikers > from Troy to Arizona. > > During surveillance of the group, detectives > attached a global positioning > satellite device to a vehicle driven by Robert P. > Moran Jr., an Oneida > County attorney and Hells Angels associate with a > law office in Rome. They > put the device on Moran's car for two days in July > 2003 after he returned > from a one-day trip to Arizona, where police say he > purchased a large > quantity of methamphetamine. > > Over those two days, Moran drove across New York > state and allegedly made > drug deals with suspected Hells Angels members in > places such as New York > City and Troy, according to court records. > > Hurd opined that authorities wouldn't need a warrant > had they decided to > follow Moran, so using a GPS device was merely a > simpler way to track his > car "as it traveled on the public highways," he > wrote. "Moran had no > expectation of privacy in the whereabouts of his > vehicle on a public > roadway. Thus, there was no search or seizure and no > Fourth Amendment > implications in the use of the GPS device." > > Hurd's ruling follows a line of reasoning that's > widely supported by many > law enforcement agencies. Police contend using > tracking devices is no > different than if they followed a suspect's vehicle > in their own cars or by > using helicopters. > > Kevin Mulroy, Moran's attorney, said the issue, > which has brought > conflicting rulings across the nation, is > unsettling. > > "I think it's something the Supreme Court of the > United States is going to > have to hear," said Mulroy, a Syracuse attorney who > was formerly an > Onondaga County Court judge and assistant > prosecutor. "One would think that > before the police could install devices on your > property, to monitor your > movements, they would need a court order." > > A similar controversy arose in Washington two years > ago, when that state's > Supreme Court determined police had the right to > attach a satellite > tracking device to a murder suspect's car, but only > after obtaining a warrant. > > Detectives attached a GPS device to the man's car > for almost three weeks. > When they downloaded the data, it indicated he had > driven to an isolated > area north of Spokane. Police searched the area and > found the body of the > man's 9-year-old daughter. He later was convicted of > her murder, and the > verdict was upheld. > > GPS devices are increasingly becoming a tool for law > enforcement. Still, > their use has been controversial because police > agencies are not routinely > obtaining court orders to install the devices, which > rely on orbiting > satellites and cellular phone networks to pinpoint > their target. In many > states, law enforcement agencies also are using them > for less surreptitious > missions, such as tracking sex offenders and > parolees who are enrolled in > electronic monitoring programs. > > It's not clear what effect Hurd's decision will have > on their use, but it's > apparently the first federal ruling regarding GPS > devices and the need for > search warrants. > > Assistant U.S. Attorney David Grable, who is > prosecuting Moran and the > others, did not return a telephone call for comment. > > The use of GPS devices by police most recently made > national news in the > Laci Peterson case. Scott Peterson, the Modesto, > Calif., woman's husband, > was convicted of murdering her on Christmas Eve > 2002. In that case, police > obtained a court order to attach tracking devices to > three vehicles driven > by Peterson, who drove to a waterfront near where > the bodies of his wife > and the baby boy she was carrying were later found. > > While the GPS data was admitted in the Peterson > case, courts across the > country are tackling the issue as defense lawyers > challenge their > reliability and whether police have a right to > install them without a > warrant. Similar technology helps police track > cellular telephones, which > also are being used by police to find fugitives and > others. > > > > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10562 From: G P Date: Wed Jan 12, 2005 6:16am Subject: Re: Ruling gives cops leeway with GPS Because anybody and everybody can now fix up your car with a GPS unit, without fear of civil or criminal prosecution. This court precedent puts very dangerous technology into the hands of the proletariat, without any form of checks and balances. Wait until somebody wires up your wife's car for sound, and you'll have a slightly different opinion about tracking technology. --- Greg Horton wrote: > > > G P wrote: > > > Absolute insanity. > > > I am not so sure about that. In California, you > don't need a warrant to > put a tracker on unless you hardwire it to the > vehicle. So instead of > fielding a six man surveillance team for thousands > of dollars and maybe > a helo or plane, you do the same thing for pennies. > You are going to > follow the suspect anyway, why not do it in a way > that saves the > taxpayer a heap o' money? > > Greg > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10563 From: G P Date: Wed Jan 12, 2005 6:18am Subject: New Homeland Security Nomination http://seattletimes.nwsource.com/html/nationworld/2002148439_homeland12.html "Chertoff headed the Justice Department's criminal division at the time of the attacks, and helped develop the USA Patriot Act, which greatly expanded the government's surveillance and detention powers. His role in crafting that law, a measure that has become a flash point for civil libertarians, is expected to bring sharp questioning in Senate confirmation hearings. The American Civil Liberties Union said yesterday that as an architect of the act, Chertoff seemed to view the Bill of Rights 'as an obstacle to national security rather than a guidebook for how to do security properly.'" 10564 From: fjansgmxnet Date: Wed Jan 12, 2005 5:00am Subject: Re: Ruling gives cops leeway with GPS --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > G P wrote: > You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? That's the point. If it costs a heap of money, they will follow only the real suspects of mayor crime offences. If it costs pennies, they will track or follow inconvenient citizens. If they want to follow the real suspects of mayor crime offences, they will get a warrant everywhere. This is only a problem, if they haven't any substantial leads. But why should they follow then, because of their preconceptions? (I am sure that they will not public the events, if their preconceptions failed.) Regards, Frank 10565 From: littledog Date: Tue Jan 11, 2005 11:10pm Subject: Re: Ruling gives cops leeway with GPS What about when these registered confidential informers do all this tracking, bugging, eavesdropping, and knotholing for no other reason than personal ones, and have always done so?> -----Original Message----- > From: Greg Horton [mailto:sgtpelon@e...] > Sent: Tuesday, January 11, 2005, 8:13 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Ruling gives cops leeway with GPS > > > > G P wrote: > > > Absolute insanity. > > > I am not so sure about that. In California, you don't need a warrant to > put a tracker on unless you hardwire it to the vehicle. So instead of > fielding a six man surveillance team for thousands of dollars and maybe > a helo or plane, you do the same thing for pennies. You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? > > Greg > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10566 From: G P Date: Wed Jan 12, 2005 9:58am Subject: Quotable quote "The most powerful clique in these elitist groups have one objective in common - they want to bring about the surrender of the sovereignty and national independence of the United States. To achieve this new [international] federalism, the United States must submerge its national sovereignty to a new political order. In my view, [the CFR] represents a skillful, coordinated effort to seize control and consolidate the four centers of power - political, monetary, intellectual, and ecclesiastical." - Admiral Chester Ward, 16-year veteran of the Council on Foreign Relations 10567 From: Tech Sec Lab Date: Wed Jan 12, 2005 10:56am Subject: Boston Scientific denies espionage will hit Irish plant http://www.ocean-research.net/modules.php?name=News&file=print&sid=17 Who says nothing exciting happens in the west of Ireland! :D 10568 From: Date: Wed Jan 12, 2005 8:59am Subject: Re: Ruling gives cops leeway with GPS You still need a warrant to monitor the vehicle if it goes on private property; just don't need one (right now) to monitor while on public roads. Doesn't sound like a "freedom" issue to me! Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217) 524-6079 office (217) 467-4211 pager (217) 836-0919 mobile 10569 From: Michael Hammer Date: Wed Jan 12, 2005 9:00am Subject: Re: Ruling gives cops leeway with GPS On Tue, 11 Jan 2005 19:26:56 -0800, Greg Horton wrote: > > > I am not so sure about that. In California, you don't need a warrant to > put a tracker on unless you hardwire it to the vehicle. So instead of > fielding a six man surveillance team for thousands of dollars and maybe > a helo or plane, you do the same thing for pennies. You are going to > follow the suspect anyway, why not do it in a way that saves the > taxpayer a heap o' money? > > Greg > By that logic, I should just be able to break into (and wipe out) an internet host that is being used to do bad things. We will get it shut down/confiscated anyways by going through the legal steps so why not just cut to the chase. As tempting as that may be, I understand the reasons we have limitations. Just because something can be done doesn't mean it should be done. Requiring a court order is a check/balance on the activities involved. Mike 10570 From: littledog Date: Wed Jan 12, 2005 10:32am Subject: Re: Re: Ruling gives cops leeway with GPS I agree with you completely Frank. I now know what I am, an inconvenient citizen..Littledog> -----Original Message----- > From: fjansgmxnet [mailto:fjans@g...] > Sent: Wednesday, January 12, 2005, 4:46 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: Ruling gives cops leeway with GPS > > > > > --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > > > G P wrote: > > You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > That's the point. If it costs a heap of money, they will follow only > the real suspects of mayor crime offences. If it costs pennies, they > will track or follow inconvenient citizens. > > If they want to follow the real suspects of mayor crime offences, > they will get a warrant everywhere. This is only a problem, if they > haven't any substantial leads. But why should they follow then, > because of their preconceptions? (I am sure that they will not public > the events, if their preconceptions failed.) > > Regards, > Frank > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10571 From: Craig Meldrum Date: Wed Jan 12, 2005 1:11pm Subject: Re: List Member Thanks Ois. As usual there is a flurry of media interest when some politician thinks they have been bugged and everyone jumps on the bandwagon for a day or two. I don't even know why they bothered to interview me, the article was almost a copy of one written 10 years ago after another such "scandal." Another minute to add to the accumulating 15 mins! Cheers Craig > Message: 2 > Date: Tue, 11 Jan 2005 17:36:21 -0000 > From: "Tech Sec Lab" > Subject: List Member > > Craig...YOUR FAMOUS!!! > > :D > > Congrats! > > -Ois 10572 From: Agent Geiger Date: Wed Jan 12, 2005 3:25pm Subject: Re: Ruling gives cops leeway with GPS Excuse me, but that is nonsense. OK, I will shut off the GPS while he cuts through that private drive. I just first have to run the coordinates through my GIS database then delete that info out before I use it in court. I am a commissior for my local government, and I see this trivial splitting of hairs thing done all the time. I wish LE and gov't officials would remember that little oath that we ALL took to uphold the Constitution from ALL enemies, foreign and DOMESTIC. I guess I need to keep a GPS jammer on me at all times, to block not only my cell phonem, but any potential LE from protecting me from myself. --- sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if > it goes on private > property; just don't need one (right now) to monitor > while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10573 From: G P Date: Wed Jan 12, 2005 6:11pm Subject: Re: Ruling gives cops leeway with GPS Bravo, it's hopeful to see that everyone hasn't gone completely mad just yet. --- Agent Geiger wrote: > > Excuse me, but that is nonsense. OK, I will shut > off > the GPS while he cuts through that private drive. I > just first have to run the coordinates through my > GIS database then delete that info out before I use > it in court. > > I am a commissior for my local government, and I see > this trivial splitting of hairs thing done all the > time. I wish LE and gov't officials would remember > that little oath that we ALL took to uphold the > Constitution from ALL enemies, foreign and DOMESTIC. > > I guess I need to keep a GPS jammer on me at all > times, to block not only my cell phonem, but any > potential LE from protecting me from myself. 10574 From: G P Date: Wed Jan 12, 2005 6:55pm Subject: speaking of GPS units Can the list members here that have experience with GPS trackers post some common installations that they've ran across? I would assume that unless using a unit with advanced correlation ability (such as reflected signals off of pavement etc), that the unit would have to be mounted with clear view of the sky and no obstructions. What are some common places for permanent installations, and where would you start looking first if you suspected a vehicle had a GPS tracking device installed? With this recent court ruling, would that also imply that cellular handsets planted in a vehicle would also be legal? With the Emergency 911 (E911) Act (no relation to Sept. 11, the bill was passed a year or so prior to the attacks), cellular telephones now must support geolocation capability up to a few meter resolution now. There would be no need for an elaborate GPS tracker if you could accomplish the same goal by wiring a cellphone into the vehicle (with the added benefit of a voice channel to listen in on conversations in the cockpit). Where would be the best place to mount one of them, and what would be the preferred technique for discovering one? Greg 10575 From: kondrak Date: Wed Jan 12, 2005 8:54pm Subject: Re: Ruling gives cops leeway with GPS Expect to see miscreant law-vultures, like divorce attys exploit this... At 07:16 1/12/2005, you wrote: >Because anybody and everybody can now fix up your car >with a GPS unit, without fear of civil or criminal >prosecution. This court precedent puts very dangerous >technology into the hands of the proletariat, without >any form of checks and balances. > >Wait until somebody wires up your wife's car for >sound, and you'll have a slightly different opinion >about tracking technology. > >--- Greg Horton wrote: > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you > > don't need a warrant to > > put a tracker on unless you hardwire it to the > > vehicle. So instead of > > fielding a six man surveillance team for thousands > > of dollars and maybe > > a helo or plane, you do the same thing for pennies. > > You are going to > > follow the suspect anyway, why not do it in a way > > that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10576 From: Hawkspirit Date: Wed Jan 12, 2005 9:15pm Subject: Re: Digital Cell phone scanning Monitoring is quite complicated. You would have to monitor the forward set-up channel from the cell site that the mobile would receive and the reverse set up channel reply. After the base station and the mobile hand shake and authenticate then the forward control channel assigns downlink and uplink traffic channel frequencies. These will change every time the mobile is handed off to a new cell site. Roger Date: Tue, 11 Jan 2005 10:14:02 -0000 From: "fjansgmxnet" Subject: Re: Digital Cell phone scanning > So I ask you guys... > How easy it is to listen to cell phone conversation and what is the level of the threat? Can the estranged husband be listening to his wife? Or is the tech needed place it in the expert mode? Well, the tricks changed. In the digital world the estranged husband or the engaged investigator has to place a conventional bug in the cell phone of his wife. The best type of bugs I have seen are very small transmitters hidden in the accumlator pack of the cell phone, which could switched into a sleep mode to save power: Very fast to install and the victim feeds the bug with power in regular intervals whereever it goes. On Contras website (www.tetrascanner.com) there was a video from the German BSI showing this type of bug for a Motorola gsm phone. But I don't remember the exact link. The equipment to monitor digital cell phones at the air interfaces is expensive. Therefore I would expect it only at the "agency" level, if the folks don't know the current phone number you are using. Regards, Frank -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 [Non-text portions of this message have been removed] 10577 From: James M. Atkinson Date: Wed Jan 12, 2005 9:54pm Subject: Did you hear the one about the two guys arrested for telling lawyer jokes? http://www.cnn.com/2005/LAW/01/12/lawyer.jokes.arrest.ap/index.html Pair arrested for telling lawyer jokes Men at courthouse cited for disorderly conduct HEMPSTEAD, New York (AP) -- Did you hear the one about the two guys arrested for telling lawyer jokes? It happened this week to the founders of a group called Americans for Legal Reform, who were waiting in line to get into a Long Island courthouse. "How do you tell when a lawyer is lying?" Harvey Kash reportedly asked Carl Lanzisera. "His lips are moving," they said in unison. While some waiting to get into the courthouse giggled, a lawyer farther up the line Monday was not laughing. He told them to pipe down, and when they did not, the lawyer reported the pair to court personnel, who charged them with disorderly conduct, a misdemeanor. "They just can't take it," Kash said of lawyers in general. "This violates our First Amendment rights." Dan Bagnuola, a spokesman for the Nassau County courts, said the men were "being abusive and they were causing a disturbance." He said he did not have the name of the lawyer who complained. Americans for Legal Reform monitors the courts and uses confrontational tactics to push for greater access for the public. The pair said that for years they have stood outside courthouses on Long Island and mocked lawyers. On Monday, however, Kash said he was due in court to answer a drunken driving charge from a year and a half ago. The men are due back in court on the disorderly conduct charge next month. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10578 From: James M. Atkinson Date: Wed Jan 12, 2005 10:38pm Subject: Are the glory days of electronic spying over≠or just beginning? Listening In Are the glory days of electronic spying over≠or just beginning? By Stephen Cass Submarines prowl the ocean floor, while ships above carefully skirt the limits of international waters. On dry land, guards patrol high fences surrounding acres of huge golf ball-shaped radar domes. In the skies, airplanes knife through the stratosphere, while higher up orbiting electronic ears listen to whispers from the planet below. They're all trolling a vast sea of electromagnetic signals in hopes of catching a terrorist plot in the making, a shady arms deal, economic intelligence, or a rogue nation building a weapon of mass destruction. This so-called signals intelligence, or Sigint, has been vital to the United States and its allies for decades. But, in the wake of 9/11 and the failure to capture Osama bin Laden, the shortcomings of the world's biggest interception system are apparent. The ships, planes, antennas, and satellites are the result of a triumph of Cold War engineering, designed to keep tabs on the Soviet Union and its allies. The question now is: how useful is the system against terrorists who know not to trust their satellite phones? How effective can it be in an age when almost untappable fiber-optic lines carry information at stupefying rates and cheap, off-the-shelf encryption systems can stump the most powerful supercomputers on earth? Given the veil of secrecy drawn by nations around their intelligence operations, these questions might seem unanswerable, but even top-secret agencies have to operate in the real world, making it possible to draw some conclusions. Those findings paint an intriguing picture of modern Sigint, in which the best way past a tough problem can be to solve a different one. Rather than the creation of ever more sensitive receivers or code-breaking computers, the hot areas of cloak-and-dagger information gathering include tapping fiber-optic cables (even at the bottom of the sea); using tiny bugging devices and old fashioned bribery, blackmail, and burglary to get at data before it has been encrypted; exploiting software flaws and poorly configured communications systems to bypass data-security measures; and automatically winnowing the vast amounts of intercepted communications. Big brother or white elephant? The old workhorse surveillance system described above is run by the United States≠with the United Kingdom, Canada, Australia, and New Zealand as junior partners≠under the secret 1947 UKUSA agreement. Often referred to as Echelon in the popular press, some fear it as the ultimate Big Brother: listening in on every telephone conversation, reading every e-mail, tracking every Web surfer around the globe. But these fears are greatly exaggerated, explains Gerhard Schmid, vice president of the European Parliament and rapporteur of a 2001 report to the parliament on the UKUSA system. Schmid notes an obvious fact that many seem to forget: only those communications that the system has access to in some way can be intercepted. "There is no special magic physics for secret services....The rest is movie stories, rumors, and nonsense," says Schmid. In effect, whether or not the Sigint system is of value boils down to a technical question: in the face of a telecommunications explosion that has brought e-mail, cellphones, beepers, instant messaging, fiber-optic cables, faxes, videoconferencing, and the World Wide Web to every corner of the globe, can the UKUSA intelligence agencies attain enough access to know what's going on? Of course, some communications are easier to access than others. Wireless communications in particular offer two key advantages≠you can intercept them without physically tapping into the target's communications system, and there is no way to detect that they have been intercepted. "Microwave, radio, telephone, walkie-talkie≠communications that are in the air are all interceptible by some sort of antenna in the right place," says Jeffrey T. Richelson, author of The U.S. Intelligence Community (Westview Press, Boulder, Colo., 1999). Much of the UKUSA system's physical assets around the world and orbiting above it are devoted to making sure there is an antenna in the right place. Listening posts of varying scale dot the earth≠including on top of every U.S. embassy. Many are attached to military installations, while some are operated remotely. Others are mobile, on navy ships and submarines and on specially modified planes such as the EP-3 that crash-landed in China in 2001. For decades these eavesdroppers provided much of the intelligence community's Sigint. But, for tactical and technical reasons, the well began to dry up at the start of the 1990s. The biggest tactical problem was that the Soviet Union's collapse kicked the legs out from under a monitoring network built up over decades. "There were some easy things about the Soviet Union," says James Bamford, author of Body of Secrets: Anatomy of the Ultra-Secret National Security Agency (Doubleday, New York, 2001). "The first one was you always knew where it was. You could invest a lot of money in a big listening post in Japan near Vladivostok because the Soviet navy was always going to be there." Apart from being easily located on a map, the USSR also generated a steady stream of routine radio and microwave transmissions to provide grist for the intelligence wheel. "It's completely different when you're going after sporadic miniwars and terrorism," says Bamford. The technical issues arose from the Internet-driven telecommunications explosion, the most serious consequence of which is the ever increasing shift toward fiber-optic-based international communications. The shift was due to the commercially attractive fact that one fiber can carry 128 times as much digital traffic as a satellite transponder≠over 240 000 channels, each carrying 64 kb/s. Breaking into Davy Jones's locker Before the widespread use of fiber-optic cables, geosynchronous satellite constellations such as Intelsat and the Russian-sponsored Intersputnik carried much of the international communications traffic. Such links can be comprehensively monitored by placing a receiving station in each satellite's transmission footprint. And thanks to the global range of the territories belonging to the UKUSA countries, exactly such a collection of stations was built, from Pine Gap in central Australia to Morwenstow in England and Sugar Grove in Virginia [see map]. In contrast, cables have to be tapped directly. While this is easy enough to do if the cable makes landfall in a territory controlled by a UKUSA country, someone has to visit the cable clandestinely if it doesn't, typically in a submarine. Fiber-optic cables are the toughest to crack: fibers don't radiate helpful electromagnetic fields (as did the old metal cables) that can be detected with an inductively coupled pick-up collar. Eavesdroppers first solved this problem by targeting the signal-boosting repeater stations strung along the cables. Early repeaters had to convert the signal from light into electricity and back again in order to amplify it, and in its electronic stage, the signal could be tapped externally in much the same way as a metal cable. But the development of erbium-doped fiber amplifiers, in which the signal is boosted without ever being converted into electricity, called for a new approach. In theory, it's easy to find out what's being transmitted along a fiber. "All you have to do is put a little bit of a bend in the fiber and look at the light that comes off it," says Jim Hayes, president of the Fiber Optic Association, a professional society for the industry. The signal loss in the fiber would be just a few tenths of a decibel, making the tap undetectable. "But practically," he adds, "it's not so easy." The problem, Hayes explains, is that, in a typical cable, the fiber in question is one of a dozen hair-thin strands of glass, which are embedded inside a laser-welded, hermetically sealed, 3-mm-diameter stainless steel tube. This tube is in turn covered by a few centimeters of reinforcing steel wire and cables carrying 10 kV of dc power, all at a depth of a couple of thousand meters. "It's not impossible≠but it certainly pushes the definition of practical," Hayes notes. The easiest interception technique is to open up one of the repeaters to get at the fibers, but, Hayes cautions, "the whole issue of resealing it is quite difficult because you have to do it perfectly." Parts must either be sourced from the manufacturer or duplicated exactly. Despite these challenges, "the U.S. has been reconfiguring the submarine USS Jimmy Carter for [fiber-optic tapping]," says Richelson. The Jimmy Carter, one of a new Seawolf class, is being extensively modified for a range of covert missions by the introduction of a new hull section, which will facilitate the use of remotely operated vehicles, surveillance equipment, and the transport of Navy Seals, the U.S. Navy's special operations warfare specialists. The sub is also being fitted with an advanced communications mast, which will allow it both to eavesdrop on radio signals and transmit information back to base. The Jimmy Carter should be fully operational by mid-2005 [see illustration]. Bond, James Bond But a big remaining challenge, according to John Pike, a defense expert and founder of GlobalSecurity.org, are fiber-optic cables that stay on land. "I think that one of the things that [Navy Seals] spend a fair amount of time doing is [going] ashore...and walking to the nearest land line," says Pike. "They were doing that in Iraq a decade ago." Pike believes that this may also be how fiber-optic communications in North Korea and other countries are monitored: "It's cat and mouse, we try to see how many taps we can put on [chief of state Kim Jong II's] fiber-optic network, and the Dear Leader runs around and tries to catch them." Another, more aggressive approach to the land-line problem is to force an opponent onto the airwaves. "One of the things the United States has been doing since the middle of 2002 is systematically taking apart Iraq's land-line communications with air strikes, to force them to communicate via channels that are more readily compromised," says Pike. Indeed, this may be the reason why U.S. Secretary of State Colin Powell was able to present incriminating Iraqi telephone conversations to the United Nations last February. When a more subtle approach than aerial bombardment is called for, agencies like the U.S. National Security Agency (NSA) and the Central Intelligence Agency (CIA) can call upon organizations such as the Special Collection Service (SCS), a joint NSA-CIA covert group headquartered in Beltsville, Md. "What this group does is the more surreptitious black-bag operations," explains Wayne Madsen, who previously worked at the NSA and is now a senior fellow at the Electronic Privacy Information Center (Washington, D.C.). Black-bag operations can include breaking into embassies or facilities of communications providers and stealing information or installing bugs. -------------------------------------------------------------------------------- "It's been extremely difficult to break Russian ciphers" -------------------------------------------------------------------------------- By bugging a computer or communications system, information can be captured before it's sent through a fiber-optic cable, author Bamford observes. A tiny microphone dropped into a keyboard can pick up the sound made by the keys as they are struck and transmit the sounds to a nearby receiver. Different keys, according to Bamford, "sound different≠each has a specific signature." Those signatures can be used to reconstruct what was typed. The SCS also allows the Sigint community "to be proactive, to go after information rather than sit and wait," explains Bamford. Another important SCS mission is to recruit people who work for targeted governments, like cryptographic clerks or systems administrators, to ensure access to sensitive information, such as cipher keys. When successful, such activities also allow the NSA to avoid another steep hurdle: encryption. Say what? The NSA claims to be the world's largest single employer of mathematicians and has always projected an image of being a code-breaking outfit par excellence, in the mold of the legendary British Bletchley Park, which succeeded in breaking the German Enigma and other ciphers during World War II. But these days, there may be some misdirection in that image. The NSA has "covered up some quite spectacular successes at breaking into cipher systems...by pretending that they were simply better at mathematics and computer science, whereas what was usually happening was some form of sabotage, blackmail, theft, corruption, or whatever," says Ross Anderson, a reader in security engineering at the University of Cambridge and cryptographic systems expert. (When contacted by Spectrum for this article, a spokesperson for the NSA said that it does not comment on operational matters.) NSA's code-breaking efforts began to run into serious trouble relatively early in the Cold War. According to Bamford, immediately after World War II the NSA captured German code-breaking machines that allowed them to read advanced teleprinter ciphers that the Soviets were using at the time. But because of a suspected spy, the Russians found out and in 1948 changed all their ciphers overnight. The next day became known as Black Friday, reports Bamford. "From that date on, it's been extremely difficult to break Russian ciphers. Most of what the NSA got, they got from occasional busts." A bust is a mistake in the implementation or operation of a cipher system. "Sometimes they don't know they're making a mistake. A clerk is typing away and all of a sudden the crypto system disengages," explains Bamford. This can give a code-breaker enough of an opening to be able to go back and read the entire message. The solution was to go around the problem. To divine Soviet diplomatic plans, the UKUSA agencies might track a meeting between a third-world diplomat and the Kremlin. When the diplomat sent a coded report back to the home government, the spooks would go after this target's weaker encryption. "Big governments like the United States and Russia use home-brewed [cipher systems]. But they've learned through 50 years of experience to do that well," says Brian Gladman, a former deputy director of the NATO Shape Technical Center who has worked with Government Communications Headquarters (GCHQ), the British equivalent of the NSA. "Smaller countries don't have that experience, and [when they] build home-brewed ciphers, they don't do very well." Countries≠including Middle Eastern nations≠have also purchased commercial cryptographic machines, but may not have always operated them properly. (There are also rumors that the NSA obtained the default keys to some units prior to delivery.) In any case, the rise of ubiquitous computer communications has allowed the emergence of widely available strong cipher systems, such as public key cryptography, which rely on mathematical functions that would take the greatest supercomputer on earth millennia to break. Initially, this caused something of a panic in intelligence circles and sparked the so-called crypto wars of the 1990s, when the U.S. government arrested Phil Zimmerman, the creator of one popular public key program, Pretty Good Privacy, and attempted to impose stringent export controls on cryptographic software. But the underlying mathematics was already freely circulating. Non-U.S. companies threatened to take over the expanding market for online security products and the government eventually relented. But even with theoretically unbreakable encryption available to anyone with Internet access, all is not lost for the code-breakers; once again the solution is to go around the problem. Nowadays, "exploits against cipher systems involve failures in design and implementation rather than in the underlying cryptographic algorithms," as during World War II, explains Anderson. The same kind of flaws and foul-ups≠buggy software, poorly configured systems≠that allow computer worms to wreak havoc on the Internet, combined with SCS-style activities, give agencies like the NSA a continuing window of access to the activities of rogue nations and the businesses they deal with. Indeed, the adoption of new telecommunications technologies has not been all bad for the intelligence agencies. Actually, the widespread deployment of cellphones in countries with historically underdeveloped communications infrastructures has made surveillance easier, especially of nongovernment targets, like terrorists. "There's more and more cellphone coverage, even in places like Pakistan," says Madsen. Pike agrees: "Incomes rose faster than land lines could be put in....Since so much of the economic activity in these emerging economies was focused in a few primary cities, it was relatively easy to overlay a cellphone system." And it is exactly these cities that are likely to host an eavesdropping U.S. embassy or consulate. Cell- and satellite phones can also reveal a caller's location. In cooperative countries, such information may be extracted directly from the cellphone network, while in other regions the location may be determined if multiple listening stations (possibly including satellites) can pick up the phone's transmissions. It was by pinpointing the origin of a satellite phone call that the United States determined the coordinates for the 1998 cruise missile attack on one of Osama bin Laden's camps in Afghanistan. Drowning in data But these successes in keeping 21st century communications an open book have just compounded the biggest issue of all: volume. "It's hard to comprehend the enormous increase in communications in the last 15 years....You're talking two million pieces of communication an hour from one listening post," says Bamford. More and more of the NSA's vast computer resources are devoted to simply storing and cataloging the torrent of raw Sigint that pours into its Fort Meade, Md., headquarters. The agency's ultimate problem is that there are just too many people on earth to monitor everyone. The only solution is to throw away as much as possible of the information as soon as possible after it's been collected. "The electrical engineers and computer scientists at NSA spend a lot of their time developing [automatic] filter systems," says Bamford. Strategies like focusing on telephone calls from a particular installation, searching for specific words and phrases in e-mails, or using voice recognition techniques [see "Getting the Message"] are all deployed in the hope of picking up a terrorist giving orders rather than someone arguing with their significant other. While it is unlikely that any government, army, or terrorist group will ever again have its plans as comprehensively exposed as the Nazi war machine's, Sigint should still be effective against specific targets≠but, as 9/11 and the search for Osama bin Laden prove, only as part of an integrated intelligence strategy that prevents it from turning a deaf ear. -------------------------------------------------------------------------------- To Probe Further The European Parliament's report on the Echelon eavesdropping network can be found online at http://www.europarl.eu.int/tempcom/echelon/rrechelon_en.htm. The National Security Agency's Web site (http://www.nsa.gov/) has information on its history and outreach programs. An open-source public key encryption application, Gnu Privacy Guard, can be found at http://www.gnupg.org/. -------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10579 From: Gregory Hicks Date: Wed Jan 12, 2005 2:16pm Subject: [IP] No expectation of privacy in public? In a pig's eye! (was: Ruling gives cops leeway with GPS) From: Michael Hammer Date: Wed, 12 Jan 2005 10:00:57 -0500 > On Tue, 11 Jan 2005 19:26:56 -0800, Greg Horton > wrote: > > > > > > I am not so sure about that. In California, you don't need a warrant to > > put a tracker on unless you hardwire it to the vehicle. So instead of > > fielding a six man surveillance team for thousands of dollars and maybe > > a helo or plane, you do the same thing for pennies. You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > > > Greg > By that logic, I should just be able to break into (and wipe out) an > internet host that is being used to do bad things. We will get it > shut down/confiscated anyways by going through the legal steps so why > not just cut to the chase. As tempting as that may be, I understand the > reasons we have limitations. > > Just because something can be done doesn't mean it should be done. > Requiring a court order is a check/balance on the activities involved. > > Mike This is also being discussed on Dave Farber's IP list... See the message below - Just because we *CAN* do something, does not mean we *SHOULD* do it... Regards, Gregory Hicks ------------- Begin Forwarded Message ------------- Date: Wed, 12 Jan 2005 14:46:47 -0500 Subject: [IP] No expectation of privacy in public? In a pig's eye! From: David Farber To: Ip Orwell was an amateur djf ------ Forwarded Message From: Lauren Weinstein Date: Wed, 12 Jan 2005 11:38:28 -0800 To: Cc: Subject: No expectation of privacy in public? In a pig's eye! Dave, It's time to blow the lid off this "no expectation of privacy in public places" argument that judges and law enforcement now spout out like demented parrots in so many situations. Technology has rendered that argument meaningless -- unless we intend to permit a pervasive surveillance slave society to become our future -- which apparently is the goal among some parties. It is incredibly disingenuous to claim that cameras (increasingly tied to face recognition software) and GPS tracking devices (which could end up being standard in new vehicles as part of their instrumentation black boxes), etc. are no different than cops following suspects. Technology will effectively allow everyone to be followed all of the time. Unless society agrees that everything you do outside the confines of your home and office should be available to authorities on demand -- even retrospectively via archived images and data -- we are going down an incredibly dangerous hole. I use the "slimy guy in the raincoat" analogy. Let's say the government arranged for everyone to be followed at all times in public by slimy guys in raincoats. Each has a camera and clipboard, and wherever you go in public, they are your shadow. They keep snapping photos of where you go and where you look. They're constantly jotting down the details of your movements. When you go into your home, they wait outside, ready to start shadowing you again as soon as you step off your property. Every day, they report everything they've learned about you to a government database. Needless to say, most people would presumably feel incredibly violated by such a scenario, even though it's all taking place in that public space where we're told that we have no expectation of privacy. Technology is creating the largely invisible equivalent of that guy in the raincoat, ready to tail us all in perpetuity. If we don't control him, he will most assuredly control us. --Lauren-- Lauren Weinstein lauren@p... or lauren@v... or lauren@p... Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, Fact Squad - http://www.factsquad.org Co-Founder, URIICA - Union for Representative International Internet Cooperation and Analysis - http://www.uriica.org Moderator, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com - - - > > ------ Forwarded Message > From: Gregory Hicks > Reply-To: Gregory Hicks > Date: Wed, 12 Jan 2005 09:42:03 -0800 (PST) > To: > Cc: > Subject: Ruling gives cops leeway with GPS > > Dave: > > For IP if you wish... > > http://timesunion.com/AspStories/storyprint.asp?StoryID=322152 > > Ruling gives cops leeway with GPS > Decision allows use of vehicle tracking device without a warrant > > By BRENDAN LYONS, Staff writer > First published: Tuesday, January 11, 2005 > > In a decision that could dramatically affect criminal investigations > nationwide, a federal judge has ruled police didn't need a warrant when > they attached a satellite tracking device to the underbelly of a car > being driven by a suspected Hells Angels operative. > > [...snip...] > > All Times Union materials copyright 1996-2005, Capital Newspapers > Division of The Hearst Corporation, Albany, N.Y. > > ------ End of Forwarded Message ------------------------------------- You are subscribed as ghicks@c... To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ------------- End Forwarded Message ------------- ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10580 From: Nalesnik, Matthew Date: Wed Jan 12, 2005 9:16am Subject: Psychic Antennas http://www.newsmax.com/archives/ic/2005/1/12/91524.shtml Wednesday, Jan. 12, 2005 9:07 a.m. EST Yelsin Protected by 'Psychic' KGB Claiming that "Americans have created radiators of modulated signals, which control people's behavior thousands of kilometers from afar," Pravda.ru reports that former Russian President Boris Yeltsin was protected by a KGB unit who defended against "psychic" attacks. Yuri Malin, a former KGB officer, tells Pravda that "there was a special department in the structure of Russian secret services to protect top officials from malicious intentions of scientists and extrasensory individuals, who could create devices that were capable of affecting human psychology." Malin worked as a consultant of Boris Yeltsin's Federal Security Service, the successor to the KGB. Malin says that Putin does not "take much" interest in the unit. "There were such people in Boris Yeltsin's team, though. There was a special department, which was dealing with unconventional technologies to manipulate the human mind," he claims. Malin says the unit was formed when someone found an eavesdropping device in the house of a Russian government official. "It was actually not a microphone, but a directional antenna. Specialists concluded that the antenna had been installed in the office to exert a psychological influence on the president," he said. Malin says that in the early 90s there were about 20 institutes which developed a variety of extrasensory devices used by the security forces and others. During the Yeltsin years, Malin says the Russian goverment spent 500 million rubles on such programs. Apparently Yeltsin was very much in favor of the efforts. Malin recalled that security agents "could not let a button of Yeltsin's shirt disappear: it was believed that extrasensory individuals could put the evil eye on the president with the help of any little thing that Yeltsin owned." 10581 From: Lou Novacheck Date: Wed Jan 12, 2005 4:57pm Subject: Re: Ruling gives cops leeway with GPS HEAR! HEAR! Or, depending which side you're on SIEG HEIL! Agent Geiger wrote: Excuse me, but that is nonsense. OK, I will shut off the GPS while he cuts through that private drive. I just first have to run the coordinates through my GIS database then delete that info out before I use it in court. I am a commissior for my local government, and I see this trivial splitting of hairs thing done all the time. I wish LE and gov't officials would remember that little oath that we ALL took to uphold the Constitution from ALL enemies, foreign and DOMESTIC. I guess I need to keep a GPS jammer on me at all times, to block not only my cell phonem, but any potential LE from protecting me from myself. --- sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if > it goes on private > property; just don't need one (right now) to monitor > while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 10582 From: tali whacker Date: Wed Jan 12, 2005 5:21pm Subject: Re: Ruling gives cops leeway with GPS So when Mr. Smiths car drives onto Mr. Does driveway they'll record/use the data how? Will they say he traveled to on 01202004 Myfreedomsrgoinga Way but we deleted the data that reflect where his vehicle may have traveled after his last "legally" tracked position. Since 99% of roadways are public, what difference does it make if "You still need a warrant to monitor the vehicle if it goes on private property" since the "legally unwarranted" data collected would already pin the vehicle to a specific location. Just as the war on terrorism "renders obsolete Geneva's strict limitations on questioning of enemy prisoners and renders quaint some of its provisions.", the supposingly stringent process (put in place to preserve privacy rights and indiscriminate surveillance) to acquire warrants too I'm afraid will become increasingly "obsolete" more and more over time. On Wed, 12 Jan 2005 08:59:43 -0600, sewellr@i... wrote: > > > > > > You still need a warrant to monitor the vehicle if it goes on private > property; just don't need one (right now) to monitor while on public roads. > Doesn't sound like a "freedom" issue to me! > > Sgt. Kirk Sewell > Illinois State Police, Technical Investigations > 500 Iles Park Place, Suite 300 > Springfield, IL 62718 > (217) 524-6079 office > (217) 467-4211 pager > (217) 836-0919 mobile > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ________________________________ > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 10583 From: Guy Urbina Date: Wed Jan 12, 2005 6:08pm Subject: GPS tracking system signal inhibitors Hi all, With all the recent chatter about GPS tracking, what are the legal ramifications of owning or selling a small GPS signal inhibitor? With the proliferation of GPS trackers seemingly ubiquitous, it seems like a good idea to prevent unauthorized people from tracking your movements in a vehicle. I've fabricated a few small devices that transmit a CW carrier under 50mw in the L1 frequency range. (1575.42Mhz) It effectively overdrives the front end of COTS GPS receivers.(Garmin, SIRF, Motorola etc.) (Most trackers use L1 receivers in their systems) Within a 10' radius, it effectively prevents a GPS receiver from locking on to get a position fix. Other than getting FCC type approval certification, Would these proposed devices be illegal to own or sell? Right now they are bench prototypes. I appreciate any constructive feedback. \R -Guy 10584 From: Bill & Tracy McDonnell Date: Wed Jan 12, 2005 8:05pm Subject: Re: speaking of GPS units Is the satellite they use to track GPS the Chameleon? By the way,I live in Ohio and the GPS they had on the SUV's trailer hitch was thrown out by the Appeals Court. We don't believe that the Ohio Supreme is going to touch it. The case thrown out is already a big deal in Constitutional Issues. Many blessings~~~ Bill & Tracy McDonnell Matthew 7:16 www.bigdaddydanes.com ----- Original Message ----- From: G P To: tscm-l@yahoogroups.com Sent: Wednesday, January 12, 2005 7:55 PM Subject: [TSCM-L] speaking of GPS units Can the list members here that have experience with GPS trackers post some common installations that they've ran across? I would assume that unless using a unit with advanced correlation ability (such as reflected signals off of pavement etc), that the unit would have to be mounted with clear view of the sky and no obstructions. What are some common places for permanent installations, and where would you start looking first if you suspected a vehicle had a GPS tracking device installed? With this recent court ruling, would that also imply that cellular handsets planted in a vehicle would also be legal? With the Emergency 911 (E911) Act (no relation to Sept. 11, the bill was passed a year or so prior to the attacks), cellular telephones now must support geolocation capability up to a few meter resolution now. There would be no need for an elaborate GPS tracker if you could accomplish the same goal by wiring a cellphone into the vehicle (with the added benefit of a voice channel to listen in on conversations in the cockpit). Where would be the best place to mount one of them, and what would be the preferred technique for discovering one? Greg ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10585 From: Greg Horton Date: Wed Jan 12, 2005 9:22pm Subject: Re: Re: Ruling gives cops leeway with GPS fjansgmxnet wrote: If it costs pennies, they will track or follow inconvenient citizens. I would like to see where you work, that your bean counters would let you track dozens of innocent citizens. Cops are always going to try to follow people that they think are involved in crime so they can stop the crime. We don't just pick out John Q Citizen and follow him because our bosses would probably put a boot up our rear for not doing anything productive. And as far as getting a warrant for everything we did, Frank we would never get anything done. If you investigate somebody, and nothing turns up, you close the investigation and move on. Many times it only takes an hour or so before you realize the information you received was probably false. And don't forget, the device that you put on the car only tells you where the individual has been, you still have to have eyes on him so you can see if the individual is actually involved in a crime. The tracking device is only a small tool to use in your investigation. Greg > > > --- In TSCM-L@yahoogroups.com, Greg Horton wrote: > > > > G P wrote: > > You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > That's the point. If it costs a heap of money, they will follow only > the real suspects of mayor crime offences. If it costs pennies, they > will track or follow inconvenient citizens. > > If they want to follow the real suspects of mayor crime offences, > they will get a warrant everywhere. This is only a problem, if they > haven't any substantial leads. But why should they follow then, > because of their preconceptions? (I am sure that they will not public > the events, if their preconceptions failed.) > > Regards, > Frank > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > [Non-text portions of this message have been removed] 10586 From: Greg Horton Date: Wed Jan 12, 2005 9:11pm Subject: Re: Ruling gives cops leeway with GPS Sorry Littledog, I was talking about the police. I agree with you that some CI's may abuse their relationship with the police. But then shame on the officers that let themselves get sucked into something like that without looking for some other indicators that would affirm or rebut what the CI told them. Greg littledog wrote: > > What about when these registered confidential informers do all this > tracking, bugging, eavesdropping, and knotholing for no other reason > than personal ones, and have always done so?> -----Original Message----- > > From: Greg Horton [mailto:sgtpelon@e...] > > Sent: Tuesday, January 11, 2005, 8:13 PM > > To: TSCM-L@yahoogroups.com > > Subject: Re: [TSCM-L] Ruling gives cops leeway with GPS > > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you don't need a > warrant to > > put a tracker on unless you hardwire it to the vehicle. So instead of > > fielding a six man surveillance team for thousands of dollars and maybe > > a helo or plane, you do the same thing for pennies. You are going to > > follow the suspect anyway, why not do it in a way that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > From: Greg Horton Date: Wed Jan 12, 2005 9:37pm Subject: Re: Ruling gives cops leeway with GPS Michael Hammer wrote: > By that logic, I should just be able to break into (and wipe out) an > internet host that is being used to do bad things. We will get it shut > down/confiscated anyways by going through the legal steps so why not > just cut to the chase. As tempting as that may be, I understand the > reasons we have limitations. > > Just because something can be done doesn't mean it should be done. > Requiring a court order is a check/balance on the activities involved. > > Mike > > Holy Smokes Mike, what a leap of logic you make. How on earth do you > make a connection between following someone on a public thoroughfare > and comitting a burglary and then committing an additional crime of > wiping the computer clean. Talk about a non sequitur. There is no > requirement for a court order and case law has reaffirmed this > technique by the police. If you are that concerned about this type of > operation, maybe you should spearhead a movement to pass appropriate > legislation. Greg > > 10588 From: Roger Date: Wed Jan 12, 2005 10:10pm Subject: identity theft is a major problem in America. Dear Member It's no secret that identity theft is a major problem in America. Think you're not at risk? Unfortunately you are. - Do you hand your credit card to servers at restaurants? - Do you sign your credit cards? - Do you supply personal information over the internet? - Do you keep your Social Security number in your wallet or purse? - Do you leave mail at your home or business for the postal carrier to collect? - Do you shred unwanted mail with personal information? What if you discovered that your identity had been stolen? - Call your bank and/or credit card company - Contact the three major credit repositories - Go through the helpful but extensive steps recommended by the Federal Trade Commission in its 30-page consumer support publication - Fill out and submit the affidavit form supplied by the FTC to dispute new, unauthorized accounts - Spend on average $1,500 in out-of-pocket expenses to resolve the many problems cause by identity thieves WITH THE IDENTITY THEFT SHIELD: Get REGULAR monitoring of your credit report and let the proven leaders in the identity restoration and legal services fields assist you. With no obligation, you can view a short presentation and learn more by visiting my website. See what Pre-Paid Legal can do for you at: http://www.prepaidlegal.com/idt/hollowaypi Thank you for your time and if you're interested or just have questions, I'll be happy to help. Please feel free to contact me at your convenience. Sincerely, Roger Holloway Independent Associate Pre-Paid Legal ServicesÆ, Inc. 940-592-7000 www.TexasDetective.com www.RogerHolloway.com 10589 From: Greg Horton Date: Wed Jan 12, 2005 9:29pm Subject: Re: Ruling gives cops leeway with GPS G P wrote: > Because anybody and everybody can now fix up your car > with a GPS unit, without fear of civil or criminal > prosecution. This court precedent puts very dangerous > technology into the hands of the proletariat, without > any form of checks and balances. > > Wait until somebody wires up your wife's car for > sound, and you'll have a slightly different opinion > about tracking technology. GP, What you are saying is not quite accurate. A private person cannot use the devices or he is in violation of both criminal and civil codes. We were talking about tracking devices that are self contained and attach to the vehicle without using the vehicle's battery or electrical system. We said nothing about wiring for audio. All police officers MUST have a signed warrant to attach any video or audio to a suspect's vehicle. There is no way around that. You must have enough probable cause to convince a judge. I know for a fact that if a person in California puts a listening device in a car, he is in a heap o' trouble. Greg > > --- Greg Horton wrote: > > > > > > > G P wrote: > > > > > Absolute insanity. > > > > > I am not so sure about that. In California, you > > don't need a warrant to > > put a tracker on unless you hardwire it to the > > vehicle. So instead of > > fielding a six man surveillance team for thousands > > of dollars and maybe > > a helo or plane, you do the same thing for pennies. > > You are going to > > follow the suspect anyway, why not do it in a way > > that saves the > > taxpayer a heap o' money? > > > > Greg > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ------------------------------------------------------------------------ > Yahoo! Groups Links > > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > > * Your use of Yahoo! Groups is subject to the Yahoo! Terms of > Service . > > [Non-text portions of this message have been removed] 10590 From: wiggyyy2000 Date: Wed Jan 12, 2005 11:07pm Subject: Thanks James.. I would like to thank Jim for inviting me to this group, it is very informative with good people thanks 10591 From: James M. Atkinson Date: Thu Jan 13, 2005 0:08am Subject: State Department/CIA Communications Annex and Special Collection Facilities (for publication to Cryptome) Consider for a moment the irony of having one of major the U.S. Governments espionage centers located between a road called "Ashcroft Drive" and one called "Entomology Road". The Beltsville Agricultural Research Center is world famous for the study of insects, but more than one kind of bug is grown at this location. The site has also been used as a base for spies and diplomats since the late 70's as a major communications center, and a wet-house where bugs of a more electronic nature are nurtured. In a forested area near Rt 295 there are two sister building set back from the road. On page 2 of the following FCC document we see that MCI Worldcom operates a satellite communications system from this location. http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-230090A1.pdf Application for Authority Class of Station: Fixed Earth Stations MCI WORLDCOM NETWORK SERVICES, INC. E030002 SES- LIC- 20030102- 00007 E Nature of Service: Domestic Fixed Satellite Service SITE ID: 1 LOCATION: 8101 Odell Rd, Montgomery, Beltsville, MD 39 ∞ 2 ' 48.40 " N LAT. 76 ∞ 51 ' 52.90 " W LONG. Universal Antennas 1 18.3 meters ANTENNA ID: 1183 0.00 dBW 3700.0000 - 4200.0000 MHz 44M2G7W 56.00 dBW PSK DATA 5925.0000 - 6425.0000 MHz 43K8G7W 71.60 dBW PSK DATA 5925.0000 - 6425.0000 MHz 44M2G7W 3700.0000 - 4200.0000 MHz 43K8G7W Points of Communication: 1 - ALSAT - (ALSAT) Note the listing on page 2, which reflects that MCI is operating the Satellite Dish on the East side of the State Department Communications Annex. ALSAT is a foreign based commercial communications satellite with surveillance capability, and the above frequency bands would allow this systems to handle a huge about of materials. Also, the bandwidth that they are using is enormous and they could move huge amounts of data through a system like this. http://dettifoss.fcc.gov/acweb/dettifoss/IBFS/IBFS_Ses_License.roi;16520?ViewDefault http://dettifoss.fcc.gov/acweb/dettifoss/Genmen_a/db_8/d_admin.roi;119?ViewDefault --------------------------------------------------------- Most State Department facilities have special phones lines that allow personnel to call their families while abroad via this systems at little or no cost, for example: http://foia.state.gov/MMS/postrpt/pr_view_all.asp?CntryID=159 Telephones and Telecommunications Last Updated: 7/12/2004 5:25 AM Local and international telephone service is available and reliable. International direct dial service is excellent. A one-minute call to the U.S. or other foreign country costs approximately $1. Direct calls from the U.S. can be received in Hanoi without cost. Residences of all USG personnel are equipped with telephones. Employees are responsible for paying the monthly residential telephone bill. Through the International Voice Gateway (IVG) Program, the Embassy has four IVG telephone trunks directly connecting the office with the State Department Telephone Switch at Beltsville, Maryland. This IVG connection was installed as both a cost-saving and morale-boosting program. Calls to the greater Washington area (703/202/301/410) are free. All 1-800 numbers are also free of charge to Embassy personnel. When placing personal calls, a commercial telephone calling card can be used for numbers outside the D.C. area. These personal calls will be billed to the employee as if the call originated from Beltsville, Maryland. Also, http://foia.state.gov/MMS/IVG_prefix/ivgprefix_start.asp IVG Usage Dial Prefix Codes The International Voice Gateway (IVG) switch is located in Beltsville, Maryland and provides interconnectivity from 135 overseas locations to all Department of State and government agencies located in the Washington, D.C. metropolitan area. Through the use of calling cards, it also enables users to access the FTS networks, GETS, WITS, as well as commercial numbers for international direct dialing at substantially reduced rates. Embassy to Off-Network Overseas Location: When calling from an Embassy to a different country, but not an IVG location, you must use your ID3 Calling Card. Off-Network Overseas Location to Department of State and/or U.S. Location: You must use your ID3 Calling Card. When calling from an off-network overseas location to an off-network location, you must use your ID3 Calling Card. and, http://foia.state.gov/masterdocs/05fah02/tel0640.pdf 5 FAH-2 H-640 INTERNATIONAL VOICE GATEWAY (TL:TEL-1; 07-01-1998) 5 FAH-2 H-641 DESCRIPTION (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) The International Voice Gateway (IVG) is an international telephone network directly linking foreign affairs agency headquarters with field offices abroad via dedicated voice circuitry. DTS-PO established the network to provide a cost-effective, U.S. Government-controlled and switched telephone service for foreign affairs agencies. Dial tone and switching for IVG trunks are provided by the central switch at the Network Control Center in Beltsville. DTS-PO manages the network and maintains the central switch and circuitry up to the PBX at destination points. 5 FAH-2 H-642 INTERCONNECTIVITY (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) IVG subscribers can connect to other U.S. Government networks by dialing special access codes. DTS-PO periodically sends telegraphic updates of IVG directories and detailed dialing instructions to all IVG subscribers. The other networks are described in greater detail below. 5 FAH-2 H-642.1 Department of State Metropolitan Area/Wide Area Network (MA/WAN) (Voice) (TL:TEL-1; 07-01-1998) (Uniform State/USAID/USIA) The Departmentís MA/WAN is a voice network connecting the IVG central switch at Beltsville to Department facilities at Main State, Washington area State annexes, and other facilities in Portsmouth, New Hampshire, Charleston, South Carolina and USUN New York. --------------------------------------------------------- Here is an article about MCI getting caught playing games with the system: http://www.computerweekly.com/Article123819.htm Note that MCI was illegally routing "sensitive calls" through Canada to save money. --------------------------------------------------------- The same 8101 Odell address is also listed as a GSA building at: http://www.iolp.gsa.gov/iolp/BuildingsList.asp?dID=2405 ALTERNATE COMM SITE 8101 ODELL RD BELTSVILLE , MD 20705-4110 PRINCE GEORGE'S COUNTY ------------------------------------------------------------- An index for State department Annex locations indicates that this location is part of the "Bureau of Information Resource Management ": http://foia.state.gov/MMS/Annexes/print_all_annex.asp State Annex - SA-26 SA-26 Beltsville 8108 O'Dell St. Beltsville, MD 20522 Major Office: IRM, AID ------------------------------------------------------ Here is a listing of some of the people at the facility, broken down by assignment/position: http://foia.state.gov/alphalisting/alpha_print.asp?Range=DD Alphabetical Listing of Employees Name Number Room Office Location Ortman, Edward 301-985-8318 102 Beltsville Kahney, Joseph 301-985-8100 154 SA-26 Ivan, Patricia 301-985-8006 BIMC SA-26 White, Robert H. 301-985-8100 143 SA-26 Bazemore, Lisa C. 301-985-8022 107 SA-26 Ivory, Cynthia Y. 301-985-8797 126 SA-26 Delisa, John 301-985-8064 GTS(BIMC) SA-26 Heiser, Richard E. 301-985-8019 BIMC SA-26 Scott, Betty Jean 301-985-8037 2nd Fl SA-26 Bowden, Alfred Jerome 301-985-8711 111A(GTS) SA-26 Crawford, Steadman C. 301-985-8016 126(GTS/EN SA-26 Chavis, Keith 301-985-8100 A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Clark, Sherry 301-926-5710 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Steen, Jon J. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Beckloff, Mark 301-985-8787 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Ortman, Edward 301-985-8318 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Bristol, Robert 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Jones, Jerry R. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Pantos, Lillian 301-985-8004 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Thomas, Anthony 301-985-4738 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Wilson, Rima S. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Harrell, Earl C. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Johnson, Chad R. 301-985-8318 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Mangal, Aaron S. 301-985-8208 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Marbley, Troy G. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Rice, William J. 301-985-8712 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Brown, Richard T. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Gonzalez, Jose F. 301-985-8512 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Ingram, Robert J. 301-985-8866 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Lippa, Michelle L. 301-985-8100 EMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Lippa, Michelle L. 301-985-8100 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Mooring, Odessa M. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Rios, Kixxonmin G. 301-985-8866 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Burgman, Charles E. 301-985-8815 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Dejesus, Yesenia D. 301-985-8712 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 McDaniel, Tyrone G. 301-985-8122 BMC A/DTSPO - Diplomatic Telecommunications Service, Program Office SA-26 Bruno-Nieves, Jorge L. 301-985-8100 109 A/DTSPO/GTS SA-26 Bryson, Cader A. 301-985-8945 A/OPR/FMS/RAM - Office of Facilities Management Services SA-26 Anderson, Michael G. 301-985-8946 B03E A/OPR/FMS/RAM - Office of Facilities Management Services SA-26 Palmer, Erica 301-985-8347 8th Fl DS/CIS/IST - Office of Information Security Technology SA-26 Hurt, Lolita M. 301-985-8347 DS/SI/AC SA-26 Perry, Gwenette C. 301-985-8347 DS/SI/AC SA-26 Washington, Shawnisa 301-985-8229 DS/SI/AC SA-26 D Elisa, John 301-985-8064 GTS IRM/NOC SA-26 Badra, Patrick M. 301-985-8433 IRM/NOC SA-26 Correll, Jacob A. 301-985-8008 GTS IRM/NOC SA-26 Bridgwood, Thomas F. 301-985-1717 GTS IRM/NOC SA-26 Carroll-Nickens, Mary 301-985-8371 117(GTS-NS IRM/OPS/ENM - Enterprise Network Management SA-26 Ballard, Paul E. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Wardle, Shane C. 301-985-8250 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Ross, Russell M. 301-985-8369 ENMOC IRM/OPS/ENM/OPS/NA SA-26 Williams, Sherman L. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/NA SA-26 Webster, Tara Marsette 301-985-8460 ENMOC IRM/OPS/ENM/OPS/NA SA-26 Bullock-Bangoura, Wanda D. 301-985-8227 1269 IRM/OPS/ENM/OPS/NA SA-26 Beddingfield, Guthrie 301-985-8356 ABCD IRM/OPS/ENM/OPS/TC Beltsville Kumar, Ravindra 301-985-8462 Bsmt IRM/OPS/ENM/OPS/TC SA-26 Neal, Joseph C. 301-985-8217 Bsmt IRM/OPS/ENM/OPS/TC SA-26 Scott, Teresa D. 301-985-8806 140 IRM/OPS/ENM/OPS/TC SA-26 Rivera, Jose Antonio 301-985-8342 IRM/OPS/ENM/OPS/TC SA-26 Williams, Dorothea V. 301-985-8004 111 IRM/OPS/MSO - Messaging Systems Office Beltsville Premo, Rob 301-985-8516 IRM/OPS/MSO - Messaging Systems Office SA-26 Hedges, John S. 301-985-8004 IRM/OPS/MSO - Messaging Systems Office SA-26 Walker, Michael D. 301-985-8516 IRM/OPS/MSO - Messaging Systems Office SA-26 Cabral, John L. 301-985-8005 108 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division Beltsville Bell, Anthony R. 301-985-8007 Vault IRM/OPS/MSO/BMC - Beltsville Messaging Center Division Beltsville Leger, David J. 301-985-8061 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Glover, Henry A. 301-985-8319 105 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Williamson, Darrell L. 301-985-8122 IRM/OPS/MSO/BMC - Beltsville Messaging Center Division SA-26 Hamilton, Lee 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Harrell, Earl 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Marbley, Troy 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Childs, Albert 301-985-8039 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Morris, Ofelia 301-985-8004 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Haskins, Albert 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Edwards, Anthony 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 McDaniels, Tyrone 301-985-8122 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Williams, John A. 301-985-8866 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Mooring, Odessa M. 301-985-8516 BELTSVILLE IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Jones, Frank R. 301-985-8122 IPC IRM/OPS/MSO/BMC/OPS - Operations Branch Beltsville Gomez, Bernabe Jesus 301-985-8122 1 IRM/OPS/MSO/BMC/OPS - Operations Branch Beltsville Hunt, Richard L. 301-985-8122 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Manning, Felix 301-985-8122 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Zayas, Orlando 301-926-5405 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Champ, Renee C. 301-985-8296 108 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Gibson, Mary E. 301-985-8105 104 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Stephens, James 301-985-8866 111 IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Motes, Roger D. 301-985-8516 PRIMARY IRM/OPS/MSO/BMC/OPS - Operations Branch SA-26 Barclay, James E. 301-985-8302 108 IRM/OPS/MSO/BMC/TS - Technical Services Branch Beltsville Battle, Ronald Nelson 301-926-5400 5420 IRM/OPS/MSO/BMC/TS - Technical Services Branch Beltsville Beechum, Michael E. 301-926-5405 IRM/OPS/MSO/BMC/TS - Technical Services Branch SA-26 Norton, Adrian L. 301-985-8124 112 IRM/OPS/MSO/BMC/TS - Technical Services Branch SA-26 Fleming, Carla M. 301-985-8032 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch Beltsville Hill, Bruce 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Kodey, Mark 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Lutes, Mike 301-985-8714 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Ledger, Dave 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Mobeka, Rita 301-985-8505 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Garner, Cedric 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Jackson, Larry 301-985-8061 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Knight, Gerald 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Knieriem, Gerry 301-985-8060 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Spellane, Michael 301-985-8145 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Schneider, Paul C. 301-985-8123 111 IRM/OPS/MSO/MSMC/PRG - Programming Branch SA-26 Hampton, Angel B. 301-985-8905 1986E IRM/OPS/SIO/APD/PAY - Payroll Applications Branch SA-26 Dormio, Debora L. 301-985-8900 117 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch Beltsville Woodland, Marian G. 301-985-8293 130 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch Beltsville Baia, Joseph L. 301-985-8738 139 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 McCree-Green, Carol E. 301-985-8902 136 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 Williamson, Johnnie R. 301-985-8727 139 IRM/OPS/SIO/MFS/CSO - Client/Server Operations Branch SA-26 Dumas, Jimmie J. 301-985-8721 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Chase, Mary L. 301-985-8312 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Day, Marcus R. 301-985-8406 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Cook, Tyrone W. 301-985-8292 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Brown, Elliott W. 301-985-8737 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Davis, Leonard W. 301-985-8739 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Cornelison, Jim X. 301-985-8290 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Jackson, Ramona D. 301-985-8793 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Johnson, Sheila D. 301-985-8295 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Raiford, Angela E. 301-985-8741 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Williams, Steve R. 301-985-8732 130 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Wilson, Barbara J. 301-985-8294 135 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Smith, Lawrence C. 301-985-8901 1921 IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Wise, Pernell X. 301-985-8790 135 - A IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Alami, Michelle E. 301-985-8746 Bubble IRM/OPS/SIO/MFS/OP - Operations Branch Beltsville Douglas, Kirk 301-985-8901 117 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Parker, Carlton 301-985-8743 OPS IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Sands, Vance H. 301-985-8795 135 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Slater, Demetrius 301-985-8700 139 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Stevens, Phillip H. 301-985-8731 135B IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Clough, Patricia A. 301-985-8700 1st Fl IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Weinberger, Jim C. 301-985-8792 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Collins, Tony C. 301-985-8794 130 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 Richardson, Barbara A. 301-985-8700 130 IRM/OPS/SIO/MFS/OP - Operations Branch SA-26 http://foia.state.gov/MMS/OrgDirectory/OrgDir.asp?ID=56 MESSAGING SYSTEMS (IRM/OPS/MSO) Director Susan Musser, Acting 5440 202-647-7787 Deputy Director Susan Musser 5440 202-647-7787 Management Analysis Staff Chief Patsy Butler 5440 202-647-7768 Messaging Systems Products Division Chief Edward Courlang 2288C SA34 703-912-8009 Special Messaging Operation Divisions Chief Frontis Wiggins 5440 202-647-7989 E-Mail Division Chief Larry McElroy 1921 202-736-4878 Main State Messaging Center Division Chief Margaret Johnson 5440 202-647-7795 Beltsville Messaging Center Division Chief John Cabral 117 SA26 301-985-8005 -------------------------------------------------------------------------------------------------------- The East side of the Odell Road facility has two large Parabolic dish antenna for satellite up-link and down link. On the South side of the building there is a very tall red/orange and white tower with a point-to-point microwave dish to another site in the area. Next to this is a much shorter mast, with a large log-periodic antenna that we often see on the roofs of embassies and diplomatic facilities across the globe. There is also a fiber optic cable between this facility, and the one just to the east of it (the Special Collection Service). ------------------------------------------------------------------------------------------------------------- http://www.fbodaily.com/cbd/archive/1999/06(June)/22-Jun-1999/70sol003.htm COMMERCE BUSINESS DAILY ISSUE OF JUNE 22,1999 PSA#2372 U.S. Agency for International Development, M/OP/B/HNE, Room 7.09-120, 1300 Pennsylvania Avenue, NW, Washington, DC 20523-7100 70 -- GENERAL PURPOSE AUTOMATED DATA PROCESSING EQUIPMENT SOL M/OP/HNE/P99-002 DUE 062599 POC POC Daisy Matthews: Purchasing Agent, M/OP/B/HNE, Fax (202) 216-3052, Tel: (202) 712-0512, Internet: dmatthews@u..., Contracting Officer, James A. Jeckell WEB: http://www.info.usaid.gov/procurements_bus_opp/procurement/announce/cb d, http://www.info.usaid.gov. E-MAIL: dmatthews@u..., http://www.info.usaid.gov. This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in Federal Acquisition Regulations (FAR) subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotes are being requested and A WRITTEN SOLICITATION WILL NOT BE ISSUED. This CBD notice can be viewed and downloaded using the Agency Web Site. The Worldwide web address is http://www.info.usaid.gov. Select Business and Procurement Opportunities from the home page, then "USAID Procurements." On the following screen, select "Download Available USAID Solicitations." The Solicitation Number for this Request For Quotations (RFQ) is M/OP/HNE/P99-002. The Government anticipates awarding a single purchase order. This procurement is for the following items: CLIN NO. 001, Part No. ALSM64-05AE, 64KB Airlink Wireless Modems,Input Power: 90-270 VAC 50/60 HZ Qty. 12 ea.; CLIN NO. 002, Part No. ALS128-05AB, 128KB Airlink Wireless Modems, Input Power: 90-270 VAC 50/60 HZ Qty. 6 ea.; CLIN NO. 003, Part No. ALS256-05AB, 256KB Airlink Wireless Modems, Input Power 90-270 VAC 50/60 HZ Qty. 12 ea.; CLIN NO. 004, Part No. YEA-24SP-NF, 24DBI Semiparabolic Antenna Qty. 30 ea.; CLIN NO, Part No. 005 YELA-24, Lighting Arrestor with Bracket/Female Connector Qty. 30 ea.; CLIN NO. 006, Part No. YEX-4UF-010M/M, Ultra-Flex RF Cable 10 foot N. Male Connector Qty. 4 ea.; CLIN NO. 007, Part No. YEC-4UF-020M/M Ultra, Flex RF Cable 20 Foot N. Cable Connector Qty. 4 ea.; CLIN NO.008, Part No. YEC-400-1000B, 1000 Foot Spool LMR Cable (Bulk Reel) Qty. 1, CLIN NO. 009, Part No. YE-73565, Type N. 50 OHM Solder/Clamp Connector Qty. 50 ea. F.O.B Point, 8101 Odell Drive, Beltsvile, Maryland,20705. Date of Delivery: No later than July 30, 1999. No partial quotes will be considered. Please acknowledge all requirements on quotations. Please indicate F.O.B point on quote. This procurement is set-aside for small business. The provision at FAR 52.212-1, Instructions to Offerors, applies to this acquisition. Evaluation is based on best value including cost and ability to meet service requirements. Offerors shall include a completed copy of the provision at FAR 52.212-3, Offeror Representations and Certifications-Commercial Items, with its offer. The clause at 52.212-4, Contract terms and Conditions-Commercial Items, applies to this acquisition. In addition to the guidance contained in FAR 52.212-4, contractors shall submit proof of delivery with their invoices. The receiving office or representative of USAID may in the form of a bill of lading or other shipping document sign proof of delivery. Invoices received without proof of delivery with their invoices will not be accepted. The clause at FAR 52.212-5, Contract Terms and Conditions Required to Implement Status or Executive Orders-Commercial Items, applies to this acquisition. Offers are due by close of business 07/25/99, and can be submitted by fax to (202) 216-3052 Attn: Daisy Matthews. Inquiries regarding this request will only beaccepted via Fax. Posted 06/18/99 (W-SN344815). (0169) COMMERCE BUSINESS DAILY ISSUE OF JULY 20,1999 PSA#2391 U.S. Agency for International Development, M/OP/B/HNE, Room 7.09-120, 1300 Pennsylvania Avenue, NW, Washington, DC 20523-7100 70 -- GENERAL PURPOSE AUTOMATED DATA PROCESSING EQUIPMENT SOL M/OP/HNE/P99-003 DUE 072399 POC POC Daisy Matthews: Purchasing Agent, M/OP/B/HNE, Fax: (202) 216-3052; Telephone: (202) 712-0512, Internet: dmatthews@u..., Contracting Officer: James A. Jeckell WEB: http://www.info.usaid.gov/procurement_bus_opp/procurement/announce/cbd, http://www.info.usaid.gov. E-MAIL: http://www.info.usaid.gov, dmatthews@u.... This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in Federal Acquisition Regulations (FAR) subpart 12.6, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotes are being requested and A WRITTEN SOLICITATION WILL NOT BE ISSUED. This CBD notice can be viewed and downloaded using the Agency Web Site. The Worldwide web address is http://www.info.usaid.gov. Select Business and Procurement Opportunities from the home page, then "USAID Procurements." On the following screen, select "Download Available USAID Solicitations." The Solicitation Number for this Request For Quotations (RFQ) is M/OP/HNE/P99-003. The Government anticipates awarding a single purchase order. This procurement is for the following item: CLIN NO. 001, Part No. Radyne DD 2401L, Receive-Only Modem, with Cisco Cable Kit, Twenty (20) each. F.O.B Point, 8101 Odell Drive, Suite 110, Beltsvile, Maryland,20705. Date of Delivery: No later than August 20, 1999. No partial quotes will be considered. Please acknowledge all requirements on quotations. Please indicate F.O.B point on quote. This procurement is set-aside for small business. The provision at FAR 52.212-1, Instructions to Offerors, applies to this acquisition. Evaluation is based on best value including cost and ability to meet service requirements. Offerors shall include a completed copy of the provision at FAR 52.212-3, Offeror Representations and Certifications-Commercial Items, with its offer. The clause at 52.212-4, Contract terms and Conditions-Commercial Items, applies to this acquisition. In addition to the guidance contained in FAR 52.212-4, contractors shall submit proof of delivery with their invoices. The receiving office or representative of USAID may in the form of a bill of lading or other shipping document sign proof of delivery. Invoices received without proof of delivery with their invoices will not be accepted. The clause at FAR 52.212-5, Contract Termsand Conditions Required to Implement Status or Executive Orders-Commercial Items, applies to this acquisition. Offers are due by close of business 07/23/99, and can be submitted by fax to (202) 216-3052 Attn: Daisy Matthews. Inquiries regarding this request will only be accepted via Fax. Posted 07/16/99 (W-SN355185). (0197) Loren Data Corp. http://www.ld.com (SYN# 0398 19990720\70-0012.SOL --------------------------------------------------------------------------------------------------------------- http://216.33.118.202/EPSData/AID/Synopses/11471/M-OP-1787/PROPOSALINSTRUCTIONS.doc Courier services will cover the District of Columbia; Montgomery and Prince George's County, Maryland, Fairfax and Arlington Counties, and the Cities of Alexandria and Falls Church, Virginia. Approximately eighty (80) percent of service calls will originate or terminate at the Agency office located in the District of Columbia. Agency's offices are currently located: District of Columbia Ronald Reagon International Trade Building 1300 Pennsylvania Avenue, N. W. Washington, D.C. 20523 Maryland (1) USAID Mainframe Computer Center 8101 Odell Road Beltsville, MD 20705 Virginia (2) Tower Building (State Annex 14) 1100 Wilsong Boulevard Rosslyn, VA 22209 --------------------------------------------------------------------------------- http://md.allpages.com/beltsville/real-estate/real-estate-services/ Montage Inc 8101 Odell Road Beltsville, MD 20705-4110 Phone: (301) 210-4540 Business Types: Property Maintenance & Services ------------------------------------------------------------------------------------- http://www.globalsecurity.org/org/news/2002/020718-scs1.htm The Baltimore Sun July 18, 2002 Report faults decisions by intelligence agencies By Tom Bowman WASHINGTON - The nation's spy agencies failed to provide adequate warning of the Sept. 11 terrorist attacks due partly to a series of "questionable management decisions" about where to spend money and assign workers, according to a sharply worded congressional report released yesterday. The Central Intelligence Agency and the National Security Agency must do more to penetrate al-Qaida and other terrorist organizations, said the report by the House Intelligence Subcommittee on Terrorism and Homeland Security. It was the first congressional report on the subject since the attacks on the Pentagon and the World Trade Center. The CIA should hire more foreign agents, while the NSA must shift from being a passive listener to a "proactive hunter" of terrorist targets. At the same time, the FBI was faulted in the report for the reluctance of top officials to share counterintelligence information with other agencies. "This report contains constructive suggestions for what the intelligence community needs to do to strengthen our country's counterterrorism intelligence capabilities," said Rep. Porter J. Goss, the Florida Republican who chairs the committee and has joined with the Senate committee in an investigation into why America had no advance warning of the attacks on the World Trade Center and the Pentagon. The FBI had no immediate comment on the report, while the CIA and NSA said they were making progress in dealing with the terrorist threat. Though funding for counterterrorism has sharply increased, both intelligence agencies said they face budget constraints in pursuing terrorists and spies. The intelligence community, with an annual budget in excess of $30 billion, is expected to receive billions of dollars more in the coming years. The CIA has an estimated work force of 19,000 and the NSA is believed to have 25,000 employees at Fort Meade, although precise figures are classified. While the report repeated long-standing criticisms that the agencies must hire more linguists and analysts to fight terrorism, the report broke ground by focusing on management decisions it said were key factors in the agencies' inability to sound the alarm before Sept. 11. The CIA's human intelligence - such as that gathered by foreign spies in the agency's employ - steadily eroded in the early to mid-1990s because the CIA perceived a reduced terrorist threat, the report said. It said the NSA had failed to find a way to closely follow a target who switches from a land-line phone to a cell phone or an Internet address. A senior intelligence official, who requested anonymity, said the CIA had yet to completely review the 100-page classified report. A declassified, 10-page summary was publicly released. But the intelligence official defended the agency's efforts on counterterrorism. Beginning in 1997, Director George J. Tenet beefed up the agency's efforts against terrorism with new employees and more focused analysis. Counterterrorism funding grew by 50 percent between 1997 and 2001, while the number of case officers - those who recruit foreign spies - rose by the same percentage. The official laid part of the agency's difficulty at the feet of Congress and the White House: "We certainly ask the administration and Congress to reverse the trend of increasing intelligence funding after terrorist attacks and then dropping back to former inadequate levels after the smoke clears." Robert Baer, a CIA officer for 21 years who left in 1997 and wrote about his experiences in the recent book See No Evil, said the committee's criticisms jibe with his own. Too much money was spent on CIA headquarters staff, he said, and not enough on the critical and often risky intelligence work overseas. The committee report "is right on the mark," he said. NSA released a statement saying it is dedicated to meeting technological challenges and ensuring that it has the right skills mix in its work force. The statement also said that since the end of the Cold War, "NSA is one-third smaller in population and has one-third fewer resources at its disposal." John Pike, an intelligence analyst with globalsecurity.org, said that many of the criticisms were not new, and some of them amount to "Monday morning quarterbacking" by Congress. Still, Pike said he was intrigued that the committee is calling for NSA to become a hunter rather than a passive listener. He said that might mean the agency will be encouraged to start "placing more bugs" around the world through its Special Collection Service, a joint program it runs with CIA that operates out of a secret office building in Beltsville. ------------------------------------------- http://www.spectrum.ieee.org/WEBONLY/publicfeature/apr03/code.html Bond, James Bond But a big remaining challenge, according to John Pike, a defense expert and founder of GlobalSecurity.org, are fiber-optic cables that stay on land. "I think that one of the things that [Navy Seals] spend a fair amount of time doing is [going] ashore...and walking to the nearest land line," says Pike. "They were doing that in Iraq a decade ago." Pike believes that this may also be how fiber-optic communications in North Korea and other countries are monitored: "It's cat and mouse, we try to see how many taps we can put on [chief of state Kim Jong II's] fiber-optic network, and the Dear Leader runs around and tries to catch them." Another, more aggressive approach to the land-line problem is to force an opponent onto the airwaves. "One of the things the United States has been doing since the middle of 2002 is systematically taking apart Iraq's land-line communications with air strikes, to force them to communicate via channels that are more readily compromised," says Pike. Indeed, this may be the reason why U.S. Secretary of State Colin Powell was able to present incriminating Iraqi telephone conversations to the United Nations last February. When a more subtle approach than aerial bombardment is called for, agencies like the U.S. National Security Agency (NSA) and the Central Intelligence Agency (CIA) can call upon organizations such as the Special Collection Service (SCS), a joint NSA-CIA covert group headquartered in Beltsville, Md. "What this group does is the more surreptitious black-bag operations," explains Wayne Madsen, who previously worked at the NSA and is now a senior fellow at the Electronic Privacy Information Center (Washington, D.C.). Black-bag operations can include breaking into embassies or facilities of communications providers and stealing information or installing bugs. -------------------------------------------------------------------------------- "It's been extremely difficult to break Russian ciphers" -------------------------------------------------------------------------------- By bugging a computer or communications system, information can be captured before it's sent through a fiber-optic cable, author Bamford observes. A tiny microphone dropped into a keyboard can pick up the sound made by the keys as they are struck and transmit the sounds to a nearby receiver. Different keys, according to Bamford, "sound different≠each has a specific signature." Those signatures can be used to reconstruct what was typed. The SCS also allows the Sigint community "to be proactive, to go after information rather than sit and wait," explains Bamford. Another important SCS mission is to recruit people who work for targeted governments, like cryptographic clerks or systems administrators, to ensure access to sensitive information, such as cipher keys. When successful, such activities also allow the NSA to avoid another steep hurdle: encryption. --------------------------------------------------------------------------------------------------------------- http://www.long-intl.com/mbw.htm CIA OPERATIONS FACILITY - Provided master planning, scheduling, budgeting, and monthly monitoring services on this $17 million new construction project at Beltsville, Maryland. The project was a classified fast-track office/research facility. ----------------------------------------------------------------------------------------------------------------- ww.villagevoice.com/features/9908/vest_madsen.shtml February 24 - March 2, 1999 A Most Unusual Collection Agency How the U.S. undid UNSCOM through its empire of electronic ears By Jason Vest and Wayne Madsen When Saddam Hussein raised the possibility of attacking U.S. planes in Turkey last week, his threats illustrated what many in diplomatic circles regard as an international disgrace≠ the emasculation of the UN by the U.S. When UNSCOM, the UN's arms-inspection group for Iraq, was created in 1991, it drew on personnel who, despite their respective nationalities, would serve the UN. Whatever success UNSCOM achieved, however, was in spite of its multinational makeup. While a devoted group of UN staffers managed to set up an independent unit aimed at finding Saddam's weapons and ways of concealing them, other countries seeking to do business with sanctions-impaired Iraq≠ notably France and Russia≠ used inspectors as spies for their own ends. But what ultimately killed UNSCOM were revelations that the U.S. government had manipulated it by assuming control of its intelligence apparatus last spring (or perhaps even earlier by using the group to slip spies into Iraq) not so much to aid UNSCOM's mission, but to get information for use in future aerial bombardments. When stories to this effect broke last month, however, there was almost no consistency in descriptions of the agencies involved or techniques used. The New York Times, for example, said only one CIA spy had been sent into Baghdad last March to set up an automated eavesdropping device. Time had multiple Defense Intelligence Agency (DIA) operatives planting bugs around Baghdad throughout 1998. The Wall Street Journal referred to the use of one "device" from the National Security Agency (NSA) last year and "a series of espionage operations used by the U.S. [since] 1996 to monitor the communications" of Saddam and his elite. When probing the world of espionage, rarely does a clear picture emerge. But according to a handful of published sources, as well as assessments by independent experts and interviews with current and former intelligence officers, the U.S. government's prime mover in Iraqi electronic surveillance was most likely a super-secret organization run jointly by the the CIA and the NSA≠ the spy agency charged with gathering signals intelligence (known as SIGINT)≠ called the Special Collection Service. Further, there is evidence to suggest that the Baghdad operation was an example of the deployment of a highly classified, multinational SIGINT agreement≠ one that may have used Australians to help the U.S. listen in≠ months after the CIA failed to realize the U.S. objective of overthrowing Saddam Hussein through covert action. According to former UNSCOM chief inspector Scott Ritter, when the U.S. took over the group's intelligence last year, a caveat was added regarding staffing: only international personnel with U.S. clearances could participate. "This requirement," says Ritter, "really shows the kind of perversion of mission that went on. The U.S. was in control, but the way it operated from day one was, U.S. runs it, but it had to be a foreigner [with a clearance] operating the equipment." authors Andrew and Patrick Cockburn demonstrate in their just published book Out of the Ashes: The Resurrection of Saddam Hussein, were two of the most colossally bungled CIA covert operations since the Bay of Pigs. While details of one of the failed operations were widely reported, the Cockburns fleshed out details of an arguably worse coup attempt gone awry in June 1996. Iraqi counterintelligence had not only managed to finger most of the suspects in advance, but months before had even captured an encrypted mobile satellite communications device that the CIA gave the plotters. Adding insult to injury, the Cockburns report, Iraqi counterintelligence used the CIA's own device to notify them of their failure: "We have arrested all your people," the CIA team in Amman, Jordan, reportedly was told via their uplink. "You might as well pack up and go home." Some UNSCOM staffers≠ first under Russian Nikita Smidovich, later under American Scott Ritter≠ managed to create what amounted to a formidable micro- espionage unit devoted to fulfilling UNSCOM's mission. Between information passed on from various countries and use of unspecified but probably limited surveillance equipment, the inspectors were gathering a great deal. But in March 1998, according to Ritter, the U.S. told UNSCOM chair Richard Butler of Australia that it wanted to "coordinate" UNSCOM's intelligence gathering. Ritter insists that no U.S. spies under UNSCOM cover could have been operating in Baghdad without his knowledge prior to his resignation in August 1998. However, as veteran spies point out, if they were, Ritter probably wouldn't have known. A number of sources interviewed by the Voice believe it possible that Special Collection Service personnel may have been operating undercover in Baghdad. According to a former high-ranking intelligence official, SCS was formed in the late 1970s after competition between the NSA's embassy-based eavesdroppers and the CIA's globe-trotting bugging specialists from its Division D had become counterproductive. While sources differ on how SCS works≠ some claim its agents never leave their secret embassy warrens where they perform close- quarters electronic eavesdropping, while others say agents operate embassy- based equipment in addition to performing riskier "black-bag" jobs, or break- ins, for purposes of bugging≠ "there's a lot of pride taken in what SCS has accomplished," the former official says. Intriguingly, the only on-the-record account of the Special Collection Service has been provided not by an American but by a Canadian. Mike Frost, formerly of the Communications Security Establishment≠ Canada's NSA equivalent≠ served as deputy director of CSE's SCS counterpart and was trained by the SCS. In a 1994 memoir, Frost describes the complexities of mounting "special collection" operations≠ finding ways to transport sophisticated eavesdropping equipment in diplomatic pouches without arousing suspicion, surreptitiously assembling a device without arousing suspicion in his embassy, technically troubleshooting under less than ideal conditions≠ and also devotes considerable space to describing visits to SCS's old College Park headquarters. "It is not the usual sanitorium-clean atmosphere you would expect to find in a top-secret installation," writes Frost. "Wires everywhere, jerry-rigged gizmos everywhere, computers all over the place, some people buzzing around in three- piece suits, and others in jeans and t-shirts. [It was] the ultimate testing and engineering centre for any espionage equipment." Perhaps one of its most extraordinary areas was its "live room," a 30-foot-square area where NSA and CIA devices were put through dry runs, and where engineers simulated the electronic environment of cities where eavesdroppers are deployed. Several years ago, according to sources, SCS relocated to a new, 300-acre, three- building complex disguised as a corporate campus and shielded by a dense forest outside Beltsville, Maryland. Curious visitors to the site will find themselves stopped at a gate by a Department of Defense police officer who, if one lingers, will threaten arrest. There are good reasons, explains an old NSA hand, for havingelectronic ears on terra firma in addition to satellites. "If you're listening to something from thousands of miles up, the footprint to sort through is so huge, and finding what you are looking for is not a simple chore. If you know more or less specifically what you want, it's easier to get it in close proximity. And if it happens to be a low-powered signal, it may not travel far enough." According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm. It's not an unreasonable assumption; though Ericsson brushes off questions about it, in 1996 a Middle Eastern businessman filed suit against the company, claiming, among other things, that it had stiffed him on his commission for brokering a deal between the Iraqis and Ericsson for sensitive defense communications equipment, which, reportedly, included encrypted cell phones. Speaking on condition of anonymity, a veteran intelligence official confirmed that the NSA has "arrangements" with other communications firms that allow NSA to access supposedly secure communications, but cooperation from Ericsson would be "a breakthrough≠ despite our best efforts, they always kept their distance. But it's not beyond the realm of possibility." (This is not without precedent; though hardly covered in the American press, it has been reported that Switzerland's Crypto AG≠ long the supplier of cipher equipment to many of the world's neutral and "rogue" states≠ enjoyed such an "arrangement" with the NSA for decades. Crypto AG denies this.) There is, however, another possible scenario regarding participation by Ericsson in an intelligence venture. According to FAS analyst Pike, it's much more likely that anyone doing intelligence work in Iraq would want a schematic of Baghdad's telephone system≠ which Ericsson installed in the late '60s and has subsequently updated. "I would find it to be far more plausible that the U.S. intelligence community would be interested in acquiring, and Ericsson would be interested in supplying, the wiring diagram for Baghdad's telephone exchange than encryption algorithms for cell phones," he says. Also, he explains, finding ways to tap into a whole phone system or pull short-range signals out of the air without being obvious is clearly SCS's portfolio. "This type of risky close surveillance is what SCS was formed to do," he says. "When you think of NSA, you think satellites. When you think CIA, you think James Bond and microfilm. But you don't really think of an agency whose sole purpose is to get up real close and use the best technology there is to listen and transmit. That's SCS." Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, "It would be classified and we would not be able to talk about it." It's also possible, according to Mike Frost, that cleverly disguised bugs might have been planted in Baghdad≠ SCS, he recalls, managed to listen in on secured facilities by bugging pigeons. But, says a retired CIA veteran, with UNSCOM effectively dead, bugging is now out of the question. "I hope the take from this op," he says, "was worth losing the only access the outside world's disarmament experts had to Iraq." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 10592 From: Thomas Kellar Date: Thu Jan 13, 2005 8:34am Subject: Re: GPS tracking system signal inhibitors I would assume buying, selling and owning would probably not be a problem. Using it would be the problem. phrack.org has a design of a gps jammer on their web site. I am not sure if it works as advertised. On Wed, 12 Jan 2005, Guy Urbina wrote: > Would these proposed devices be illegal to own or sell? Right now they are > bench prototypes. -- w8twk Freelance Systems Programming http://www.fsp.com 10593 From: Michael Hammer Date: Thu Jan 13, 2005 9:21am Subject: Re: Ruling gives cops leeway with GPS The answer Greg, is that the issue is about where we as a society draw the lines (and who should draw them) rather than whether something is currently legal (or illegal) because of an administrative decision, a lower court decision, etc. I'm a lifelong Goldwater Republican (no Neocon here) and proud of it. Barry would be rolling over in his grave! As someone who handles computer security issues, I work with LEOs at various levels across a wide range of issues. Sometimes it's something I bring them and sometimes it's because they approach us (formally with a subpeona or search warrant and sometimes informally). Some of the hoops we all jump through for the legalities are just plain silly. Still, when all is said and done, as a citizen I would prefer to see some bad guys go free than trample on the privacy and rights of the average person by eliminating those hoops. I've lived and worked in countries where survelliance by the government is an everyday thing and it's not something I would like to see here. I give up a certain amount of personal privacy because of the nature of the work I do. That is a choice I make at an individual level. Your focus is on the technical nuances rather than the societal and ethical issues. Your job is to catch bad guys. Your preference is for things to be structured to make it easier for you to do your job. When you attach a GPS tracking device to something, it doesn't know the difference between publicly accessible places and private property. It's an idiot savant tool. Where you stand depends on where you sit. Some books which might help better frame the issues for you include: "World without Secrets" By Richard Hunter (Gartner Analyst, don't hold it against him ) A quick synopsis can be found at http://www.csoonline.com/analyst/report230.html You could also try reading some of Bruce Schneiers writings (If you ever have the chance to see Bruce present, he is an awesome mind) Some of his essays/op ed pieces can be found at: http://www.schneier.com/essays.html To put his writings in perspective, Bruce has a long track record in the security field, specifically in crypto. Mike On Wed, 12 Jan 2005 19:37:45 -0800, Greg Horton wrote: > > > Michael Hammer wrote: > > > By that logic, I should just be able to break into (and wipe out) an > > internet host that is being used to do bad things. We will get it shut > > down/confiscated anyways by going through the legal steps so why not > > just cut to the chase. As tempting as that may be, I understand the > > reasons we have limitations. > > > > Just because something can be done doesn't mean it should be done. > > Requiring a court order is a check/balance on the activities involved. > > > > Mike > > > > Holy Smokes Mike, what a leap of logic you make. How on earth do you > > make a connection between following someone on a public thoroughfare > > and comitting a burglary and then committing an additional crime of > > wiping the computer clean. Talk about a non sequitur. There is no > > requirement for a court order and case law has reaffirmed this > > technique by the police. If you are that concerned about this type of > > operation, maybe you should spearhead a movement to pass appropriate > > legislation. > > Greg > 10594 From: Hawkspirit Date: Thu Jan 13, 2005 11:43am Subject: Ruling gives cops leeway with GPS I think the ruling stinks but it is good for business as long as you are competent at sniffing out GPS units. And let me say, it is sometimes it is no easy task. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Message: 1 Date: Wed, 12 Jan 2005 04:16:19 -0800 (PST) From: G P Subject: Re: Ruling gives cops leeway with GPS Because anybody and everybody can now fix up your car with a GPS unit, without fear of civil or criminal prosecution. This court precedent puts very dangerous technology into the hands of the proletariat, without any form of checks and balances. Wait until somebody wires up your wife's car for sound, and you'll have a slightly different opinion about tracking technology. --- Greg Horton wrote: > > -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 [Non-text portions of this message have been removed] 10595 From: Tech Sec Lab Date: Thu Jan 13, 2005 5:44pm Subject: Pentagon [OT] Well, I hadn't seen this until today. I can say this, it wasn't a 757. That's for sure. http://www.freedomunderground.org/memoryhole/pentagon.php Tragic that the truth will never be known. 10596 From: littledog Date: Thu Jan 13, 2005 3:10pm Subject: Re: Ruling gives cops leeway with GPS anybody, what was that website again that sells a small GPS blocker for your car? I accadently deleted that info. Thanx> -----Original Message----- > From: Hawkspirit [mailto:hawkspirit@e...] > Sent: Thursday, January 13, 2005, 9:43 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Ruling gives cops leeway with GPS > > > > > I think the ruling stinks but it is good for business as long as you are > competent at sniffing out GPS units. And let me say, it is sometimes it is > no easy task. > > > > Roger Tolces > > HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > > > > Message: 1 > > Date: Wed, 12 Jan 2005 04:16:19 -0800 (PST) > > From: G P > > Subject: Re: Ruling gives cops leeway with GPS > > > > Because anybody and everybody can now fix up your car > > with a GPS unit, without fear of civil or criminal > > prosecution. This court precedent puts very dangerous > > technology into the hands of the proletariat, without > > any form of checks and balances. > > > > Wait until somebody wires up your wife's car for > > sound, and you'll have a slightly different opinion > > about tracking technology. > > > > --- Greg Horton wrote: > > > > > > > > > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.6.10 - Release Date: 1/10/2005 > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10597 From: Michael Puchol Date: Thu Jan 13, 2005 6:42pm Subject: Re: Pentagon [OT] I have to say I got sick and tired of footage of a 747 viewed from the ground being shown on the news as "the aircraft heading towards the Pentagon, seconds before impact". The big question after this presentation then is: where did Flight 77 go? The impact explosion footage appears to be of one petrolleum-fuelled, and I don't suppose the Pentagon stores large amounts of gas for internal use on their premises... Aircraft are made mainly of aluminium, which means that when one is completely driven into something, and it combusts, not much is left of it. The pictures of wreckage show are of crashes that had fire crews put out the flames and what is left, mainly struts and thicker structure. The engines tend to survive quite well too, as they are made from titanium, so they should have been in there somewhere. An engine travelling at a few hundred miles per hour can drive quite a distance into a building. If you notice in the Trade Center footage of the second plane hit, one of the engines completely crosses the building and shoots out the opposite end. The combustion is very similar to the one observed in the Pentagon. I'm not saying it's impossible that the whole truth hasn't come out, but I seriously doubt they drove a smaller plane (too much damage for that) or a land vehicle (ground marks?) into it. Regards, Mike Tech Sec Lab wrote: > Well, I hadn't seen this until today. > > I can say this, it wasn't a 757. That's for sure. > > http://www.freedomunderground.org/memoryhole/pentagon.php > > Tragic that the truth will never be known. > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10598 From: Agent Geiger Date: Thu Jan 13, 2005 6:46pm Subject: Re: Pentagon [OT] How about demo charges in the building already? --- Michael Puchol wrote: > I have to say I got sick and tired of footage of a > 747 viewed from the > ground being shown on the news as "the aircraft > heading towards the > Pentagon, seconds before impact". The big question > after this > presentation then is: where did Flight 77 go? The > impact explosion > footage appears to be of one petrolleum-fuelled, and > I don't suppose the > Pentagon stores large amounts of gas for internal > use on their premises... > > Aircraft are made mainly of aluminium, which means > that when one is > completely driven into something, and it combusts, > not much is left of > it. The pictures of wreckage show are of crashes > that had fire crews put > out the flames and what is left, mainly struts and > thicker structure. > The engines tend to survive quite well too, as they > are made from > titanium, so they should have been in there > somewhere. An engine > travelling at a few hundred miles per hour can drive > quite a distance > into a building. If you notice in the Trade Center > footage of the second > plane hit, one of the engines completely crosses the > building and shoots > out the opposite end. The combustion is very similar > to the one observed > in the Pentagon. > > I'm not saying it's impossible that the whole truth > hasn't come out, but > I seriously doubt they drove a smaller plane (too > much damage for that) > or a land vehicle (ground marks?) into it. > > Regards, > > Mike > > > Tech Sec Lab wrote: > > Well, I hadn't seen this until today. > > > > I can say this, it wasn't a 757. That's for sure. > > > > > http://www.freedomunderground.org/memoryhole/pentagon.php > > > > Tragic that the truth will never be known. > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10599 From: Greg Horton Date: Thu Jan 13, 2005 8:07pm Subject: Re: Ruling gives cops leeway with GPS Michael Hammer wrote: > > The answer Greg, is that the issue is about where we as a society draw > the lines (and who should draw them) rather than whether something is > currently legal (or illegal) because of an administrative decision, a > lower court decision, etc. > > I'm a lifelong Goldwater Republican (no Neocon here) and proud of it. > Barry would be rolling over in his grave! > > As someone who handles computer security issues, I work with LEOs at > various levels across a wide range of issues. Sometimes it's something > I bring them and sometimes it's because they approach us (formally > with a subpeona or search warrant and sometimes informally). Some of > the hoops we all jump through for the legalities are just plain silly. > Still, when all is said and done, as a citizen I would prefer to see > some bad guys go free than trample on the privacy and rights of the > average person by eliminating those hoops. I've lived and worked in > countries where survelliance by the government is an everyday thing > and it's not something I would like to see here. I give up a certain > amount of personal privacy because of the nature of the work I do. > That is a choice I make at an individual level. > > Your focus is on the technical nuances rather than the societal and > ethical issues. Your job is to catch bad guys. Your preference is for > things to be structured to make it easier for you to do your job. When > you attach a GPS tracking device to something, it doesn't know the > difference between publicly accessible places and private property. > It's an idiot savant tool. > > Where you stand depends on where you sit. Some books which might help > better frame the issues for you include: > > "World without Secrets" By Richard Hunter (Gartner Analyst, don't hold > it against him ) A quick synopsis can be found at > http://www.csoonline.com/analyst/report230.html > > You could also try reading some of Bruce Schneiers writings (If you > ever have the chance to see Bruce present, he is an awesome mind) Some > of his essays/op ed pieces can be found at: > http://www.schneier.com/essays.html To put his writings in > perspective, Bruce has a long track record in the security field, > specifically in crypto. > > Mike > > Good points Mike, but once again, it is a position that is framed by where you sit. I have been working in law enforcement for 30+ years and I think that the issues for me are framed clearly. You imply that we are all running out and randomly putting trackers on hundreds of people, mostly innocent. Once again, I would submit that even though the tracker is inexpensive to operate, It still does require money to purchase and monitor. But I also said that the tracker is only a very small part of the investigation, and can identify only patterns that the individuals may establish. If I see that Jack is going to the corner of Elm and Birch three times a day, I still have to put that location under surveillance and actually see if there is any crime involved. If a crime was observed, I would still need search warrants to search the car or any house I could establish was involved in the criminal act. Then arrest warrants would be in order, or maybe an arrest for a crime in progress. But to say that cops are wantonly placing placing devices on any Tom, Dick, or Harry is patently false. I read the article in the first website, and although it addresses surveillance issues, it doesn't really talk about putting trackers on cars. I also read "Curb electronic surveillance abuses." by Bruce Schneier and it was interesting and I can agree with his stressing that court issued warrants are a vital part of keeping our nation free. But I just don't think that it applies to the trackers put on vehicles in public places. Would you object to me putting a small IR beacon on the back of a car to follow at night with NVG's? That has been done before. Even Bruce Schneier says that It has always been possible for the police to tail a suspect, and wireless tracking is decades old. The only difference is that it's now much easier and cheaper to use the technology. And goes on to say that: Surveillance will continue to become cheaper and easier -- and less intrusive. (Quotes retrieved from: http://www.schneier.com/essay-043.html ) I think that the "less obtrusive" is the key here. Even though cops use trackers, the case doesn't solve itself and it still requires the use of good old fashioned police work to put a case together. Any way, that is my opinion. I want to thank you Mike for this excellent discussion and for you not engaging in the ad hominem attacks like others on this list. It is a pleasure to discuss very important issues with you. Greg [Non-text portions of this message have been removed] 10600 From: Date: Fri Jan 14, 2005 5:23am Subject: RE: GPS tracking system signal inhibitors Gentlemen, Obviously using such a device would be highly illegal. With a CW signal and 50 mW of RF power the jammer could be easily tracked within 1km using a conventional DF or even "fox hunt" handheld DF (By the way Cubic makes such DF with a similar application in mind). But more elegant jammers do exist. They use low power composite pulse signals. These jammers are practically not detectable from a distance more than 10 meters even with a dedicated equipment. For further technical details ask CIA or KGB. They have developed these devices for their respective diplomats. By the way even with CW signal you do not need 50 mW RF power to jam GPS receiver. For a SiRF and similar direct conversion receiver 50 microwatts would be enough. Even old Rockwell Navcore can be disabled with 5 mW. Well, this is not a "do it yourself" site as our moderator would say so I am closing down. Regards, A.W. Guy Urbina wrote: > > >Hi all, > >With all the recent chatter about GPS tracking, what are the legal >ramifications of owning or selling a small GPS signal inhibitor? > >With the proliferation of GPS trackers seemingly ubiquitous, it seems like >a good idea to prevent unauthorized people from tracking your movements in >a vehicle. > >I've fabricated a few small devices that transmit a CW carrier under 50mw >in the L1 frequency range. (1575.42Mhz) It effectively overdrives the front >end of COTS GPS receivers.(Garmin, SIRF, Motorola etc.) (Most trackers use >L1 receivers in their systems) > >Within a 10' radius, it effectively prevents a GPS receiver from locking on >to get a position fix. Other than getting FCC type approval certification, > >Would these proposed devices be illegal to own or sell? Right now they are >bench prototypes. > >I appreciate any constructive feedback. > >\R > >-Guy > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 10601 From: Javier Villanueva Date: Fri Jan 14, 2005 8:05am Subject: Icom IC-R3 and R20 Hi List, I¥ve been trying unsuccesfully to buy this equipment Online. All of the shops i¥ve found replied they are "out of stock". If any of you sell these, offer "Special modified versions", or know where to find them, i¥ll be grateful. Payment by credit card and express delivery to Mexico a big plus. Most probably this will be just the first buy, with more to come. Thank you very much guys. ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje ElectrÛnico y Seguridad Inform·tica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10602 From: Javier Villanueva Date: Fri Jan 14, 2005 8:08am Subject: Icom ICR3 and ICR20, detail Sorry, on the previous mail i forgot to tell you i was referring to the "unblocked" or "Non-USA" version, without the cellular gap. Thanks again. ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje ElectrÛnico y Seguridad Inform·tica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 10603 From: delta Date: Fri Jan 14, 2005 8:57am Subject: question about border hello everybody do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special authorisation to go outside our country ? may be the rules are different between some country ? many thanks david from paris 10604 From: contranl Date: Fri Jan 14, 2005 4:30pm Subject: Infrared Indicators ( credit card size) . Ran in to this manufacturer of credit card sized infrared indicators...maybe they are usefull for anything ? there's a short demo-video too. http://www.bromba.com/indicare.htm I suppose they need a fair bit of illumination Possibly usefull for : a) Detecting laserbeams ( i would say yes ...since they are concentrated beams with sufficient power left over at your end, best would be a card with as big as possible active area,) b) Detecting infrared illuminators for cameras ( i would say yes ...when you are close enough) c) Detecting infrared mics/bugs using infrared light to transport the audio/video ( you need to be very close to the bug to get enough level i guess) Kodak also makes similar cards and bigger sheets Infrared/Nightvision/Thermal-imagers would do too...probably better. Greets Tetrascanner 10605 From: contranl Date: Fri Jan 14, 2005 4:59pm Subject: Re: question about border . It depends on the local laws of the country you want to enter and the one you want to come back to. You might just ask/phone the customs office at the border. A rule of thumb could be that you consider your equipment as a radio-scanner (if it's a wideband receiver for example) In Belgium for example it is forbidden to have/possess/use a scanner therefore you could conclude that any equipment that could do the same could be forbidden too. In some countries they used to lock you up for bringing a satellite-phone...you had to ask special permission to bring that. To go one step further (overdoing it) you can't bring your NLJD to The Netherlands if it works (transmits)on a non-permitted frequency wich many do To go even one more step further...your equipment might be on the list of "strategic goods" usually that list refers to high level advanced stuff...for example a laser gyroscope or a wideband 100 watt jammer...not the regular TSCM equipment :) Many times they just care about the taxes being paid...so a piece of paper issued by your country's custom-tax-office could be sufficient just make shure you go in and out with the same amount of equipment. Anyway you can't ask this question in general because there is no general answer to it,it all depends on the local authorities and sometimes even on who's on service that day. The above is a little overstated and my advice again would be just ask them ! Tetrascanner 10606 From: Robin Hunter Date: Fri Jan 14, 2005 11:21am Subject: Re: question about border Hi David, depends where you are going, in Russia and a number of former Soviet Bloc countries Customs will impound your equipment and you will probably never see it again, similar problem in a number of African and Middle East countries.. Most western european countires - no problem. Regards from Scotland, ROBIN HUNTER AEGIS INTELLIGENCE LIMITED "KNOWLEDGE IS POWER" Member of EPIC (www.epic-uk.com) tel. 0131 312 8480 fax. 087 0132 8085 mobile. 07790900005 email. enquiries@a... www.aegisintelligence.co.uk Standby Member of Missingkin.com www.missingkin.com This message and any attachments are confidential and strictly for the use of the intended recipient. If you are not the intended recipient or the person responsible for delivery to the intended recipient, be aware that you have received this message in error and that any use is strictly prohibited. ----- Original Message ----- From: "delta" To: Sent: Friday, January 14, 2005 2:57 PM Subject: [TSCM-L] question about border > > > hello everybody > do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special > authorisation to go outside our country ? > may be the rules are different between some country ? > many thanks > david from paris > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10607 From: Michael Hammer Date: Fri Jan 14, 2005 1:31pm Subject: Re: Ruling gives cops leeway with GPS On Thu, 13 Jan 2005 18:07:29 -0800, Greg Horton wrote: > > > > > Good points Mike, but once again, it is a position that is framed by > where you sit. I have been working in law enforcement for 30+ years and > I think that the issues for me are framed clearly. And that's my point exactly. The issues are framed for you because it impacts you both as a citizen but more importantly as a law enforcement professional. Someone from the Center for Democracy and Technology (www.cdt.org) would almost certainly be against the use of GPS trackers under almost any circumstance. >You imply that we > are all running out and randomly putting trackers on hundreds of people, > mostly innocent. Absolutely not. What I am explicitly stating is that the potential for abuse is there and checks and balances are appropriate as new technology is introduced. One need only read the Federalist papers to see that our founding fathers basically distrusted government power and structured things to limit government power. Who would have thought an Attorney General (John Mitchell) of the United States would go to prison for acts committed while in office? >Once again, I would submit that even though the > tracker is inexpensive to operate, It still does require money to > purchase and monitor. But I also said that the tracker is only a very > small part of the investigation, and can identify only patterns that the > individuals may establish. If I see that Jack is going to the corner of > Elm and Birch three times a day, I still have to put that location under > surveillance and actually see if there is any crime involved. If a > crime was observed, I would still need search warrants to search the car > or any house I could establish was involved in the criminal act. Then > arrest warrants would be in order, or maybe an arrest for a crime in > progress. But to say that cops are wantonly placing placing devices on > any Tom, Dick, or Harry is patently false. > Again, I'm not saying that they are.... I'm saying that there are enough documented cases of individuals trusted with law enforcement abusing capabilities they are entrusted with that this is an issue (both generally and in the specific case of GPS) that deserves a wider discussion and consensus as to where the boundaries should be. We will either get a clear (national) line if this and other cases make it up the food chain to the Supremes or if there is a legislative resolution (going forward). I would put the question to you.... if placing tracking devices on ALL vehicles makes your job easier, why would anyone object? After all, people that have nothing to hide shouldn't care. Clearly, people that have OnStar in their vehicles are willing to allow themselves to be tracked. > I read the article in the first website, and although it addresses > surveillance issues, it doesn't really talk about putting trackers on > cars. I also read "Curb electronic surveillance abuses." by Bruce > Schneier and it was interesting and I can agree with his stressing that > court issued warrants are a vital part of keeping our nation free. But > I just don't think that it applies to the trackers put on vehicles in > public places. Would you object to me putting a small IR beacon on the > back of a car to follow at night with NVG's? That has been done > before. Even Bruce Schneier says that > The article on the first site ( re World without Secrets) doesn't cover as much territory as the book. I highly recommend reading the book even though I disagree with many of his conclusions. It frames the discussion and issues fairly well. As far as a small ir beacon, I would have to think about that and possibly do some research to formulate a position on it. My first reaction would tend towards thinking this should require a court order on the basis that you are doing something to the individuals property in order to track them. This is one of those grey areas as far as I'm concerned. Take a step back and let's frame the issues in the broadest sense. What we (as a society) are really struggling with is how to deal with new capabilities arising from new technologies. What is appropriate and what is inappropriate? Why should we choose one dividing line vs another? On one level, I obviously don't care about personal privacy vis-a-vis the government because more than one government agency has detailed information about me including biometrics/dna....all given up as part of the employment process. As a LEO you would probably have a difficult time getting that data if you could find it at all. On another level I care very much about giving up personal data including surveillence. Just because someone can use a satellite to watch me sit by my lake naked doesn't mean it's a good thing (ugly thing that I am I'd probably crack the lense anyways). > It has always been possible for the police to tail a suspect, and > wireless tracking is decades old. The only difference is that it's now > much easier and cheaper to use the technology. > > And goes on to say that: > > Surveillance will continue to become cheaper and easier -- and less > intrusive. (Quotes retrieved from: > http://www.schneier.com/essay-043.html ) > > I think that the "less obtrusive" is the key here. Even though cops use > trackers, the case doesn't solve itself and it still requires the use of > good old fashioned police work to put a case together. Any way, that is > my opinion. I want to thank you Mike for this excellent discussion and > for you not engaging in the ad hominem attacks like others on this > list. The key quote from Bruces article is really his parting thought. "Much of the rhetoric on the "security" side of the debate cloaks one of its real aims: increasing law enforcement powers by decreasing its oversight and accountability. It's a very dangerous road to take, and one that will make us all less secure. The more surveillance technologies that require a warrant before use, the safer we all are." Here's another related issue for you Greg. Check out this link and tell me what you think (I have a feeling I know where you will come down on this).... http://www.capecodonline.com/cctimes/dnasweep6.htm This (DNA Sweep) deeply troubles me on a couple of levels, particularly the following quote: "Police say it's a voluntary thing, but they will take note of the dissenters. " So, once someone has given up their DNA sample for this specific case (let's assume voluntarily), what will be done with it once they are found not to be the person involved? Will the information be discarded? Absolutely not, that would be destruction of evidence and the defense attorney (assuming someone is brought to trial) would have a field day. So this will in essence become part of a government controlled database and subject to other uses. Do the people involved really know (perhaps they don't understand or care) the extent of the personal information they are giving up? >It is a pleasure to discuss very important issues with you. Likewise. Time to get some work done. Mike 10608 From: Michael Angelo Date: Fri Jan 14, 2005 2:27pm Subject: Re: question about border cowboy delta wrote: hello everybody do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special authorisation to go outside our country ? may be the rules are different between some country ? many thanks david from paris ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? The all-new My Yahoo! ñ Get yours free! [Non-text portions of this message have been removed] 10609 From: Dragos Ruiu Date: Fri Jan 14, 2005 7:02pm Subject: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Anyone used one of these and care to share any experience: http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm Looks like an interesting gadget, tough I haven't found out yet if they want a ridiculous amount of money for it. It would also be interesting to find out if they could produce a variant with a wider sweep range/more agile front end.... (I'm on a quest to find WLAN node directional locators... specifically to find out which out of a few hundred laptops in a big room has a particular mac address and is messing around to other's detriment...) thanks, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, CanadaMay 4-6 2005 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 10610 From: Date: Fri Jan 14, 2005 4:53pm Subject: Re: question about border It's legal, but you might have trouble getting your equipment back in the US. Customs might think you just purchased it elsewhere. You need a customs form which shows you purchased it in the US , or had it already, and took it out of the country with you. You list mfgr, model number and serial number, etc. LARSEN and ASSOCIATES PRIVATE INVESTIGATIONS 18847 N. Alameda Drive Surprise, Arizona, 85387 ph/fax: 623-594-1783 [Non-text portions of this message have been removed] 10611 From: Hawkspirit Date: Fri Jan 14, 2005 10:36pm Subject: GPS Jammer HYPERLINK "http://www.phrack.org/phrack/60/p60-0x0d.txt"http://www.phrack.org/phrack/6 0/p60-0x0d.txt Does anyone know how to decode the schematic? Roger -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.6.12 - Release Date: 1/14/2005 [Non-text portions of this message have been removed] 10612 From: Charles Patterson Date: Fri Jan 14, 2005 10:47pm Subject: Re: Infrared Indicators ( credit card size) Radio Shack here in the US (do you have Radio Shack in the UK?) used to sell them (maybe they still do). If I recall, you had to "charge it up" by exposing it to a florescent light, then it would glow when ir shined on it. You did have to be pretty close to the source. Main purpose was to test your tv remote. Charles ----- Original Message ----- From: "contranl" To: Sent: Friday, January 14, 2005 5:30 PM Subject: [TSCM-L] Infrared Indicators ( credit card size) > > . > > Ran in to this manufacturer of credit card sized infrared > indicators...maybe they are usefull for anything ? > there's a short demo-video too. > > http://www.bromba.com/indicare.htm > > I suppose they need a fair bit of illumination > > Possibly usefull for : > > > a) > Detecting laserbeams ( i would say yes ...since they are > concentrated beams with sufficient power left over at your end, > best would be a card with as big as possible active area,) > > b) > Detecting infrared illuminators for cameras ( i would say > yes ...when you are close enough) > > c) > Detecting infrared mics/bugs using infrared light to transport the > audio/video ( you need to be very close to the bug to get enough > level i guess) > > > Kodak also makes similar cards and bigger sheets > > Infrared/Nightvision/Thermal-imagers would do too...probably better. > > > Greets > > Tetrascanner > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > > -------------------------------------------------------------------------------- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 10613 From: Andy Moore Date: Fri Jan 14, 2005 0:00pm Subject: Re: question about border David, at a guess, I'd imagine that there would be legal issues in crossing international borders with certain TSCM equipment. Many countries have regulations about possessing equipment which can receive frequencies other than broadcast and most will have rules relating to radio transmission equipment such as NLJDs. Standard ICT test equipment, such as multimeters and butt sets, probably wouldn't attract too much attention but spectrum analysers which reach into 10's of GHz might be subject to arms export regulations (!). All in all, you'd need to check with the countries into which you are importing the equipment - professional import/export handlers may be able to assist. In the face of these risks, you're unlikely to have any problems whatsoever travelling by road within the EU although airport x-rays may result in a detailed inspection by customs! Andy M ----- Original Message ----- From: "delta" To: Sent: Friday, January 14, 2005 2:57 PM Subject: [TSCM-L] question about border > > > hello everybody > do you know if it is legal to pass the border with some tscm equipment ( cpm700 oscor tdr etc ... ) or if we need a special > authorisation to go outside our country ? > may be the rules are different between some country ? > many thanks > david from paris > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10614 From: Andy Moore Date: Sat Jan 15, 2005 3:21am Subject: Fw: question about border > David, > at a guess, I'd imagine that there would be legal issues in crossing > international borders with certain TSCM equipment. Many countries have > regulations about possessing equipment which can receive frequencies other > than broadcast and most will have rules relating to radio transmission > equipment such as NLJDs. Standard ICT test equipment, such as multimeters > and butt sets, probably wouldn't attract too much attention but spectrum > analysers which reach into 10's of GHz might be subject to arms export > regulations (!). All in all, you'd need to check with the countries into > which you are importing the equipment - professional import/export handlers > may be able to assist. In the face of these risks, you're unlikely to have > any problems whatsoever travelling by road within the EU although airport > x-rays may result in a detailed inspection by customs! > > Andy M > > ----- Original Message ----- > From: "delta" > To: > Sent: Friday, January 14, 2005 2:57 PM > Subject: [TSCM-L] question about border > > > > > > > > hello everybody > > do you know if it is legal to pass the border with some tscm equipment ( > cpm700 oscor tdr etc ... ) or if we need a special > > authorisation to go outside our country ? > > may be the rules are different between some country ? > > many thanks > > david from paris > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > 10615 From: Michael Puchol Date: Sat Jan 15, 2005 5:03am Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Hi, I've yet to either see one operating or know of someone that has one or has seen one operating. I believe this device to be more a stunt for the other products the company makes, than something tangible. The device is way too expensive (they charged twice the going price for the PDA alone, for example). If you need to do surveys like you mention, you can do with AirMagnet and a Cisco 350 card with MMCX antenna jacks - then you can connect a small 2.4GHz handheld yagi and attenuators to it, and do the hunting. AirMagnet costs some $2.5k last I looked, but it's quite an impressive little package, I have seen it operating and I have used it quite a few times myself. The BumbleBee does not demodulate data at all, which means that you cannot really tie a signal to a particular computer/MAC address without further manual inspection. With AirMagnet you can set a filter to capture only packets coming from a particular MAC address, and thus hunt for it in confidence. If you are not concerned about using commercial tools, you can flash an iPAQ with Linux and use the vast array of tools available for it. Regards, Mike Dragos Ruiu wrote: > > Anyone used one of these and care to share any experience: > > http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm > > Looks like an interesting gadget, tough I haven't found out > yet if they want a ridiculous amount of money for it. > > It would also be interesting to find out if they could produce a > variant with a wider sweep range/more agile front end.... > > (I'm on a quest to find WLAN node directional locators... > specifically to find out which out of a few hundred laptops > in a big room has a particular mac address and is messing > around to other's detriment...) > > thanks, > --dr > 10616 From: contranl Date: Sat Jan 15, 2005 5:34am Subject: Re: GPS Jammer . The complete and readable circuit and more other hot and iligal stuff used to be here: (i have seen it) http://www.dafh.org/gbppr/mil/gps/gps_jammer.png currently the're offline...maybe forever...(not necessarly when they were online it took a minute to see a page) Allthough i would'nt be surprised if they are really gone now The main page can still be found in google's cache: http://www.google.nl/search?q=cache:RiNkf9RKl- EJ:www.dafh.org/gbppr/mil/gps/+gps+jammer+png&hl=nl Maybe you can find it spending a few ours of research on the net possibly someone has copied it...try to put the properties of the links back in to google maybe it's cached somewhere Tetrascanner From: A Grudko Date: Sun Jan 13, 2002 4:11am Subject: Re: CELLULAR DETECTOR - Original Message - > MICRO-CELLULAR DETECTOR > Detection range: 5 Mhz - 2.6 Ghz Mmmm - more psudo technical "Janglish". Now I'm even more sceptical about the Star Tac scrambler. Sounds like a diode detector I had in the mid 80's, possibly crossed an RF cellphone ring detector. > ... risky 5 mhz to 2.5 ghz radio frequencies within reach ( hidden transmissions of > your conversations) created by your cellular telephone. I'd like to see a better explanation of the 'risk' before I fork out $480. > so that if the cellular phone emits a hidden hidden? > transmission of your > conversation, when it is in stand-by mode ( when it should not transmit > data) data? >, the Micro- Detector will adopt adopt? > the RF emitted by the cellular phone > This is an equipment that can detect and alert you about the most simple to > the most sofisticated tappings of cellular telephones as intruder microphones. Hey, jma, now you throw away most of those 2 tons of equipment > When the batteries of cellular telephones are removed during > meetings, this is no guarantee that the conversation that is taking place > is not being transmitted to a third party No battery? > since with today?s technology it > is very easy to place a microphone that transmitts at a distance of up to > 500 m. With the Micro- Detector you are able to confirm, after you have > removed the batteries, that no cellular phone is transmitting a > confidential conversation I think we can confirm that a cellphone with no power source is not transmitting without having to buy any toy. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4534 From: A Grudko Date: Sun Jan 13, 2002 11:56am Subject: Re: Re: Cellular Scramblers - Original Message - > Go to CDMA and you're safe from virtually anything not covered > by a Title III court order served on the service provider. More acronyms... Who or what are CDMA? Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time "Richard Milhouse Nixon was the first US president whose name contains all the letters from the word "criminal." The second? William Jefferson Clinton" 4535 From: Miguel Puchol Date: Sun Jan 13, 2002 2:45pm Subject: Re: Re: Cellular Scramblers Hi Andy, CDMA = Code Division Multiple Access. It's used in cellular systems in the U.S. Qualcomm is rumoured to have bought some of Dolphin's licenses for European TETRA, to install CDMA systems instead. They already use it in their GlobalStar satphone network - I think they designed it if my memory serves me right... Take a look at a simple comparison between TDMA (used by GSM for example) and CDMA at: http://home.san.rr.com/denbeste/cdmatdma.html All the best, Mike ----- Original Message ----- From: "A Grudko" To: Sent: Sunday, January 13, 2002 6:56 PM Subject: Re: [TSCM-L] Re: Cellular Scramblers > - Original Message - > > Go to CDMA and you're safe from virtually anything not covered > > by a Title III court order served on the service provider. > > More acronyms... Who or what are CDMA? > > Andy Grudko > D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 > International business intelligence and investigations - ICQ 146498943 > Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 > 0255 - 244 0256 (Fax) > SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom > When you need it done right - first time > "Richard Milhouse Nixon was the first US president whose name contains all > the letters from the word "criminal." The second? William Jefferson Clinton" > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4536 From: Justin T. Fanning Date: Sun Jan 13, 2002 3:44pm Subject: Re: Re: Cellular Scramblers I don't understand why the encryption isn't done in the phone's own software. Most modules offered by various companies approach from the analogue prospective, but when you consider the phone itself is a miniature computer, why aren't companies producing modified OS ROMs that encrypt after the speech encoding stage. It would take just a few extra CPU cycles to push the byte value of the encoded audio through a cypher. (Taken to the extreme, you could even have handsets exchanging keys at the beginning of each call!) Providing you didn't modify the GSM/CDMA packet structure only the packet payload, this would seem a far more secure & simplistic approach than external analogue hardware. JF 4537 From: James M. Atkinson Date: Sun Jan 13, 2002 11:19pm Subject: Re: Re: Cellular Scramblers The problem is two-fold. First of all, when you ENCRYPT a signal you are breaking it down into a digital form, then mixing in a "key" and in so doing profoundly changing both the nature and structure of the original signal. Then the encrypted data is converted back into it digital; form for transmission. The problem with encrypting the signal is that you loose bandwidth, and you can either take the performance hit, increase bandwidth, or perform some black magic to "fake out" the missing bandwidth. SCRAMBLING on the other hand does not profoundly change both the nature and structure of the original signal. Instead we add a signal, shift a signal, subtract a signal, sync a signal, or some variation thereof. In some cases of "advanced scrambling" we can chop up the signal in both the time and frequency domain, and then move the sequence around, but not actually change the structure of the content (just make it annoying to the eavesdropper). Now with cellular telephones simply swapping keys would do nothing more then amuse the eavesdropper. What you would have to do is preload each phone with a matching set of ciphering keys, then at the beginning of the call (and at several points during the call) the phones negotiate which keys they will use. Since no key is EVER transmitted over the air (only and index or key bank address number is used in the negotiation). Since the only two people or phones (we hope) have the matching key banks in the two phones, the two users should be a very high level of privacy. Next we need a strong ciphering algorithm (without backdoors), and a data stream randomizing engine just prior to, and just after the encryption engine. On top of these we need constantly refreshed ciphering keys issued by a trusted source, and kept under rigid security. All of this is expensive, complicated, and moderately time consuming. When people want secure communications they should go to their hardwired lines, and not use a phone with an antenna unless they have some wicked good ciphering (not SCRAMBLING... but ENCRYPTION). -jma At 9:44 PM +0000 1/13/02, Justin T. Fanning wrote: >I don't understand why the encryption isn't done in the phone's own >software. Most modules offered by various companies approach from the >analogue prospective, but when you consider the phone itself is a >miniature computer, why aren't companies producing modified OS ROMs >that encrypt after the speech encoding stage. It would take just a >few extra CPU cycles to push the byte value of the encoded audio >through a cypher. (Taken to the extreme, you could even have handsets >exchanging keys at the beginning of each call!) Providing you didn't >modify the GSM/CDMA packet structure only the packet payload, this >would seem a far more secure & simplistic approach than external >analogue hardware. > > >JF -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4538 From: A.Lizard Date: Sun Jan 13, 2002 4:32pm Subject: re: Cellular Scramblers At 08:44 PM 1/13/02 +0000, you wrote: >Message: 3 > Date: Sat, 12 Jan 2002 21:40:52 -0800 > From: Hawkspirit >Subject: Cellular Scramblers > >Anyone know how effective these scramblers are? > >CELLULAR SCRAMBLER > > > >SPECIFICATIONS >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm >Audio range: 300 up to 3000 Hz >Telephone lines: Cellular >Consumption: 5 Vdc, 80 mA of the battery >Stand-by consumption: 5 Vdc, 80 mA of the battery > >Selling Price: $5800 >Prod. Code: HS-7000 > > > >Security level: III ( High security) >Hop rate: up to 150 times per second It would be more cost-effective for you to get a laptop, a cellular modem, and download a free copy of PGPfone from http://www.pgpi.org . You can decide for yourself whether or not the security level is better from the clear and explicit information presented there on how it works. The advice "don't bet your life on it" is appropriate in either the device you describe or the one I am suggesting you consider instead. Plus, of course, you can use the laptop to play Solitaire or run Excel or read this mailing list via modem connection from when you aren't transmitting SECRET messages. :-) A.Lizard ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4539 From: William Knowles Date: Mon Jan 14, 2002 1:53am Subject: Re: Cellular Scramblers On Sat, 12 Jan 2002, Men in black helicopters forced Hawkspirit to write: > Anyone know how effective these scramblers are? > > CELLULAR SCRAMBLER > > SPECIFICATIONS > Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > Audio range: 300 up to 3000 Hz > Telephone lines: Cellular > Consumption: 5 Vdc, 80 mA of the battery > Stand-by consumption: 5 Vdc, 80 mA of the battery > > Selling Price: $5800 > Prod. Code: HS-7000 > > This scrambling system is used by top entities and companies, > where nowadays information is the most valuable asset. > > These cellular scramblers are sold only by pairs. So effectively we're talking about $11,600? If you are going to pick two of these bad boys up, I have a friend selling airport concessions at Kandahar Airport. I hear rumblings that Afghanistan is supposed to be the next hot tourist destination! - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4540 From: David Alexander Date: Mon Jan 14, 2002 3:24am Subject: column titles for Steve How about "Is something bugging you ?" "Scope me in" "Don't sweep it under the carpet" "Sweep dreams" "News sweep" "For the recording" David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc DDI: 01235 837823 Mobile: 0779 988 1284 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4541 From: Justin T. Fanning Date: Mon Jan 14, 2002 3:49am Subject: Re: re: Cellular Scramblers I was thinking along similar lines when I wrote my last post about modifying the on board software. It would be much simpler to wire a handheld/pocket PC running Windows CE (or similar) to a cell phone for use as an external (analogue) crypto device (and for a fraction of the cost of a dedicated unit). A cell phone & pocket PC would easily fit into the same pocket and used in conjunction with a personal hands free kit would look totally normal to any observer. Of course, if you are communicating only to known parties, you could dump the cell phone all together and get a PCMCIA cellular card (http://www.nokia.com/phones/cellularcard/index.html and http://www.nokia.com/phones/cardphone2_0/index.html) for your pocket PC and plug your personal hands free directly into the PC and simply establish GSM data calls between the pocket PC's using PGPfone or the voice over IP encryption software of your choice. I think it was commercially silly that Nokia didn't use an established OS in their 9110/9210 range of "communicator" phones, but instead went with a proprietary OS. I think it's only a matter of time until we see pocket pc's running Windows CE and other common OS's and cell phones merge, then strong mobile crypto will simply become the norm, making the whole concept of a cellular wiretap of limited use. You would still get the raw pen register & location data, but not the call audio. Once your already operating in the digital domain, adding a strong crypto engine is extremely easy and can of course all be done in software at little to no cost. Just before I finish, I note Nokia is about to release a phone with a built in digital camera, 640 x 480 still capture with store & forward capability the Nokia 7650 (http://www.nokia.com/phones/7650/index.html) I believe similar technology has been in use in Asia for some time, but this will be the first mainstream release of it in the west. I wonder if these will start turning up on sweeps concealed in other devices with modified lenses or used as the transport end of a remote camera setup... JF --- "A.Lizard" wrote: > > At 08:44 PM 1/13/02 +0000, you wrote: > >Message: 3 > > Date: Sat, 12 Jan 2002 21:40:52 -0800 > > From: Hawkspirit > >Subject: Cellular Scramblers > > > >Anyone know how effective these scramblers are? > > > >CELLULAR SCRAMBLER > > > > > > > >SPECIFICATIONS > >Circuit size: 50 mm ¥ 35 mm ¥ 5 mm > >Audio range: 300 up to 3000 Hz > >Telephone lines: Cellular > >Consumption: 5 Vdc, 80 mA of the battery > >Stand-by consumption: 5 Vdc, 80 mA of the battery > > > >Selling Price: $5800 > >Prod. Code: HS-7000 > > > > > > > >Security level: III ( High security) > >Hop rate: up to 150 times per second > It would be more cost-effective for you to get a laptop, a cellular modem, > and download a free copy of PGPfone from http://www.pgpi.org . You can > decide for yourself whether or not the security level is better from the > clear and explicit information presented there on how it works. The advice > "don't bet your life on it" is appropriate in either the device you > describe or the one I am suggesting you consider instead. > > Plus, of course, you can use the laptop to play Solitaire or run Excel or > read this mailing list via modem connection from when you aren't > transmitting SECRET messages. :-) > > A.Lizard > ************************************************************************ > new voicemail number,ask if you need it. > Personal Web site http://www.ecis.com/~alizard > Disaster prep info: http://www.ecis.com/~alizard/y2k.html > Littleton Killings: http://www.ecis.com/~alizard/littleto.html > backup address (if ALL else fails) alizard@o... > IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the > new version with the bug fixed is available NOW. > PGP 6.5.8 key available by request,keyserver,or on my Web site > For e-mail privacy, download PGP from http://www.pgpi.org > PGPfone v1.02 and v2.1 available for secure voice conferencing, get > your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ > ************************************************************************ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4542 From: Miguel Puchol Date: Mon Jan 14, 2002 10:23am Subject: Re: re: Cellular Scramblers Hi Justin, > Of course, if you are communicating only to known parties, you could > dump the cell phone all together and get a PCMCIA cellular card > (http://www.nokia.com/phones/cellularcard/index.html and > http://www.nokia.com/phones/cardphone2_0/index.html) for your > pocket PC and plug your personal hands free directly into the PC > and simply establish GSM data calls between the pocket PC's using > PGPfone or the voice over IP encryption software of your choice. That would be a nice setup - the problem I see is that PocketPCs (with the possible exception of the iPAQ) have rather limited processors and memory, and coding, scrambling, encrypting & sending audio via the network protocol stack (and viceversa) would probably make them spontaneously combust. In any case, the GSM encryption algorithm is reasonably secure for the average user, but as wisely pointed out, not against a court order (or unauthorised tap), or someone with enough resources. > I think it was commercially silly that Nokia didn't use an established > OS in their 9110/9210 range of "communicator" phones, but instead went > with a proprietary OS. I think it's only a matter of time until we > see pocket pc's running Windows CE and other common OS's and > cell phones merge, then strong mobile crypto will simply become the > norm, making the whole concept of a cellular wiretap of limited use. > You would still get the raw pen register & location data, but not the > call audio. Once your already operating in the digital domain, adding > a strong crypto engine is extremely easy and can of course all be done > in software at little to no cost. The Nokia 9210 uses a Crystal EPOC OS, which can be programmed via the free SDK provided by Nokia, which includes C++ and Java environments. Even so, this phone is also RAM and processor limited, so intensive tasks tend not to run too well. > Just before I finish, I note Nokia is about to release a phone with a > built in digital camera, 640 x 480 still capture with store & forward > capability the Nokia 7650 (http://www.nokia.com/phones/7650/index.html) > I believe similar technology has been in use in Asia for some time, > but this will be the first mainstream release of it in the west. I > wonder if these will start turning up on sweeps concealed in other > devices with modified lenses or used as the transport end of a remote > camera setup... Other solutions already exist for this, although more cumbersome. I expect any such unit found on a sweep will be a very nice and expensive gift :-) Cheers, Mike 4543 From: Hawkspirit Date: Mon Jan 14, 2002 11:39am Subject: Re: Theory (brought to mind by Comsec C3I discussion) Jim, As I have mentioned before I really don't care for digital test equipment for analog testing because of resolution losses due to quantizing. So my comment here are relative to my Tektronix 1503. It has been my experience with TDR, that the off hook steady state bias of 48 volts DC is the best case live line status for TDR measurement. At this time the 48 volts is a non interfering steady state DC bias. Inducing line current will not change the impedance parameters along the loop ( until it triggers the CO terminating card into off hook status) or improve TDR resolution. If you cross over into off hook status, then you have to deal with dial tone and source signals which is a problem. I don't know if taking fast time slice frames is really going to give you any resolution improvement. I currently don't have the capability to take triggered time slice measurements, but when I have used this technique it provided minimum resolution because of the shortness of interval. I prefer normal TDR real time renewal pulses and their averaging displays. As far as I know, termination card status will not radically effect the impedance vs distance line characteristic of the loop. A termination card is only a problem when it is sending back signals i.e. dial tone, voice, data. The only thing this technique (crossover measurement) might do is buy you better TDR resolution by limiting terminating card interference but I don't see how. You may shift the signal source impedance by activating the terminating card at the CO but once again, a TDR charts impedance at points of distance along the wire. Termination is but another impedance point to be described by its status at the time of measurement . Roger www.bugsweeps.com At 9:18 AM -0800 1/11/02, Hawkspirit wrote: >From: "James M. Atkinson" > >"What I am in interested in the electrical behavior of a line during >the loop relay seizing the line, and releasing it, and more >specifically the "overshoot" areas of the signal. >I am also interested in the frequencies that appear right at the >moments of making, and then of breaking the line." > >Jim, Could you amplify on this, what kind of line behavior, in what form of >result, would indicate what form of intercept? Thanks, Roger Sure, First I apply a slowly increasing resistance to the line until I seize the line. I repeat this several times until I have a fairly good calculation of the amount of current i need to get flowing to size the line, and the delay between the current draw and the seizure. I then sync my TDR to the circuit so that I start pounding the line with TDR pulse as I approach the seizing current. I then disregard the TDR pulses gathered just prior to the seize so that I am actually looking at TDR pulses during the zero crossing (when it should be really quiet). I can usually grab several hundred usable "pings" during the transition period, and have found it helpful for each "ping" to have a slightly offset rise/fall time or pulse width. The whole goal is to force a predictable zero crossing, and shoot pings into the line during the zero crossing. I start with a 5 pico second ping (using a high energy 90 volt tunnel diode), and slowly increase the rise time and/or pulse width to several milliseconds as I look down the line. I am not using a "sampling" circuit, but actually digitizing and capturing the TDR wave forms directly into a laptop in real time. This way I can see "mouse feces" laying against the wire, and can see any kind of resistive, inductive, or capacitive breach with some extreme resolution. The further down the line I am looking the less the resolution and the wider the pulses. If I can get two lines on the same cable I can ping on one line, and listen to the crosstalk of the signal on the other pair, I can also split the pairing and shoot them that way as well (while in transition). Either way the goal is to locate where the twisting of the pair has been compromised, and not just look for resistive faults. Most sweep methods are obsessed with finding resistive devices in series with the line, or some variation thereof. Sadly, the methods used to find resistive devices are worthless in finding something that is capacitively or inductively isolated (most professional eavesdropping devices are 10-40+ megaohms of impedance, or isolated in such a way that a regular TDR is worthless). The "virgin pair' vs "split pair" TDR will find any kind of inductive coupling on the line (of more then one loop), but you have to do it during the zero crossing. Inductive loading of less then one loop (such as in the case of a linear ferrite pickup) your going to have sweep more then the two wires your looking at (you need a total of four conductors, plus a good ground). Crosstalk analysis will detect any kind of separation or disturbance of the pairs of more then a mm, or even disturbance of the wire insulation (but you have to do it during the zero crossing). It's also helpful to "listen in" to the line with both an audio amp, AND a spectrum analyzer. After you have performed your regular non alerting phone sweep... disconnect the load (or phones), then "listen" to the line with a high impedance audio amp (like Kaisers 1059 or Alan's uAmp), then slowly tune something like the SCD-5 across the line. Next connect your AUDIO (100 Hz to about 10 kHz) spectrum analyzer to the line (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of control or command tones such as DTMF-C, 2100 Hz, etc (typically appearing as crosstalk). Then switch your your RF spectrum analyzer (though a transient limiter, impedance matching filter, and pre-amp) and look for any kind of RF present on the line. Hint: if someone attaches a transmitter to the line some of the RF will bleed back over the line and you will be able to see it.... however your going to have to "tune" the line to see it reliably. The determine how much current draw you need to seize the line card (remember the phone system works on current draw, not voltage) and bounce some TDR pulses down the line during the zero crossings to see what a regular wet line TDR might miss. The key in all of this is your ability to match the impedance of the line during the transition. This is not just a case of "cranking up the voltage", but one of "tuning up the TDR circuit" though a variable capacitor/varistor and resistor/inductor. You want a near perfect coupling between the TDR (or pulse generator) and the line. To look at it another way, consider that the line is an antenna, and you want a perfect impedance match between a radio, the feed line, and the antenna so you can maximize the signal your giving off or collecting. If you simply crank up your transmit power, but have a bad feed line all you will end of doing is heating up some wire. On the other hand if the feed line has a near perfect match to the radio, and the antenna has a near perfect mach to the feed line all kinds of wonderful things can be done. If you go one step further and fiddle with the antenna and use it at its precise resonant frequency you can work the world with just a small amount of power. Along the same lines if you filter out all the thunder-lizards, tune up your antenna, use good feed lines, and have a good LNA on the antenna you can hear extremely low poer things many thousands of miles away. Now, we take this and apply it to sweeping phone lines: First we find the "quietest time" on the line, which is during the transition point (the loop voltage and dial tone is our thunder lizard). Next we match the impedance of our TDR to the line impedance. Then we "tune" the line by bouncing TDR pulses down the line (with various pulse widths and rise times) while we tweak a capacitor/varactor for clean return (sort of like adjusting an SWR meter). The end result is a super precise series of pulses, clean TDR wave forms, and the exact position of anomalies along the line (including mouse feces touching the line). -jma 4544 From: James M. Atkinson Date: Mon Jan 14, 2002 1:38pm Subject: 2002 Darwin Awards It's that time again! The awards this year are classic. These awards are given each year to bestow upon (the remains of) that individual, who through single-minded self-sacrifice, has done the most to remove undesirable elements from the human gene pool. 5th RUNNER-UP Goes to a San Angelo, California man who died when he hit a lift tower at the Mammoth Mountain ski area while riding down the slope on a foam pad. The 22-year old David Hubal was pronounced dead at Central Mammoth Hospital. The accident occurred about 3a.m., the Mono County Sheriff's department said. Hubal and his friends apparently had hiked up a ski run called Stump Alley and undid some yellow foam protectors from lift towers, said Lt. Mike Donnelly of the Mammoth Lakes Police Department. The pads are used to protect skiers who might hit towers. The group apparently used the pads to slide down the ski slope and Hubal crashed into a tower. It has since been investigated and determined the tower he hit was the one with its pad removed. 4th RUNNER-UP Goes to Robert Puelo, 32, was apparently being disorderly in a St. Louis market. When the clerk threatened to call the police, Puelo grabbed a hot dog, shoved it into his mouth and walked out without paying. Police found him unconscious in front of the store. Paramedics removed the six-inch wiener from his throat where it had choked him to death. 3rd RUNNER-UP Goes to poacher Marino Malerba of Spain, who shot a stag standing above him on an overhanging rock and was killed instantly when it fell on him. 2nd RUNNER-UP "Man loses face at party." A man at a West Virginia party (probably related to the winner last year, a man in Arkansas who used the ..22 bullet to replace the fuse in his pickup truck) popped a blasting cap into his mouth and bit down, triggering an explosion that blew off his lips, teeth, and tongue. Jerry Stromyer, 24, of Kincaid, bit the blasting cap as a prank during the party late Tuesday night, said Cpl. M.D. Payne. "Another man had it in an aquarium hooked to a battery and was trying to explode it." "It wouldn't go off and this guy said I'll show you how to set it off." He put it into his mouth, bit down and it blew all his teeth out and his lips and tongue off, Payne said. Stromyer was listed in guarded condition Wednesday with extensive facial injuries, according to a spokesperson at Charleston Area Medical Division. "I just can't imagine anyone doing something like that," Payne said. 1st RUNNER-UP Doctors at Portland University Hospital said an Oregon man shot through the skull by a hunting arrow is lucky to be alive and will be released soon from the hospital. Tony Roberts, 25, lost his right eye last weekend during an initiation into a men's rafting club, Mountain Men Anonymous (probably known now as Stupid Mountain Men Anonymous) in Grant's Pass, Oregon. A friend tried to shoot a beer can off his head, but the arrow entered Robert's right eye. Doctors said that had the arrow gone 1 millimeter to the left, a major blood vessel would have been cut and Roberts would have died instantly. Neurosurgeon Doctor Johnny Delashaw at the University Hospital in Portland said the arrow went through 8 to 10 inches of brain with the tip protruding at the rear of his skull, yet somehow managed to miss all major blood vessels. Delashaw also said that had Roberts tried to pull the arrow out on his own he surely would have killed himself. Roberts admitted afterwards that he and his friends had been drinking that afternoon. Said Roberts, "I feel so dumb about this." No charges have been filed, but the Josephine County district attorney's office said the initiation stunt is under investigation. Now THIS YEAR'S WINNER. (The late) John Pernicky and his friend, (the late) Sal Hawkins, of th great State of Washington, decided to attend a local Metallica concert at the George Washington amphitheater. Having no tickets (but having had 18 beers between them), they thought it would be easy to "hop" over the nine foot fence and sneak into the show. They pulled their pickup truck over to the fence and the plan was for Mr. Pernicky, who was 100-pounds heavier than Mr. Hawkins) to hop the fence and then assist his friend over. Unfortunately for (the late) Mr. Pernicky, there was a 30-foot drop on the other side of the fence. Having heaved himself over, he found himself crashing through a tree. His fall was abruptly halted (and broken, along with his arm) by a large branch that snagged him by his shorts. Dangling from the tree with a broken arm, he looked down and saw some bushes below him. Possibly figuring the bushes would break his fall, he removed his pocket knife and proceeded to cut away his shorts to free himself from the tree. Finally free, Mr. Pernicky crashed into holly bushes. The sharp leaves scratched his ENTIRE body and now, without the protection of his shorts, a holly branch penetrated his rectum. To make matters worse, on landing, his pocket knife penetrated his thigh. Mr. Hawkins, seeing his friend in considerable pain and agony, threw him a rope. Intended pull him to safety by tying the rope to the pickup truck and slowly driving away. However, in his drunken haste/state, he put the truck into reverse and crashed through the fence landing on his friend and killing him. Police arrived to find the crashed pickup with its driver thrown 100 feet from the truck and dead at the scene from massive internal injuries. Upon moving the truck, they found John under it half-naked, scratches on his body, a holly stick in his rectum, a knife in his thigh, and his shorts dangling from a tree branch 25-feet in the air. ... Congratulations gentlemen, you win... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4545 From: James M. Atkinson Date: Mon Jan 14, 2002 9:17pm Subject: Estimate Worksheet Updated For those list members who are interested in such things... I have just updated and uploaded our current "Estimate Worksheet" to the website, and would be happy to get comments and feedback from the list concerning it. It can be found at: http://www.tscm.com/estimate.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4546 From: Guy Urbina Date: Mon Jan 14, 2002 11:59am Subject: Steve's column name Hi Steve, Here's mine off the top of my head....... "Sigint suggestions" "Wired wisdom" best regards, -Guy 4547 From: tek492p Date: Mon Jan 14, 2002 11:13pm Subject: Re: attacking CCS To the group -- I agree 100% with Steve Uhrig. For more information about CCS, go to the top of the "Messages" page, and do a "search" on CCS. Jack 4548 From: Justin T. Fanning Date: Sat Jan 15, 2028 3:07am Subject: Re: Steve's column name Hi Steve, how about "Bugger off!" "Stop bugging me!" "The bug swatter" "Bug eyed" "Bug spray" "A Bug's life" Hope this helps ... JF 4549 From: Dave Emery Date: Tue Jan 15, 2002 1:36am Subject: Re: Re: Theory (brought to mind by Comsec C3I discussion) On Mon, Jan 14, 2002 at 09:39:14AM -0800, Hawkspirit wrote: > Jim, > activating the terminating card at the CO but once again, a TDR charts > impedance at points of distance along the wire. Termination is but another > impedance point to be described by its status at the time of measurement . > Roger > www.bugsweeps.com As an engineer with an academic interest in TSCM but no actual practical experiance in that business but with significant rf and measurement experiance in various other areas over the years including design of high speed digital PC boards and networking devices and EMI control, I have to say that what you have to say makes much more sense to me than what Jim says. I cannot see why the status of line card relays or their modern solid state equivalent at the end of a transmission line should make any difference at all in the echos bounced back from discontinuities in the line in response to a pulse that has not even reached the end of the wire at the time the echoes are measured and recorded. Simple physics and the speed of light suggest otherwise. I suppose, just as you say, that various AC signals on the line might contaminate the measurement with various sorts of noise (but most tones and signalling found on a phone line are very very low in frequency compared to the echoes seen on a TDR). But the presence or absence of a particular terminating network should make no difference. There is a technique that has seen increasing use with cabling in communications systems where there are frequency selective networks that make traditional unit impulse based TDR impractical - FFT based sweep probing. This operates by injecting a swept carrier and measuring the complex return signal precisely (eg amplitude and phase). From the actual return signal and known exciting signal it is actually possible to derive - using a FFT - much the same impedance versus distance chart as a classical radar like TDR yields. I suppose that for such slow sweeps of a line it would be helpful to have a well behaved termination or even no termination on the other end, but unless I am confused it seems to me that TSCM techs use classical unit impulse type TDR radars rather the swept CW techniques (which are more like SAR radar). But one of the reasons I read the TSCM list is to learn of the technology used by actual practitioners in the field and perhaps I miss some subtlety of Jim's technique and the theory behind it. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 4550 From: Steve Uhrig Date: Tue Jan 15, 2002 8:45am Subject: Re: Theory - TDR Once upon a midnight dreary, Dave Emery pondered, weak and weary: > I cannot see why the status of line card relays or their modern > solid state equivalent at the end of a transmission line should > make any difference at all in the echos bounced back from > discontinuities in the line in response to a pulse that has not > even reached the end of the wire at the time the echoes are > measured and recorded. Simple physics and the speed of light > suggest otherwise. I haven't been following the thread, so if my response seems out in left field, it probably is. The ideal situation when using a TDR in TSCM is to have the TDR set to the impedance of the line under test (not many machines have the ability to set this parameter), then to see anything on the line you want an impedance mismatch --- of the fault or whatever you are looking for -- to be as miserable as possible. The most difficult thing to see on a TDR is a splice with perfect impedance match. The easiest thing to see is the grossest mismatch, like a short or an open. Zero impedance or infinite impedance. Re terminating at the CO -- seems a moot point since there is a lot of garbage, like loading coils, between the our end of the line and the CO, which we cannot read through. Speed of light -- in free space -- is different than in a conductor. You can't use the same formulas without introducing a correction factor called Velocity of Propogation (VOP), or velocity factor to the old buzzards. 1 is the speed of light. Speed in a conductor is something less than the speed of light, so you set the VOP on the TDR to whatever it is for the particular line under test, always a factor less than zero. 0.88, or 0.66 are typical for different types of coax, for example. Especially if you are trying to get a precise distance from the TDR to a fault, you need an accurate velocity factor. Some people leave the TDR set to a fixed value all the time, like .66 as a default for twisted pair phone line. It doesn't matter a whole lot in many cases, as the machine can measure a lot more accurately than you can. You can't precisely measure a line up a wall, down a hallway, between floors and all around, to where hundredths of a point of velocity factor matter. Velocity factor is different for each different type of cable. If you are running new cable, it will be listed in the manufacturer's spec sheet for the cable. I insist on marking it on the spools of all cable we have in stock, so I don't have to remember it or look it up later if all I want to do is see how much string is left on the spool. And once the cable leaves the factory and enters the real world, the velocity factor starts changing. Not by much, or quickly, but a 10 year old piece of coax running up the tower will read noticeably different than what the spec says it should be for Andrews Type XYZ hardline. If all this is completely irrelevant to the subject being discussed before I stuck my nose in, I apologize. Anyone who has the time -- there is a need for a good TDR tutorial specifically for TSCM, starting at the "see Spot Run" level. The few other people whpo have written books have gone down in history and helped many people. Glenn's stuff and Ted Swift's stuff are good examples. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4551 From: Date: Tue Jan 15, 2002 1:17pm Subject: re Steves column. " The Straight Line On Surveillance" " The Straight Line on Surveillance Technology" ,as in direct line from horse's mouth, ,as in " Don't cross this legal line,re do's and dont's' ,as in " line of privacy rights" ,as in phone line That's all i can come up with at this moment, although, i think the list members have some good ideas. Maybe ,a different title every week! That sounds interesting! HAVE A GREAT DAY !!! 4552 From: Rafail Kapustin Date: Tue Jan 15, 2002 0:43pm Subject: Re: Re: Attacking CCS? Yes, exactly that Hi everyone, I would like to thank Steve for very detailed reply regarding CCS equipment - it will save starters in a field like me from making a mistake. Thank you Rafail --- Steve Uhrig wrote: > Once upon a midnight dreary, david_johnrobinson > pondered, weak and weary: > > > Two things hit me regarding this listing; A) so > what is new? this > > stuff has been out there advertised for years. B) > Why does every > > one immediatly jump and say CCS? > > Because some of us have been around a long time and > have seen > this stuff over and over and over. I'm talking > longer than some > of the players in this industry have been alive and > longer than > practically anyone in the industry has been in > business. > > > Let me put my cards on the table, I was the > operations > > manager for CCS for a time here in London > > Then pardon me for being forthright, but either you > were > incredibly naive or you are a crook. > > > and they realy do not deserve the bad mouthing > they get from > > the group, > > See comment above. If you really believe this, I > will go with > naive. > > > OK so most of the stuff they provide is "crap" > from a > > professional point of veiw, but to most of their > clients it's > > exactly what they want > > One could make the same argument about illegal drugs > or > abortion. That doesn't justify it. > > > Any one wanting professional equipment would > /should come to > > professional suppliers like our company Department > Q who only > > deal with Government level bugs , covert equipment > and GSM > > tracking. > > Now I will change my opionion back to crook. > > If you only deal with 'Government level bugs', why > are you > inviting anyone to come to you. Do you claim to be > supplying > 'Government level bugs' to anyone? In the unlikely > event you > supply anything at all, I would expect it would be > to anyone > *other* than the government. > > Remember, there are a (very) few people around who > actually work > in these technologies, with government clients on a > daily basis, > and cannot be fooled. Most of them are smarter than > me and keep > their mouths shut. I speak my mind. > > > I don't think it is CCS for several reasons > > > > For all the reasons you mention, it absolutely fits > the pattern > of CCS. Lie to someone with money, schmooze them, > pump up their > egos and convince them they will make outrageous > profits dealing > with CCS. The ignorant fool (and ANYONE who deals > with CCS/G-COM > in ANY way is an ignorant fool) hands CCS five or > six figures > for the 'privilege' of acquiring their absolutely > worthless but > impressive boxes of nonfunctional bells and > whistles. At that > point the relationship, such as it was, is over > unless CCS feels > they can extract/extort even more money from the > ignorant fool. > > In this case apparently, and I have seen it more > times than I > could count, the ignorant fool private labeled the > crap because > he wants the other ignorant fools who might buy it > to think he > manufactured it. CCS doesn't care. They got their > money. They > probably charged the guy extra for private labeling > it, which in > itself is funny because CCS was the original king of > > repackaging and slapping their name on standard > products from > other manufacturers and claiming it as their own. > > CCS cheated the guy pushing this private labeled > crap, because > he was an ignorant fool and had more money than he > had brains. > ANYONE who does any homework on CCS would never deal > with them > on any level. > > > a CCS licence costs $150.000 with no stock. > > A CCS 'license' or 'distributorship' or whatever > they choose to > call it costs precisely as much money as they can > extract from > the ignorant fool who gets involved with them. They > (CCS) are > very good at developing financial information on > their victims, > and this is how much they charge. > > Same with 'exclusive' rights to distribute CCS's > vaporware in a > particular country. I had the distinct pleasure at a > trade show > in New Delhi some years ago of introducing three > 'exclusive > distributors for all of India' to each other. Each > had paid, as > I recall, sums between the rupee equivalent of USD > $50,000 and > $200,000 for the alleged privilege of having an > 'exclusive' > representation for CCS in all of India. None > received anything > in return. Nada. > > If I called them tomorrow, I could purchase the > exclusive rights > to distribute their products in any country you > could name, and > I likely would be the 50th person to purchase the > exclusive. > > You were a member of the den of thieves. You know > how the game > is played. You just have to pretend to defend them > to justify > stealing money from your victims. > > If you led the victim (ignorant fool) to believe > something which > was not true, either from a product representation > standpoint or > from an equipment performance standpoint, then you > committed > fraud. Whether you believe it or not, some day there > will be a > day of judgement, and you will have to provide an > accounting, > before man possibly and to God definitely, for your > actions. You > do have the opportunity to escape those penalties > and erase the > slate, and if you wish to discuss this issue only > via PRIVATE > email with me I will be glad to do so. > > > If you want to worry, and it seems you do , try > talking to > > professional covert suppliers - if you call us a > spy shop you > > had better duck > > You already provided substantial incontrovertible > testimony that > you are a crook, and your likely fictitious claims > indicate you > still are operating in the mode you learned from > CCS. Therefore > you fit this list's generic, and my personal, > definition of a > spy shop. > > This month is 30 years I have been manufacturing > electronic > surveillance and intelligence gathering products for > government > agencies. Do some research and you will find that is > true. > > === message truncated === __________________________________________________ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ 4553 From: James M. Atkinson Date: Tue Jan 15, 2002 10:41pm Subject: Face the Storms and Smile A little girl walked to and from school daily. Though the weather that morning was questionable and clouds were forming, she made the daily trek to the elementary school. As the afternoon progressed, the winds whipped up, along with thunder and lighting. The mother of the little girl felt concerned that her daughter would be frightened as she walked home from school and she herself feared that the electrical storm might harm her child. Following the roar of thunder, lightning, like a flaming sword, would cut through the sky. Full of concern, the mother quickly got into her car and drove along the route to her child's school. As she did so, she saw her little girl walking along, but at each flash of lightning, the child would stop, look up, and smile. Another and another were to follow quickly and with each, the little girl would look at the streak of light and smile. When the mother's car drew up beside the child she lowered the window and called to her, "What are you doing? Why do you keep stopping?" The child answered, "I am trying to look pretty. God keeps taking my picture." May God bless you today as you face the storms that come your way. And don't forget to smile. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4554 From: Date: Wed Jan 16, 2002 2:30am Subject: California's Wiretap Bill Scrapped California's Wiretap Bill Scrapped SACRAMENTO, Calif. (AP) - Gov. Gray Davis' proposal to expand state wiretapping laws has been dropped after state attorneys reviewing the plan said it exceeded federal law. The bill would have allowed state and local authorities to obtain wiretaps through state courts and permit them to conduct surveillance on e-mail and Internet communications. President Bush signed legislation late last year that broadened federal wiretapping activities but the law did not expand authority at the state level. Davis spokesman Steve Maviglio said the legislation was dropped Tuesday after lawmakers learned of the opinion by the Legislative Counsel's office. Maviglio said the Davis camp may try to reintroduce the bill later this year. Under state law, authorities need a court order to tap a phone line. The proposed legislation would have allowed ``roving'' wiretaps that can follow a person from one number to the next. The plan was the centerpiece of Davis' State of the State address last week. AP-NY-01-16-02 0706EST 4555 From: zack <10-33@c...> Date: Wed Jan 16, 2002 8:52pm Subject: Record device Due to experiences which have occurred within the past few days, I would like to enlist this list for some information. I am looking for a modest price recording device which would record phone conversations as soon as I pick up the phone, taking into account I also use the same line for Internet use. ( long play with time/date ). PS..... I live in a state with one party only knowledge as to recording. Thanks visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Our enemies have made the mistake that America's enemies always make. They saw liberty and thought they saw weakness. And now, they see defeat. " George W Bush President of the United States of America God Bless The USA http://www.copscops.com/blessusa.htm 4556 From: James M. Atkinson Date: Wed Jan 16, 2002 9:28pm Subject: Legal Office Sinks Davis' Wiretap Bill http://www.latimes.com/news/local/politics/cal/la-000004144jan16.story?coll=la%2Dnews%2Dpolitics%2Dcalifornia January 16, 2002 RESPONSE TO TERROR Legal Office Sinks Davis' Wiretap Bill Security: The proposal is dropped after legislative counsel finds 'roving' tracking of calls illegal. By MIGUEL BUSTILLO and NANCY VOGEL, TIMES STAFF WRITERS SACRAMENTO -- Gov. Gray Davis' proposal to let state and local police obtain roving wiretaps on suspected criminals was dropped from the legislation containing it Tuesday after the legislative counsel's office concluded that it was illegal. The proposal, a centerpiece of Davis' State of the State address last week, had been welcomed by some law enforcement leaders but criticized by civil libertarians and some liberals. Davis unveiled the idea at the outset of a reelection bid in which he faces challenges from three Republicans--former Los Angeles Mayor Richard Riordan, Secretary of State Bill Jones and investor Bill Simon Jr.--each vying for the GOP nomination to take on the Democratic incumbent. Asked to size up the chances of a roving-wiretap bill passing now, Assemblyman Fred Keeley (D-Boulder Creek) said: "I think none. There is no opportunity, because whether the Legislature has the will or not, our attorney is telling us it is moot because we lack the authority." Although aides to the governor challenged that interpretation, the legislative counsel said that a state law authorizing roving wiretaps for state and local prosecutors and police would exceed the authority federal wiretapping law gives states, and would thus be invalid. President Bush signed legislation in October that broadened federal wiretapping abilities to target suspected terrorists, but that law did not expand states' powers to allow roving wiretaps at the local level, the counsel concluded. Davis spokesman Steve Maviglio acknowledged that Assemblyman Carl Washington (D-Paramount) dropped roving wiretaps from his legislation Tuesday after hearing the legal opinion, but said the Davis administration would continue to work with the lawmaker, and may attempt to have it reinstated later this year. Maviglio said the Davis administration contacted local district attorneys and the Justice Department before making the proposal public, and was informed it was within the state's powers. George Vinson, Davis' security advisor, added that changes to federal law are still in flux, and that state lawmakers should eventually be able to pass legislation this year permitting roving wiretaps on suspected terrorists. With conventional wiretaps, police must obtain a judge's order authorizing them to listen in on a specific phone number. Roving wiretaps allow them to follow a suspect from number to number. Vinson said the administration may agree to back an alternative proposal that would would still require police to go to a judge any time they wanted to expand their wiretap authority but would speed up that process. Legal Questions Only One of Plan's Problems Some constitutional authorities joined with the legislative counsel in questioning Davis' approach. Erwin Chemerinsky, a USC professor of constitutional law, said Davis appeared to have acted without the benefit of careful legal analysis. The legal questions about Davis' wiretap proposal are only part of its difficulties. It also has been criticized by civil libertarians and some Democrats in the Assembly and Senate, who are wary of its proposed expansion of police power. As a result, some lawmakers on Tuesday predicted that the proposal is unlikely to become law. Assemblyman Washington, who was carrying the measure sponsored by Los Angeles County Sheriff Lee Baca and Dist. Atty. Steve Cooley, and whose bill Davis has seen as the best opportunity for expanded wiretap authority--had to pare back his bill just to get it out of the Public Safety Committee, which he chairs. Washington's bill, AB 74, initially would have allowed state and local authorities to obtain roving wiretaps through state courts, and also would have allowed them to conduct surveillance on e-mail and Internet communications. Law enforcement leaders argue that wiretap laws have failed to keep up with technology, and that criminals can now sidestep surveillance by switching mobile phones and using e-mail and Internet chat rooms to communicate. A roving wiretap would allow police to keep up with the times and the criminals, they say. Authorities must now obtain court orders to tap specific phone numbers, which they say puts them at a disadvantage in an age when criminals can buy cheap prepaid cell phones at convenience stores. "The world of terrorism in terms of criminal planning and strategizing has clearly shown law enforcement that these people are pretty clever," Baca said in an interview. "They will use one cell phone, turn it off, come back with another phone, turn that one off . . . conducting their transactions on dozens of mobile phones. Our current system prevents us from following that conversation without going back into court." Roving wiretaps and e-mail surveillance have come under fire, however, since Davis proposed them last week. It was because of that criticism that Washington requested the legal opinion from the legislative counsel. Once he received it, he announced that his bill would no longer authorize roving wiretaps. Several lawmakers also objected to the provisions of Washington's bill that would extend wiretapping to e-mail and the Internet, arguing that the privacy of countless innocent people would be infringed. Washington then scratched those sections from his measure as well. Assemblyman Keeley was among those who raised doubts about the idea of police and prosecutors screening e-mail. During a spirited committee hearing, he questioned the prosecutors and police who supported that proposal, and they conceded that they were still developing ways to screen e-mail without unduly intruding on personal privacy. "These are the types of scattershot investigative tools that result in the widespread loss of personal privacy," said Francisco Lobaco of the American Civil Liberties Union, which opposed the bill. Having pared back his legislation Tuesday, Washington's bill now would only slightly expand local wiretapping powers to target suspected terrorists planning to use anthrax or other "weapons of mass destruction." Its main purpose is to allow local police and prosecutors to continue to obtain wiretaps beyond next year, when their power to do so under state law is set to expire. Slight Expansion Is All Most Lawmakers Expect Such a law, several lawmakers said, is as strong as is likely to pass in the Capitol this year, particularly after the counsel's office opinion. Chemerinsky called the legislative counsel's analysis a "very strong opinion" showing that state and local governments cannot engage in wiretapping except as permitted by federal law. Chemerinsky and others have questioned the need for expanded state wiretapping powers, noting that local authorities can already partner with the federal government to conduct surveillance on suspected terrorists if needed. A recent report by the state Department of Justice showed that California law enforcement requested 88 wiretap orders in 2000. Judges granted every request. The wiretaps cost an average of $56,767 and resulted in the arrests of 271 people. Of those, 17 were convicted. Most were used in drug investigations and involved home phones, cellular phones and pagers. For information about reprinting this article, go to http://www.lats.com/rights -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4557 From: James M. Atkinson Date: Wed Jan 16, 2002 9:32pm Subject: Los Alamos Scientist Criticizes FBI in Book [(grumble, grumble)... Lee should still be in prison (grumble, grumble). See what happens when investigators gets caught lying trying to make a case? (grumble, grumble) -jma] http://www.washingtonpost.com/wp-dyn/articles/A52000-2002Jan15.html Los Alamos Scientist Criticizes FBI in Book Lee Calls Copied Tapes 'Crown Junk' By Walter Pincus Washington Post Staff Writer Wednesday, January 16, 2002; Page A08 Former Los Alamos scientist Wen Ho Lee maintains he was selected for prosecution because of his ethnic background and asserts that the computer tapes he downloaded, which were the basis of his guilty plea, were not the "crown jewels" of nuclear weapons building, but "largely the crown junk." In his newly published autobiography, "My Country Versus Me," written with the help of Helen Zia, Lee acknowledges that his downloading of computer tapes was a security violation. But he blames the multi-year FBI investigation of his activities and his jailing in solitary confinement for nine months on espionage charges partly on Washington hysteria and spineless bureaucrats. Most of all, the Taiwan-born Lee writes, "Had I not been Chinese, I never would have been accused of espionage and threatened with execution." Lee's book, however, does not totally explain why he downloaded computer codes associated with nuclear weapons designs in 1993-94, and again in 1997. In fact, he focuses his attention on the earlier download and not at all on those of 1997. As he did in earlier interviews, he said in his book that the downloading in the 1993-94 period was done "to protect my files, to make a backup copy." He adds, as he did just before his guilty plea to the surprise of his own lawyers, that he had "made more than one backup copy, actually." Why more than one backup? Because, he writes, "there were no lab rules against making copies -- most prudent people keep copies of their important documents." He also said he had "lost some important codes before, when the [Los Alamos computer] operating system changed, and I didn't want that to happen again." But, as Los Alamos senior scientists testified at Lee's trial, and another newly published book on the Lee case, "A Convenient Spy," repeats, Los Alamos scientists in the highly classified X Division where Lee worked were repeatedly offered opportunities to copy their own work in case of computer failure, "day by day, even computer stroke by computer stroke," one said recently. Reporters Dan Stober and Ian Hoffman provide another reason for Lee's downloading. He might have wanted to use the data in a future job, either with a Taiwan company called Asiatek, which has close ties to that country's defense ministry, or some other company. As for the computer codes themselves, called the "crown jewels" of the nuclear weapons business by one of the nuclear lab's senior scientists, Lee called them "the crown junk" and "the biggest nuclear weapons secret that [Los Alamos National Laboratory] and the government have to hide. "The cornerstone of nuclear deterrence," Lee writes, "is to scare the rest of the world into thinking that our weapons are bigger, stronger, faster, and far more destructive than theirs." And while saying that statement is true, Lee goes on to say, "the science of nuclear weapons hasn't progressed much" since the end of the Cold War and the test ban treaty. He says scientists like himself still at the U.S. weapons labs "spend their time figuring out what to do with rusty, old nuclear bombs." The stockpile stewardship program, "fixing old bombs and digging up old test data" in trying to keep U.S. nuclear weapons safe and reliable, is "like eating leftovers for dinner, [but] it's better than nothing." Much of the preliminary testimony and motions in court went Lee's way, particularly because of the work of his two lead lawyers, John Cline and Mark Holscher. But when the decision came before trial to accept an agreement that included pleading guilty to one count of mishandling classified information, Lee writes that Cline and Holscher told him he had a 95 percent chance of winning "if it goes to trial, but a five percent chance that we could lose. If we lose, you could face life in prison. Are you willing to take that risk?" Saying "it was not worth the risk of spending the rest of my life in prison," Lee said he agreed, since losing the right to vote, own a gun, run for public office or serve on a jury was "less of a sacrifice . . . than to risk a prison sentence." © 2002 The Washington Post Company -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4558 From: Steve Uhrig Date: Wed Jan 16, 2002 9:45pm Subject: Re: Record device Once upon a midnight dreary, zack pondered, weak and weary: > Due to experiences which have occurred within the past few > days, I would like to enlist this list for some information. I > am looking for a modest price recording device which would > record phone conversations as soon as I pick up the phone, > taking into account I also use the same line for Internet use. > ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. Very easy problem. Connect a tape recorder to your phone line via any standard method, and start the recorder manually when you make or receive a call you wish to record. Since you are in a one party consent state, you are OK as the one party, and it would only be your own calls you would be recording, so you merely can start the machine yourself when needed. That way, you won't fill the tape needlessly with Internet noise/data instead of voice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4559 From: Hawkspirit Date: Wed Jan 16, 2002 10:18pm Subject: Electronic Harassment Sweepers http://www.siin.com/invres.html This is our most recommended service for clients who are serious about solving their EH problems permanently. This service while being the most expensive is the best and most cost effective. You will receive at least 2 experts. One will be a scientist with experience and understanding of electronic harassment, the science behind it and defensive measures. You will also receive an investigative research specialist, our IR Specialists have experience and training in many aspects such as surveillance, counter-surveillance, investigative sciences, law, psychology, undercover operations, and computer security. You will never receive an inexperienced team, we field train all of our staff and test them regularly. What you get essentially is two experts that will locate, eliminate, and document your situation to ultimately solve your problem. The initial portion of this service is conducted covertly. Due to the secure nature of our methods we do not publish how our covert activities are carried out. Rest assured that no one will know of our activities or our arrival. Once we announce our presence to the client, we begin a thorough and extensive test of your residence, you and appropriate individuals, vehicles, personal electronics, computers and appropriate areas. On the conclusion of the testing we will inform you of our findings. We take detailed case history, speculative and factual statements from appropriate parties. Once we determine the source of the Electronic Harassment, we will take appropriate countermeasures. You will also receive a report (including a CAD rendering of your residence) detailing our tests, findings and "hotspots". Using a combination of our state-of-the-art equipment, counter-surveillance techniques and hands-on approach we will detect almost any signal between DC to Infrared, this includes: ∑ DC ELF pulse ∑ AC ELF pulse ∑ Low Hz audio to Ultrasonic levels ∑ Microwave signals (1GHz to 20GHz) & >20GHz pulses ∑ LF to UHF RF signals (DC to 20GHz) (Linear or Digital) ∑ Laser, Infrared, visible light spectrum ∑ Soliton and Scalar waves ∑ EMP ∑ AM/FM transmissions ∑ High energy static fields ∑ High voltage ion fields ∑ Plasma radiation ∑ Nuclear radiation (includes X-rays, Gamma, Beta and Alpha) This also includes detection of tracking devices, bugs, wireless surveillance equipment, and other electronic radiation signal emitting devices. We can also detect metallic and semi-metallic devices. 4560 From: Ray Van Staden Date: Wed Jan 16, 2002 10:09pm Subject: Demonstration - Combat Terrorism The Leaders of the world are asking for your support to combat terrorism and we're encouraging to demonstrate against them next Friday, at 15:00. It is a well-known fact that the Taliban are against alcohol consumption and think it is sinful to look at a naked woman. Therefore, Friday at 15:00, women should run naked through the office while men chase them with a beer in their hands. This is the best way to show our disgust for the Taliban and will hopefully help us in detecting the terrorists among us (anybody who doesn't do as proposed will be deemed a terrorist and denounced to the World). Your efforts are much appreciated in the name of a free, democratic world. [Non-text portions of this message have been removed] 4561 From: Matthew Paulsen Date: Thu Jan 17, 2002 2:28am Subject: RE: Re: Record device Careful with this, in some states this may be illegal, check with your lawyer before proceeding. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, January 16, 2002 7:45 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Record device Once upon a midnight dreary, zack pondered, weak and weary: > Due to experiences which have occurred within the past few > days, I would like to enlist this list for some information. I > am looking for a modest price recording device which would > record phone conversations as soon as I pick up the phone, > taking into account I also use the same line for Internet use. > ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. Very easy problem. Connect a tape recorder to your phone line via any standard method, and start the recorder manually when you make or receive a call you wish to record. Since you are in a one party consent state, you are OK as the one party, and it would only be your own calls you would be recording, so you merely can start the machine yourself when needed. That way, you won't fill the tape needlessly with Internet noise/data instead of voice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4562 From: Justin T. Fanning Date: Thu Jan 17, 2002 3:39am Subject: Re: Record device In the CCITT phone system (see See ITU-T G.165 etc.) all non voice calls are proceeded with a short burst of 2100 Hz to switch off the Line Echo Canceler. I don't believe the US Bell system uses such a standard, but you may find it's an option on your modem/fax, or the receivers modem/fax. This could then be incorporated into your recording device to not record calls preceded with 2100 Hz. Of course the other solution is to use DSL/Cable etc and segregate the data off the voice line & get higher speed always on to boot! JF --- zack wrote: > > Due to experiences which have occurred within the past few days, I would > like to enlist this list for some information. I am looking for a modest > price recording device which would record phone conversations as soon as I > pick up the phone, taking into account I also use the same line for > Internet use. ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. > > Thanks > > visit http://www.copscops.com > Washington DC Police Department http://mpdc.dc.gov/main.shtm > > "Our enemies have made the mistake that America's enemies always make. They > saw liberty and thought they saw weakness. And now, they see defeat. " > > George W Bush > President of the United States of America > > God Bless The USA > http://www.copscops.com/blessusa.htm > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ From: rockdriver Date: Mon Jan 13, 2003 9:38pm Subject: Antenna Shootout For educational purposes,I was wondering what type of antennas the list members preferred/owned antennas were for doing "business",and why, I use a discone for anything up to 1.2 gig with 2 small conical designed antennas for anything above 1.2.....and a loop antenna for vlf. Any input is welcome,thanx! MitchD 6754 From: Matt Paulsen Date: Mon Jan 13, 2003 11:06pm Subject: Marriott International goes WiFi with STSN! Get that WiFi card and sniffer out and hit one of over 400 hotels for your enjoyment while you eat in the dining room. If your organization travels, now would be a good time to consider mobile code security practices if you haven't. Or you may just find your next product release on the market... by your competitor. 6755 From: James M. Atkinson Date: Tue Jan 14, 2003 0:14pm Subject: Re: Antenna Shootout I prefer an wide-band array of 16 quarter wave GAM antenna's with base loading, and a varactor for remote tuning over a 6 foot wide by 12 foot long ground plane of heavy steel (vehicle mounter) . Each element of the array is cut and tuned to a specific frequency that is "hot with bugs", the varactor is used to tune up a specific frequency of interest. The varactor is remote controlled by the preselector which isolated all 16 signals (in parallel) by 40+ dB, before being amplifier by 32 dB. Four to six 2.4 GHz high gain panels (with filters and preamps). Two 5.8 GHz high gain panels Two to four 900 MHz high gain panels One omni directional TV antenna with LNA Two steerable 2.4 GHz high gain panels in an external Radome Two Bi-Conicals (20-300 MHz) on an 16 foot mast Two spiral logs (200-1 GHz) on an 16 foot mast Two Microwave Discones (400 MHz to 3 GHz) on a 12 foot mast). Two Wideband Discones (36 MHz to 1.5 GHz) on a 12 foot mast Several active loop antennas (for specific bug channels) broadband passive loop antenna's with remote band select, and tuning. Double loop (small loop) tunable with sense element for DF usable Several active rod antenna's with 24" ground plane 98 MHz close field probe (micro-loop) with swept comb circuit for FM band. Set of EMCO, Electrometrics, and HP close field probes. Really big, and really nasty dipole set (15 MHz to 1 GHz) A collection of standard gain antenna with ampls/mixers (900 MHz to 40 GHz) EMCO broadband quad ridges horns (1 GHz to 40 GHz) Microtel Microwave array "Pipe organ" (2 GHz to 125 GHz) Copious collapsible whip antenna Several high threat frequency specific Yagi's (ie: 398.605, 169.505) Several collapsible log periodic (200-420 MHz, 420-480, 800-890 MHz) ...and several others -jma At 3:38 AM +0000 1/14/03, rockdriver wrote: >For educational purposes,I was wondering what type of antennas the >list members preferred/owned antennas were for doing "business",and >why, > >I use a discone for anything up to 1.2 gig with 2 small conical >designed antennas for anything above 1.2.....and a loop antenna for >vlf. > >Any input is welcome,thanx! >MitchD -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6756 From: James M. Atkinson Date: Tue Jan 14, 2003 1:30pm Subject: Spyking/Frank Jones associates by the name of Terry Kawles Hello List Members, One of the Spyking/Frank Jones associates by the name of Terry Kawles is trying to force my ISP to shutdown my site in an attempt to blackmail me into taking down the public records I have concerning he and Frank Jones. Here are the latest round of documents, they just came in today : http://www.tscm.com/01-14-03AUPnotice.pdf http://www.tscm.com/01-13-03complaint.pdf Also, I have added a great deal of materials the the page concerning Jones, and you may find it of interests. http://www.tscm.com/FNJspyking.html The more they try to pursue all of this the more public document I will be adding... I would note that I have recently received threats of physical violence and harassment unless I remove the pages with the public documents on them. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6757 From: kondrak Date: Tue Jan 14, 2003 1:37pm Subject: Anti-Spam program.. Dont know if you've seen or used this program, but its helped control spam here. Mailwasher - http://mailwasher.net/ It operates on the simple principal of downloading the mail headers before you actually download the mail from the server. It compares headers against known spammer addresses in ORBS and spamcop, and a blacklist you maintain locally. You merely scan the titles, check obvious spam for the built in blacklist, and the spam will be bounced back to the sender, and future mail from that address (or expression in a header, like Viagara, or Morgage etc.) will cause the mail to be blacklisted. You then "process mail", and garbage is bounced, then your real email program is brought up. You then hit the "check mail" in your emailer and download the real email. This sounds complicated, but really isn't. A must do, however, is to turn of the auto-check in your email program, as if you dont, and its running in the background, it will download all the mail on the server before you can check it in mailwasher. Read more about it, its free, or pay, (paid removes ad banner) I'm down to perhaps one or two that slip by me (my bad, not its fault) per day now. Well worth a look...I have no interest in the company other than I like the product... At 10:04 1/13/03 -0500, you wrote: >Just wanted to see if I was able to get through. Because of SPAM I had to >change e-mail accounts. Thanks. 6758 From: Marcel Date: Tue Jan 14, 2003 3:48pm Subject: Re: Spyking/Frank Jones associates by the name of Terry Kawles Amazing simply amazing. I'm sure you have seen this......... http://212.100.234.54/content/55/24477.html http://212.100.234.54/content/55/24461.html http://212.100.234.54/content/55/24456.html http://212.100.234.54/content/55/24433.html http://212.100.234.54/content/archive/19480.html "James M. Atkinson" wrote: > Hello List Members, > > One of the Spyking/Frank Jones associates by the name of Terry Kawles > is trying to force my ISP to shutdown my site in an attempt to > blackmail me into taking down the public records I have concerning he > and Frank Jones. > > Here are the latest round of documents, they just came in today : > > http://www.tscm.com/01-14-03AUPnotice.pdf > > http://www.tscm.com/01-13-03complaint.pdf > > Also, I have added a great deal of materials the the page concerning > Jones, and you may find it of interests. > > http://www.tscm.com/FNJspyking.html > > The more they try to pursue all of this the more public document I > will be adding... > > I would note that I have recently received threats of physical > violence and harassment unless I remove the pages with the public > documents on them. > > -jma > > -- 6759 From: kondrak Date: Tue Jan 14, 2003 7:42pm Subject: Re: Spyking/Frank Jones associates by the name of Terry Kawles As an aside, we had a machine in that was allegedly infected with his software, and found several easily identified viruses, that's how stealthy his crap was. Machine was cleaned in an hour, and we sent it back out with a IDS system installed to see if there was any future attempts to access it. None ever returned. His crap used FTP to communicate, and it was easily defeated with proper fire-walling. At 16:48 1/14/03 -0500, you wrote: >Amazing simply amazing. > > >I'm sure you have seen this......... Yup... >http://212.100.234.54/content/55/24477.html > >http://212.100.234.54/content/55/24461.html > >http://212.100.234.54/content/55/24456.html > >http://212.100.234.54/content/55/24433.html > >http://212.100.234.54/content/archive/19480.html 6760 From: Marcel Date: Tue Jan 14, 2003 8:44pm Subject: Re: Spyking/Frank Jones associates by the name ofTerry Kawles I found it amazing that public safety would associated themselves with someone with such a questionable past. The documents presented by jma surely should raise some antennas. kondrak wrote: > As an aside, we had a machine in that was allegedly infected with his > software, and found several easily identified viruses, that's how stealthy > his crap was. Machine was cleaned in an hour, and we sent it back out with > a IDS system installed to see if there was any future attempts to access > it. None ever returned. > His crap used FTP to communicate, and it was easily defeated with proper > fire-walling. > > At 16:48 1/14/03 -0500, you wrote: > >Amazing simply amazing. > > > > > >I'm sure you have seen this......... > > Yup... > > >http://212.100.234.54/content/55/24477.html > > > >http://212.100.234.54/content/55/24461.html > > > >http://212.100.234.54/content/55/24456.html > > > >http://212.100.234.54/content/55/24433.html > > > >http://212.100.234.54/content/archive/19480.html -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG 6761 From: Matt Paulsen Date: Tue Jan 14, 2003 9:48pm Subject: RE: Spyking/Frank Jones associates by the name ofTerry Kawles I searched kazaa for pcphonehome and got 0 hits. Somewhat remarkable since the stats read at 3,786,197 users, sharing 752,969,031 files in 5,540,736 GB. So much for a widely used good app! ha! Tried these variants on it as well, same results. phonehome macphonehome Funny enough though, if you search for "Frank Jones" (without the "'s) you get "You're a mean one Mr Grinch" back. -----Original Message----- From: Marcel [mailto:Marcelrf@B...] Sent: Tuesday, January 14, 2003 6:44 PM To: kondrak Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Spyking/Frank Jones associates by the name ofTerry Kawles I found it amazing that public safety would associated themselves with someone with such a questionable past. The documents presented by jma surely should raise some antennas. kondrak wrote: > As an aside, we had a machine in that was allegedly infected with his > software, and found several easily identified viruses, that's how stealthy > his crap was. Machine was cleaned in an hour, and we sent it back out with > a IDS system installed to see if there was any future attempts to access > it. None ever returned. > His crap used FTP to communicate, and it was easily defeated with proper > fire-walling. > > At 16:48 1/14/03 -0500, you wrote: > >Amazing simply amazing. > > > > > >I'm sure you have seen this......... > > Yup... > > >http://212.100.234.54/content/55/24477.html > > > >http://212.100.234.54/content/55/24461.html > > > >http://212.100.234.54/content/55/24456.html > > > >http://212.100.234.54/content/55/24433.html > > > >http://212.100.234.54/content/archive/19480.html -- "NEXTEL-1 IT'S NOT JUST NEXTEL" Note The New address Subscribe to Nextel-1: http://www.groups.yahoo.com/subscribe/NEXTEL-1 "NEXTEL2 FOR iDEN SOFTWARE DEVELOPERS" Subscribe to Nextel2: http://www.groups.yahoo.com/subscribe/NEXTEL2 "WIRELESS FORUM HOMELAND SECURITY GROUP" The Complete Resource for Wireless Homeland Security. Subscribe to WFHSG: http://www.groups.yahoo.com/subscribe/WFHSG ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6762 From: John McCain Date: Tue Jan 14, 2003 11:19am Subject: Another antenna question Along the same line, I use a couple of "professional quality" amateur or "commercial" discones for vhf/uhf. Antennas that I've had for a couple of decades. I have little exposure to government or lab grade portable antennae, and wonder if anyone is aware of an economical (what an adjective :,) discone that is faster to deploy than having to screw 32 small rods into the center castings. I was thinking of simply cutting off the rods about a half inch from the center and slipping small springs over the cuts to make it "pop out" of a tubular transit case, but didn't like the though of brass or steel springs in the middle of my aluminum antenna. Anyone with experience trying this, or know of a similar antenna? Cheers, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-897-6600 2949 CR 1000N Web: http://www.dcbnet.com Dewey, IL. 61840 Email: Jmccain@d... 6763 From: James M. Atkinson Date: Wed Jan 15, 2003 9:20am Subject: Re: Another antenna question First, exactly match the material content of the antenna to that of the spring (both should be steel. Second, be sure to trim off enough of the original element to compensate for the added length of the spring. Third, install a small tip or coating on the ends of the elements so that you don't put an eye out if it gets away from you. Fourth, Use a velcro strap to restrain the elements, and do not let them "pop out" as you risk physical injury You will get better performance if you DO NOT use the springs, and use a solid element Always use a decent low noise 25-30 dB amplifier with a broad band antenna such as a discone. Having a dozen of so cheap band pass filters in front of the amplifier will do you a world of good. -jma At 11:19 AM -0600 1/14/03, John McCain wrote: >Along the same line, I use a couple of "professional quality" amateur or >"commercial" discones for vhf/uhf. Antennas that I've had for a couple of >decades. > >I have little exposure to government or lab grade portable antennae, and >wonder if anyone is aware of an economical (what an adjective :,) discone >that is faster to deploy than having to screw 32 small rods into the center >castings. > >I was thinking of simply cutting off the rods about a half inch from the >center and slipping small springs over the cuts to make it "pop out" of a >tubular transit case, but didn't like the though of brass or steel springs >in the middle of my aluminum antenna. Anyone with experience trying >this, or know of a similar antenna? > >Cheers, >JohnM > > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-897-6600 >2949 CR >1000N Web: http://www.dcbnet.com >Dewey, IL. 61840 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6764 From: kondrak Date: Wed Jan 15, 2003 9:49am Subject: Re: Another antenna question How about, putting banana jacks on the base, and plugs on the radials? I'd make the base out of say brass or something durable, and just drill holes to accommodate the banana plugs. I realize not everyone has access to a machine shop, but its a thought. >I was thinking of simply cutting off the rods about a half inch from the >center and slipping small springs over the cuts to make it "pop out" of a >tubular transit case, but didn't like the though of brass or steel springs >in the middle of my aluminum antenna. Anyone with experience trying >this, or know of a similar antenna? > >Cheers, >JohnM > > > > >Manager, Corporate Security Voice: 217-352-3207 >Data Comm for Business, Inc. Fax: 217-897-6600 >2949 CR >1000N Web: http://www.dcbnet.com >Dewey, IL. 61840 Email: >Jmccain@d... > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6765 From: Hawkspirit Date: Wed Jan 15, 2003 10:44am Subject: Cordless Phone Monitoring While doing a sweep yesterday for a client in a condo who had an opposing party in a litigation rent an apartment under him, I had an interesting result with his cordless phone (Sanyo CLT-957). After disconnecting the clients cordless phone base from the AC, every time I initiated the handset into transmission I had a return RF handshake at the exact same frequency and matching 913MHZ digital spread spectrum wave pattern. No dial tone but a matching wave pattern reply. Does anyone know the circuits in these units well enough to tell me how a covert specialized receiver would use this setup and handshake to adjust its receiving frequencies for monitoring. Roger Tolces Electronic Security www.bugsweeps.com 6766 From: Kirk Adirim Date: Thu Jan 16, 2003 0:05am Subject: Re: another antenna question If you place springs in line with the elements make sure you bypass them with copper braid soldered to each end of the elements. This prevents the spring from acting as a loading or phasing coil and will also short out any noise generated by the dissimilar metals in the spring. Any movement or corrosion between disimilar metals can act as a noise generating diode (PN junction). You could also replace your elements with flat 1/16th inch spring steel strips that are cut to the same length. Another solution would be to cut a skirt of brass mesh to wrap around your elements to the same length. Now remove all but 4 of the elements to hold the skirt in place. You'll have to devise a way to electrically secure and connect/disconnect the skirt to the 4 elements or collar. The mesh will replicate the 32 elements or cone. Now you only have 4 rods to install and the mesh skirt will roll up for easy transport. Kirk www.tactronix.com [Non-text portions of this message have been removed] 6767 From: Does it matter Date: Tue Jan 14, 2003 2:03pm Subject: info http://hot.ee/nuhk/tempest.html http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=14077 http://www.ebiz.co.za/L_SCRIPTS/Regular.ASP? pklRegularID=889&pklIssueID=294 Some more info about that Attorney. 6768 From: Date: Wed Jan 15, 2003 10:56am Subject: Rif: Re: Another antenna question > First, exactly match the material content of the antenna to that of > the spring (both should be steel. Does the material really matter, as long as it conduces electricity well, and has a reasonable dimensinal stability? I thought it was mainly the length of the rod that matters, as it must resonate at the appropriate frequency, and therefore must be one nth of the wavelength. Remo Cornali 6769 From: bc Date: Wed Jan 15, 2003 9:51pm Subject: fyi: ~e; Electromagnetic News & Views #10 a sample of a newsletter from the electronetwork.org which compiles news from various sectors/disciplines with electromagnetism as a common theme or context. it is part of an electromagnetic educational initiative- to find out more please visit http://www.electronetwork.org/ =================================================== Electromagnetic News & Views -- #10 =================================================== 01) Top Stories of Electromagnetism 02) Electromagnetic health & medicine 03) Electromagnetic trash & treasure 04) Electromagnetic security & surveillance 05) Electromagnetic power & energy 06) Electromagnetic current & human affairs 07) Electromagnetic transportation & communication 08) Electromagnetic matter & information 09) Electromagnetic trends & inventions 10) Electromagnetic weaponry & warfare 11) Electromagnetic business & economics 12) Electromagnetic art & artifacts =================================================== 01) --top stories-- --------------------------------------------------- Vatican warning on danger of 'online confession' "THE Vatican has warned Catholic bishops and priests not to use the internet to hear "online confessions" in case they are read by "ill-intentioned people such as hackers" for purposes such as blackmail." // you would FTP files or check e-mail from a wi-fi cafe? Expert: Alleged Wi-Fi Risks Are Nonsense By Mitch Wagner "The solution is not to limit Wi-Fi, but rather to install personal firewalls on each computer, and encrypt all traffic going over the network, Doctorow said." // waiting for ISPs and Webhosts to offer this service to // avoid liability issues for unsecured access/transit... How Secure Is Secure Shell? Despite its vulnerabilities, SSH is far better than its unsecure cousins, including Telnet, the "r" commands and FTP, which transmit usernames and passwords -- and everything else, for that matter -- as clear text. Stealth Antennae Try to Blend In "There are about 130,000 communications antennae in place across the United States, according to industry officials. Roughly 75 percent are standard antennae. The rest have been surreptitiously stashed in scenic simulations. "The next time you see a picturesque shot of rocks, a flagpole, a church steeple, cacti or trees, consider that there might be more there than meets the eye..." Phone Units Join in Effort for Seamless Wireless Net "Most Wi-Fi networks have focused on transfer of e-mail messages and other forms of data from laptop computers but the goal of the three companies is to offer seamless transitions to cellphone users as well." IBM's New PDA Provides a Measure of Security "Instead of swiping a badge through a reader, the employee places his or her thumb on the Paron's small fingerprint-recognition screen. A wirelessly connected server reads the fingerprint, makes an identification, and grants access if a match is found between the individual making the request and the stored data. Do told NewsFactor that the Paron features CDL's proprietary encryption processor, the CDL-82, enabling secure wireless transmission of sensitive voice calls and data. It also has a smart-card reader for ID cards." --------------------------------------------------- 02-- electromagnetic health & medicine --------------------------------------------------- When the Athlete's Heart Falters, a Monitor Dials for Help "Soon, machines may be able to do some of this emergency dialing on their own. Manufacturers are working on wearable heart monitors linked to cellphones that can sound an alert automatically, contacting a doctor, family member or Web site when trouble beckons." Chip Plants Take Heat for Toxics "A government health agency ordered Motorola and two other leading semiconductor makers to tighten up their handling of carcinogenic and toxic materials after a groundbreaking investigation uncovered holes in their safety procedures." Charting the hidden force at street corners "Havas is quick to point out there is no proof, as yet, that electromagnetic fields directly cause illnesses. But there is plenty of evidence showing they are associated with illnesses and can promote them. Her work on Main Street, Ontario, should be a wake-up call to public utilities and other businesses generating electromagnetic fields, such as banks and cellphone companies, which one day could face lawsuits from people claiming compensation for impaired health." --------------------------------------------------- 03-- electromagnetic trash & treasure --------------------------------------------------- What to Do With That Old, Slow PC Don't throw away your old computer. Some manufacturers offer trade-ins and rebate programs so you can recycle what you no longer want to use. By Kendra Mayfield. // will the 4-fold increase in e-waste be due to HDTVs? E-Waste: Dark Side of Digital Age U.S. computer makers are improving recycling programs, but they still lag behind Europe and Japan in managing toxic e-waste. Most U.S. manufacturers received failing grades in an annual Computer Report Card survey. By Kendra Mayfield. "The SVTC report card evaluated the firms based upon criteria gleaned from the companies' websites. Only one company, Fujitsu, received a passing grade. Fujitsu...developed technologies to eliminate toxic chemicals by developing lead-free products. "The leadership continues to be by and large the Japanese companies, and the U.S. companies tend to be far behind," Smith said." ... "The report also criticizes Dell's use of federal prison labor to recycle old computers, which it says exposes inmates to toxic chemicals without the same health and safety protections as workers at other facilities." Consumer Electronics Show Panel Addresses E-Waste For videocassettes, the end is near --------------------------------------------------- 04-- electromagnetic security & surveillance --------------------------------------------------- George Orwell, here we come By Declan McCullagh "But what could Poindexter and the Bush administration devise in five or 10 years, if they had the money, the power and the will? That's the real question, and therein lies the true threat. Even if all of our current elected representatives, appointed officials and unappointed bureaucrats are entirely trustworthy--and that's a pretty big assumption--what could a corrupt FBI, Secret Service or Homeland Security police force do with advanced technology by the end of the decade? What if there was another terrorist attack that prompted Congress to delete whatever remaining privacy laws shield Americans from surveillance?" What CIOs Need To Know About New Firewall Tech N.R.C. Excludes Terrorism as Licensing Consideration 'The Nuclear Regulatory Commission has ruled that the threat of terrorism cannot be considered when licensing reactors or other nuclear installations because the risk is too speculative. The commission also said discussing the issue in licensing hearings would give too much information to terrorists and might "unduly alarm the public."' // for those who can still sleep, this may be unwelcome // news. especially given the fact that a nuclear reactor // _was officially targeted by a hijacked airplane on 9/11... Nuclear Licenses Need Not Consider Terrorism Threat "The threat of terrorism is too nebulous to be considered when licensing nuclear reactors and other such facilities, the Nuclear Regulatory Commission (NRC) has concluded." U.K. school to use eye scanner for lunch fees IT Resists Mandatory Cyber-Security // absurdity // else, there is always the 'terrorism' weather map, // where hotspot zones are shown during TV newscasts... Officials consider faster ways to alert U.S. to terrorism "[The Commerce Dept.] would also explore new ways to disseminate the warnings through the Internet, cell phones and new technology to turn on TV sets. Specially equipped televisions, radios, pagers and other devices already exist to decode EAS messages, according to a fact sheet distributed by the Federal Communications Commission. Consumers can program these products to turn on automatically for the messages they want to receive." Top Vulnerabilities in Web Applications from the Open Web Application Security Project (OWASP) Nuclear Terrorism --- How To Prevent It "Less than 18 pounds of plutonium or 55 pounds of highly enriched uranium are sufficient to make a nuclear bomb, but these materials circulate in civilian nuclear commerce by the ton." Security cameras are getting smart -- and scary + Hong Kong gym pulls plug on camera cell phones + Tiny Cell Phone or Big Brother? --------------------------------------------------- 05-- electromagnetic power & energy --------------------------------------------------- White House Installs Solar Panels "The Bush administration has installed the first-ever solar electric system on the grounds of the White House." 'Fog City' Catches a Few Rays "A principal goal of the Vote Solar Initiative is to lower the cost of solar energy by increasing demand. More demand will lead to greater production capacity through the creation of new solar-power systems. While those systems initially represent an added cost, they will be paid off over time with savings from lower energy bills. And once that happens, consumers can end up spending less on electricity generated through solar power than other means." U.S. Senate Bill Would Cap Greenhouse Gas Emissions "WASHINGTON, DC, January 8, 2003 (ENS) - A bipartisan bill introduced in a U.S. Senate hearing today would attempt to curb global warming by establishing a market based trading system in greenhouse gas emissions. The bill, the first major piece of environmental legislation to be introduced in the 108th Congress, was met with rousing endorsements from the conservation community. Senators Joe Lieberman, a Connecticut Democrat, and John McCain, an Arizona Republican, said their bill would spur innovation by giving companies maximum flexibility in meeting national greenhouse gas emissions goals." Brazil wants to master all facets of nuclear technology ""Nuclear energy represents a wide field of knowledge and the nuclear bomb is just a fragment of that knowledge," spokeswoman Fernanda Melazo quoted Amaral as saying Tuesday. "We want to acquire this knowledge because of its applications in medicine, food production and in many other peaceful endeavors."" Ice storm danger melting away "...when ice storms strike as they did in Canada and the American north-east in 1998, power lines can become so encrusted with ice that they collapse, leaving millions without electricity. But Victor Petrenko, at Dartmouth College in New Hampshire, thinks he has a smarter idea - use the ice itself as the element. Working with a consortium of US and Canadian power companies, he has developed a system that sends high-frequency electrical signals along the cables to create a current in the ice build- up and melt it." OPEC Agrees to Increase Its Oil Production Quotas by 6.5% "Though the new quota is an increase from the 23 million level set only a month ago, analysts said the actual amount of additional oil that enters the market will be smaller, meaning that its effect on prices could be muted. "This isn't going to lead to any collapse in prices," said Raad Alkadiri, a consultant at PFC Energy in Washington." // another way of constituting the European Union... European Cross-Border Power Costs Halved in 12 Countries '"The agreement marks a further step in the construction of a single European market in electricity," said GRTN Chairman Salvatore Machi.' --------------------------------------------------- 06-- electromagnetic current & human affairs --------------------------------------------------- Study: Online Polls Skew to Right // Conservatives media In Italy, an SMS a Day Can Keep the Devil Away "Italy's largest mobile phone operator, TIM, has begun a service to offer clients SMS messages with "the prayer of the day," "saint of the day" or "gospel of the day."" TV Ads Say S.U.V. Owners Support Terrorists // oil addiction "Patterned after the commercials that try to discourage drug use by suggesting that profits from illegal drugs go to terrorists, the new commercials say that money for gas needed for S.U.V.'s goes to terrorists." // how much of this is social programming, from youngest // ages to college career paths? personal evidence in math // classes never indicated any difference in abilities. and // a young niece is fascinated and loves to learn about how // computers work, cables, printers, soon, circuitboards. if // young people were all given equal access to this knowledge, // a lot of it is simply fun, and at the same time, they can // gain confidence. especially if programming skills were to // be taught at an early age, before the complexities of real // life overwhelm the abstractions of computer programming... Where the Girls Aren't // inequalities in Computer Science... Fight with computer brings SWAT team No charges filed after misunderstanding cleared up "It turned out that the man was simply upset at his computer ≠ which he had called a "bitch" he "wanted to kill," police said ≠ and the gun was a plastic pellet gun, not the .45-caliber automatic handgun it was made to resemble." --------------------------------------------------- 07-- electromagnetic transportation & communication --------------------------------------------------- Is that "hot spot" hot or not? A group whose certification mark for wireless gear is considered essential by U.S. manufacturers has now developed a seal of approval for commercial wireless "hot spots," places where wireless Web access is available to the public for a fee. "To earn its new Wi-Fi Zone label, hot spots will have to use Wi-Fi certified products. They will also have to make it possible for someone to connect using a Virtual Private Network, which is used to secure the data over the air. The Alliance, however, isn't requiring hot spots to use any stronger forms of security, including Wi-Fi Protected Access , a security standard the Alliance proposed in October, Wi-Fi Alliance representative Brian Grimm said Thursday." A defining moment for TV. Mike Snider, USA TODAY "This could be digital television's year." Laos Online: Pedal for Its Mettle "...volunteer tech experts working with the Remote IT Village Project in rural Laos say that all it takes is some pedal-powered generators, a few wireless antennas and some rugged, Linux-powered computers." Plug Power Announces Agreement With Honda R&D to Jointly Develop Home ReFueling System "Plug Power will integrate one of its GenSys (TM) 5C stationary fuel cell systems with additional components necessary for the home refueling concept, which will be supplied by Plug Power and Honda R&D." Gentlemen, Start Hacking Your Engines "Engine control units first appeared in cars in the late 1970's. By regulating fuel injection, air and ignition far better than older systems that relied on carburetors and distributors, the E.C.U. resulted in better gas mileage and fewer emissions. These "black boxes" are now so ubiquitous and advanced that if your car has an engine problem, a mechanic can diagnose it by simply plugging the car into a computer." How Caching Works "Caching greatly increases the speed of data retrieval from your computer's memory. Know how? Find out why a little cache goes a really long way." More Cities Set Up Wireless Networks "Add urban renewal to the growing list of reasons to deploy wireless computing networks." Wi-Fi takes to the skies // from 500mph @ 30,000 feet... --------------------------------------------------- 08-- electromagnetic matter & information --------------------------------------------------- // excellent article, if interested in particle physics... In a Lab on Long Island, a Visit to the Big Bang "The time machine ≠ the Relativistic Heavy Ion Collider, known affectionately at the Brookhaven National Laboratory here on eastern Long Island as RHIC (pronounced rick) ≠ is designed to make a Little Bang, recreating a tiny dollop of the hot, mysterious soup of particles that scientists say existed a split second after the gargantuan blast that started it all. ... "Theory holds that less than a trillionth of a second after the Big Bang (and after a sudden growth spurt known as inflation), the early universe, about the size of a marble or a grapefruit, underwent a transition to a new state of matter, as water does in cooling to form ice. "In this new phase, the cooling particle soup consisted mainly of quarks, a species of subatomic particle, and force carriers known as gluons. This small universe, after expanding to about the size of this solar system, then underwent another transition, forming subatomic particles like the protons and neutrons of everyday matter." Nanotech Scientists Build Super-Small Circuit "Electrons will jump from the metal tip of an electrical source to a lever coated in nanoparticles made of gold, the researchers discovered. The jumping electrons pull the lever toward the tip, closing a simple circuit that may be the smallest ever devised." First speed of gravity measurement revealed "The speed of gravity has been measured for the first time. The landmark experiment shows that it travels at the speed of light, meaning that Einstein's general theory of relativity has passed another test with flying colours." Beyond the Blackboard "The board shows whatever a professor writes on it as well as anything -- text, charts, still and moving pictures -- stored in a computer plugged into it. With a remote mouse, teachers can edit and move the material around on the board, which has the touch sensitivity of an A.T.M. screen." Magnetars Some stars are magnetized so intensely that they emit huge bursts of magnetic energy and alter the very nature of the quantum vacuum Explaining the Moon's Ancient Magnetism Device demos terabit storage // ferroelectric vs. magnetic // also for dumb-terminals via fiberoptics and home servers..? Remote monitoring aids data access // sends video vs. data "The Sandia method doesn't transfer data at all, but instead transfers the video signal that normally carries image information from a computer to its monitor. "The video card is designed to put out a video signal to a local monitor... we extend the signal," said Eldridge." --------------------------------------------------- 09-- electromagnetic trends & inventions --------------------------------------------------- Physicist proposes deeper layer of reality New theory takes the chance out of quantum mechanics. "'t Hooft is not about to resurrect hidden variables. But neither is he convinced that quantum uncertainty has to be the final word. "Contrary to common belief," he says, "it is not difficult to construct deterministic models where quantum mechanics correctly describes stochastic behaviour, in precise accordance with the Copenhagen doctrine." ... The key, says 't Hooft, is information loss. At the smallest conceivable size scale - the Planck Scale, many trillions of times smaller than the nucleus of an atom - there exists complete information about the world." 'Gadget printer' promises industrial revolution "The idea of printing a light bulb may seem bizarre, but US engineers are now developing an ink-jet printing technology to do just that. The research at the University of California in Berkeley will allow fully assembled electric and electronic gadgets to be printed in one go." What Happened to 3G? // more confusing than ever... "The unhappy conclusion is that Europe, after the runaway success of Global System for Mobile Communications (GSM), may have got it very wrong with 3G and may now be five years behind the U.S." // when will Japan start exporting everything they make? Trendsetting Wireless Wares Interchangeable face plates, lighted keypads and flashy antennas make cell phones cool for trend-conscious users. Because teenagers are a large and growing segment of the wireless consumer market, customized looks likely will dominate accessory lines. The Honda Humanoid Robot: ASIMO // here is one way they are being imported... The Coolest Notebooks You Never Saw "Major Japanese computer companies such as Sony, Toshiba, Fujitsu, and Panasonic make some amazing notebooks that pack style and functionality into cases that weigh as little as 1.8 pounds. There's just one catch: They produce them for their home market and don't sell them in the United States." Massive Data Storage in Tiny Devices Redefining the PC INVENTOR THROWS CURVE AT SCREENS TO MAKE THEM MORE USER-FRIENDLY By Kristi Heim Mercury News Seattle Bureau "Starkweather's new prototype screen is 12 inches high, 44 inches wide and curved 90 degrees. He uses digital light projectors and telescope mirrors to remove the distortion caused by the curved screen. The screen is five times as bright as a standard cathode ray tube or liquid crystal display monitor, helping to reduce eye fatigue." Internet browser that quadruples surf speed wins Irish science prize "Adnan Osmani, 16, a student at Saint Finian's College in Mullingar, central Ireland spent 18 months writing 780,000 lines of computer code to develop the browser. Known as "XWEBS", the system works with an ordinary Internet connection using a 56K modem on a normal telephone line." Leapfrogging to Cellular // in Central and Eastern Europe... Wireless telephony is a prime example of technological leapfrogging. Faced with crumbling fixed line networks, years on waiting lists, frequent interruptions of service and a venal bureaucracy, subscribers opt to go cellular. Full-Length Movies Play on Palm-Size Computer // VCR quality Giant electromagnets to moor ships // remove metal jewelry... --------------------------------------------------- 10-- electromagnetic weaponry & warfare --------------------------------------------------- Scientists seek 'super-soldiers' formula "One of the agency's plans for keeping warriors awake is to "zap" their brains with electromagnetic energy. Much of the research is being conducted at Columbia University in New York, in the laboratories of the neurological science department. Researchers have identified a small area of the brain above the left ear that they would zap either before or during missions. "When he needed it, the pilot could just be zapped during operations," said one leading research scientist." Robots for the masses "Pasadena, Calif.-based Evolution Robotics said its technology that lets a robot determine its position relative to its environment is based on wheel sensors and a Webcam that cost less than $50. That's a fraction of the cost of current robot navigation systems relying on laser range finders, which can cost $5,000, the company said." N. Korea leaves nuclear weapons treaty "As it announced it would pull out of the treaty, a keystone to global nuclear nonproliferation, the North warned the United States not to take military action against it. Pyongyang said a "new Korean War will finally lead to the Third World War" and that the North could hold its own in a "fire-to-fire standoff." The comment was distributed by the official North Korean news agency in English." US Government Starts E-Mail Campaign to Key Iraqis "The U.S. military has begun an e-mail campaign urging military and civilian leaders in Iraq to turn away from President Saddam Hussein as the Pentagon builds forces for a possible invasion of the country, defense officials said on Saturday. Visitors to the Iraqi capital, Baghdad, confirmed the electronic mail campaign, part of a psychological war mounted by elite U.S. Special Operations who also have been broadcasting messages from planes over the past month." (and in related news...) Iraq pulls plug on e-mail "Iraq has blocked access to e-mail following an electronic campaign by the US urging key military and civilian figures to turn against President Saddam Hussein." // note: this sabotage is similar to that which killed an // opposition leader in the days preceding 9/11 via either // a gun/bomb disguised as a television camera. same locale. Tape-recorder bomb kills 2 in Afghanistan KABUL, Afghanistan (AP) -- An electronics repairman in northern Afghanistan and his friend were killed by a bomb in a tape recorder that exploded when batteries were inserted into the device, a regional military commander said Monday. ELECTRONIC BATTLEFIELD: The Laser Storm (Jan 14th) // hybrid-electric and fuel-cell vehicles in new .mil gear... Future Combat Systems (FCS) "For transportation, the FCS will rely on hybrid electric vehicles, which use less fuel and have the added advantage of being able to recharge batteries used for the other FCS electronic systems. Research is also being funded for the development of electricity- producing fuel cells for the same reasons. Some FCS vehicles will be robots whose job will be to scout ahead of the main force to test for nuclear, biological and chemical threats..." --------------------------------------------------- 11-- electromagnetic business & economics --------------------------------------------------- // this appears to be about commercial rents, not residential // yet the wildest story i heard about during the late 1990s // was a single-bedroom house (very very small) going for one // million US dollars, as the housing market was so competitive. // rents have been so high that lower-paid workers cannot find // housing in the area, too, which explains the freeway gridlock. Silicon Valley rent plunges Rent in Silicon Valley for high-tech commercial real estate fell almost 30 percent in 2002, extending a slide that began a year earlier, according to a new study. // of radio frequency identification (RFID) tags... R.I.P UPC? Major retailers to test "smart shelves" Two major retailers and a consumer products giant are teaming up to test a new "smart shelf" technology that allows for real-time tracking of inventory levels. & Gillette To Test MIT 'Smart Tags' MIT's Auto-ID Center developed the technology. Center executives claim it could revolutionize supply chain and inventory management and save businesses billions in losses from out-of stock, stolen or wasted products. & Tech riding on wave of cheap chips Consumer technology in the near future will be driven by low-cost microprocessors, says an industry trend-spotter "Embedded processor technologies that will lead to new applications include cheap sensors, such as those used in global positioning systems and video cameras, as well as radio frequency identification tags, Saffo said." Electronics Gives Chaos a Good Name Minimizing the amount of spray used in a manufacturing process can have other than fiscal benefits. For instance, zinc-based shielding materials used on computer terminals to eliminate electromagnetic interference are toxic in large doses. Schools' Internet Subsidies Are Called Fraud-Riddled New Respect for the Internet Bubble-Blowers Today's business models must be solid, even if the underlying e-commerce ideals are the same as those heralded during the dot-com heydey. "Indeed, even if they lose money, Web sites are increasingly key for any business..." Help for life-cycle assessments for electronic equipment // something WiFi is going on... Duracell batteries is // also cutting its base prices by a large percentage... Intel shaves mobile chip prices --------------------------------------------------- 12-- electromagnetic art & artifacts --------------------------------------------------- sonic light: composing light, articulating space // thanks H "The vision of a 'music for the eye' is centuries old and forms an important undercurrent in the recent history of art and the new media: from the construction of the first colour organs, light sculptures and the first use of coloured lighting in theatre, through abstract film animation and synthetic video images, to the design of interactive software to generate light and sound. The idea of a music and light art form to be presented in an environment specially designed for that purpose becomes topical every time a new visual medium appears on the horizon. Among the present generation of computer artists a new type of visual music is being created which can be performed live or made specially for the Internet. // related to EM media's predominance in copyright issues An Exhibition That Borrows Brazenly By CHRIS NELSON The rapper has long fought restrictions on sampling...Where does it stop?" he asked. "Does a lawn mower company copyright its sound? Does a Macintosh copyright its sound when you hit the keyboard? I don't think you can copyright sound. You can copyright compositions. But nobody invents a sound." How Electromagnets Work // maybe applicable to certain artists explorations... Grants Available for Environmental Education =================================================== * to subscribe to the electronetwork-list, send an e-mail to lists@o... with the following command in the body of the message: subscribe electronetwork-l * to unsubscribe: unsubscribe electronetwork-l * for more info contact human @ electronetwork.org --------------------------------------------------- please forward this to your friends and colleagues --------------------------------------------------- the electromagnetic internetwork-list electromagnetism / infrastructure / civilization archives.openflows.org/electronetwork-l http://www.electronetwork.org/ 6770 From: Matt Paulsen Date: Thu Jan 16, 2003 11:30am Subject: time source? cdma/gps device, suggestions? Looking for a time source that has very little flutter. Needs to be network attached to support NTP and also be able to support frame/t1/isdn etc timing. Plan is to put it on a roof with an omni up about 150' and down via fiber to IDF's/MDF's in the buildings. Have considered this. Anyone from Verizon, ATT, Qwest, etc lurking that can help? NetClock/GPS: Receives time signals from the Global Positioning System (GPS) satellites, and automatically sets its time to within 500 nanoseconds. The RS-232 and RS-485 ASCII time code outputs used for computer time setting are accurate to within 10 microseconds. This unit also provides an IRIG, 1PPS and 10-MHz outputs. TIA, Matt 6771 From: Steve Uhrig Date: Thu Jan 16, 2003 7:16pm Subject: Public input on hacker sentencing OFF WITH THEIR HEADS! ... Steve "Feds Seek Public Input on Hacker Sentencing" SecurityFocus Online (01/13/03); Poulsen, Kevin The United States Sentencing Commission (USSC) engaged the public for advice last week on whether prison or probation sentences for cybercriminals are adequate enough, or should be stronger. Michael O'Neill of George Mason University Law School says, "We want to know whether or not the relevant community...believes that serious penalties will deter people from engaging in that sort of conduct." The public can provide suggestions by accessing a formal "Issue for Comment" posted on the USSC Web site; the period for public comment will continue until Feb. 18. In addition to a general overview of the question of whether penalties for cyber miscreants are strong enough, the forum seeks advice on eight proposals to take additional factors into consideration when determining a sentence. One proposal suggests adding points--and thus extra jail time--to sentences if the hackers commit their crimes for financial gain, or to violate a person's privacy. For now, the sentencing guidelines for computer crimes are the same as those for larceny, embezzlement, and theft, in which the financial loss inflicted is the primary consideration. However, the Homeland Security Act and the congressional emphasis on cyberterrorism required the USSC to review its cyber crime sentencing guidelines so that they take into account "the serious nature of such offenses, the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses." The Homeland Security Act also authorized the creation of penalties for hackers whose activities result in a loss of human life. Orin Kerr of George Washington University Law School thinks that computer crime sentences are as harsh as normal sentences, if not harsher, according to some provisions. http://online.securityfocus.com/news/2028 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6772 From: Matt Paulsen Date: Thu Jan 16, 2003 7:24pm Subject: RE: Public input on hacker sentencing Make them watch barney and elmo tapes.. constantly... -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Thursday, January 16, 2003 5:17 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Public input on hacker sentencing OFF WITH THEIR HEADS! ... Steve "Feds Seek Public Input on Hacker Sentencing" SecurityFocus Online (01/13/03); Poulsen, Kevin The United States Sentencing Commission (USSC) engaged the public for advice last week on whether prison or probation sentences for cybercriminals are adequate enough, or should be stronger. Michael O'Neill of George Mason University Law School says, "We want to know whether or not the relevant community...believes that serious penalties will deter people from engaging in that sort of conduct." The public can provide suggestions by accessing a formal "Issue for Comment" posted on the USSC Web site; the period for public comment will continue until Feb. 18. In addition to a general overview of the question of whether penalties for cyber miscreants are strong enough, the forum seeks advice on eight proposals to take additional factors into consideration when determining a sentence. One proposal suggests adding points--and thus extra jail time--to sentences if the hackers commit their crimes for financial gain, or to violate a person's privacy. For now, the sentencing guidelines for computer crimes are the same as those for larceny, embezzlement, and theft, in which the financial loss inflicted is the primary consideration. However, the Homeland Security Act and the congressional emphasis on cyberterrorism required the USSC to review its cyber crime sentencing guidelines so that they take into account "the serious nature of such offenses, the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses." The Homeland Security Act also authorized the creation of penalties for hackers whose activities result in a loss of human life. Orin Kerr of George Washington University Law School thinks that computer crime sentences are as harsh as normal sentences, if not harsher, according to some provisions. http://online.securityfocus.com/news/2028 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6773 From: Ocean Group Date: Thu Jan 16, 2003 7:45pm Subject: CSE... -----BEGIN PGP SIGNED MESSAGE----- Hello, If there is anyone here from the CSE could you please contact me off list. Thank you, Kind regards Vance Deran Ocean Group, Technical Security Division, Ireland. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQINBD2ItiQBEADUGR+tkegYQJtSmiGVwUZW0xXtj9DeYXIFcVKywTNETPmqs1xf s6L/QP2DgoaJsxpy/Knr06QqDq8NbJdSH63cBtUcOM6TSmvei9KzaXvKTYdKyLrd kPOvXAZq+4YrwHXY5oH9tL0HdtouBnLxQjIy5OVUlohRcYBZQKusoIyeH8SQVqqZ yXTT9X7hYINYwfbEQG7rZG39QS3o7DrtKQ8zGOUlPIuSjyKVY0YU/IRm/shUOmzm FsKrtIx0+NuYZHiML+UN0XM+xX3n55i4lEiIAnCi7uCleeETJSEusQJ1FnEWFjN2 atYG6OQVWofWhzW4O3pcPfmH2vOICpG07lMe88rF2Q+JK0cTUwJbRV/LWSi5QCmU DSdL/v5/3wVnAzoZAzknsmmN09gJPT7kOpqnMdHqhwgyh4txL1MTPcOm36ncRTTv 9Wx4KanMLsyFCaLXfezwUr/sbG5qycsd1cxj/+QbaCCHcYuMg8CXh5tCUagKNwUj kQETM3qPI6hsw7fY1k9BrD3JAx0FDNektPAkoxUbl4s/bZ9+mJEit2PIIPNNnwOS infadjbkkt/7Z5ltMmgOxMFwyLjbjZJNalGUFGMD8i7HU9Anh/330H/Vd2ROiwIj DwBbclzlc3jyvUFdXsN0l2Kj4l9fXB6KQ6Qkdr2hWAMbLRvxr5/coUFQFQARAQAB tBtPY2VhbiBHcm91cCA8aW5lcnRpYUAwMi5pZT6JAi4EEAECABgFAj2ItiQICwMJ CAcCAQoCGQEFGwMAAAAACgkQDmqiVDJj1Od7Cw//YcIHVBei7u4imWX0/YpcaNlw brzNKe6Y2qXIKb4BH5HJjTNraZY47X3sWAYXXjUygztnkX9LPiRtTgGzZ5T/Hn1Q GS74SNp+0Qeuy/aMvAKZuZqiYvLIWbXLKZq3+dihoBUSQQDc19ap+H77xnfhv2DW kbfRn37MSz9Lw608NfGD3ZZmtlclI/v1hVphlaH057Imj4mh5Ycnig9kHwml6zwQ ZtAh1T6gddMuQGhvdfZVZwOTE3Xo2P3IlM2Ct2mj1FNY9No21NknaLBZs6zsAAbs VyXIdaMnfoq1zXGd1uPQjMsftX1YajPoAVPo8uBF6EASL+RkpJejzRzCVV2yh6Ro LD6jBVMeqXxzTt+ZV/f05UhyhjtECk7roYld2/S9vAecVDjHb2WLfAX8iLGXQhCo v2fwQ7QUqtc7pWqkOd3iP1mpRw41kQ/8imA9vUqLqQZQ+40QzCxDCFZ2tXGT2jHN bXqzEU2BAtulPcX0IbTLwv4GgUC7Kn++9aUBg/++lKTWkyLFP0jfaSONYKWb2mLy TZnhp4B1mEx9SDh4zBfOuagY6gpZ9DQ4vSUkRRF38YsNpqA5KibRC2But3kNssyW VTw8l6ShTg7XWvD3FNEawl2Ngo7BJOQ0D5YZPx06eje+JX5F6R2XVx+BiJ1trOuJ Y7UaLj6AtDBaSx6hXM25Ag0EPYi2qQEQAPIHSV9nSUsXnNWUFGKiSJ2+Yfbv5ibG m2DC9nXotMgRyZc/Pto0Xwr/77rgeASlMRKXlVbpCO6nwrLV5aVLib8tCg4qVQMK 3J+aX79nU1KXiFgCqos3M6eQolEjykDhtFNj3Wc2KqFy00JGgeXwj9R+OdT4mUNG aQF1w9hnzys+a9ix4eY9m4AtlUtmRG7+gCW3vWVnhJ/ABQOVOcUL2JyZZBTgpA+Q /hQiGMH24WbilwWE+XhwOkGQUE5KgKHthmCMa3tWOk+f06PEiCjVjwkv6Fc60RHW pa+5PMHdq5zKozfDQR6hQRlZ3k/7Adfsyiw/5fCLbVl2TPaFyuE/n+pJmekd4xH1 /hw2N4EMgzau7t8gIRUUVTICXLdlMeboVrxQ1kuNlK/ZOiC9pdZeO18e/jhSQemC cd+awTOUATw9qV95TD4n5l3JlzbdrZQ7Fb3oIld2cqh1jMPypM8diWPnpyGiampm bfqQbU1dloN3Ng4U+X21jPrqeafvpQT8cnURDALTNdWynDAR7ta4pivb5UjKNDk2 C9Oy7KqKYPgB5hWKSEZs7iQDfWsO9opy8bRXZlau9JQnEY9cZd9Ty0XzYQGYvc65 K1Bd6h7NB9/5URYNmQuM/13OHukVCjTbgnT5GJLvIou4qba2UczuUrSPknQPheoy j208HYitdwwpABEBAAGJAiIEGAECAAwFAj2ItqkFGwwAAAAACgkQDmqiVDJj1OfU 0RAAtdEvkcJVHH3s08uYiatNBAhJML32UIx7nQXDalqiPdM1zJ7AmQjFjWvlqke0 4Y0PS1HFVAsvy1XRWdRAChRqfRXZ2dk+eJxMzHC/KtgrQHahUtPqYozQcVwgjWRC obWh9LwgOrFcXrzvv93D0D4VrDgKLvNmiPOoxe3GW1hUWwaf412zZ3wsAI/EiTDP wol4WvB5Mxe4397HsAKzbLAXuMa1D1RQNlWaK93EgTjn/F5SUWgMVyz3L4HcNF6a qWRft48BgCy8Oj8v9zY0BopWUU7vezFtKmXpfhmxcorKjO0qnkoijFlEph/zTvJz XiKelN6japucGc1EMz5WXI1q9C6Y9Y7KQciA8ZfvXlfZo48vAnfFC8tCgEkYzDJv wO/IebYhIcb9pyFdoZzkAi6yBDZHWRx5rj83X1eAF8Xf9lTtSBWkt49spyn7Ix1q WWnx3aBCC410bQwqWTjrohDi26YltcPOf3qt8QnvL8vy1j5OQRNS3y82opoKqbbf UHyiXUxF4+WiRFJk53D9JCxvgTzQFEQU+QKnqpIXuqppxh3CjfCYtvID8LIsHc2k f0fWZiDYQ3Y86bW421LGGaHt1i4W6K3czwyZVI+I8lJtb5FiDkKnGtKEM2lUwBvU 1oq9e5ySDyaXjg1la2m0gXGVGny0kdPrTasTzJ/Jd0CH8Vw= =OyUh - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use iQIVAwUBPidgGw5qolQyY9TnAQELYA//YReWVtKxECpiS2GCScGTNu3xb9KfzZyW nCvoldUG7qLmYlHTLxVu0imTpvXc0wd01AXXG79SCjaaS+NfAIPPRN2f89QeVss4 BTJMDVJiVezRC3zcdl5k8WLConi/iVTngFHBGoabdeynv5WS0Gr6u3gKxo9beANP NNNtLwzsnexi0cG9bjfIVpM0wAkDM5csoJv5/iZeGpiSCwlNCxrsFrQD3X/cPtjq AQCAbpKFx4AWfMvkWOe0FSnlZJSlYBASmaQPWZxP6sxXkng7kw8Okk+qSvWmMH8u gBA4l+ZFYhvhqfA+HVXHWLp1iADJf5a3bTe/oeRtzGl1wVjCPgQmMmWFp8wzYENU yymBTJn+5n26bCL6JFQXxCSsh0j+1fWNLhEXY+cz7deAfQyIk+Ex+m6NwT0HhDtn mzFpUPnQ8TvYpxlisDhbYpIUqro9dRfdi7GVAb9CwlV2/vFSj7BWgb0Tg6gFmfN4 I3KtMpX+HiyqWCHKv0SbySRmfm144ztS/M7bpB8/Svvb3LwmGVHFLIRM1UtmEz18 o6SVnMKJu+bs7hMqtKTbyUetOyT/PvHFXC/6/PjUNAjdelpMn7iNvotMqRwG41Qc NfZqbFLn6eYdx9ZPI6sEwoXqCTGV46X1Bi2wGYZ3j24W7DtDEQpaTBMYzBIIa3TT OxATs1flK1g= =+2Wp -----END PGP SIGNATURE----- 6774 From: Ocean Group Date: Fri Jan 17, 2003 7:09am Subject: RE: Public input on hacker sentencing Well I guess that would be extremely funny... However I think the ol' capital punishment is slightly sadistic.... I'd favour something like giving something back to the community... Years of community service for poor, homeless and kids charities etc. If they're gonna take from the community then they should have to give back to it as punishment. Not sit in a prison doing nothing having working people pay for their meals. My opinion anyway, Vance. Message: 3 Date: Thu, 16 Jan 2003 17:24:05 -0800 From: "Matt Paulsen" Subject: RE: Public input on hacker sentencing Make them watch barney and elmo tapes.. constantly... 6775 From: Trey A Mujakporue Date: Fri Jan 17, 2003 10:26am Subject: RE: Public input on hacker sentencing Personally I think they should adopt the points option, currently as pointed out in the initial publication, the main consideration for sentencing is based on the financial loss inflicted by the attacker. How can you justify giving the same sentence to hacker A, that "came" in (notice I use the words "came in" and not "broke in" via a badly configured machine e.g Adrian Lamo Vs a hacker that actually launched exploit code and "broke into" machine? E.g Kevin Mitnick? Adrian Lamo Links http://212.100.234.54/content/archive/24240.html http://212.100.234.54/content/archive/23218.html http://212.100.234.54/content/archive/19279.html Don't get me wrong.. Hacking is hacking, and murder is murder, but why can murder sometimes be called pre-meditated and sometimes called manslaughter? jmtpw -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 17 January 2003 01:17 To: tscm-l@yahoogroups.com Subject: [TSCM-L] Public input on hacker sentencing OFF WITH THEIR HEADS! ... Steve "Feds Seek Public Input on Hacker Sentencing" SecurityFocus Online (01/13/03); Poulsen, Kevin The United States Sentencing Commission (USSC) engaged the public for advice last week on whether prison or probation sentences for cybercriminals are adequate enough, or should be stronger. Michael O'Neill of George Mason University Law School says, "We want to know whether or not the relevant community...believes that serious penalties will deter people from engaging in that sort of conduct." The public can provide suggestions by accessing a formal "Issue for Comment" posted on the USSC Web site; the period for public comment will continue until Feb. 18. In addition to a general overview of the question of whether penalties for cyber miscreants are strong enough, the forum seeks advice on eight proposals to take additional factors into consideration when determining a sentence. One proposal suggests adding points--and thus extra jail time--to sentences if the hackers commit their crimes for financial gain, or to violate a person's privacy. For now, the sentencing guidelines for computer crimes are the same as those for larceny, embezzlement, and theft, in which the financial loss inflicted is the primary consideration. However, the Homeland Security Act and the congressional emphasis on cyberterrorism required the USSC to review its cyber crime sentencing guidelines so that they take into account "the serious nature of such offenses, the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses." The Homeland Security Act also authorized the creation of penalties for hackers whose activities result in a loss of human life. Orin Kerr of George Washington University Law School thinks that computer crime sentences are as harsh as normal sentences, if not harsher, according to some provisions. http://online.securityfocus.com/news/2028 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6776 From: Steve Uhrig Date: Fri Jan 17, 2003 1:12pm Subject: This is already happening with some lunatics we know Officials consider faster ways to alert U.S. to terrorism By Audrey Hudson THE WASHINGTON TIMES Television sets suddenly turning on in the middle of the night, Internet messages or nontraditional telephone rings may be the next way Americans are alerted by the government they are under attack by terrorists. The Emergency Alert System (EAS) in 1997 replaced the Emergency Broadcast System that historically warned that "this is only a test," but lawmakers say new technology is needed to give Americans faster and more practical information. In announcing his candidacy for president, Sen. John Edwards, North Carolina Democrat, first proposed a telephone warning system for in the event a terrorist attack occurs while Americans are sleeping. "There are a lot of folks in this country who have no idea what they are supposed to do if an attack occurs," Mr. Edwards said. Mr. Edwards and Sen. Ernest F. Hollings, South Carolina Democrat and soon-to-be ranking member of the Commerce, Science and Transportation Committee, yesterday announced legislation to explore new alert systems. The bill would authorize the Homeland Security and Commerce departments to work with other government agencies and the media to set standards for warnings. The color-code warning system established by Tom Ridge, White House homeland security adviser, fails to give information on how to react to a terrorist attack, Mr. Edwards said. "We have to make sure effective warnings get to every American in times of danger, and we have to make sure those warnings tell folks just what they can do to protect themselves and their loved ones," Mr. Edwards said in a statement. The EAS is used daily on the local level to issue warnings of events that can endanger the public, including hazardous-material spills. The EAS is also used to transmit warnings from the AMBER (America's Missing Broadcast Emergency Response) alert system, which notifies the public about child abductions. AMBER was established on a state-by-state voluntary basis in 1996 in response to the abduction and slaying of 9-year-old Amber Hagerman in Dallas. It would be up to Congress to require the EAS to transmit terrorism warnings from a new alert system. The EAS has never been used for its primary function, which is to provide the president with a means to address the nation through all broadcast, cable and satellite systems in the event of a national emergency. It was not activated on September 11 because President Bush did not address the nation. The bill requires the Commerce Department to develop new technologies to issue warnings based on the National Weather Service system, which is decoded by EAS equipment at broadcast and cable stations and can be delivered almost immediately. Commerce would also explore new ways to disseminate the warnings through the Internet, cell phones and new technology to turn on TV sets. Specially equipped televisions, radios, pagers and other devices already exist to decode EAS messages, according to a fact sheet distributed by the Federal Communications Commission. Consumers can program these products to turn on automatically for the messages they want to receive. The Edwards-Hollings bill was based on recommendations from the Partnership for Public Warning. "National warning systems need significant improvement. They enable Americans at risk to save lives and reduce losses from natural and manmade disasters," said Peter Ward, partnership chairman. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6777 From: Does it matter Date: Fri Jan 17, 2003 0:29pm Subject: Re: Public input on hacker sentencing I believe that people charged with computer crimes should do community service and be placed in the community corrections system. We can learn far more from people who specialize in penetration tests, intrusion, etc. The good ones are taken by the government immediately anyway. Hacker is such a bad term anyway. A large majority of "hackers" break in and then report that they broke in and help overall network security. So there are a few bad ones out there which there will be with any groups. Don't put them in prison help them help others. Darren --- In TSCM-L@yahoogroups.com, "Steve Uhrig" wrote: > OFF WITH THEIR HEADS! > > ... Steve > > > > > "Feds Seek Public Input on Hacker Sentencing" > SecurityFocus Online (01/13/03); Poulsen, Kevin > > The United States Sentencing Commission (USSC) engaged the > public for advice last week on whether prison or probation > sentences for cybercriminals are adequate enough, or should > be stronger. Michael O'Neill of George Mason University Law > School says, "We want to know whether or not the relevant > community...believes that serious penalties will deter > people from engaging in that sort of conduct." The public > can provide suggestions by accessing a formal "Issue for > Comment" posted on the USSC Web site; the period for public > comment will continue until Feb. 18. In addition to a > general overview of the question of whether penalties for > cyber miscreants are strong enough, the forum seeks advice > on eight proposals to take additional factors into > consideration when determining a sentence. One proposal > suggests adding points--and thus extra jail time--to > sentences if the hackers commit their crimes for financial > gain, or to violate a person's privacy. For now, the > sentencing guidelines for computer crimes are the same as > those for larceny, embezzlement, and theft, in which the > financial loss inflicted is the primary consideration. > However, the Homeland Security Act and the congressional > emphasis on cyberterrorism required the USSC to review its > cyber crime sentencing guidelines so that they take into > account "the serious nature of such offenses, the growing > incidence of such offenses, and the need for an effective > deterrent and appropriate punishment to prevent such > offenses." The Homeland Security Act also authorized the > creation of penalties for hackers whose activities result in > a loss of human life. Orin Kerr of George Washington > University Law School thinks that computer crime sentences > are as harsh as normal sentences, if not harsher, according > to some provisions. > > http://online.securityfocus.com/news/2028 > > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* 6778 From: infospy Date: Fri Jan 17, 2003 4:51pm Subject: Re: Public input on hacker sentencing And at the same time they're loping heads, put the little !$%#^^$&%)^%(*$^#$^%$ that send out all the "SPAM" and write the spyware, in line. 6779 From: Hugo Drax Date: Sat Jan 18, 2003 0:52am Subject: Re: Marriott International goes WiFi with STSN! My laptop has no software except the VPN secureID software (Token) and on my diskonkey I have terminalserver client. I vpn to my homeoffice system and all my work takes place at a secured system. So if the laptop is stolen it has no Intellectual Property :) picture does not include the other items (IDS system,server etc..) http://www.draxindustries.com/pictures/homenet1.jpg ----- Original Message ----- From: Matt Paulsen To: TSCM-L@yahoogroups.com Sent: Tuesday, January 14, 2003 12:06 AM Subject: [TSCM-L] Marriott International goes WiFi with STSN! Get that WiFi card and sniffer out and hit one of over 400 hotels for your enjoyment while you eat in the dining room. If your organization travels, now would be a good time to consider mobile code security practices if you haven't. Or you may just find your next product release on the market... by your competitor. [Non-text portions of this message have been removed] 6780 From: Date: Sat Jan 18, 2003 0:04am Subject: From Dave at DEMTEC UK Hello All I am a new member and am based here in the UK on Merseyside near Liverpool. My partner and I are looking for a Non Linear Junction Detector [NLJD] SCOUT - SUPERBROOM-etc At this stage we cannot afford a new unit and are looking for used and will consider anything at the right price even a faulty system [we have the technology to repair] I have heard that some devices exist originating from ex Eastern Block/Soviet countries anybody have any suggestions as to a source of these units in the USA or Europe in particular a device that was considered a health risk originating from Russia, we have heard about. Regards to All David McGauley Demtec Electronic Surveillance and Counter Surveillance Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs 01695 558544 07866206112 demtec@a... The manufacture and installation of custom made covert electronic audio and video devices Professional physical and electronic counter surveillance [sweep] services. Note: any fellow UKPIN members welcome to call in to discuss applications. Workshop located alongside the M58 junc 3 [Non-text portions of this message have been removed] 6781 From: Matt Paulsen Date: Sat Jan 18, 2003 1:21pm Subject: RE: Marriott International goes WiFi with STSN! For a home office, you've certainly spent some cash. What is that a 2500-2600? A pix 506e? Can't really tell what the smaller devices are from the pic. Microswitches? 6-8 port? One off the pix, one off the 2x00? or do you bypass and expose 2 ip's? A few notes.... Even if you're setup as Hugo is, you're still not safe as there are a few other holes to review. All your traffic can be bridged using some of the most recent hacks on wifi, which means you're not in control of where your traffic goes, or even if you're getting a valid response back. Encryption comes in 2 levels on most systems - auth & session, you will expose your vpn ip at least once and may be exposing other details and not knowing it even before you get to encryption. For example, you may send SMBs out with your workstation idents and local administrator ID's for some service requests. TSC has bugs that allow interception, don't rely on it. A fob is an excellent addition and a must for mobile users. Add a biometric interface to the local GINA, ie: identix, etc. For mobile code, suggest a peek at thumbdrives, cheap and effective to a point: http://www.thumbdrive.com/prd_info.htm If you use MS's VPN, drop it and move up to something else.. CHAP was misnamed when they thought up the acronym, reminds me of WEP, HA! yea. right. Suggest some sort of encryption as well, ie: 168bit 3des, hmac md5 auth, etc. Last, enable a personal firewall - blackice, nai, etc. and local antivirus - symantec, nai, etc.. Don't use anything below nt 40 if you're mobile and on MS, and use ntfs and local policies on your profile, and do setup the system securely - winreg guide, poledit, security admin, etc. Worried about recovery, ghost your box at your office before you leave on a trip. Hugo, you may want to check packetyzer and netstumbler out on a 2nd system while your laptop is going to see what you find, you may discover more than you though you would. http://www.packetyzer.com/ http://www.netstumbler.com/ You can also download sniffer eval and review your lan connection info. www.mydocsonline.com/pub/snifferdemo/15Pro47 Matt -----Original Message----- From: Hugo Drax [mailto:hugodrax@d...] Sent: Friday, January 17, 2003 10:52 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Marriott International goes WiFi with STSN! My laptop has no software except the VPN secureID software (Token) and on my diskonkey I have terminalserver client. I vpn to my homeoffice system and all my work takes place at a secured system. So if the laptop is stolen it has no Intellectual Property :) picture does not include the other items (IDS system,server etc..) http://www.draxindustries.com/pictures/homenet1.jpg ----- Original Message ----- From: Matt Paulsen To: TSCM-L@yahoogroups.com Sent: Tuesday, January 14, 2003 12:06 AM Subject: [TSCM-L] Marriott International goes WiFi with STSN! Get that WiFi card and sniffer out and hit one of over 400 hotels for your enjoyment while you eat in the dining room. If your organization travels, now would be a good time to consider mobile code security practices if you haven't. Or you may just find your next product release on the market... by your competitor. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6782 From: Matt Paulsen Date: Sat Jan 18, 2003 1:37pm Subject: RE: RE: Public input on hacker sentencing Put em in prison I say... and bill them out at $85/hr. Make em work 120 months to buy a pair of nike's. ref: OSDOC's GIS group. When they get out, they can start a company if they like. After all, that's a working trend that seems to fit in the industry... as disturbing as it is. -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: Friday, January 17, 2003 5:09 AM To: TSCM Group Subject: [TSCM-L] RE: Public input on hacker sentencing Well I guess that would be extremely funny... However I think the ol' capital punishment is slightly sadistic.... I'd favour something like giving something back to the community... Years of community service for poor, homeless and kids charities etc. If they're gonna take from the community then they should have to give back to it as punishment. Not sit in a prison doing nothing having working people pay for their meals. My opinion anyway, Vance. Message: 3 Date: Thu, 16 Jan 2003 17:24:05 -0800 From: "Matt Paulsen" Subject: RE: Public input on hacker sentencing Make them watch barney and elmo tapes.. constantly... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: Charles P Date: Sun Jan 14, 2001 11:28pm Subject: Re: What would YOU do? I can give you one scenarios that is not exactly what you described but may be worth consideration. A potential client called wanting a sweep of his home office. He said he was not sure if there even was a need for a sweep but was just concerned about his privacy. He wanted to know if I could come out and do a "small sweep". I explained that there really is no such thing. Since he seemed sincerely concerned, just undecided, so I offered to meet with him on a consulting basis for a few hours at a much smaller fee. I would look over his situation, explain typical problems and where he seems to be most vulnerable. I would also explain in greater detail what a full sweep would be able to do for him. He was very pleased with that suggestion and immediately accepted. He has not contacted me for a full sweep, but I don't think he really needed one either. But he does have my name and appreciated my service. A "small sweep" is like putting an alarm on only the front door of your house, since the burglars in your neighbor hood are rather lazy and you think that's the simplest place for them to enter. Charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com ----- Original Message ----- From: "1RCM" <1RCM@M...> To: "TSCM List - Post" Sent: Sunday, January 14, 2001 10:33 AM Subject: [TSCM-L] What would YOU do? > Hi List, > > Let's see if we can't spawn some creative debate here. Many on this list > have run across these type instances which fall right in that blurry area > somewhere between standing on true ethics and paying the bills. What do YOU > do?? Ah yes, before you consider both scenarios think back to all of the > debate that has taken place on this list over the past year relating to > professionals vs. charlatans; just what constitutes performing a proper > sweep; enlightening a potential client; fees vs. services performed; etc., > etc. Then respond honestly! > > Scenario #1 ..... You are contacted by a potential client who feels that > he/she has reason to have a sweep done. During the discussion that follows > you are convinced that a sweep is legitimately needed, but also that the > potential client does not have the foggiest idea of what is involved. And so > you do a bit of education before you quote a fee. At the end of the > discussion the client states that he/she fully understands what you have > explained but has reached this decision: "Instead of the 6 hours that you > quoted I want you to do the best that you can in 2 hours with your fee being > reduced accordingly. I understand what you have explained to me and I accept > the fact that I will be receiving less than what you recommend - but as the > client that's my decision to make". > > Now remember that the office copy machine needs repair and you could use > those few extra $$$'s to buy that new piece of equipment you want - all to > the tune of about what you would make doing this 'mini-sweep'; the location > is only 15 minutes from your office; you are satisfied that the client is > making an 'informed decision'; and you have absolutely nothing work-wise > going on the next day. What would YOU do??? > > Scenario #2 ...... You are contacted by a PI firm regarding handling a > referral job. After a discussion regarding your services, fees and > recommendations they want you to do: " a check of a hotel meeting room for > transmitters and a quick look-around with a flashlight - bring just your sp > ectrum analyzer, your CPM-700, your Opto Xplorer, or what ever you told us > you have that you want to use, and your flashlight - we want this done very > low-keyed. And you will only have about an hour alone in the room". After > explaining your feelings regarding doing 'proper' sweeps the PI that you are > talking to states emphatically that it is he who has been retained to look > after the best interests of the client; no, you may not speak with the > client; he is making his request based upon an investigation that he is > conducting for the client; and yes, it is his neck on the line and not yours > as the client will not know who you are. However, at the end of this > discussion you are not really sure whether or not the PI fully understands > what you had attempted to explain to him regarding TSCM and you have this > lingering feeling that he is to a high degree basing his request on what he > is willing to pay out of his billable fee for your services. But still, he > is offering a decent buck for the work that you will actually have to do. > > Same conditions exist for this one as for the scenario above. What do YOU > do???? > > Respond or not; do it on or off list; included your name or be anonymous - > your choice. I'm not trying to embarrass anyone or to pry. I have my own > reasons for posing these questions. But I truly believe that the diverse > answers - and accompanying debate - that hopefully will be generated can > benefit us all. > > > Bob Motzer > 1RCM@M... > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2313 From: Craig Snedden Date: Mon Jan 15, 2001 4:13am Subject: Re: What would YOU do? Now now boys! I'd have to agree with Miguel and Hoffman to a broad degree. I'm also a great believer in pride in the job and ethics, but being too stuck up your own .... never paid any bills! What is ethically wrong in taking the job, but only after explaining to the "client" that a sweep comes with no guarantees (something you should do anyway) and that any reduction in your service will only serve his fiscal needs and lead to a false sense of security. If the client is willing to accept that, and you have the appropriate riders on paper, signed by him, then go ahead, take his money. By the way, where do we get off calling each other "whores"? "Providing a service in return for money" isn't that what we all do? Maybe there are too many out there who can afford to sit back and be picky about what work they do and don't? :-) [Non-text portions of this message have been removed] 2314 From: Hoffman Date: Mon Jan 15, 2001 0:14pm Subject: Re: Re: What would YOU do? ---------------------------------------------------------- SWS> Why is this not the definition of a whore? Yes, and also the alternative definition of capitalism and entrepreneurship. -------------------------------------------------------- SWS> What does YOUR need for money have to do SWS> with whether you do an honest job or not? The scenario which was described has nothing whatsoever to do with a so-called "honest job." Dishonesty is when you deceive people either intentionally, or sometimes it can apply when your involves in a trade which your not qualified for, and attempt to pass yourself off as qualified. There is absolutely no dishonesty in doing a "half-assed job" provided you have made it clear to the customer in both writing, and verbally that what they are requesting (i.e. the economy job for half price) has it's consequences and that you feel that performing the service in such a manner may lead to substandard results. Treat these clients like the adults that they are! It's pretty damned self righteous, patronizing, and outright insulting to me, that anyone feels as if need to "baby" these customers with the "I'm doing this for your own good" mentality. As customer, it's their decision, and your only obligation in terms of professional integrity is to be as accurate and straightforward as possible. I'm not implying that one needs to do a job every time some customers say's "Hey look, I'd like the $800.00 economy special sweep job." If it's not worth it to you; then dont do it. It's your call and your business. However, what perturbs me in regards to this particular discussion is there is a blurry line to be crossed when you use your influence to set up an arbitrary "code of ethics" for an entire industry. In my opinion, it is just as dishonest to "smear" otherwise honest security professionals just because some professionals choose not to treat their customers like children (much like our politicians think they can do... everytime they pass another regulation for our own good... because they know better.) -------------------------- SWS> Having pride in one's work and trying to be the SWS> absolute best at what you do is a sign of a quality SWS> practitioner. Some of us strive for that constantly. SWS> What do you propose -- strive to be mediocre? And of course... the ultimate point gets missed. Your in business no doubt for a variety of reasons. People in this particular field, usually love their work, so no doubt that there must go along with it a self satisfaction, and an arbitrary set of standards which one adheres to. You want to run a quality service, and be known as a quality guy. However, the flip side of the coin is the customers NEEDS. They called you because they either want or need a service. You are there to serve the customer. If you feel the customer is a scumbag; you just walk away; as is the case in any line of work. However, I think professional who claims that they are "helping their customer" by refusing to do a job simply because they cant get their way, that professional clearly has ulterior motives and is placing their real or imaginary reputation ahead of the immediate needs of the customers. If you want it that way; fine.... but dont impose that mentality on the entire profession. Most professionals in any industry realize that business is a compromise, and different customers have different economic means, and different job requirements. Not everyone needs the ultra-deluxe $5,000+ TSCM service. I see no dishonest in providing an appropriate service for the appropriate fee. The hypothetical question posed by the original poster as far as I am concerned, is open to great interpretation. I'm not implying that one should "wave the magic boxes around the room and declare the room is clean." Rather, I think it's perfectly honest simply to perform a "limited" service, where your just checking for a few specific threats, as opposed to an all-inclusive job where you drag out all the equipment. It should be made clear to the customer that a "limited service" has it's consequences, and not all potential threats can be detected. There is obviously a threshold where doing a job is clearly a waste of time (i.e. if the customer tells you to go sweep the place with a Radio Shack frequency counter; THAT is a waste of time...) but theres nothing dishonest about performing a limited service. Looking at this from a logical perspective, it is totally impossible to honestly claim that a clients premise is vulnerability and threat-free; regardless of how thorough your service is. Therefore, no matter how much equipment and manpower you decide to use on the job; there will never be a 100 percent certainty as to threats. Hence, that being the case... there is nothing wrong with doing "limited-sweeps" (i.e "economy sweeps") because in essence, all sweeps are limited in some manner. 2315 From: Bcrews Date: Mon Jan 15, 2001 2:49pm Subject: ECS vs. TSCM I was recently reading an article that made a distinction between ECS (electronic countermeasures) equipment versus TSCM (technical surveillance countermeasures) equipment. I am familar with the later but am unsure about the former. Comments? Bill C. 2316 From: Date: Sun Jan 14, 2001 6:14pm Subject: Re: The Football Check out the dcurrent edition of MAXIM--a men's magazine. They give a very complete breakdown of what is allegedly inside. Also, some nice phoographs of it. 2317 From: Miguel Puchol Date: Mon Jan 15, 2001 4:47pm Subject: RE: ECS vs. TSCM ECS, more commonly known as ECM, are used in military weapon systems, like combat aircraft. They range from passive target spoofing to active radar & communications jamming. You may check out Jane's for some examples of this equipment, like the ECM pods used in the F-16. Cheers, Mike > -----Mensaje original----- > De: Bcrews [mailto:bcrews@s...] > Enviado el: lunes, 15 de enero de 2001 21:49 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] ECS vs. TSCM > > > I was recently reading an article that made a distinction > between ECS (electronic countermeasures) equipment > versus TSCM (technical surveillance countermeasures) equipment. > I am familar with the later but am unsure about the former. > Comments? > > Bill C. > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2318 From: James M. Atkinson, Comm-Eng Date: Mon Jan 15, 2001 5:03pm Subject: Re: What would YOU do? At 12:28 AM -0500 1/15/01, Charles P wrote: >I can give you one scenarios that is not exactly what you described but may >be worth consideration. > >A potential client called wanting a sweep of his home office. He said he >was not sure if there even was a need for a sweep but was just concerned >about his privacy. He wanted to know if I could come out and do a "small >sweep". I explained that there really is no such thing. > >Since he seemed sincerely concerned, just undecided, so I offered to meet >with him on a consulting basis for a few hours at a much smaller fee. I >would look over his situation, explain typical problems and where he seems >to be most vulnerable. I would also explain in greater detail what a full >sweep would be able to do for him. > >He was very pleased with that suggestion and immediately accepted. He has >not contacted me for a full sweep, but I don't think he really needed one >either. But he does have my name and appreciated my service. > >A "small sweep" is like putting an alarm on only the front door of your >house, since the burglars in your neighbor hood are rather lazy and you >think that's the simplest place for them to enter. > >Charles > >Charles Patterson >charles@t... >Global Communications >Tarrytown, NY >www.telephonesecurity.com I usually tell such a client that the minimum amount of time that I charge for any work on site is four hours. In such cases it gives me just enough time to unpack a small amount of gear and check for anything obvious, with only a bare minimum of protection being offered. It doesn't matter to me if I have to drag out some equipment of not, I still charge the same four hour minimum any time I have to go somewhere, or do something away from the office. If the client only wants a one hour consultation fine, I'll do it over the phone where I bill in 15 minute blocks of time (but not in person). Personally, I prefer to have at least 12 hours on-site for any sweep work, and like to spend about half the time of any sweep just doing the radiated and conducted signals analysis. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2319 From: James M. Atkinson, Comm-Eng Date: Mon Jan 15, 2001 6:25pm Subject: Re: What would YOU do? Yes, it works out to be one person for 12 hours, and I would point out that for each person you add to the team you only get an productivity increase of about 30-35% and not an actual doubling. I only utilize extra people if the sweep will involve more then 36 hours of time (three sweep days) as the extra people tend to be much disruptive and much less covert. In cases where the time on target is limited, or when heavy furniture has to be moved I will use extra help (but no more then three or four extra people). I call it a "-3 dBnerd rule", which cuts the secrecy and security of the sweep in half for each extra nerd you involve in the sweep. I also have a "-6 dBclient rule" where each of the clients employees that are involved in the sweep drop the secrecy by a factor of four. When the client contacts me via his cell phone the "-40 dBcellular rule" kicks in, and if he is calling from a suspect phone or from within the suspect facility a "-110 dBdumbass rule" applies. -jma At 10:58 AM +1100 1/16/01, Mike Dever wrote: >Jim > >Is that 12 hours on site for one person? > >Typically our minimum would be four hours with a two or three man team which >equates to 8-12 man hours total on site. > >Regards >Mike Dever CPP > > >"James M. Atkinson, Comm-Eng" wrote: > >> At 12:28 AM -0500 1/15/01, Charles P wrote: >> >I can give you one scenarios that is not exactly what you described but may >> >be worth consideration. >> > >> >A potential client called wanting a sweep of his home office. He said he >> >was not sure if there even was a need for a sweep but was just concerned >> >about his privacy. He wanted to know if I could come out and do a "small >> >sweep". I explained that there really is no such thing. >> > >> >Since he seemed sincerely concerned, just undecided, so I offered to meet >> >with him on a consulting basis for a few hours at a much smaller fee. I >> >would look over his situation, explain typical problems and where he seems >> >to be most vulnerable. I would also explain in greater detail what a full >> >sweep would be able to do for him. >> > >> >He was very pleased with that suggestion and immediately accepted. He has >> >not contacted me for a full sweep, but I don't think he really needed one >> >either. But he does have my name and appreciated my service. >> > >> >A "small sweep" is like putting an alarm on only the front door of your >> >house, since the burglars in your neighbor hood are rather lazy and you >> >think that's the simplest place for them to enter. >> > >> >Charles >> > >> >Charles Patterson >> >charles@t... >> >Global Communications >> >Tarrytown, NY >> >www.telephonesecurity.com >> >> I usually tell such a client that the minimum amount of time that I >> charge for any work on site is four hours. In such cases it gives me >> just enough time to unpack a small amount of gear and check for >> anything obvious, with only a bare minimum of protection being >> offered. >> >> It doesn't matter to me if I have to drag out some equipment of not, >> I still charge the same four hour minimum any time I have to go >> somewhere, or do something away from the office. If the client only >> wants a one hour consultation fine, I'll do it over the phone where I >> bill in 15 minute blocks of time (but not in person). >> >> Personally, I prefer to have at least 12 hours on-site for any sweep >> work, and like to spend about half the time of any sweep just doing >> the radiated and conducted signals analysis. >> >> -jma >> >> -- >> >> ======================================================================= >> Sed quis custodiet ipsos Custodes? >> "In a time of universal deceit, telling the >> truth is a revolutionary act" - George Orwell >> ======================================================================= >> James M. Atkinson Phone: (978) 381-9111 >> Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ >> Gloucester, MA 01931-8008 jmatk@tscm.com >> ======================================================================= >> The First, The Largest, The Most Popular, and The Most Complete TSCM, >> Technical Security, and Counterintelligence Site on the Internet. >> ======================================================================= >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.onelist.com/community/TSCM-L >> >> or email your subscription request to: >> subTSCM-L@t... >> =================================================== TSKS -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2320 From: James M. Atkinson, Comm-Eng Date: Mon Jan 15, 2001 6:47pm Subject: Re: What would YOU do? At 10:13 AM +0000 1/15/01, Craig Snedden wrote: >Now now boys! > >I'd have to agree with Miguel and Hoffman to a broad degree. I'm >also a great believer in pride in the job and ethics, but being too >stuck up your own .... never paid any bills! > >What is ethically wrong in taking the job, but only after explaining >to the "client" that a sweep comes with no guarantees (something you >should do anyway) and that any reduction in your service will only >serve his fiscal needs and lead to a false sense of security. If >the client is willing to accept that, and you have the appropriate >riders on paper, signed by him, then go ahead, take his money. > >By the way, where do we get off calling each other "whores"? > >"Providing a service in return for money" isn't that what we all do? >Maybe there are too many out there who can afford to sit back and be >picky about what work they do and don't? > >:-) That is a good subject for discussion... Let me ask the list how they view the following "Ethical Continuum", and how they relate it to TSCM services. How far would someone have to go before the action would escalate the action on the scale. How would padding your invoice rank, or planting a device only to find it. Would you rank the illegal possession of eavesdropping equipment, or planting a bug to catch a criminal. 1) Public Image or Client Perception 2) Job Pride or Private Image 3) Professional Ethics (as generally accepted by your associates) 4) Personal Ethics (can you look at yourself in the mirror) 5) Professional Integrity (Do you feel good about what you do for a living) 6) Personal Integrity (can you sleep at night?) 7) Willingness to "bend the rules" 8) Willingness to "bend the law" for a higher cause 9) Willingness to "bend the law" for profit or personal gain 10) Willingness to "break the law" for a higher cause 11) Willingness to "break the law" for profit or personal gain 12) Willingness to "break the law" just for fun 13) Willingness to do anything legal for money (assuming that the thing may be embarrassing or humiliating, and you are in a real hurt for the money) 14) Willingness to do anything legal, but unethical or immoral for money (assuming you are in a real hurt for the money) 14) Willingness to do anything illegal, but ethical or moral for money (assuming you are in a real hurt for the money) 15) Willingness to do anything illegal (assuming you will not get caught, and assuming you are in a real hurt for the money) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2321 From: James M. Atkinson, Comm-Eng Date: Mon Jan 15, 2001 7:07pm Subject: Re: ECS vs. TSCM At 3:49 PM -0500 1/15/01, Bcrews wrote: >I was recently reading an article that made a distinction >between ECS (electronic countermeasures) equipment >versus TSCM (technical surveillance countermeasures) equipment. >I am familar with the later but am unsure about the former. >Comments? > >Bill C. ECS (electronic countermeasures) is used to JAM or otherwise interfere with a surveillance activity. For example if we pickup a 398 Mhz eavesdropping signal ECS activities would simply jam the signal in a rude, crude, and totally overt manner. TSCM (technical surveillance countermeasures) on the other hand is the careful and elegant procedures use for ferreting out of the eavesdropping device, and other hunting down the actual spy. A good example is when you pickup a 2.4 GHz video signal in ant are your check, and then DF on 480 MHz IF signal to locate who is operating the equipment on the receiving end. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2322 From: Steve Uhrig Date: Mon Jan 15, 2001 9:27pm Subject: Full coverage R8500 receivers for sale Hello list, I have come across a small supply of government trade in ICOM R8500 receivers, and am offering them for sale here first before posting them on my used equipment page. These generally sell very quickly once they are posted. Many are familiar with the R8500. This is ICOM's newest wideband HF/VHF/UHF receiver, quite common with sweepers. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. These are full coverage receivers originally purchased by the government, generally used for one weekend surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer-controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM just raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. I only have a few of these, so don't wait if you need a portable, decent full coverage receiver. Price is $2000 shipped in the U.S. This is less than current retail for a blocked receiver. Anyone buying an R8500 receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for this receiver, and is a good antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25- 2000 megs. I take credit cards for payment. And I will consider trades for other pieces of high end TSCM equipment. Swap something you don't need for something you do. Also have a few full coverage R100s just came in if anyone needs one of them. Inquire. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2323 From: Craig Snedden Date: Tue Jan 16, 2001 3:36am Subject: Re: Re: What would YOU do? Good morning all, James Atkinson has given us some food for thought..... To answer all the questions that he poses truthfully, I probably come out as a conniving, sneaky, self-serving, two faced individual that you wouldn't touch with a 10 foot pole! (I'd be really upset if I thought anyone thought I was any of these things) My own standpoint on these issues are shades of grey. For the record, (before you get a really jaundiced view of me) I regularly decline to undertake work for potential clients, when I feel that they would be wasting my time and thier money. I quite often get people who are clearly mentally disturbed contacting me, saying that they are bugged. It usually doesn't take long to find out that they are already seeing a professional more suited to thier needs and it's not a TSCM operative! See answers below: Craig ----- Original Message ----- ---Cut as irrelevant----- > Let me ask the list how they view the following "Ethical Continuum", > and how they relate it to TSCM services. How far would someone have > to go before the action would escalate the action on the scale. > > How would padding your invoice rank, or planting a device only to > find it. Would you rank the illegal possession of eavesdropping > equipment, or planting a bug to catch a criminal. > > 1) Public Image or Client Perception 50/50 balance, but I wouldn't do a "risky" job just to keep a client happy. It's a delicate balancing act, because a poor public image will lead to a decline in clients, but dis-satisfied clients will also lead down that road. > > 2) Job Pride or Private Image again 50/50 > > 3) Professional Ethics (as generally accepted by your associates) 100% > > 4) Personal Ethics (can you look at yourself in the mirror) No problem > > 5) Professional Integrity (Do you feel good about what you do for a living) Sure 100% > > 6) Personal Integrity (can you sleep at night?) Yep! > > 7) Willingness to "bend the rules" Depends very much on the degree of "bending" and the "rule" to be bent, but generally no. > > 8) Willingness to "bend the law" for a higher cause As above, but to a lesser degree, I.m going to jail for no-one! However, it depends on the situation and whether I could justify my actions to a Court at a later date. > > 9) Willingness to "bend the law" for profit or personal gain No. > > 10) Willingness to "break the law" for a higher cause > No, again I'm going to jail for no-one. > 11) Willingness to "break the law" for profit or personal gain As above. > > 12) Willingness to "break the law" just for fun > Depends on the law and the possible outcome, but generally no. > 13) Willingness to do anything legal for money (assuming that the > thing may be embarrassing or humiliating, and you are in a real hurt > for the money) Maybe, depends on what I'm being asked to do, the hurt and the money on offer. Having said that, I do tend to shy away from situations that could lead to personal or professional embarrassment. I'd probably consider it for a few seconds, then decline. > > 14) Willingness to do anything legal, but unethical or immoral for > money (assuming you are in a real hurt for the money) Generally no. As above. > > 14) Willingness to do anything illegal, but ethical or moral for > money (assuming you are in a real hurt for the money) No > > 15) Willingness to do anything illegal (assuming you will not get > caught, and assuming you are in a real hurt for the money) No. > > > -jma > > > > > > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2324 From: Steve Uhrig Date: Tue Jan 16, 2001 10:40am Subject: Gordon Liddy again http://www.sunspot.net/content/cover/story?section=cover&pagename =story&storyid=1150540205511 Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2325 From: James M. Atkinson, Comm-Eng Date: Tue Jan 16, 2001 3:15pm Subject: The Lone Ranger and Tonto are camping in the desert... The Lone Ranger and Tonto are camping in the desert, set up their tent, and are asleep. Some hours later, The Lone Ranger wakes his faithful friend. "Tonto, look up at the sky and tell me what you see." Tonto replies, "Me see millions of stars." "What does that tell you?" ask The Lone Ranger. Tonto ponders for minute. "Astronomically speaking, it tells me that there are millions of galaxies and potentially billions of planets. Astrologically, it tells me that Saturn is in Leo. Time wise, it appears to be approximately a quarter past three. Theologically, it's evident the Lord is all powerful and we are small and insignificant. Meteorologically, it seems we will have a beautiful day tomorrow. What it tell you, Kemo Sabi?" The Lone Ranger is silent for a moment, then speaks: "Tonto, you Dumb Ass, someone has stolen our tent". -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2326 From: Larry Malmberg Date: Wed Jan 17, 2001 11:16am Subject: Interesting "stuff" Cut and paste from another group I am a member of. Larry > TRANSMISSION TROUBLE? > The Toronto Globe and Mail reported yesterday that the Eagles and > Minnesota Vikings, who visited the New York Giants in playoff games the > last two weekends, accused the Giants of intercepting the transmissions > between the wireless headsets of the coaches and quarterbacks. Then, the > report said, the Giants adjusted their defense by using hand signals. > That defense was dominant in both games, surrendering 10 points total, > including shutting out the combustible Vikings. > > Andy Reid yesterday denied knowing of any such accusation and did not > complain of any irregularities during his team's 20-10 loss at Giants Stadium. > http://inq.philly.com/content/daily_news/2001/01/17/sports/EAGL17.htm > (Contributed by Joe Canone.) > > --- > > There are serious suggestions in the National Football League that the > New York Giants have been cheating in the playoffs by intercepting radio transmissions. > > The matter was first brought to the attention of NFL commissioner Paul > Tagliabue after the Giants defeated the Philadelphia Eagles in their > playoff game two weekends ago. > > The Eagles said they have reason to believe the Giants were able to > listen to the plays being sent via radio from coaches to their > quarterback, Donovan McNab. All NFL quarterbacks have helmets equipped > with special radios. Once the Giants heard the plays, the Eagles are > claiming, they were able to set up their defense accordingly with hand signals. > > Yesterday, similar fears were being expressed by the Minnesota Vikings, > who were crushed 41-0 by the Giants in the National Football Conference > final on Sunday. > > The NFL is desperately is trying to keep the issue quiet, what with the > Giants having qualified for the Super Bowl. But, rest assured, you'll > hear more about this sinister stuff in the next few weeks. > http://archives.theglobeandmail.com/ > > --- > > Background Information... > One of the most amazing new devices being used in the NFL is the > radio-equipped helmet. Quarterbacks used to wear helmets just to protect > their heads. Not anymore! Now quarterbacks also use helmets to get plays > from their coaches. > > The radio-equipped helmets let coaches give plays to quarterbacks much > faster than they could when they used hand signals or brought plays in > through substitute players. To talk to a quarterback, a coach on the > sidelines presses a button on a box strapped to his waist. The button > activates a radio transmitter, which is something like a walkie-talkie. > When the coach speaks into his microphone, the transmitter sends the > message. A device in the quarterback's helmet picks up the signal. > > Are the two teams picking up each other's radio signals and stealing > plays? Nope-because each radio signal is scrambled, or encrypted, using > a secret electronic code. The quarterback's radio receiver unscrambles > the signal, so he can understand it. But if anyone else tried to listen > to the signal, all he or she would get is a high-pitched noise that > sounds like a bunch of squawking geese! -- Amin Bey (Weekly Reader) > > --- > > RADIOS IN HELMETS -- History 101 > > April 7, 1943 - The NFL made the wearing of helmets mandatory. > > October 18, 1956 - Football commissioner Bert Bell turned thumbs down on > the use of radio-equipped helmets by NFL quarterbacks. Bell had > received, um, a lot of static about the devices which were quite popular > with coach Paul Brown of Cleveland. Word was that severe whiplash was > possible with the long antennas used. > > 1995 - Quarterbacks may now receive communication from the bench via a > small radio transmitter in their helmets. This proposal was originally > run on a test basis last year during the pre-season, but was scrapped. > > The systems, provided by Control Dynamics Corp. of Ivyland, Pa., consist > of small circuit boards encased in silicon. The > device is about 2.5 inches by 1.25 inches. It allows the quarterback > only to hear signals, not to talk back to the sideline. > > 1998 - The NFL went wireless with Telex equipment. > > June 2, 2000 - The NFL is considering a plan to let its broadcasters put > miniature cameras inside helmets and wire its players with microphones > during exhibition games. Another possibility might be putting cameras on > the umpire. No final decision as yet. However... the World Wrestling > Federation announced that its new football league, the XFL, was planning > to use miniature cameras in helmets of some players and microphones in > huddles and on the sidelines. NBC plans to televise the XFL games, which > are to begin in February. > > 1999 - Motorola became the NFL official Wireless Communications Sponsor. > > 2000 - Trakus Inc., an MIT-affiliated technology company, hopes to put > radio tags in the helmets of every NFL player starting in the 2001 > season. The information received from these tags would be processed into > information that could completely change the way we watch TV sports and > could possibly revolutionize the sports themselves. > http://exn.ca/Stories/2000/01/21/53.cfm > > --- > > We don't know how this eavesdropping story will develop. It is our > understanding that the transmissions are encrypted. We will be looking > into this further. Larry Malmberg Investigations and Security 638 North D Street San Bernardino, CA 92401-1110 P.I. 15211, P.P.O. 12466 909-383-8565, 800-655-4549 Facsimile-909-383-8566 www.larrypi.com Not everything that counts can be counted and not everything that can be counted, counts. 2327 From: Tom Suess Date: Thu Jan 18, 2001 1:08am Subject: Telephone Line Questions Hi, Comments would be appreciated from list subscribers on the following telephone line balance/audio amp./line noise questions: Background * high rise apartment, no access to NID box * computer dial up connection fails ~ 80% on each of two different computers...a random group of alpha-numeric symbols appear in the log-in boxs on the computer screens after the telephone line is plugged into the computer modular jack, but only about 80% of the time. * ISP reports no problems at their end * TelCo is not interested... * all phone equipment unplugged, and line balance tested as per Ted Swifts book, "A Guide to Checking Telephone Lines", pages 48-54 * line balance measurements made with a Fluke 189 multimeter * both resisters match exactly @ 3013.8 Ohms, solder connection is good * the ring-to-earth-ground (table, A, page 53), voltage was fluctuating from -51.2 to -52 volts, regardless of multimeter range, and all connections were secure. The average (mean) reading was used * the tip-to-earth-ground reading (table, B, page 53) was also fluctuating * the series imbalance (table, H, page 53) is calculated to be 45.78 Ohms, but I do not have confidence in this number due to the phone line voltage fluctuation Additional Items * ongoing minor telephone harassment - crank/hang-up calls * phone displays "line-is-busy" after each crank phone call terminates. After unplugging and reconnecting the phone line, the "line-is-busy" warning disappears from the display * Some background voice and DTMF tones were audible during the test performed with the mini audio amplifier (Ted Swift book, p 40), but they were barely audible. Questions * Is it a normal TSCM experience to hear slight background voice and DTMF tones on the phone line during the amplifier check (the test amp. was the low cost RS model recommended by the book)? * What are the most likely causes of phone line noise? What sequence of test methods would identify intermittent phone line noise? * Is fluctuation in phone line voltage normal? If so, what is the average voltage fluctuation? If not, what are the possible causes? Thanks in advance for the help. 2328 From: St. Clair, James Date: Thu Jan 18, 2001 6:50am Subject: FW: Cellular telephone may have caused deadly Swiss air crash Cellular telephone may have caused deadly Swiss air crash Air Disaster.com, 01/17/2001 http://www.airdisaster.com/news/0101/12/news.html Swiss aviation investigators said yesterday that a mobile phone may have caused a Saab 340 to crash shortly after take-off from Zurich airport a year ago, killing all 10 passengers and crew on board. According to Chris Mason, a spokesman for the Civil Aviation Authority, it would be the first time a mobile phone had caused a crash. Studies have proved that radio waves from mobile phones while switched on can interfere with aircraft electronic and navigation systems and that the use of mobile phones aboard aircraft presents even greater safety risks. Jean Overney, leading investigations into the crash of Crossair flight LX 498 on January 10 last year, said tests with the same aircraft model had shown that the Saab 340's navigation system could be disrupted by a mobile phone. Mr Overney said: "We have asked mobile phone operators to check whether a call was made or a message sent just before the crash. These are recorded precisely to the second. We need a court order to give us access, but should have this data by the end of May." The use of mobile phones on board a plane is outlawed in most countries. But passengers often forget to switch off mobile phones, and in some cases have packed working phones in the aircraft hold. This has led to a series of alerts. This week, a Slovenian airliner made an emergency landing in Ljubljana after a mobile phone caused the electronics system to malfunction and falsely indicate an onboard fire. An investigation showed that the alarm had been caused by the mobile phone, which had been stowed in the luggage compartment and had not been switched off. Two years ago a Briton was sentenced to a year in jail by a Manchester court for "recklessly and negligently endangering" an international flight by refusing to switch off his phone. 2329 From: Charles P Date: Thu Jan 18, 2001 10:33am Subject: Re: Telephone Line Questions Tom, some questions: what type of telephone set? Since it has some kind of display that says "line in use", is it part of a phone system? Some high rise appartments have phone systems installed, but the voltage probably would not be 52v if that was the case. Voltage fluctuation of a small amount may be normal. Can you make normal phone calls on the line with no problem? i.e. does is sound clear for a normal conversation? If you are hearing voices and dtmf on the pair when the phone is not in use, it is probably crosstalk or possibly picking up rf on the wires or a combination. This is probably an old building with very old wiring that has been moved around and updated many times over the years, therefore the wire for that phone line may have poor connections or perhaps is twisted around other pairs in such a way that it picking up extraneous signals. This would also cause poor dial-up connection as well. You did not mention what software you were trying for dial up. If you are trying to log onto the Internet through the ISP, are you using Internet Explorer, Netscape, or AOL? If you are just using a terminal program to log in to another computer you frequently will get garbage on the screen if you have the wrong terminal settings or if you have a bad connection. You can try connecting the computer on a different phone line to see if it is working properly by itself. Note that these days, many people believe that they are being harrassed by hang up calls but it is actually a multitude of automatic dialers for telemarketers, auto fax dialers, and the like. (And I do mean _multitude_). Companies that have multiple lines with numbers in sequence (i.e. 555-1200, 1201, 1202, 1203, etc) often report hang up calls that they can see come on line 1 then 2 then 3 then 4... as the auto dialers make their rounds, it happens at my office fairly regularly. Someone else may have a more indepth analysis of the line balance, but the 45 ohms may just be some of the bad wiring in the building, with an extra loop stuck on it somewhere that could also help to create cross talk. A tdr would be useful to track it down. These are some of the "non-threatening" possibilities. Have fun! Charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.avtele.com www.telephonesecurity.com ----- Original Message ----- From: "Tom Suess" To: Sent: Thursday, January 18, 2001 2:08 AM Subject: [TSCM-L] Telephone Line Questions > Hi, > > Comments would be appreciated from list subscribers on the following > telephone line balance/audio amp./line noise questions: > > Background > > * high rise apartment, no access to NID box > * computer dial up connection fails ~ 80% on each of two different > computers...a random group of alpha-numeric symbols appear in the > log-in boxs on the computer screens after the telephone line is > plugged into the computer modular jack, but only about 80% of the > time. > * ISP reports no problems at their end > * TelCo is not interested... > * all phone equipment unplugged, and line balance tested as per Ted > Swifts book, "A Guide to Checking Telephone Lines", pages 48-54 > * line balance measurements made with a Fluke 189 multimeter > * both resisters match exactly @ 3013.8 Ohms, solder connection is > good > * the ring-to-earth-ground (table, A, page 53), voltage was > fluctuating from -51.2 to -52 volts, regardless of multimeter > range, and all connections were secure. The average (mean) reading > was used > * the tip-to-earth-ground reading (table, B, page 53) was also > fluctuating > * the series imbalance (table, H, page 53) is calculated to be 45.78 > Ohms, but I do not have confidence in this number due to the phone > line voltage fluctuation > > Additional Items > > * ongoing minor telephone harassment - crank/hang-up calls > * phone displays "line-is-busy" after each crank phone call > terminates. After unplugging and reconnecting the phone line, the > "line-is-busy" warning disappears from the display > * Some background voice and DTMF tones were audible during the test > performed with the mini audio amplifier (Ted Swift book, p 40), but > they were barely audible. > > Questions > > * Is it a normal TSCM experience to hear slight background voice and > DTMF tones on the phone line during the amplifier check (the test > amp. was the low cost RS model recommended by the book)? > * What are the most likely causes of phone line noise? What sequence > of test methods would identify intermittent phone line noise? > * Is fluctuation in phone line voltage normal? If so, what is the > average voltage fluctuation? If not, what are the possible causes? > > Thanks in advance for the help. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2330 From: James M. Atkinson, Comm-Eng Date: Thu Jan 18, 2001 10:41am Subject: Re: Telephone Line Questions This is why it is critical to use a TDR when checking phone lines. The "balance line test" is of greatest value if the suspect device is series in nature, and is parasitic in it's power draw. Professional taping equipment is typically PARALLEL in nature, and does not draw current from the targeted line. When performing the audio check you need a very high impedance LOW NOISE audio amplifier, and you need to punch up the gain to at least 100 dB (over 110 dB is ideal). When you do this you will hear what is called "cross talk" and "line noise". This is normal, but the presence of stable tones (ie" DTMF "C") could indicate a slave located on the cable (but not on the current pair). My preference is to perform the high impedance audio checks, and then attach a buffer amplifier/transient limiter and route the output to a spectrum analyzer. This way I can SEE what is on the line, as opposed to trying to hear it. (of course all of this is done in a non-alerting fashion). Balanced line tests, Wet and Dry Time Domain Reflectometry, giga-ohm testing, milli-ohm testing, crosstalk analysis, capacitance testing, and so on are also important (and would not be used until you get to the alerting stages). A voltage variation means virtually nothing.... but it is nice to know. You HAVE TO LOCATE what is causing the voltage variation, and why. It could be completely normal, or maybe not... but you have to find out and not just assume its a bug because your volt meter twinkles. The Radio Shack audio amp is shit... complete and utter shit... buy a couple of Kaiser 1059's and you will be stunned at the difference. I notice that you didn't indicate how much loop current was being drawn to "draw tone", nor the resistance of the line and instrument.... these things are critical. Also, how much C-Message band noise was there, and where where the loading coils (if any). -jma At 11:08 PM -0800 1/17/01, Tom Suess wrote: >Hi, > >Comments would be appreciated from list subscribers on the following >telephone line balance/audio amp./line noise questions: > >Background > > * high rise apartment, no access to NID box > * computer dial up connection fails ~ 80% on each of two different > computers...a random group of alpha-numeric symbols appear in the > log-in boxs on the computer screens after the telephone line is > plugged into the computer modular jack, but only about 80% of the > time. > * ISP reports no problems at their end > * TelCo is not interested... > * all phone equipment unplugged, and line balance tested as per Ted > Swifts book, "A Guide to Checking Telephone Lines", pages 48-54 > * line balance measurements made with a Fluke 189 multimeter > * both resisters match exactly @ 3013.8 Ohms, solder connection is > good > * the ring-to-earth-ground (table, A, page 53), voltage was > fluctuating from -51.2 to -52 volts, regardless of multimeter > range, and all connections were secure. The average (mean) reading > was used > * the tip-to-earth-ground reading (table, B, page 53) was also > fluctuating > * the series imbalance (table, H, page 53) is calculated to be 45.78 > Ohms, but I do not have confidence in this number due to the phone > line voltage fluctuation > >Additional Items > > * ongoing minor telephone harassment - crank/hang-up calls > * phone displays "line-is-busy" after each crank phone call > terminates. After unplugging and reconnecting the phone line, the > "line-is-busy" warning disappears from the display > * Some background voice and DTMF tones were audible during the test > performed with the mini audio amplifier (Ted Swift book, p 40), but > they were barely audible. > >Questions > > * Is it a normal TSCM experience to hear slight background voice and > DTMF tones on the phone line during the amplifier check (the test > amp. was the low cost RS model recommended by the book)? > * What are the most likely causes of phone line noise? What sequence > of test methods would identify intermittent phone line noise? > * Is fluctuation in phone line voltage normal? If so, what is the > average voltage fluctuation? If not, what are the possible causes? > >Thanks in advance for the help. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2331 From: Robert G. Ferrell Date: Thu Jan 18, 2001 0:48pm Subject: Re: Telephone Line Questions > * computer dial up connection fails ~ 80% on each of two different > computers...a random group of alpha-numeric symbols appear in the > log-in boxs on the computer screens after the telephone line is > plugged into the computer modular jack, but only about 80% of the > time. Are you sure they're 'random?' Modem commands often appear to be 'random groups of alpha-numeric' characters. In the standard Hayes command set, for example, ATE0 Q0 V1 X1 is an initialization string that turns on command echoing and long result codes, and selects blind dialing (no dial tone confirmation). It would help to see one of these sets of random symbols... Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2332 From: James M. Atkinson, Comm-Eng Date: Thu Jan 18, 2001 3:02pm Subject: Two new FBI agents were in a parking lot... [humor] Two new FBI agents were in a parking lot trying to unlock the door of their car with a coat hanger. They tried and tried to get the door open, but they couldn't. The one with the coat hanger stopped for a moment to catch his breath, and fellow agent said anxiously, "Hurry up! It's starting to rain and the top is down." -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2333 From: Tom Suess Date: Thu Jan 18, 2001 0:08pm Subject: Re: Telephone Line Questions Reply to: Charles Patterson Thanks for the help. The answers to your questions are listed below: Date: Thu Jan 18, 2001 5:29pm Subject: Re: Telephone Line Questions Reply to: Robert Ferrell Thanks for the help. The replies are listed below: Date: Fri Jan 19, 2001 0:57am Subject: Freq hopper? I've isolated what appears to be a digital frequency hopping transmission near a client's office. The pulses are extremely fast, and follow each other on a wide bandwidth (across some 50 KHz) around 2.455 GHz. The signal is relatively powerful, and easily spotted with a whip antenna. Each pulse has very narrow deviation. Monitored over time, the pulses span the entire bandwidth. The office is somewhat shielded from L.A. area RF congestion by nature of its location. Am I missing something really obvious? Can't sleep well at night... -Eric Leonard 2336 From: Tom Suess Date: Thu Jan 18, 2001 5:40pm Subject: Re: Telephone Line Questions Reply to: James Atkinson Thanks for the help. The replies are listed below: Date: Fri Jan 19, 2001 9:57am Subject: How Electronic Tags Work to Foil Shoplifters Technology in Store How Electronic Tags Work to Foil Shoplifters By Todd Campbell Q U E S T I O N: How do those little sensor strips that are embedded in the cover of books in libraries and in products in the store work? A N S W E R: Welcome to the world of "loss protection," an entire industry dedicated to the art of preventing something called "shrinkage," better known to the rest of us as "shoplifting." How big a problem is shrinkage? Estimates of the dollar value vary widely, but here is a nice round number for the total value of goods that are secreted out of stores in the United States by nonpaying customers each year: $26 billion, according to a University of Florida study. That's a lot of shrinkage! So what's a store owner to do? Watching every customer - either in person or with a closed circuit video camera - isn't practical, and putting all of your goods in cases and behind counters isn't good for business. Electronic Tags Instead, a lot of stores (and libraries) use something called Electronic Article Surveillance, or EAS. All EAS systems have three components: labels or hard tags that are attached to the merchandise; detectors within the tag or label that trigger an alarm if you try to leave a store without paying for an item; and deactivators, which allow a sales person to turn off or remove a tag or label once you've paid for an item. There are four basic EAS systems used in stores today. The oldest type uses microwave technology. In these systems, the detector consists of two transmission antennas which send out two different signals: one is a high-frequency signal between 902 and 906 MHz, the second is a much lower frequency, around 111.5 kHz. The detector also includes a high-frequency receiver. The tags in these systems - which are usually those big hard plastic things that can make it a pain to try on an article of clothing - consist of a microwave diode and an antenna that can receive both the high and low frequency signals and also send a high frequency signal. If you are attempting a little "shrinkage" action with a piece of clothing sporting a microwave tag, when you walk by a detector the tag will read the two frequencies, combine them, and then retransmit them as a single signal. The detector then checks to make sure that the signal it is receiving is the right frequency (say, 903 MHz plus 111.5 kHz). If it is, the detector triggers the alarm. The only way to disarm this system is to remove the tag. Occasionally, someone forgets to remove it and the tag fails to trigger the alarm. That's one of life's more annoying retail moments: getting home with a spiffy new sweater only to realize you can't wear it because it still has that clunky tag on it. Actually, it happens more than occasionally: these systems fail about 20 percent of the time. But I did mention that this is an old technology? Radio Systems More common these days, especially in the United States, are radio frequency (RF) systems. Detectors in these systems use two pedestals which serve as gates that you pass between when you leave a store. One is a transmitter that sends out a signal (the normal range is 7.4 to 8.8 MHz). The other pedestal is a receiver. RF systems use small flat, usually square-shaped, labels that have an electronic circuit containing a capacitor and an inductor. When the label receives a signal from the detector, it energizes the capacitor and the inductor, which causes them to send energy back and forth at a specific frequency. The tag then transmits a signal that is picked up by the receiver. The receiver also picks up the signal sent by the transmitter in the other gate. It compares the two signals and if the difference is correct, the alarm goes off. When you pay for an item with an RF tag, the salesperson exposes the tag to a very strong RF pulse that burns out the components of the electronic circuit, rendering the tag incapable of transmitting a signal. In Europe, many stores use an electromagnetic (EM) system in which a low frequency electromagnetic field is generated between the two pedestals or gates. That field changes strength and polarity, switching back and forth from positive to negative. The labels in EM systems have a small embedded wire that changes magnetic state when it is exposed to the changing electromagnetic field. Each time the wire flips from positive to negative, it generates a signal which is picked up by a receiver in the detector. EM labels are easy to deactivate - exposing them to a magnet does the trick - and reactive, a feature that makes them ideal for use in libraries hoping to cut down on book shrinkage. AM Systems A fourth system, called acousto-magnetic, or AM for short, sends out a radio frequency signal (58 kHz is typical) in short bursts, transmitting anywhere from 50 to 90 pulses per second. AM system labels have a resonator and a magnetic strip. The radio frequency burst makes the resonator vibrate, initiating a signal that is tuned to match the original signal from the transmitter. The resonator works like a tuning fork, sending out a sustained signal and if the receiver continues to detect the proper radio frequency in between pulses, the alarm is triggered. The label can be turned off by demagnetizing it. Until recently, adding sensor tags and labels was left up to the store. The newest trend is called source tagging. With source tagging, a security label is added by the manufacturer, embedded in the packaging, say, or placed under a label, or even woven directly into an article of clothing. There is talk that these tags will eventually be used to help with inventory control as well as shoplifting. So how useful is "loss prevention" in reducing "shrinkage"? Industry estimates are that EA systems can reduce theft by up to 60 percent. EAS systems are such a strong disincentive to would-be shoplifters that some stores have taken to putting fake detector gates and fake tags on items, which provides at least some of the deterrence at a much reduced cost. Such dummy systems also increase the likelihood that you'll end up with a brand new article of clothing with a plastic tag still attached. I don't know about you, but I hate it when that happens. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2338 From: James M. Atkinson, Comm-Eng Date: Fri Jan 19, 2001 10:22am Subject: Re: Freq hopper? At 6:57 AM +0000 1/19/01, Eric wrote: >I've isolated what appears to be a digital frequency hopping >transmission near a client's office. The pulses are extremely fast, >and follow each other on a wide bandwidth (across some 50 KHz) around >2.455 GHz. The signal is relatively powerful, and easily spotted >with a whip antenna. Each pulse has very narrow deviation. >Monitored over time, the pulses span the entire bandwidth. > >The office is somewhat shielded from L.A. area RF congestion by >nature of its location. > >Am I missing something really obvious? Can't sleep well at night... > >-Eric Leonard It was probably a microwave oven. They use (or are supposed to use) a signal at 2.450 GHz, and use a "chopper circuit" which almost makes the signal look like a pulse modulated signal. The pulse repetition rate and pulse duration is what gives the psuedo-bandwidth. Try this, park your rock stable spectrum analyzer right at 2.450 GHz and use an IF BW of say 100 kHz, then drop into zero span. You should see a nice 60 Hz signal (of a harmonic/sub harmonic thereof) if a microwave oven is being used. Then use a direction antenna/waveguide to find what is actually causing the signal (and never just assume that it is a microwave oven). I would point out that it could also be an ISM devices, a network connection, a pulse modulated data stream, and any one of a hundred different eavesdropping signals... but only a very careful analysis will tell for sure. Following the below sequence and you will find it easier to hunt down such devices.. 1) Isolate in the FREQUENCY domain (using a spectrum analyzer or search receiver) 2) Isolate in the TIME domain (use an Oscilloscope, or Zero Span on your SA Always go back to #1 your not successful in isolating the signal in the time domain) 3) Isolate in the SPACE domain (use a directional antenna to find WHERE the signal is coming from, and WHAT is causing it. Always go back to #2 your not successful in isolating the signal in the space domain) 4) Isolate in the PHYSICAL domain (use various hand tools, Xray equipment, and so on to determine if the thing creating the signal is supposed to be creating the signal, and determine if it is hostile or not. Always go back to #3 your not successful in isolating the signal in the physical domain) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2339 From: Dawn Star Date: Fri Jan 19, 2001 0:07pm Subject: Telephone Line Questions From: Tom Suess Subject: Telephone Line Questions Hi, Comments would be appreciated from list subscribers on the following telephone line balance/audio amp./line noise questions: This ones easy, if you are not using a TDR you should not be sweeping telephone lines for compensation. Roger [Non-text portions of this message have been removed] 2340 From: Dawn Star Date: Fri Jan 19, 2001 0:10pm Subject: Key to the puzzle "Professional taping equipment is typically PARALLEL in nature, and does not draw current from the targeted line." jma I give you a hint of a key to the puzzle " what is the impedance of the drop wire or wire extension to the loop?" Roger [Non-text portions of this message have been removed] 2341 From: Robert G. Ferrell Date: Fri Jan 19, 2001 0:13pm Subject: Re: Re: Telephone Line Questions >I will contact the ISP for the copy directions, and foreword >the symbols to you. FYI for the list, he did forward them, and they were truly random. Looks like the typical noise I used to see on analog lines. Generally that sort of manifestation was accompanied by audible static. If there are no spurious signals on the line itself, then perhaps the interference is being injected further downstream (i.e., at the modem or the PC com port)... Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== From: Tech Sec Lab Date: Sat Jan 15, 2005 7:37am Subject: RE: GPS tracking Check out the schematics on the Phrack newsletter, shows a basic jammer. http://www.phrack.org/show.php?p=60&a=13 Russian http://www.qsl.net/n9zia/wireless/gps_jam-pics.html As to AW's post, do you have any info on this composite pulse...links or research? Kind regards -Ois ********************* Message: 1 Date: Fri, 14 Jan 2005 06:23:58 -0500 From: Tensor66B@n... Subject: RE: GPS tracking system signal inhibitors Gentlemen, Obviously using such a device would be highly illegal. With a CW signal and 50 mW of RF power the jammer could be easily tracked within 1km using a conventional DF or even "fox hunt" handheld DF (By the way Cubic makes such DF with a similar application in mind). But more elegant jammers do exist. They use low power composite pulse signals. These jammers are practically not detectable from a distance more than 10 meters even with a dedicated equipment. For further technical details ask CIA or KGB. They have developed these devices for their respective diplomats. By the way even with CW signal you do not need 50 mW RF power to jam GPS receiver. For a SiRF and similar direct conversion receiver 50 microwatts would be enough. Even old Rockwell Navcore can be disabled with 5 mW. Well, this is not a "do it yourself" site as our moderator would say so I am closing down. Regards, A.W. 10618 From: Tech Sec Lab Date: Sat Jan 15, 2005 10:25am Subject: FW: Tech Sec Group For anyone interested, Regards -Ois -----Original Message----- Maybe you can pass this onto interested parties, There is a Technical Security Professional Group, open to active professionals. Details are here: http://ocean-research.net/mailman/listinfo/c4i-l_ocean-research.net Registration is subject to verification. Cheers Sarah 10619 From: A Grudko Date: Sat Jan 15, 2005 4:50pm Subject: RE: question about border -----Original Message----- > ...... legal issues in crossing international borders with certain TSCM equipment. David does not say what his country of origin is. He says 'our' borders but signs his post as 'david from 'paris' with a US .com address, so he might be from France or one of the 12 towns in the US. Nor does he name the country whose border he wishes to cross into. We also have a 'Paris' here in South Africa but it's spelled 'Parys'. So let's leave that out, but I frequently travel in 'back-hander' southern Africa with my TSCM equipment, sometimes for companies, sometimes for government departments, so if you are heading this way, here are some unofficial rules: Rule 1 : Find out the destination laws re. receivers, transmitters and technical equipment. There are always exceptions for specialists or government mandated companies but always have the correct written authority in your hand with certified copies at 'home'. Rule 2 : Make sure someone briefed and competent is at the end of a phone at home 24/7 in case a SNAFU is triggered by the awaiting customs officials Rule 3 : Have certified copies of proof of purchase for everything Rule 4 : If the airports customs you departed from offer to document technical/dutyable good before you leave, DO SO Rule 5 : Have a list of your destination contact's numbers so you can call them and they can explain to the airport officials why you are there and vouch for you Rule 6 : Have a lawyer fully briefed and on call. If you end up in a jail you want out ASAP under today's environment. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10620 From: Gregory Hicks Date: Fri Jan 14, 2005 10:49pm Subject: Re: GPS Jammer > To: > From: "Hawkspirit" > Date: Fri, 14 Jan 2005 20:36:11 -0800 > Subject: [TSCM-L] GPS Jammer > > > > > HYPERLINK > "http://www.phrack.org/phrack/60/p60-0x0d.txt"http://www.phrack.org/phra ck/6 > 0/p60-0x0d.txt > > Does anyone know how to decode the schematic? Cut off the text down to the BEGIN line. Ensure that the END line is still attached. Save to a file. On a Unix box, do "uudecode > Roger > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.6.12 - Release Date: 1/14/2005 > > > > > [Non-text portions of this message have been removed] > > > > ------------------------ Yahoo! Groups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > --------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3479 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton [Non-text portions of this message have been removed] 10621 From: The Price's Date: Fri Jan 14, 2005 10:52pm Subject: RE: Icom IC-R3 and R20 I deal with a fellow named Pete Petola at www.bander.com he is out of the Netherlands. Both honest and fair. Shipping is quick and he likely has in stock the items you require. John -----Original Message----- From: Javier Villanueva [mailto:javier_vc1@y...] Sent: January 14, 2005 7:06 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Icom IC-R3 and R20 Hi List, I4ve been trying unsuccesfully to buy this equipment Online. All of the shops i4ve found replied they are "out of stock". If any of you sell these, offer "Special modified versions", or know where to find them, i4ll be grateful. Payment by credit card and express delivery to Mexico a big plus. Most probably this will be just the first buy, with more to come. Thank you very much guys. ===== Javier Villanueva C. Vcorp & Asociados Contraespionaje Electrsnico y Seguridad Informatica Tel. 01 (33) 36 19 47 09 cel. 044 333 392 64 50 msm. javier_vc@h... __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10622 From: wiggyyy2000 Date: Sat Jan 15, 2005 10:18am Subject: Re: identity theft is a major problem in America. a freind of mine used to work at a place where they do points, in other words when you get points for using your air miles visa or amex and he told me he had all the info of peoples cc and ssn, it was scary and they are not monitored like at the cc companies, so be carful when you sign up for those " perks" --- In TSCM-L@yahoogroups.com, "Roger" wrote: > > > Dear Member > > It's no secret that identity theft is a major problem in America. > Think you're not at risk? Unfortunately you are. > > - Do you hand your credit card to servers at restaurants? > - Do you sign your credit cards? > - Do you supply personal information over the internet? > - Do you keep your Social Security number in your wallet or purse? > - Do you leave mail at your home or business for the postal carrier > to collect? > - Do you shred unwanted mail with personal information? > > > What if you discovered that your identity had been stolen? > - Call your bank and/or credit card company > - Contact the three major credit repositories > - Go through the helpful but extensive steps recommended by the > Federal Trade Commission in its 30-page consumer support publication > - Fill out and submit the affidavit form supplied by the FTC to > dispute new, unauthorized accounts > - Spend on average $1,500 in out-of-pocket expenses to resolve the > many problems cause by identity thieves > > WITH THE IDENTITY THEFT SHIELD: Get REGULAR monitoring of your credit > report and let the proven leaders in the identity restoration and > legal services fields assist you. > > With no obligation, you can view a short presentation and learn more > by visiting my website. See what Pre-Paid Legal can do for you at: > > http://www.prepaidlegal.com/idt/hollowaypi > > Thank you for your time and if you're interested or just have > questions, I'll be happy to help. Please feel free to contact me at > your convenience. > > > Sincerely, > > Roger Holloway > Independent Associate > Pre-Paid Legal ServicesÆ, Inc. > > 940-592-7000 > > www.TexasDetective.com > > www.RogerHolloway.com 10623 From: wiggyyy2000 Date: Sat Jan 15, 2005 10:23am Subject: Re: question about border i have personally crossed over an oscor from canada into the us and then back to canada...it was the new york plattsburgh border, sometimes they could give you a rough time but if paperwork is good, you will just slide by --- In TSCM-L@yahoogroups.com, "Andy Moore" wrote: > David, > at a guess, I'd imagine that there would be legal issues in crossing > international borders with certain TSCM equipment. Many countries have > regulations about possessing equipment which can receive frequencies other > than broadcast and most will have rules relating to radio transmission > equipment such as NLJDs. Standard ICT test equipment, such as multimeters > and butt sets, probably wouldn't attract too much attention but spectrum > analysers which reach into 10's of GHz might be subject to arms export > regulations (!). All in all, you'd need to check with the countries into > which you are importing the equipment - professional import/export handlers > may be able to assist. In the face of these risks, you're unlikely to have > any problems whatsoever travelling by road within the EU although airport > x-rays may result in a detailed inspection by customs! > > Andy M > > ----- Original Message ----- > From: "delta" > To: > Sent: Friday, January 14, 2005 2:57 PM > Subject: [TSCM-L] question about border > > > > > > > > hello everybody > > do you know if it is legal to pass the border with some tscm equipment ( > cpm700 oscor tdr etc ... ) or if we need a special > > authorisation to go outside our country ? > > may be the rules are different between some country ? > > many thanks > > david from paris > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > 10624 From: wizardtradingcompany Date: Sat Jan 15, 2005 11:07am Subject: Safecracking for the computer scientist Somebody mentioned Bruce Schneier & counterpane in a previous post. I didn't read it entirely, so this may be duplication. Anyway, here's what Schneier says about the paper below: It's a great paper, and it has completely pissed off the locksmithing community: 10625 From: James M. Atkinson Date: Sat Jan 15, 2005 9:02pm Subject: MI5 boss admits bugging Adams http://www.timesonline.co.uk/printFriendly/0,,1-523-1442540-523,00.html January 16, 2005 MI5 boss admits bugging Adams David Leppard THE head of MI5, Eliza Manningham-Buller, has admitted that British intelligence agents have been bugging Gerry Adams and other top Sinn Fein officials. Manningham-Buller told a closed meeting of the parliamentary intelligence and security committee before Christmas that MI5 had planted a sophisticated listening device at the head offices of Sinn Fein at Connolly House in Andersonstown, west Belfast. In the security serviceís first formal acknowledgment of the bugging operation, MI5ís director-general told the committee, which monitors Britainís intelligence services, ìthey [Sinn Fein officials] had to almost shred the office to find itî. The 5 ft device was found last September hidden in a floor joist at the headquarters of the party, which is the IRAís political wing. Sinn Fein said at the time that two live microphones were found, one pointed towards the upstairs office and the other at a downstairs conference room. When the bugging was disclosed, Downing Street and the Northern Ireland Office declined to discuss the matter. But the find embarrassed Tony Blair who only days later had to face Adams, the party president, and other Sinn Fein officials for talks. Adams described the bug as ìa serious act of bad faithî and ìa violation of human rightsî. He added: ìThe British make it very, very hard to make peace when this goes on . . . this is a violation of the peace process.î Manningham-Bullerís admission of the MI5 bugging operation comes as the peace process is under renewed threat because of the IRAís alleged involvement in the £26.5m robbery at the Northern Bank last month. Hugh Orde, the chief constable of Northern Ireland, has said that ìintelligenceî has linked IRA leaders to the crime. The Connolly House bug was the latest in a series to have been found in property used by senior Sinn Fein and IRA members. Just a week earlier, a listening device had been found at the home of Paula McManus, who works in Adamsís west Belfast constituency offices. She is not suspected of any wrongdoing but her home was targeted because of her friendship with Martin Lynch, the adjutant-general of the IRA. He in turn is said to have met Bobby Storey, the IRAís director of intelligence, at the flat. That bug consisted of a microphone, six battery packs and a transmitter. It was concealed in the beam in the loft of the flat, which could be accessed from a communal area at the front of the building. Adams and Martin McGuinness, the partyís chief negotiator, blamed Paul Murphy, the Northern Ireland secretary, for authorising the surveillance operation. In 1999, a sophisticated listening and tracking device worth £20,000 was found built into a car owned by Lynch. Adams and McGuinness said the car had been used to take them to meetings with the IRA leadership. The bugging occurred during the review of the Good Friday agreement by George Mitchell, the former US senator. The intelligence and security committee was set up by an act of parliament in 1994 as a watchdog for the intelligence services. It is chaired by Ann Taylor, the former Labour chief whip, and comprises senior MPs and one member of the House of Lords. It reports directly to the prime minister on the work of MI5, MI6 and GCHQ, the governmentís eavesdropping agency. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10626 From: James M. Atkinson Date: Sat Jan 15, 2005 9:06pm Subject: Inspector General Rebukes F.B.I. Over Espionage Case and Firing of Whistle-Blower http://www.nytimes.com/2005/01/15/national/15translate.html Inspector General Rebukes F.B.I. Over Espionage Case and Firing of Whistle-Blower By ERIC LICHTBLAU Published: January 15, 2005 ASHINGTON, Jan. 14 - The F.B.I. has failed to aggressively investigate accusations of espionage against a translator at the bureau and fired the translator's co-worker in large part for bringing the accusations, the Justice Department's inspector general concluded on Friday. In a long-awaited report that the Justice Department sought for months to keep classified, the inspector general issued a sharp rebuke to the F.B.I. over its handling of claims of espionage and ineptitude made by Sibel Edmonds, a bureau translator who was fired in 2002 after superiors deemed her conduct "disruptive." Ms. Edmonds, who translated material in Turkish, Persian and Azerbaijani, had complained about slipshod translations and management problems in the bureau's translation section and raised accusations of possible espionage against a fellow linguist. The report from the office of Glenn A. Fine, the Justice Department's inspector general, reached no conclusions about whether Ms. Edmonds's co-worker had actually engaged in espionage, and it did not give details about the espionage accusations because they remain classified. But officials have said Ms. Edmonds said the co-worker, a fellow Turkish linguist, had blocked the translation of material involving foreign acquaintances of hers who had come under suspicion. In general, Mr. Fine's investigation found that many of Ms. Edmonds's accusations "were supported, that the F.B.I. did not take them seriously enough and that her allegations were, in fact, the most significant factor in the F.B.I.'s decision to terminate her services." Ms. Edmonds's case has become a cause cÈlËbre for critics who accused the bureau of retaliating against her and other whistle-blowers who have sought to expose management problems related to the campaign against terrorism. The American Civil Liberties Union joined her cause earlier this week, asking an appellate court to reinstate a whistle-blower lawsuit she brought against the government. The suit was dismissed last year after Attorney General John Ashcroft, invoking a rarely used power, declared her case to be a matter of "state secret" privilege, and the Justice Department retroactively classified a 2002 Congressional briefing about it. Responding to the investigation's calls for improvements in the management of translation services, the F.B.I. said Friday that it had taken steps to reorganize the operation and instituted "competency models" for hiring and training translators. A broader review by the inspector general released in September had found systematic problems in the F.B.I.'s translation capabilities and large backlogs in its translation of terrorism-related material. The F.B.I. also said Friday that it was continuing to investigate Ms. Edmonds's claims and restated its commitment to ensuring that whistle-blowers "who raise good faith concerns" do not face retaliation. Ms. Edmonds, for her part, said she viewed the inspector general's report as "an absolute vindication." "After all the delays in getting this story out, I wasn't expecting a lot," she said in an interview. "This report is certainly more than I expected, and I'm actually pretty pleased." Senators Patrick J. Leahy of Vermont, a Democrat, and Charles E. Grassley of Iowa, a Republican, who have been two of the F.B.I.'s toughest critics, said the report underscored their broader concerns about the bureau's treatment of dissenters, particularly on critical matters involving terrorism and espionage. "This report confirms that the F.B.I. failed to treat this case as seriously as the situation demanded," Mr. Leahy said. "It is unacceptable, and it deeply concerns us, that in the wake of the Robert Hanssen spy case, and in the months following Sept. 11, the F.B.I. failed to vigorously investigate these grave allegations." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10627 From: contranl Date: Sun Jan 16, 2005 0:26am Subject: Announcing a new Yahoo-group " Traffic-Cams " . Hi, I like to announce a new Yahoo group that i have started,It's called "Traffic-Cams" The group can be found here: http://groups.yahoo.com/group/traffic-cams/ It deals with all aspects related to traffic-cameras. There must be 10000's online,live and realtime on the net ! Check it out and visit the links-section where you find all traffic-cams in the world sorted by country or type (streaming-video / streaming-jpg's / stills) Learn about how video-signals are transported over the internet and how to embed video-cam screens on a webpage Check what the governments (departments of transportation) are looking at See how privacy is respected (or not) when they temporarely switch-off a camera when details or noticable. Or just take a virtual world-tour and visit some exotic countries like Hongkong,Brazil,Japan,Korea or just look at European or USA traffic-cams Some traffic-cam sytems just send dull non-moving pix ...with some javascript or html you can change those into dynamic movies (auto-refresh) Or combine a few traffic-cams with a local radio-scanner feed on 1 web-page to get the real feel of being in the control-room :) I have succeeded in embedding a web-page of my own inside the homepage of this Yahoo-group...so now you have live-video there ! Your welcome ! Greetings Tetrascanner Amsterdam The Netherlands W: www.tetrascanner.com 10628 From: Date: Sat Jan 15, 2005 10:58pm Subject: Microphone wire I am looking for a good source of ultra thin screened mic wire Preferably in Europe anybody have any suggestions please Thanks Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 _demtec@a..._ (mailto:demtec@a...) [Non-text portions of this message have been removed] 10629 From: contranl Date: Sun Jan 16, 2005 8:30am Subject: Re: Microphone wire . Maybe it's a good idea to use lets call it: "Differential Technique" Not shure if that is the right term but that will allow you to use non-screened wires just 2 wires ...any kind of wire ! the smallest that you could think of ! You take a mic...depending on the type you feed the audio to a circuit or a single chip made for that purpose. At the output you connect the 2 unscreened wires At the other end you feed it to a similar circuit wich reverses it back to non-differential. The resulting audio is the difference between the 2 wires, in other words you won't hear any interference from outside ...such as 50/60 hz hum or radiofrequent-interference since this interference reaches both wires there wont be a difference..the wanted audio will be heard ofcourse. This technique is also used to send video over unscreened wires ...over considerable distances ( miles !) It's also used in digital cellphones/GSM to avoid any interference (am-pulses)reaching the phone it's own audio-circuits. Therefore several specialised ic's are avialable to make "differential circuits" A condenser mic would need such a circuit on both ends A magnetic coil mic (little old fashioned :) ...only on the other end since it is already more or less "differential" but in that case you might need a impedance transformer...so better a condenser-mic with integrated amp (like most have) The point of all this is that you could use any wire that you want...no screen neccessary,it will allow you to use the smallest wire possible...maybe even conductive tape or paint ! You could even use any metal objects or constructions already available..like heating pipes or water-pipes...whatever, probably the 2 conductors should not be to far spaced from each other,cause that might introduce interference from a source not having the same distance to both wires. It's an interesting technique...i hope anyone can say something about it. Tetrascanner 10630 From: Date: Sun Jan 16, 2005 4:03am Subject: Re: Re: Microphone wire In a message dated 16/01/2005 14:31:13 GMT Standard Time, contranl@y... writes: . Maybe it's a good idea to use lets call it: "Differential Technique" Not shure if that is the right term but that will allow you to use non-screened wires just 2 wires ...any kind of wire ! the smallest that you could think of ! You take a mic...depending on the type you feed the audio to a circuit or a single chip made for that purpose. At the output you connect the 2 unscreened wires At the other end you feed it to a similar circuit wich reverses it back to non-differential. The resulting audio is the difference between the 2 wires, in other words you won't hear any interference from outside ...such as 50/60 hz hum or radiofrequent-interference since this interference reaches both wires there wont be a difference..the wanted audio will be heard ofcourse. This technique is also used to send video over unscreened wires ...over considerable distances ( miles !) It's also used in digital cellphones/GSM to avoid any interference (am-pulses)reaching the phone it's own audio-circuits. Therefore several specialised ic's are avialable to make "differential circuits" A condenser mic would need such a circuit on both ends A magnetic coil mic (little old fashioned :) ...only on the other end since it is already more or less "differential" but in that case you might need a impedance transformer...so better a condenser-mic with integrated amp (like most have) The point of all this is that you could use any wire that you want...no screen neccessary,it will allow you to use the smallest wire possible...maybe even conductive tape or paint ! You could even use any metal objects or constructions already available..like heating pipes or water-pipes...whatever, probably the 2 conductors should not be to far spaced from each other,cause that might introduce interference from a source not having the same distance to both wires. It's an interesting technique...i hope anyone can say something about it. Tetrascanner ------------------------ Yahoo! Groups Sponsor --------------------~--> What would our lives be like without music, dance, and theater? Donate or volunteer in the arts today at Network for Good! _Click Here!_ (http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links I spoke to an engineer years ago who tried this technique using fairly simple audio equipment and had very varying results I will try it out for myself and let you know how I get on many thanks for the info Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a... (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10631 From: Gerald Date: Sun Jan 16, 2005 3:23am Subject: Just a matter of time. Few months ago I posted a note about how firewalls and Anti-virus and sweepers don't do the job. How webcams and headsets can be turned into bugs remotely. I took alot of heat for my article but every thing I said has been covered in the news since then. Even the FBI retires its Carnivore, to use other software available online. There are more than 2,500 software vulnerabilities found every year according to the Sans Instutite. There are rootkits, attack bots and automated exploit testers out there now. And its just a matter of time before they are combined. Which has implications for terrorism and criminals. Id theft runs around $10 billion dollars a year now. I view our security systems like a NET.It has to allow info in and you out to view web pages. Most people use just three nets,firewall, anti-virus and a sweeper, not that difficult to get through. We add 5 more nets and connect them. This makes it more probable that I will catch and stop an attack. Info here. http://cigars.bravepages.com/newbullet2.htm Gerald Chief Forensics Fraud Investigator (tracking & Research) 10632 From: delta Date: Sun Jan 16, 2005 3:28am Subject: answer about border hello to the group and many thanks to robin , oisin , contrant , andy , and other who joined me by private mail i work in paris capital (france) and i need to travel to switzerland but only with a cpm700 and tdr , nothing else for the moment . i m going to contact the border to obtain the rules about crossing with this equipment. i travel with a car or by train but not by airplane. of course when i travel i don t bring with me my scanner and when it is possible i left the spectrum analyseur hp 8560a at my office for andy ( and other on this list ) if you want to see my website but in french language you have to go here http://www.deltafrance.com many thanks to everybody for my question about the border david from paris france europe ... lol 10633 From: G P Date: Sun Jan 16, 2005 9:12pm Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... I own a Yellowjacket with the optional Stinger for DF, it's a very nice piece of equipment and the only thing out there (that I'm aware of) that will DF 802.11 gear based on the data link layer. It starts sniffing for wireless APs, then you can punch down into the AP you're interested in and DF it, the unit sounds like a Geiger counter with an on-screen display for signal strength and attenuation etc. Unlike most of the other handheld sniffers, the BV stuff is truly a separate piece of discrete logic, the IPAQ is only used for the GUI and associated interfacing and has nothing to do with the actual RF section and spectrum capture and analysis. The Bumblebee is supposed to be a lower-cost version of the Yellowjacket (sub $2500 without the IPAQ and Stinger DF), plus the Bumblebee can do all ISM (including 900 Mhz), Bluetooth, 802.11, and the 5 Ghz UNII band. I wanted the Bumblebee instead of the Yellowjacket, but at the time it was still 3-6 months before the Bumblebee was due to be released so I went with the Yellowjacket Stinger setup instead. Make sure you get the Stinger option if you buy it, the DF aspect of it is worth the extra $250 for the directional antenna array. Very very nice and high-quality gear, and Berkeley Viatronics is a great company to work with - well worth the price IMHO. --- Dragos Ruiu wrote: > > > Anyone used one of these and care to share any > experience: > > http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm > > Looks like an interesting gadget, tough I haven't > found out > yet if they want a ridiculous amount of money for > it. > > It would also be interesting to find out if they > could produce a > variant with a wider sweep range/more agile front > end.... > > (I'm on a quest to find WLAN node directional > locators... > specifically to find out which out of a few hundred > laptops > in a big room has a particular mac address and is > messing > around to other's detriment...) > > thanks, > --dr > > -- > World Security Pros. Cutting Edge Training, Tools, > and Techniques > Vancouver, CanadaMay 4-6 2005 > http://cansecwest.com > pgpkey http://dragos.com/ kyxpgp > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Has someone you know been affected by illness or > disease? > Network for Good is THE place to support health > awareness efforts! > http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10634 From: G P Date: Sun Jan 16, 2005 9:15pm Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Maybe you used an older version, the Yellowjacket can definitely inspect the data link layer on up, and home in on a signal for direction finding based on MAC and IP address. The Yellowjacket smokes AirMagnet for DF applications, no comparison - you have to have an array of AirMagnets to triangulate and the BV stuff does it all from one handheld device. --- Michael Puchol wrote: > > Hi, > > I've yet to either see one operating or know of > someone that has one or > has seen one operating. I believe this device to be > more a stunt for the > other products the company makes, than something > tangible. The device is > way too expensive (they charged twice the going > price for the PDA alone, > for example). If you need to do surveys like you > mention, you can do > with AirMagnet and a Cisco 350 card with MMCX > antenna jacks - then you > can connect a small 2.4GHz handheld yagi and > attenuators to it, and do > the hunting. AirMagnet costs some $2.5k last I > looked, but it's quite an > impressive little package, I have seen it operating > and I have used it > quite a few times myself. > > The BumbleBee does not demodulate data at all, which > means that you > cannot really tie a signal to a particular > computer/MAC address without > further manual inspection. With AirMagnet you can > set a filter to > capture only packets coming from a particular MAC > address, and thus hunt > for it in confidence. > > If you are not concerned about using commercial > tools, you can flash an > iPAQ with Linux and use the vast array of tools > available for it. > > Regards, > > Mike > > Dragos Ruiu wrote: > > > > Anyone used one of these and care to share any > experience: > > > > > http://www.bvsystems.com/Products/WLAN/BumbleBee/bumblebee.htm > > > > Looks like an interesting gadget, tough I haven't > found out > > yet if they want a ridiculous amount of money for > it. > > > > It would also be interesting to find out if they > could produce a > > variant with a wider sweep range/more agile front > end.... > > > > (I'm on a quest to find WLAN node directional > locators... > > specifically to find out which out of a few > hundred laptops > > in a big room has a particular mac address and is > messing > > around to other's detriment...) > > > > thanks, > > --dr > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10635 From: Michael Puchol Date: Mon Jan 17, 2005 2:58am Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Hi, Great to hear it's a good product! As I mentioned, I know a couple of people who inquired a few years ago, and were given rather vague responses at the time, and since then I've not heard about the device. I have used a single AirMagnet + iPAQ to triangulate, basically in the old traditional way of aiming a directional antenna, attenuating, moving, repeat a few times. Not knowing the current prices, I can imagine that if they charge $1000 for an internal GPS receiver option (GPS boards now cost around $50), the prices for the whole kit will still be rather high. Thanks for the info, best regards, Mike G P wrote: > Maybe you used an older version, the Yellowjacket can > definitely inspect the data link layer on up, and home > in on a signal for direction finding based on MAC and > IP address. The Yellowjacket smokes AirMagnet for DF > applications, no comparison - you have to have an > array of AirMagnets to triangulate and the BV stuff > does it all from one handheld device. > > --- Michael Puchol wrote: > > >>Hi, >> >>I've yet to either see one operating or know of >>someone that has one or >>has seen one operating. I believe this device to be >>more a stunt for the 10636 From: Tech Sec Lab Date: Mon Jan 17, 2005 8:31am Subject: RE: Mic Wire David When I worked with satellite hardware design and we had to interface boards we always converted the cmos logic to differential voltage. Its standard practice for space applications where emi can piss around with levels. So if its good enough for that I'm sure it should work well with audio. However for surveillance you can forget about it usually because: You will need a converter at the mic end which will require the space of a pcb and power for it. So pointless if you're doing a covert mic. Fine if you need to use it as a repeater for ultra long runs. Regards -Ois ********************** I spoke to an engineer years ago who tried this technique using fairly simple audio equipment and had very varying results I will try it out for myself and let you know how I get on many thanks for the info Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a... (http://www.demtec.co.uk/) 10637 From: Date: Mon Jan 17, 2005 6:17am Subject: Re: Mic Wire In a message dated 17/01/2005 14:33:31 GMT Standard Time, tscmteam@o... writes: David When I worked with satellite hardware design and we had to interface boards we always converted the cmos logic to differential voltage. Its standard practice for space applications where emi can piss around with levels. So if its good enough for that I'm sure it should work well with audio. However for surveillance you can forget about it usually because: You will need a converter at the mic end which will require the space of a pcb and power for it. So pointless if you're doing a covert mic. Fine if you need to use it as a repeater for ultra long runs. Regards -Ois ********************** I spoke to an engineer years ago who tried this technique using fairly simple audio equipment and had very varying results I will try it out for myself and let you know how I get on many thanks for the info Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a... (http://www.demtec.co.uk/) ======================================================== Many Thanks for that I will go ahead and have a go anyway see what sort of results I get. Still no luck with the actual screened wire though Thanks again for taking the trouble to reply Best Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10638 From: Tech Sec Lab Date: Mon Jan 17, 2005 0:42pm Subject: MI5 boss admits bugging Adams http://www.timesonline.co.uk/article/0,,2087-1442540,00.html Hmmm, I do recall quite a few people on the list, who shall remain nameless(archives...hehe).... Pretty much bet their lives in conviction that there was no way that the device was planted by the UK Gov. So, maybe, they would explain to me why the Gov would admit to doing something that they didn't actually do....? :) 10639 From: Daryl Adams, CISSP Date: Mon Jan 17, 2005 7:55am Subject: WFFF This may be of interest to some. More features in the pipe. Stay tuned. http://wififofum.org 10640 From: scott4957 Date: Mon Jan 17, 2005 10:53am Subject: Re: Just a matter of time. Gerald, Very true, I have experimented with many free programs that allow you to use someone's webcam or mic remotely over the internet without any sign they are being used. My best advice is to keep them disconnected when not in use. Simple software firewalls are much to easy to circumvent, they cannot be trusted. I'm surprised you took heat for saying such a thing, this type of software as been available to the public for many years, there is no doubt in my mind that much more advanced software exists. All this can be done remotely, imagine the possibilities with access to the host computer. RS --- In TSCM-L@yahoogroups.com, "Gerald" wrote: > > > Few months ago I posted a note about how firewalls and Anti-virus and sweepers don't do the job. How webcams and headsets can be turned into bugs remotely. I took alot of heat for my article but every thing I said has been covered in the news since then. Even the FBI retires its Carnivore, to use other software available online. There are more than 2,500 software vulnerabilities found every year according to the Sans Instutite. There are rootkits, attack bots and automated exploit testers out there now. And its just a matter of time before they are combined. Which has implications for terrorism and criminals. Id theft runs around $10 billion dollars a year now. I view our security systems like a NET.It has to allow info in and you out to view web pages. Most people use just three nets,firewall,anti-virus and a sweeper, not that difficult to get through. We add 5 more nets and connect them. This makes it more probable that I will catch and stop an attack. Info here. http://cigars.bravepages.com/newbullet2.htm Gerald Chief Forensics Fraud Investigator (tracking & Research) 10641 From: scott4957 Date: Mon Jan 17, 2005 11:12am Subject: Re: Icom IC-R3 and R20 Suncom Inc (786) 621-1304 Miami FL They used to sell Asian versions of the R20. RS --- In TSCM-L@yahoogroups.com, Javier Villanueva wrote: > > Hi List, > I¥ve been trying unsuccesfully to buy this equipment > Online. All of the shops i¥ve found replied they are > "out of stock". > > If any of you sell these, offer "Special modified > versions", or know where to find them, i¥ll be > grateful. > > Payment by credit card and express delivery to Mexico > a big plus. Most probably this will be just the first > buy, with more to come. > > > Thank you very much guys. > > ===== > Javier Villanueva C. > Vcorp & Asociados > Contraespionaje ElectrÛnico y > Seguridad Inform·tica > Tel. 01 (33) 36 19 47 09 > cel. 044 333 392 64 50 > msm. javier_vc@h... > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - now with 250MB free storage. Learn more. > http://info.mail.yahoo.com/mail_250 10642 From: satcommunitfive Date: Mon Jan 17, 2005 7:27pm Subject: Re: Once more into the breach I have a AOR 8600 mark2 and it`s full of birdies ps new AOR looks intersting SR2000 link > http://uk.groups.yahoo.com/group/AOR-SR2000/files/sr2000-info-e.pdf bewell 10643 From: contranl Date: Mon Jan 17, 2005 8:33pm Subject: Re: Mic Wire . Demtec says: > You will need a converter at the mic end which will require the > space of a pcb and power for it. So pointless if you're doing a > covert mic A pc board would not be neccessary since the whole circuit would be no bigger than a 8 pin SMD IC wich is the size of a match-head. something like this ## maybe this you could glue that to the back of a 3-pin condenser-mic ...only addition would be a 0.1 uF capacitor wich you need to separate the audio from the power-supply wich is send over the 2 wire line too. Here is such an IC (Integrated Circuit) also available in SMD size look at the application circuits at the bottom of nthe pdf and see how practically no extra components are needed: http://www.analog.com/productSelection/pdf/ad830.pdf This one does up to 10 Mhz ...that could be 2 videocameras ! A Google search shows that they come with ranges over 200 mHz ! You could send the signals of a complete 10-camera-video-surveillance-network to the other side of the building or street...over just 2 practical invisible wires ! Or maybe you could get a little condenser-microphone with a built-in differential output !? don't know if they exist, maybe from a cellular phone ? Now that i think of it the smallest shielded microphone-cable that i have seen must be those that are used for small headphones like the ones used with portable cd-players/mp-3 players. Specially Sony uses a cable with 2 thin and shielded wires ...the funny thing is that they are not completly metallic, they use some kind of conducting rubber. Next problem ....how to get those in 20 meter lengths ? :( Don't know what length you need but one 15$ headphone will give you at least 2 x 1,5 meters Maybe you dont need the whole length like that but just there where the wires need to be "invisible" In addition ...here is a coax >> twisted-pair converter (balun) for video-signals wich could be used at both ends of a piece of cable that should be hidden or "invisible" The 2 boxes you could put in a convenient place out of sight. http://www.spytown.com/twpavitr.html To be honest i have no real-life experience with this "differential" bugging stuff...just theory :) Interested in the matter i spend an hour or so searching the internet for "thin shielded microphone cable" but that did'nt give any good results. Maybe "Farnell" (Europe) have such a cable ? Last idea: ...just try a piece of unshielded wire and a condenser-mic about the same length as you will use later,do some experiments (amplification or hum-filters ) maybe it that fine enough. Have fun ! Ps) By the way...the purpose of this would be to hide a microphone cable...as much as possible ? Tetrascanner 10644 From: G P Date: Tue Jan 18, 2005 0:09am Subject: Re: Intersting doodad: Bumblebee Wireless spectrum analyzer.... Yes the BV stuff is not cheap by any stretch of the imagination, the Yellowjacket setup with DF Stinger was more than $4K. The Bumblebee uses a different front end than the Yellowjacket, so the manufacturing process is supposed to be cheaper - although with the GPS option and Stinger, it's probably approaching $4K still. Great tool for detecting and locating rogue APs though, very relevant for site audits and WLAN security in general. --- Michael Puchol wrote: > > Hi, > > Great to hear it's a good product! As I mentioned, I > know a couple of > people who inquired a few years ago, and were given > rather vague > responses at the time, and since then I've not heard > about the device. > > I have used a single AirMagnet + iPAQ to > triangulate, basically in the > old traditional way of aiming a directional antenna, > attenuating, > moving, repeat a few times. > > Not knowing the current prices, I can imagine that > if they charge $1000 > for an internal GPS receiver option (GPS boards now > cost around $50), > the prices for the whole kit will still be rather > high. > > Thanks for the info, best regards, > > Mike 10645 From: Date: Tue Jan 18, 2005 4:52am Subject: Tetrascanner Advice Many Thanks again for your reply and some excellent ideas. Simple micro shielded wire does seem difficult to obtain. The best I can do here in the UK is 1.5mm o/d single screen grey fairly low quality from CPC [order number CBBR 4177]. Further to some recent discussions re RFID detection the ELEKTOR ELECTRONICS MAGAZINE Feb 2005 has printed an excellent article named RFID frenzy and a project RFID Detector for 13.56 Mhz.I have not had time to assimilate all the details but seems well worth a look. The mag has a website _www.elektor-electronics.co.uk_ (http://www.elektor-electronics.co.uk) Regards to all Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10646 From: Cristian Date: Tue Jan 18, 2005 0:44pm Subject: second hand Any Oscor and Orion in second hand there? A friend of mine, with tight budget, wants them. Cristian From: Steve Uhrig Date: Thu Jan 17, 2002 8:37am Subject: Re: Electronic Harassment Sweepers Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > http://www.siin.com/invres.html This guy is Ronald Rhodes. He tried to rip me off for a few hundred dollars in a business deal last year, and I had to get some letters to knock on his door to get him to make good. He has a felony theft record for stealing some laser components from a company and peddling them on ebay. He's in his twenties. He also runs two other websites, one selling vaporware kits and the other an anti government type site. Stay far away from this guy. I had looked into filing a complaint against him in California, claiming to be a PI when he is not, but did not pursue that when he made good on the deal after trying to rip me off. I'm sure the State's Attorney would be mildly interested in him. I believe I posted a warning about him last year around the time we knocked heads. That message should be in the archives if anyone cares. If anyone else has had, or tried to have, business deals with this guy and you got cheated, I will share my file with you. I have copies of his criminal records and a good bit of other stuff. Those of you out there who are PIs should be especially incensed by this sort of thing (meaning his website listed above) because this is what the public sees of your profession. Can't blame them if they read the site and judge the entire profession. He's a hotdog, answers all the messages on his bulletin boards pretending to be someone else and pumping up his products, and referring to himself in the third person. I don't know how many people see through him doing that. Steer clear of this guy. I am sure Roger was posting the info merely as a curiosity as to how far some people think they can go without ultimate sanctions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4564 From: Date: Thu Jan 17, 2002 4:19am Subject: Re: Re: Electronic Harassment Sweepers In a message dated 1/17/02 6:47:28 AM Pacific Standard Time, steve@s... writes: << He also runs two other websites, one selling vaporware kits and the other an anti government type site. >> Would you please share these with the rest of the list? Thanks, M. 4565 From: Steve Uhrig Date: Thu Jan 17, 2002 9:45am Subject: Ripoff Artist Mikie asked: << He also runs two other websites, one selling vaporware kits and the other an anti government type site. >> > Would you please share these with the rest of the list? Ask and it shall be given unto you. www.plans-kits.com www.siin.com www.getexempt.com > Having stolen items nets sentence The San Diego Union - > Tribune; > San Diego, Calif.; Sep 7, 2000; Onell R. Soto; > Abstract: Ronald Rhoades, 25, pleaded no contest last month > to possessing lasers stolen from Melles Griot, a Carlsbad > manufacturer of industrial lasers, after company officials > noticed their products for sale on the Internet auction site > eBay. > Rhoades also pleaded no contest to possessing an illegally > shortened .22-caliber rifle and nunchakus, outlawed martial > arts weapons. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4566 From: Dr. Pepper Date: Thu Jan 17, 2002 9:59am Subject: RE: Re: Record device Radio Shack makes such a device for about 20 bucks. I've used it for years, and it works great. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, January 16, 2002 7:45 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Record device Once upon a midnight dreary, zack pondered, weak and weary: > Due to experiences which have occurred within the past few > days, I would like to enlist this list for some information. I > am looking for a modest price recording device which would > record phone conversations as soon as I pick up the phone, > taking into account I also use the same line for Internet use. > ( long play with time/date ). PS..... I live in a state with > one party only knowledge as to recording. Very easy problem. Connect a tape recorder to your phone line via any standard method, and start the recorder manually when you make or receive a call you wish to record. Since you are in a one party consent state, you are OK as the one party, and it would only be your own calls you would be recording, so you merely can start the machine yourself when needed. That way, you won't fill the tape needlessly with Internet noise/data instead of voice. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4567 From: Hawkspirit Date: Thu Jan 17, 2002 11:18am Subject: TSCM article Here is a pretty good article http://www.securitymanagement.com/library/000464.html 4568 From: A Grudko Date: Fri Jan 18, 2002 6:42am Subject: Bin Ladin rights Just a thought, reading another group's comments yesterday on the legal issues of audio serveillance in the US - a bit off the wall and not intended to give any support to OBL or any criminals... I'm thinking about the video tape which was 'found' about a month ago in Afghanistan where someone resembling OBL 'boasted' about 9/11 to another Saudi. News reports implied that this was a covert recording - done without OSL's knowledge, a roaming concealed camera on someone else's property recording a private meeting. The 'cameraman' or perhaps 'secret agent' is unknown so not available to testify to the circumstances of the event or authenticity of the tape. If this tape is used to try to prosicute someone, wouldn't a US criminal Court refuse to accept it as evidence under normal conditions? I do realise these are not 'normal' conditions and that governments can and do grant themselves powers which trample over people's rights in times of emergency. Before I get flamed; I do not support OBL's group or actions I'm not looking for a loophole for him to grovel to the caves through I'm not anti-American. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4569 From: Aimee Farr Date: Fri Jan 18, 2002 3:37pm Subject: CALEA decision http://laws.lp.findlaw.com/dc/005386.html U.S. DC Circuit Court of Appeals US TELECOM ASSN v FBI January 18, 2002 4570 From: James M. Atkinson Date: Fri Jan 18, 2002 3:46pm Subject: 4568 message on the Archive I just wanted to let the list know that we have an archive vailable of over 4500 list postings. http://groups.yahoo.com/group/TSCM-L/messages -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4571 From: William Knowles Date: Sat Jan 19, 2002 2:38am Subject: China Finds Bugs on Jet Refitted in U.S. http://www.washingtonpost.com/wp-dyn/articles/A5176-2002Jan18.html By John Pomfret Washington Post Foreign Service Saturday, January 19, 2002; Page A1 BEIJING, Jan. 18 - Somewhere on a military airfield north of Beijing, China's presidential aircraft, a new Boeing 767-300ER with all the trimmings, sits unused with parts of its innards torn out. Last October, days before its planned maiden voyage, Chinese military communications experts discovered numerous high-tech listening devices planted inside the plane, according to Chinese and Western sources, who said they had been told of this by Chinese military officers and aviation officials. The plane was grounded and has not been flown since it was delivered. Chinese aviation officials and military officers have charged that U.S. intelligence agencies planted the bugs aboard the plane while it was being refitted in the United States, the sources said. The U.S. Embassy declined to comment on the allegations. Analysts said the devices were highly sophisticated. A CIA spokesman, Bill Harlow, declined to comment on the report, saying, "We never comment on allegations like these, as a matter of policy." The story behind the immobile Boeing jet offers a tantalizing glimpse of modern spycraft. A Chinese source, with close ties to China's military intelligence services, said members of the Third Department of the General Staff Department of the People's Liberation Army discovered the devices. The Third Department deals in signals intelligence. The Chinese source said that, to date, 27 listening devices had been found, including devices in the presidential bathroom and in the headboard of the presidential bed. A Western executive and a Western diplomat said they had been told by Chinese aviation sources that the devices were highly sophisticated. The diplomat said they "had to be triggered by a satellite communication. In that sense, they were very advanced." U.S. sources have said the controversy over the plane is emerging as an issue in the summit meeting between President Bush and President Jiang Zemin scheduled for Feb. 21 in Beijing. Chinese analysts said the incident confirms their fears that the United States is an untrustworthy partner and continues to treat China as an enemy. After the listening devices were discovered, Western sources said, 20 Chinese air force officers and two officials from China Air Supply Import & Export Corp., which was involved in negotiations for the jet, were detained. Chinese sources said they were being investigated for negligence and for corruption ñ the American firms were paid about $10 million for the refitting job but China doled out $30 million. In addition, a senior air force officer is under a form of house arrest for his role in the affair. The officer has previously purchased planes for government officials through the auspices of China United Airlines, owned by the Chinese air force, which also had a piece of the transaction in question. A top officer of the Bodyguards Bureau of the General Staff Department of the People's Liberation Army, has also been criticized for tolerating the lax security, the sources said. The China Air Supply Import & Export Corp. and China United Airlines declined to comment on the situation. It is unclear how the episode could affect Boeing, which in September signed a $2 billion deal to sell planes to China. More broadly, Western diplomats said they believed Washington and Beijing would weather the dispute. "This kind of thing is to be expected," said a Chinese security expert, who noted that relations between Washington and Moscow were not seriously disrupted by disclosures in the 1980s that the Soviets had bugged the new U.S. Embassy. The expert added, "Even if our relations were excellent, we would still spy on each other." China purchased the Boeing 767-300ER in June 2000 for $120 million, a Chinese source said. An executive at Delta Airlines said the Chinese were so eager to obtain a top-of-the-line 767 that Delta allowed China to assume its contractual responsibilities for one plane about to come off Boeing's assembly line in Seattle. China's state-run media, which dubbed the plane Air Force One, reported the sale in August of that year. Several reports, including one that appeared in the Guangzhou Daily, a mass circulation newspaper in that southern metropolis, said the plane had already been brought to China for refitting. In fact, the plane had been sent to the San Antonio International Airport for refitting by several aircraft maintenance firms, including Dee Howard Aircraft Maintenance Lp, Gore Design Completions Ltd., Rockwell Collins Inc. and Avitra Aviation Services Ltd., a Singapore firm, according to companies that worked on the contract. The job was worth less than $10 million, an industry source said, and work continued during a very tense period in U.S.-Chinese relations following the April 1, 2001, collision between a U.S. reconnaissance aircraft and a Chinese jet off the coast of southern China. In a report about the refitting work published last September, the San Antonio Express-News quoted Earl Parker, a project manager for Avitra, as saying the plane was not a "plain Jane, like [U.S.] Air Force One." Parker told the newspaper the plane was refitted to accommodate about 100 people in beige leather chairs that could be converted into beds. Larger, one-hour oxygen canisters replaced the 20-minute type used on most aircraft. And the new presidential suite consisted of a bedroom, sitting room and a bath with a shower. The firms also added a 48-inch television set, satellite communications and advanced avionics. Chinese security guards provided round-the-clock security for the plane while it was being refitted, the newspaper said. How the listening devices got on board the plane is a mystery. Phil O'Connor, a vice president at Dee Howard Aircraft Maintenance of San Antonio, said today was the first time he he had heard of the allegations. Robert Sanchez, chief operations officer at Gore Design Completions, also of San Antonio, said he did not believe the allegations. "We had an excellent relationship with every Chinese official who worked on this project," he said. "We're not in the business of doing things like this." A Rockwell Collins spokeswoman said the company would have no comment. Work was completed on the plane in August and it was flown to China on Aug. 10, stopping in Honolulu. A group of American workers and their families accompanied the plane as guests of the Chinese government, Sanchez said. "The Chinese were very happy with the aircraft and with the work we did. They took the workers to the Great Wall and showed them around," said Sanchez. "Why would any of these corporations or workers consider that, if they knew anything about this?" Western diplomats and executives learned of the case in mid-October when Chinese officials they normally did business with did not appear for meetings. Chinese friends and colleagues informed them that the officials had been arrested, they said. The arrests occurred in China about the time that Jiang was supposed to take his maiden voyage in the jet to attend the summit of the Asia-Pacific Economic Cooperation forum in Shanghai. Jiang flew to the meeting on another airplane. Sanchez said Chinese government officials have not contacted his firm about the problems. He also said that Chinese aviation officials said they wanted Gore to work on three additional VIP aircraft. "We're technical, not political," Sanchez said. "This incident is not going to hurt the U.S. government; it's not going to hurt the government of China. It's only going to hurt the firms. " For years, China has worried that Western governments, using Western companies, would use high-tech products to compromise China's security. China spent millions of dollars protecting the new headquarters of the Foreign Affairs Ministry from listening devices that could potentially be mounted in office buildings nearby, a Chinese security source said. Last year, the People's Daily, the official Communist Party newspaper, carried an editorial in which it SAID the import of high-tech products from the West constituted a security risk because Western governments would place secret codes or technical Trojan horses inside the products to collect intelligence. Staff writer Thomas E. Ricks in Washington contributed to this report. *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4572 From: Richard Superman Date: Sat Jan 19, 2002 2:25am Subject: China says president's jet bugged http://money.iwon.com/jsp/nw/nwdt_rt.jsp?cat=USMARKET&src=201&feed=reu§ion=news&news_id=reu-l19285278&date=20020118&alias=/alias/money/cm/nw China says president's jet bugged-Financial Times Friday January 18, 8:39 PM EST LONDON, Jan 19 (Reuters) - China has said its intelligence officers found more than 20 spying devices in a Boeing 767 meant to become President Jiang Zemin's official plane after it was delivered from the U.S., the Financial Times said on Saturday. Citing Chinese officials, the newspaper said it was unclear when the aircraft was fitted with the bugs, said to be tiny and operated by satellite. The devices were detected after the plane emitted a strange static whine during test flights in China in September, shortly after it was delivered. One device was found in a lavatory and another in the headboard of the presidential bed. The discovery came ahead of a planned summit between U.S. President George W. Bush and Jiang in Beijing next month. The Chinese president was said to be furious about the find, the FT said. The aircraft was made at the Boeing factory in Seattle and then fitted with VIP equipment and upholstery by another company. The plane was under surveillance by Chinese officials throughout, the newspaper said. A Boeing spokesman declined to comment on the report. Chinese officials said the security forces had launched an investigation into possible negligence and some 20 air force officers had been held for questioning, the FT said. The U.S. and China clashed over espionage issues in April last year when a Chinese fighter jet and U.S. spy plane collided over the South China Sea, resulting in the death of the Chinese pilot and the grounding of the U.S. plane in China. ©2001 Reuters Limited. -- Sent through GMX FreeMail - http://www.gmx.net 4573 From: Shawn Hughes Date: Sat Jan 19, 2002 0:07pm Subject: Re: US Videdo Surveillance Andy, Naah. We (I) have videotaped people all the time without their knowledge or consent, State and Federal. There are several rules concerning it, but the safest one is to have a cooperating witness in the room (or frame). Think about it like this; basically, if you were required to garner the ok of any future felon before you could conduct visual and audio intercept ops, you'd just about never be doing them. Oh, and the rules are a lot less stringent when they are in a public setting. Shawn 4574 From: James M. Atkinson Date: Sat Jan 19, 2002 6:47pm Subject: Appeal - United States Telecom Association v. Federal Bureau of Investigation, et al. United States Court of Appeals FOR THE DISTRICT OF COLUMBIA CIRCUIT Argued October 12, 2001 Decided January 18, 2002 No. 00-5386 United States Telecom Association, Appellant v. Federal Bureau of Investigation, et al., Appellees Appeal from the United States District Court for the District of Columbia (No. 98cv02010) A. Stephen Hut Jr. argued the cause for appellant. With him on the briefs were John H. Harwood II, Samir C. Jain, Lawrence E. Sarjeant, Linda L. Kent and John W. Hunter. Anne Murphy, Attorney, U.S. Department of Justice, ar- gued the cause for appellees. With her on the brief were Kenneth L. Wainstein, U.S. Attorney, and Douglas N. Letter, Counsel, U.S. Department of Justice. Daniel L. Kaplan, Counsel, entered an appearance. Before: Ginsburg, Chief Judge, Henderson, Circuit Judge, and Williams, Senior Circuit Judge. Opinion for the Court filed by Senior Circuit Judge Williams. Williams, Senior Circuit Judge: Electronic eavesdropping has historically proceeded on a basis of cooperation between law enforcement authorities and telephone service providers. In 1970 Congress regularized the relationship somewhat by providing that a court order for electronic surveillance should, at the request of the officer applying for authority, direct the provider to furnish the applicant with the necessary "informa- tion, facilities and technical assistance." Act of July 29, 1970, Pub. L. No. 91-358, tit. II, s 211(b), 84 Stat. 654 (1970), codified at 18 U.S.C. ß 2518(4). Because of rapid technologi- cal development since then, Congress in 1994 added further structure with the Communications Assistance for Law En- forcement Act ("CALEA" or the "Act"), 47 U.S.C. ß 1001 et seq. (1994). (Each of the statute's sections has a number 899 lower than that of its codified equivalent in Title 47; for simplicity's sake we use only the latter.) The Act has re- quirements relating to both the "capability" of telephone service providers to intercept communications and their "ca- pacity" to do so. In United States Telecom Ass'n v. FCC, 227 F.3d 450 (D.C. Cir. 2000), we addressed "capability"; here we deal only with "capacity." In very simplified form, CALEA sets up the following regime as to capacity, involving three key phases: (1) The Attorney General issues "notices" of what capacity is needed. The Attorney General in fact has delegated his duties to the FBI, and we henceforth refer to it exclusively. (2) Each carrier responds with a "statement" of the modifications any of its systems or services will need to provide the required capacity. (3) A carrier is deemed in compliance with the FBI's capacity notices, without having made the specified modifications, until the FBI agrees to reimburse the carrier for those modifications. We spell out the scheme in more detail below. In 1998 the FBI issued a set of rules implementing the Act's capacity requirements. See Implementation of Section 104 [47 U.S.C. ß 1003] of CALEA, 63 Fed. Reg. 12218 (March 12, 1998) ("Final Notice"). United States Telecom Associa- tion ("USTA"), a trade association of about 1400 telephone companies, sought relief in district court against various provisions of the rules. First, it argued that the FBI had erroneously defined the class of "modifications" for which carriers might be eligible for reimbursement. Second, it said that the FBI's concept of the required "notices" misread the statute in a variety of ways, each increasing the carriers' burdens and their risks of being found noncompliant. In an unpublished opinion the district court granted summary judg- ment in favor of the FBI on all issues. Reviewing the grant of summary judgment de novo, see, e.g., Shields v. Eli Lilly & Co., 895 F.2d 1463, 1466 (D.C. Cir. 1990), we affirm the district court with respect to the reim- bursement scheme, finding that the FBI correctly defined the "modifications" required to be reimbursed. On the other hand, finding error on the part of the FBI on each of the disputes about its notices, we reverse on those issues, with instructions to the district court to remand the case, in one instance vacating the challenged feature of the rules, in the others not. * * * CALEA requires the FBI to issue a notice of both the "actual number" of interceptions and devices that it expects will be conducted and used "simultaneously" by October 25, 1998, ß 1003(a)(1)(A), and the "maximum capacity" required to accommodate the surveillance that enforcement agencies "may conduct and simultaneously use" after that date, s 1003(a)(1)(B). Subject to a qualification relating to reim- bursement of necessary modifications, service providers are required within three years after notice to have the capacity specified in ß 1003(a)(1)(A) and the ability "expeditiously" to expand to the "maximum capacity" specified in s 1003(a)(1)(B). See ßß 1003(b)(1), 1003(e). The FBI notice under ß 1003(a)(1)(A) is to state the actual number of communication interceptions, pen registers, and trap and trace devices, representing a portion of the maximum capacity set forth under sub- paragraph (B), that the [FBI] estimates that [law en- forcement authorities] may conduct and use simulta- neously. 47 U.S.C. ß 1003(a)(1)(A) (emphasis added). Pen registers are devices that record the telephone numbers dialed by the surveillance's subject; trap and trace devices record the telephone numbers of the subject's incoming calls. Each of the carriers is required to respond to the notice of capacity requirements with a "statement" of "systems or services that do not have the [necessary] capacity." s 1003(d). The FBI reviews these statements and "may" agree to reimburse the carrier "for costs associated directly with modifications to attain" the capacity requirements. s 1003(e). Until the FBI agrees to reimburse the necessary modifications specified by a carrier, the carrier is considered in compliance. Id. We address first the cost allocation issue, then the charac- ter of the notices to be issued by the FBI. * * * Cost Allocation. We start with the key statutory provi- sions. Section 1003(d) sets out the duty of the carrier to submit a statement responding to the FBI's notice, and s 1003(e) states the relationship between a carrier's compli- ance and the FBI's decision on what to reimburse: ß 1003(d) Carrier statement Within 180 days after the publication by the [FBI] of a notice of capacity requirements pursuant to subsection (a) or (c) of this section, a telecommunications carrier shall submit to the [FBI] a statement identifying any of its systems or services that do not have the capacity to accom- modate simultaneously the number of interceptions, pen registers, and trap and trace devices set forth in the notice under such subsection. ß 1003(e) Reimbursement required for compliance The [FBI] shall review the statements submitted under subsection (d) of this section and may, subject to the availability of appropriations, agree to reimburse a telecom- munications carrier for costs directly associated with modi- fications to attain such capacity requirement that are deter- mined to be reasonable in accordance with section 1008(e) of this title. Until the [FBI] agrees to reimburse such carrier for such modification, such carrier shall be consid- ered to be in compliance with the capacity notices under subsection (a) or (c) of this section. 47 U.S.C. ßß 1003(d), (e). The Final Notice provided for eligibility for reimbursement as follows: Capacity costs associated with any equipment, facilities or services deployed after the Carrier Statement period of 180 days following the effective date of this Final Notice of Capacity will not be eligible for reimbursement. Final Notice, 63 Fed. Reg. at 12220-21. But the language is concededly different from the thought the FBI intended to convey. In fact, government counsel assured us at oral argument (with the full assent of USTA's counsel), that this sentence should really be read as if it also contained the material added in boldface: Capacity costs associated with any equipment, facilities or services deployed after the Carrier Statement period of 180 days following the effective date of this Final Notice of Capacity will not be eligible for reimbursement, except costs for modifications the FBI has agreed to compensate under ß 1003(e). Thus, expenses incurred to add equipment--other than for modifications that the carrier specified in its "statement" and that the FBI in its discretion agreed to reimburse--are not reimbursable. USTA objects that under the FBI's reading of ß 1003(e), a carrier will have to pay for all capacity it adds in the future (except for the reimbursed "modifications"), even though the government will be able to help itself to part of the added capacity. As was developed at oral argument, this skews a carrier's incentives: rather than invest in capacity additions sized to accommodate not only its customers' prospective demand but also the government's future wishes, it will elect smaller expansions, anticipating that after the next FBI notice and carrier statement its equipment will require "modi- fication" and thus government reimbursement. USTA fur- ther argues that we should not defer to the FBI's reading of the Act under Chevron U.S.A. Inc. v. Natural Resources Defense Council, 467 U.S. 837 (1984), because the government has a sharp pecuniary interest in the outcome: under USTA's reading of the statute, the government would have to pay for its share of all new capacity that it uses. Of course the issue of Chevron deference arises only if the statute doesn't plainly settle the issue. Chevron, 467 U.S. at 842-43 (holding that if "Congress has directly spoken to the precise question at issue," the court "must give effect to the unambiguously expressed intent of Congress."). Here we find that the Act does so, and therefore need not resolve USTA's pecuniary-interest theory. The only costs for which the Act provides any compensa- tion are for "modifications" under ß 1003(e). These "modifi- cations" are necessarily to "systems or services" identified by the carrier in its ß 1003(d) statement as "not hav[ing] the capacity" to accommodate the needs set out in an FBI notice under ß 1003(a)(1). And those "systems and services" are necessarily systems and services extant at the time the carrier files its statement. In other words, eligibility for reimbursement extends only to modifications as needed to mend deficiencies set out in the carrier's ß 1003(d) statement. USTA claims to find support in the passage of ß 1003(e) that states: "Until the [FBI] agrees to reimburse [a] carrier for [reasonable] modifications, such carrier shall be consid- ered in compliance with the capacity notices." 47 U.S.C. s 1003(e). But the carrier's being "in compliance" appears to refer only to the modifications identified in the ß 1003(d) statement, and says nothing with respect to the government's uncompensated use of capacity that a provider may add, on its own, after submitting its ß 1003(d) statement. USTA also points to CALEA's enforcement provision, pro- hibiting a court from issuing any enforcement orders that "require a telecommunications carrier to meet the Govern- ment's demand for interception ... to any extent in excess of the capacity for which the [FBI] has agreed to reimburse such [a] carrier." 47 U.S.C. ß 1007(c)(1). But USTA's literal reading of this section is plainly unsound; even USTA does not think the section governs available capacity antedating the FBI's very first ß 1003(a)(1) notice. The FBI's reading of the section is that it reinforces the "safe harbor" provided by ß 1003(e)'s assurance to a carrier that it will not be out of compliance if law enforcement authorities demand capacity that the carrier's ß 1003(d) statement has said was needed (until the FBI funds the additional capacity). As appellant's construction of ß 1007(c)(1) is impossible on a literal basis and would require us to twist the meaning of ß 1003(e) itself, we find it unconvincing. USTA's remaining textual analysis contrasts the Act's lan- guage on capacity with its language on capability, which explicitly provides for compensation for modifications of equipment deployed before January 1, 1995 to accommodate law enforcement, ß 1008(d), and none for equipment deployed thereafter. We fail to see how the distinction helps USTA. The capability provisions plainly differ substantially from those for capacity, but the contrast sheds no light on the proper interpretation of ßß 1003(d) & (e). Finally, USTA makes reference to some legislative history it believes is supportive of its position. See Appellant's Br. at 20-21 (citing H.R. Rep No. 103-827, pt. 1, at 17, 20 (1994)). "But we do not resort to legislative history to cloud a statutory text that is clear." Ratzlaf v. United States, 510 U.S. 135, 147-48 (1994). See also Burlington Northern R.R. Co. v. Oklahoma Tax Comm'n, 481 U.S. 454, 461 (1987); In re Sinclair, 870 F.2d 1340, 1342-43 (7th Cir. 1989) (suggest- ing that legislative history should only be used to elucidate the meaning of the statutory text). Of course, legislative history may "shed new light on congressional intent, notwith- standing statutory language that appears superficially clear." Natural Resources Defense Council, Inc. v. Browner, 57 F.3d 1122, 1127 (D.C. Cir. 1995) (internal quotation marks and citation omitted). But in fact the force of appellant's claim turns on its selective quotation. The House Committee Re- port said: After the four year transition period, which may be extended an additional two years by order of the FCC, industry will bear the cost of ensuring that new equipment and services meet the legislated requirements, as defined by standards and specifications promulgated by the indus- try itself. However, to the extent that industry must install addi- tional capacity to meet law enforcement needs, the bill requires the government to pay all capacity costs from date of enactment, including all capacity costs incurred after the four year transition period.... H.R. Rep No. 103-827, pt. 1, at 16-17 (emphasis added). Appellant ignores the first sentence and quotes the second. In fact, properly read even the second sentence does not help appellant, for it describes the statute simply as calling on the government to pay for "additional capacity" that "industry must install ... to meet law enforcement needs." Just so. Government must pay for "modifications" that it agrees to reimburse as specified in ß 1003(e), but otherwise helps itself to capacity that is available. Accordingly, we affirm the district court's grant of sum- mary judgment for the government on USTA's cost recovery claim. * * * The remaining issues relate to provisions dealing with how the FBI "notices" are to specify capacity requirements. Again USTA argues that the FBI should not enjoy Chevron deference because of its pecuniary interest. Again we need not address the pecuniary-interest issue, though for a differ- ent reason from the one previously given. Even Chevron deference requires that the agency position be reasonable, Chevron, 467 U.S. at 843, and on none of the following issues is that standard met. "Expeditiously." Recall that the Act distinguishes be- tween the "actual numbers" of interceptions and equipment the FBI expects to be conducted and used simultaneously by October 25, 1998, ß 1003(a)(1)(A), and the "maximum capaci- ty" required to accommodate surveillance thereafter, s 1003(a)(1)(B). Section 1003(b) gives this distinction opera- tional significance. Section 1003(b)(1) requires carriers by a specified date to have the capacity [subject to ß 1003(e)] to accommodate the ß 1003(a)(1)(A) demands and the ability to "expand[ ]" to the subsection (B) "maximum capacity"; and s 1003(b)(2) requires each carrier to "ensure that it can accommodate expeditiously" an increase in demand up to the "maximum capacity." The Final Notice implements these provisions by reading "expeditiously" to allow only five business days. Final No- tice, 63 Fed. Reg. at 12219/1. The only rationale offered to support the five-day period is transparently off point. The FBI said the decision was "based on past practice as to the time typically involved under existing procedures used by law enforcement and telecommunications carriers to make techni- cal interception arrangements." Id. This statement about "past practice" relates only to provisioning individual wiretaps upon request--a task quite different from that of increasing total wiretapping capacity. Worse, unrebutted evidence in the record suggests that it would be impossible for carriers to install additional capacity in such a short time period. Unsurprisingly, ordering new hardware, securing its delivery, and then installing and test- ing it takes more than five days. See id. at 12235/1 (noting that seven commenters, including the trade association repre- senting telecommunications equipment manufacturers, have described this time frame as unrealistic). In effect, then, the FBI's interpretation of "expeditiously" de facto erases the statutory distinction between actual and maximum capacity, even though the statute plainly intends such a distinction and even specifies that "actual" capacity should be "a portion of the maximum capacity set forth under subparagraph (B)." ß 1003(a)(1)(A). We therefore find un- reasonable and vacate this aspect of the Final Notice. See RCA Global Communications, Inc. v. FCC, 758 F.2d 722, 733 (D.C. Cir. 1985) (rejecting agency's reading of a statute that "would deprive [the statutory provision] of all substantive effect"). "Capacity"/"Number of," and "Simultaneously." Recall that ß 1003(a)(1)(A) requires the FBI to give notice of the actual number of communication interceptions, pen registers, and trap and trace devices, representing a portion of the maximum capacity set forth under subpar- agraph (B), that the [FBI] estimates that [law enforce- ment authorities] may conduct and use simultaneously. 47 U.S.C. ß 1003(a)(1)(A) (emphasis added). Subsection (B) similarly requires notice of the "maximum capacity" required to accommodate such interceptions, etc., again "simultaneous- ly." The Final Notice insisted that these statements of "actual number" and "capacity" were properly in terms that drew no distinction between different types of interceptions (e.g., communications content versus mere pen registers), even though they differ heavily in their actual demands on capacity. Final Notice, 63 Fed. Reg. at 12235. And it treated interceptions as "simultaneous" if they occur on the same day, even though they may each only take moments and do not overlap in the least. Id. at 12225. USTA objects to both these decisions. And rightly so. As to "capacity," the FBI acknowledged that different interceptions impose different demands on capacity; content interceptions might require up to five delivery channels be- cause of multiple participants on a call, while others, such as pen registers and trap and trace devices, typically use only a single channel. See id. at 12218, 12232-33. By way of justification it said that the only historical data it had access to did not directly reveal the information the carriers were after: the available average national ratio of content intercep- tions to pen registers and trap and trace devices was not "in any way representative of any specific geographic region." Id. at 12235. It also said that, in any event, "law enforcement ... does not know the type(s) of surveillance that will be needed in the future." Id. at 12236. As to simultaneity, the FBI insisted that its choice "was logical from a law enforcement perspective" because court orders approving wiretapping activities are phrased in terms of days, and as a result such data was all that was available. Id. at 12225/3, 12235/2. The FBI's justifications of both decisions--ultimately claims of defects in existing data--render them unreasonable. See Fresno Mobile Radio, Inc. v. FCC, 165 F.3d 965, 969-70 (D.C. Cir. 1999). Such complete throwing up of hands is inconsistent with the Bureau's extensive use of statistical projections elsewhere in implementing CALEA. In fact, all the interception numbers that the FBI gave are estimates. For instance, to determine the actual and maximum capacity requirements themselves, the FBI undertook to establish a historic baseline, and then used statistical techniques to ex- trapolate the baseline into the future. Id. at 12224-25; see also id. at 12226/3 (stating that in determining "growth factors," which require prediction of future capacity require- ments, "statistical and analytical methods were applied to the historical interception information"). As to these portions of the Final Notice, we reverse the judgment of the district court, with instructions to remand the case to the agency for a more adequate explanation. Because it is not so clear as in the case of the Bureau's interpretation of "expeditiously" that there are no defensible grounds for its conclusions, however, the district court should not vacate the FBI's resolutions of the "number of/capacity" and "simultaneously" issues. Compare Allied-Signal, Inc. v. U.S. Nuclear Regulatory Comm., 988 F.2d 146, 150-51 (D.C. Cir. 1993) ("The decision whether to vacate depends on the 'seriousness of the order's deficiencies (and thus the extent of doubt whether the agency chose correctly) and the disruptive consequences of an interim change that may itself be changed.' "). * * * The judgment of the district court is affirmed and reversed as set forth above. So ordered. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4575 From: Hawkspirit Date: Sun Jan 20, 2002 10:01am Subject: Help on R.F. signal identification I'd like some help from the group in identifying an unknown R.F. signal. This signal was received while doing a sweep in the northern part of Los Angeles. The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is some kind of pulsed microwave signal. The timing of the signal is as follows. The signal first bursts five separate simultaneous pulses. The wave form looks as if you hold your hand up in front of your face fingers pointed toward the ceiling. Each finger would be a separate pulse. They range in amplitude as you fingers appear a (bell curve). This burst lasts about one half second and then the carrier is clear of signals. Next a single pulse appears at the high side of the carrier (2.468) and starts to sweep down frequency. When it reaches about the fifty percent point of the carrier bandwidth the five finger burst array appears again for about one half second. Then the single pulse reappears at the fifty percent point and continues to sweep down frequency until it arrives at the lower frequency of the carrier (2.402GHZ) and disappears and the five finger pulse bursts again for a half second. This completes the cycle. The full cycle timing is about 3 seconds. I monitored this signal for about four hours and I did not detect any pattern variation. Any help appreciated Roger Tolces www.bugsweeps.com 4576 From: James M. Atkinson Date: Sun Jan 20, 2002 11:13am Subject: Re: Help on R.F. signal identification Roger, What was the bandwidth of the signals, and did you examine the signals in the time domain? I would suspect an 802.11 WLAN connection, but of course it has to be assumed a hostile signal until proven otherwise. Where did you trace the signal to? Was it originating INSIDE your clients facility? What kind of antenna where you using? -jma At 8:01 AM -0800 1/20/02, Hawkspirit wrote: >I'd like some help from the group in identifying an unknown R.F. signal. >This signal was received while doing a sweep in the northern part of Los >Angeles. >The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is >some kind of pulsed microwave signal. The timing of the signal is as follows. > The signal first bursts five separate simultaneous pulses. The wave form >looks as if you hold your hand up in front of your face fingers pointed >toward the ceiling. Each finger would be a separate pulse. They range in >amplitude as you fingers appear a (bell curve). This burst lasts about one >half second and then the carrier is clear of signals. Next a single pulse >appears at the high side of the carrier (2.468) and starts to sweep down >frequency. When it reaches about the fifty percent point of the carrier >bandwidth the five finger burst array appears again for about one half >second. Then the single pulse reappears at the fifty percent point and >continues to sweep down frequency until it arrives at the lower frequency >of the carrier (2.402GHZ) and disappears and the five finger pulse bursts >again for a half second. This completes the cycle. The full cycle timing is >about 3 seconds. I monitored this signal for about four hours and I did not >detect any pattern variation. Any help appreciated > >Roger Tolces >www.bugsweeps.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4577 From: Matthew Paulsen Date: Sun Jan 20, 2002 1:11pm Subject: RE: Help on R.F. signal identification This could be a frequency hopping Bluetooth air interface for a basestation. Spectrum spread in the US is from 2.402 to 2.480. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Sunday, January 20, 2002 8:01 AM To: TSCM-L@yahoogroups.com; bratkid@e... Subject: [TSCM-L] Help on R.F. signal identification I'd like some help from the group in identifying an unknown R.F. signal. This signal was received while doing a sweep in the northern part of Los Angeles. The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is some kind of pulsed microwave signal. The timing of the signal is as follows. The signal first bursts five separate simultaneous pulses. The wave form looks as if you hold your hand up in front of your face fingers pointed toward the ceiling. Each finger would be a separate pulse. They range in amplitude as you fingers appear a (bell curve). This burst lasts about one half second and then the carrier is clear of signals. Next a single pulse appears at the high side of the carrier (2.468) and starts to sweep down frequency. When it reaches about the fifty percent point of the carrier bandwidth the five finger burst array appears again for about one half second. Then the single pulse reappears at the fifty percent point and continues to sweep down frequency until it arrives at the lower frequency of the carrier (2.402GHZ) and disappears and the five finger pulse bursts again for a half second. This completes the cycle. The full cycle timing is about 3 seconds. I monitored this signal for about four hours and I did not detect any pattern variation. Any help appreciated Roger Tolces www.bugsweeps.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4578 From: ki4je Date: Sun Jan 20, 2002 10:08am Subject: Re: Help on R.F. signal identification Could it be someones wireless LAN operating on the 802.1b standard? ----- Original Message ----- From: Hawkspirit To: TSCM-L@yahoogroups.com ; bratkid@e... Sent: Sunday, January 20, 2002 11:01 AM Subject: [TSCM-L] Help on R.F. signal identification I'd like some help from the group in identifying an unknown R.F. signal. This signal was received while doing a sweep in the northern part of Los Angeles. The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is some kind of pulsed microwave signal. The timing of the signal is as follows. [Non-text portions of this message have been removed] 4579 From: MaxS Date: Sun Jan 20, 2002 10:45am Subject: Spying in China Dears: Who knows what about spying equipments in BOEING 767 for Chinese president ? I am not asking WHY but HOW. Martin KOCIAN PS I will ask WHY later. 4580 From: Michael Puchol Date: Sun Jan 20, 2002 5:51pm Subject: Re: Help on R.F. signal identification Hi Roger, Without looking at the spectrum itself, and considering you are right in one of the ISM bands, you may be looking at 802.11b WLAN. It occupies about 1MHz per channel, uses direct sequence spread-spectrum, and can change such 'channel' as needed - maybe explaining the jumps you see. Depending on your SA settings, the waveform would look as you point out. Have you tried running with peak hold on? You will see the whole spectrum used 'filling up'. Cheers, Mike > ----- Original Message ----- > From: "Hawkspirit" > To: ; > Sent: Sunday, January 20, 2002 5:01 PM > Subject: [TSCM-L] Help on R.F. signal identification > > > > I'd like some help from the group in identifying an unknown R.F. signal. > > This signal was received while doing a sweep in the northern part of Los > > Angeles. > > The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is > > some kind of pulsed microwave signal. The timing of the signal is as > follows. 4581 From: MIKE F Date: Sun Jan 20, 2002 5:56pm Subject: RE: Spying in China It is reporrted that 767 sent here to US for updating & repairs thats how the equipment was put on plane. later4,mike f. -----Original Message----- From: MaxS [mailto:maxs@m...] Sent: Sunday, January 20, 2002 11:45 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Spying in China Dears: Who knows what about spying equipments in BOEING 767 for Chinese president ? I am not asking WHY but HOW. Martin KOCIAN PS I will ask WHY later. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 4582 From: tek492p Date: Sun Jan 20, 2002 7:31pm Subject: Re: Steve's column name Steve -- Use your name in your column title. Like "Steve's xxxxxxxxxxx". Hey, why not promote your business? When readers think of Steve Uhrig, they will also think of SWS Security. Jack 4583 From: James M. Atkinson Date: Sun Jan 20, 2002 4:27pm Subject: Re: Spying in China At 5:45 PM +0100 1/20/02, MaxS wrote: > Dears: > > Who knows what about spying equipments in > BOEING 767 for Chinese president ? > > I am not asking WHY but HOW. > > Martin KOCIAN > > PS > I will ask WHY later. Simple, The Chinese intelligence service installed the devices to spy on their own president, but the presidential protective detail turned them up by accident... oops. Heaven forbid, that the US would actually bug the plane; I mean really, the work was done by a highly respected US defense contractor, guarded 7/24, and maintained in a super secure location, etc, etc, etc... Who ever installed the little toys had sloppy tradecraft, Tit-for-tat, Bwahhh, ha-ha-ha, -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4584 From: Matthew Paulsen Date: Sun Jan 20, 2002 10:08pm Subject: RE: Re: Steve's column name Steve.. How about "Uhrig's Vade Mecum"? [Non-text portions of this message have been removed] 4585 From: Wayne T Work Date: Sun Jan 20, 2002 6:17pm Subject: RE: Help on R.F. signal identification Sounds like one of the newer 2.4 gig Network receivers transmitters. They can be set to hop around to find open channels with in this range. They do a DSS on the sig strength and then settle on a freq. to use to establish the network communications. If WEP is enable then it to uses chanelized selection for an encrypted session. pretty common stuff. Also the newer video "snap shop" 2.4 gig cameras use similar technology. Got a scan capture of the info? NAI (network associates Inc) make a WAP/WEP sniffer. Might help with the analysis. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Sunday, January 20, 2002 11:01 AM To: TSCM-L@yahoogroups.com; bratkid@e... Subject: [TSCM-L] Help on R.F. signal identification I'd like some help from the group in identifying an unknown R.F. signal. This signal was received while doing a sweep in the northern part of Los Angeles. The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is some kind of pulsed microwave signal. The timing of the signal is as follows. The signal first bursts five separate simultaneous pulses. The wave form looks as if you hold your hand up in front of your face fingers pointed toward the ceiling. Each finger would be a separate pulse. They range in amplitude as you fingers appear a (bell curve). This burst lasts about one half second and then the carrier is clear of signals. Next a single pulse appears at the high side of the carrier (2.468) and starts to sweep down frequency. When it reaches about the fifty percent point of the carrier bandwidth the five finger burst array appears again for about one half second. Then the single pulse reappears at the fifty percent point and continues to sweep down frequency until it arrives at the lower frequency of the carrier (2.402GHZ) and disappears and the five finger pulse bursts again for a half second. This completes the cycle. The full cycle timing is about 3 seconds. I monitored this signal for about four hours and I did not detect any pattern variation. Any help appreciated Roger Tolces www.bugsweeps.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4586 From: James M. Atkinson Date: Mon Jan 21, 2002 8:23am Subject: China silent over spy devices found on its presidential plane http://straitstimes.asia1.com.sg/asia/story/0,1870,97989,00.html? China silent over spy devices found on its presidential plane Beijing wants to downplay the incident, say analysts, despite 27 bugs reportedly being discovered on the US-made aircraft BEIJING - China yesterday remained silent about reports that a refitted Boeing 767 intended for Chinese President Jiang Zemin was bugged, as Vice-President Hu Jintao told a delegation of former United States ambassadors and academics that Beijing wants good ties with Washington. This Boeing 767 being refitted for President Jiang in the US was reportedly bugged. -- AP A Chinese Foreign Ministry official said the ministry did not have a response to the reports by the Financial Times and the Washington Post this weekend that Chinese intelligence officers had found 27 spying devices hidden in a US-built Boeing 767 intended to become Mr Jiang's official plane. 'We're still trying to contact relevant departments on this matter,' she said. The story was not carried by any local media. Analysts said yesterday they saw the lack of response by Beijing so far as a sign that the Chinese leadership wanted to downplay the incident. 'The Chinese government has been cautious in handling this problem. It has issued no official protest, no criticism,' said Mr Zhu Feng, director of the international securities programme of the Beijing University School of International Studies. 'I think it is taking into consideration the development in China-US relations.' Meeting the former US ambassadors and professors from Harvard University on Saturday, Mr Hu said Sino-US relations 'now have opportunities for further development'. He said that bilateral relations 'have been developing constantly despite ups and downs' since China and the US re-established ties 30 years ago, and he said he wanted to push forward bilateral relations through further 'exchanges, understanding and cooperation'. Meanwhile, US Secretary of State Colin Powell said yesterday that Chinese officials had never raised with him the reported bugging of the jet. 'In all the conversations I've had with the Chinese authorities over the last several months, this has never been raised,' he said in an interview with ABC television. As well, Mr Powell, who refused to confirm or deny the reports, said he did not believe the alleged incident would affect President George W. Bush's visit to China next month. 'I don't expect anything to derail that trip,' he said in a separate interview with the Fox News Channel. --AFP, Xinhua -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4587 From: James M. Atkinson Date: Mon Jan 21, 2002 8:22am Subject: China never mentioned bugging of Jiang plane: Powell http://straitstimes.asia1.com.sg/breakingnews/story/0,1895,97908,00.html? China never mentioned bugging of Jiang plane: Powell TOKYO -- US Secretary of State Colin Powell said on Sunday that Chinese officials had never raised with him the reported bugging of an American jet built for Chinese President Jiang Zemin. In addition, General Powell, who refused to confirm or deny the report, said he did not believe the alleged incident would affect President George W. Bush's upcoming visit to China. 'In all the conversations I've had with Chinese authorities over the last several months this has never been raised,' Gen Powell said in an interview with ABC television. In a separate interview with the Fox News Channel, he expanded on his remarks, but still declined to comment on the veracity of the report that appeared in the Washington Post and Financial Times on Saturday. 'I'm not aware of any contacts between us and the Chinese government concerning this so-called matter that we read about in the newspapers yesterday,' he said. Although he refused to comment on the reports themselves, Gen Powell said he did not expect the furore raised by them to interfere with the Bush trip to China that is scheduled for next month. 'I don't expect anything to derail that trip,' he told Fox. Asked a similar question in the ABC interview he replied: 'I don't see any reason to think so. 'We've received acceptance, of course, from the Chinese of the presidential visit and I know they're looking forward to it, they're quite excited about it and so are we,' he said. Both Washington and Beijing have refused to comment on the reports which said that Chinese intelligence officers had found 27 spying devices hidden in the US-built Boeing 767 jet intended to be Mr Jiang's official plane. China had known the jet was bugged since September -- a month after the aircraft was delivered, according to the reports. -- AFP -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4588 From: MIKE F Date: Mon Jan 21, 2002 9:54am Subject: WATCH-OUT!!!!!======>Multiple windows file wiping utilities do not properly wipe data with NTFS This Should interest some that use BC-Wipe & or other supposedly assured WIPE CLEAN software programs. later4,mike f ---------------------------------------------------------------------------- ------------------------------------------------ Kurt Seifried Security Advisory 003 (KSSA-003) http://www.seifried.org/security/advisories/kssa-003.html, kurt@s... Title: Multiple windows file wiping utilities do not properly wipe data with NTFS file systems. Issue date: Jan 21, 2002 Who should read this advisory: Anyone using file wiping utilities such as PGP Wipe (from NAI), BCWipe (from Jetico) or East-Tec Eraser (from East-Tec) on a Windows system with an NTFS file system, such as Windows NT, Windows 2000 or Windows XP especially with features such as thumbnail pictures in explorer. This advisory affects virtually every Windows file wiping utility, none of the tested programs were found to be problem free. Author and contact info: This advisory is copyright 2002, Kurt Seifried, kurt@s..., http://www.seifried.org/ Overview: In the NTFS file system a facility exists to bind additional data to a file or directory, called an alternate data stream [url1][url2]. These alternate data streams cannot be be removed, unless the parent file or directory is destroyed. Unfortunately most file wiping utilities only deal with the primary data stream and do not wipe the alternate data streams, thus leaving data intact. Affected software: It is important to note that every single software package tested failed to erase single or multiple data streams (Eraser 5.3 erased multiple data streams in, however missed alternate data streams when only one was present in a file). Based on this I find it unlikely that any other secure deletion programs implement alternate data stream wiping properly, all secure deletion programs for Windows should be treated as suspect until proven innocent. If you are using secure deletion software please check immediately for files with alternate data streams, and after deleting them you are strongly advised to wipe all free space. BCWipe version 1.x and 2.x from Jetico - Confirmed in testing and from vendor. http://www.bcwipe.com/ Eraser 5.3 - Confirmed in testing and from vendor. http://www.tolvanen.com/eraser/ SecureClean v3 build-2.0 - Confirmed in testing and from vendor. http://www.accessdata.com/main_deleted_data.htm East-Tec Eraser 2000 - Confirmed in testing. http://www.east-tec.com/eraser/index.htm PGP 6.x freeware and commercial, 7.x, freeware and commercial - Confirmed in testing. http://www.pgp.com/, http://www.pgpi.org/ Numerous other packages are suspected to be vulnerable, it is strongly advised to use the workarounds listed below. Impact: If data is stored in an alternate data stream attached to a file (such as the thumbnail of an image) or directory when this file or directory is wiped the information contained within the alternate data stream will be left intact on the harddrive. No warning is given to the user at all by Windows or the wiping programs. For example if you use windows file explorer (the default file browser in Windows) and have thumbnails of pictures enabled (the default setting) then the thumbnail of the thumbnail image, once created (i.e. once the directory is viewed in Explorer) will not be deleted until you delete the file and wipe all free space. Alternate data streams also provide an ideal location to keep attack tools, snippets of virus code and so forth for attackers and viruses, in fact some virus scanners do not scan alternate data streams unless specifically configured to do so (often labeled as "scan all files" or similar). The good news is that floppy disks and most other removable media are not formatted as NTFS, thus it is unlikely that copied files will contain the alternate data streams. As well no all compression programs, such as WinZip copy the alternate data streams, while others such as WinRAR do copy the alternate data streams. While it is unlikely that files with alternate data streams will have made it to other systems with their alternate data streams intact it is possible, and any systems that have had sensitive data copied or moved to them should immediately have their free space wiped in order to ensure alternate data streams containing sensitive information are still present. Details: Create a file with an alternate data stream: echo "this is a text file" > C:\file.txt echo "this is the alternate data stream lkajhkl2" > C:\file.txt:alternate-data-stream If you use forensics software to examine the harddrive you will find the string of text "this is the alternate data stream lkajhkl2" present on the drive. Now using the file wiper of your choice (BCWipe, etc.) choose the file C:\file.txt and wipe it. Use any many passes as you want. Now examine the drive for the string "this is the alternate data stream lkajhkl2". You should be able to find it. To do this using Linux simply create an image file of the drive and examine it using grep or strings: dd if=/dev/hdb1 of=windows-disk.img grep "this is the alternate data stream lkajhkl2" windows-disk.img or strings windows-disk.img > windows-disk.strings grep "this is the alternate data stream lkajhkl2" windows-disk.strings As you will quickly discover the data is easily found. Alternate data streams are only available on NTFS file systems, making home users with older systems (Windows95, Windows98, WindowsME) immune to this problem, but newer systems based on WindowsXP are capable of using NTFS, thus potentially exposing customers to risk. NTFS is also available on most corporate systems such as WindowsNT, Windows2000 and WindowsXP. Another "feature" of alternate data streams is that they cannot be deleted. If you have an alternate data stream attached to a file you cannot delete it, you can write other data to the stream, however you cannot reliably delete it. To overwrite an alternate data stream simply place more data into it, for example: echo "this will overwrite existing data in the stream" > C:\file.txt:alternate-data-stream or type notepad.exe > C:\file.txt:alternate-data-stream *** Solutions and workarounds: Several workarounds exist, and several vendors are in the process of updating software so as to fix the problem. The first workaround is to avoid using alternate data streams to store sensitive information. Unless you have explicitly created alternate data streams it is unlikely that they exist. However to check for alternate data streams several free tools exist, one of the best of which is LADS [url3] from Frank Hayne Software (heysoft.de). Simply download lads.zip and unpack it, then run it from your root drives (e.g. C:\, D:\) and it should find and report any and all alternate data streams present. Because alternate data streams cannot be deleted tools to detect them are quite effective, once found you should securely delete the files and proceed to the next workaround, wiping free space, in order to ensure the alternate data streams are deleted. The second workaround is to immediately use the "wipe free space" feature present in most secure file deletion utilities. Since the parent file or directory that the alternate data streams were attached to have been deleted the data in the alternate data streams is now in "free space" on the harddrive, thus using "wipe free space" will overwrite it. The downside of this workaround of course is that wiping all the free space on a hard disk can take quite some time, especially on a modern disk that may have several tends of gigabytes of free space to wipe. One note on this: wiping free space may not be possible or effective on network shares using NTFS, it is recommended to encrypt truly sensitive data on NTFS network file systems. A third workaround is to encrypt sensitive data, Windows 2000 offers encrypted file system, or you can use programs such as PGP's PGPDisk [url4] or Jetico's BestCrypt [url5]. It is recommended to use encrypted disk partitions rather then encrypting single files, encrypted disk partitions are much easier to work with, type in a password and you have access, when you are done you do not need to worry about encrypting the file, as the data is kept in an encrypted state on the hard drive. Additionally temporary files stored in the same directory (such as opened word files) will also be kept in an encrypted state, reducing the need for you to wipe free space. Several vendors have announced new versions in light of this, see below for more information: BCWipe 1.x and 2.x "We confirm importance of the problem of wiping alternate data stream in files, created on NTFS disks. We would thank Mr. Seifried for writing us about the problem and are going to solve it in the next version 3 of BCWipe, which is planned to be released at April, 2002." SecureClean "We will be covering all those issues in the next release. We plan to be shipping the product in February. The new release will be posted at www.accessdata.com. The current SecureClean does not handle alternate data streams or the thumbnails. That is coming in February." East-Tec Eraser 2000 "EAST Technologies has acknowledged the possible problem concerning the wiping of the alternate data streams that may appear on NTFS disk drives and it will analyze this problem in the security product that it develops and the way this may compromise the user's personal security and privacy. EAST Technologies will also inform all its users and customers and in case it would be necessary, it will develop a fix." Additional information: Check your anti-virus software, several packages do not scan alternate data streams by default, it is recommended you enable scanning of all files and confirm by placing the eicar.com [url6] in an alternate data stream of a file and scanning to test. Backup programs should also be checked, attach an alternate data stream to a file, delete and then restore it, check for the alternate data stream. You can remove an alternate data stream either by copying the parent file onto non NTFS media or backing it up with a program that does not save the alternate data stream, or by using the "rm" utility present in MKS Software's "MKS Toolkit 8.0". An op-ed piece on this problem will be appearing at SearchSecurity [url7] later this week. References: [url1] http://www.microsoft.com/technet/treeview/default.asp?url=/TechNet/prodtechn ol/winxppro/reskit/prkc_fil_xurt.asp - Multiple data streams [url2] http://support.microsoft.com/default.aspx?scid=kb;EN-US;q286797 - Windows File Protection and Alternative Data Streams (Q286797) [url3] http://www.heysoft.de/nt/ep-lads.htm - List alternate data streams. [url4] http://www.pgp.com/products/desktop-privacy.asp - PGP's Desktop privacy (includes encrypted drive software PGPDisk) [url5] http://www.jetico.com/index.htm#/products.htm - Jetico's BestCrypt [url6] http://www.eicar.org/anti_virus_test_file.htm - Eicar.com test file (for testing anti virus software). [url7] http://searchsecurity.com/ - Op-Ed piece on this to appear later this week. Other acknowledgements / thanks / greetings / information: dd, grep and strings CanSecWest - http://www.cansecwest.com/ - See you there URL for advisory, signature and keys: http://www.seifried.org/security/advisories/kssa-003.html http://www.seifried.org/security/advisories/kssa-003.html.asc http://www.seifried.org/security/keys/ - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use mQGiBDsNcxcRBAD987JAFctBIHhuUNm5tqQgYi/CsFsx1afNI6QyHhbqPxJMF2Vs D5dymEKSNd8QSAP4GNTk9MwswwxXHuXIYJolp+U2HhD/UhQsp37WiEODMB+NX8Xc Xe5+BOUEUxaGo/du64tawslmiNw2KJDonKWaUSQBtp5ek1eQ0plTQbJ1DQCg//m4 wrYgtDl4iWdMk/76C4zbc/MD/ibshluW0pnWSDUxf00LrbMd3xAfQDPd9ACruY7z pXdbdSJctpGMgzjbC0B97uqJINmB2Uu9h62bK+eKb+eIlM+zJEth0r6PCrhr+Kj4 EpQWiiujVU8ijNbHVM9SqT2vcS9i2o2ZCjrf2bQDdI7jt1c88+DdaCvRW79BiN4P GsyCBADy8uewbArfRQl/erB6XeyVz2KDRvi5mNzM0xEWTtNkEV43pyHxXNtLzuD8 91GCHxsSL9f5JWEpcyiIiUhXNFdM3nZiGE/6/xfnKflDT7bsOdKXHXCvW1yN9aDx QoRhJhlc3mnZMyLx/xz4M6wXVj8ddOBtwgBmlFtdZjyiDHwNJLQpS3VydCBNLiBT ZWlmcmllZCAgPHNlaWZyaWVkQHNlaWZyaWVkLm9yZz6JAFQEEBECABQFAjsNcxcF CRAw7AAECwMCAQIZAQAKCRCtYwtOrVbldApoAJ9ZRUlW8cycj3/XlTVtQNx405GZ QgCg5zt7jGJ3v7FQguJgQloBGY1MACiJAEYEEBECAAYFAjsNcz8ACgkQ+7U3Ee+D x4wO6gCgnbSwZFOOiTPoYjLxu446qfvzAAoAni6CROE7jtzqZMdHJbEqDFXcreEn iQEcBBABAQAGBQI7DXNLAAoJECnUkEFIZQ2xALsH/13KyASmkFvyYCsj4hzD+UOV DMZ/3Vi8/dXqL2NpSdGbvaASNVRyGG4huJBBSh9ccjXo11IbAfOvICfjbUQmIb3w O/5mRQCiFIsakuPZWKhne5I9yVjL3ob78c4i2EvqSJ6VPFuqIrEdVCeMNU8DvjDw k8FkjF5osPoKdk2CndEnrLOXMz04Qyv6DB4O1qcmhEyVc842dqPd/eOnNGUA7qN7 axp4AiZRNRyf4/XbRt+KQzS0tItQy9LcNfQiIr2B0nYo4t+edyQbQSPBiuESYTzm TZhz0J3zxl4Tkea1GlTBxuJ6ulOFofZtDyAWABncZ9oEWgPADl15a+SCUNGvct+J AEYEEBECAAYFAjsNdHYACgkQUWd9bj7NcwaN6QCeIYLdy4G3XlFebtHiXSHc/K1/ Iw4AoNrGLQWSHat8rs74/uE8ojtzh79htCFLdXJ0IFNlaWZyaWVkIDxrdXJ0QHNl aWZyaWVkLm9yZz6JAEYEEBECAAYFAjuUYccACgkQrWMLTq1W5XRAugCfQyMVlXPs D7lYKvhYg08mv6U7AZcAn0feW5KeOLrmSCWKaHlNUsVHX3opuQINBDsNcxgQCAD2 Qle3CH8IF3KiutapQvMF6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz0AfGy0OplK33 TGSGSfgMg71l6RfUodNQ+PVZX9x2Uk89PY3bzpnhV5JZzf24rnRPxfx2vIPFRzBh znzJZv8V+bv9kV7HAarTW56NoKVyOtQa8L9GAFgr5fSI/VhOSdvNILSd5JEHNmsz bDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67VYy4XTjTNP18F1dDox0YbN4zISy1 Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9 iUsiGSa6q6Jew1XpMgs7AAICCAD1mLQv5THh1JfuQEN26KbdRXWtw5tJ2LiXri17 G1BGS4pz7CVgNIhmKxhm9xvTD7Yb0xI2RoA5yre04xG77OQ47k0IjawSHdfr+PBZ 8C7O03QS17vKHthrpKayKENOUqWKOK3jGd2fx50EgKMnt5o+n1szEuhwvmxh1lOp iV4l4EMc2QykM1W/weTgCmTvBVABfgm0OQoNswdkrKPyyY16Li2IBI9ebqo6Vnz8 NWiZ2Hzta0cKvuGak/mmNkLsZFXQ3oH/J6ubRb9LskqJ4o7SwUaCAHR1sjlq5LS/ JNVjwkG18Q+Jrr4X6NncRK1eCuHm8yD5dbvHPZi0VnltXHwsiQBMBBgRAgAMBQI7 DXMYBQkQMOwAAAoJEK1jC06tVuV0vHwAmwTOfoVT5RJqaluoEvXy7qpRjmzUAKCw 4DM73//OxJSRLTwVO5IVtq/WIQ== =azr0 - -----END PGP PUBLIC KEY BLOCK----- Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems, if and only if, the bulletin is not edited or changed in any way, is attributed to Kurt Seifried kurt@s..., and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. Kurt Seifried kurt@s... is not liable for any misuse of this information by any third party. Kurt Seifried, kurt@s... A15B BEE5 B391 B9AD B0EF AEB0 AD63 0B4E AD56 E574 http://www.seifried.org/security/ -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQA/AwUBPEuH161jC06tVuV0EQJdaACg3i2aFcK4Rt6E9Ou9NNlt0sHJmxsAoM6b n4zlM+40Y8Em5NTqwQ+7r+yn =aYjp -----END PGP SIGNATURE----- ============================================================================ Delivery co-sponsored by VeriSign - The Internet Trust Company ============================================================================ FREE E-COMMERCE SECURITY INFRASTRUCTURE GUIDE When building an e-commerce site, you want to start with a strong, secure foundation. Learn how with VeriSign's FREE White Paper, "Building an E-Commerce Trust Infrastructure." See how you can authenticate your site to customers, use 128-Bit SSL encryption to secure your web servers, and accept secure payments online. Click here: http://www.verisign.com/cgi-bin/go.cgi?a=n116965650045000 ============================================================================ --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 4589 From: MIKE F Date: Mon Jan 21, 2002 10:17am Subject: WIN 2K ENCRYPTION On the Website near bottom the four articles posted on jan17 deal with Windows 2000 built in ecryption. later4,mike f ---------------------------------------------------------------------------- ----------------------------------------------- Added on Thursday, January 17, 2002 1) Keep Your Data Confidential A 2001 article from Windows & .NET magazine. 2) Step-by-Step Guide to EFS A technical reference provided by Microsoft. 3) Inside Encrypting File System Learn about Win2K's built-in encryption facility from this article from Windows & .NET magazine. 4) Encrypting File System Primer: Basics and Best Practices A 2001 article from the SANS Institute. The Above articles can be accessed from this web site: http://www.pcwebopedia.com/new_links.asp --------------------------- lATER4,Mike F ------------------------------------------ "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or Confidential. The information is intended for use only by the individual(s)or entity named/indicated above.If you are the identified/intended recipient, be aware that (Unless you seek Permission.) any disclosure, COPYING, DISTRIBUTION,& or use of the contents of this Message/Information is Prohibited! --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.314 / Virus Database: 175 - Release Date: 1/11/2002 4590 From: Hawkspirit Date: Mon Jan 21, 2002 11:08am Subject: Help on R.F. signal identification Mat, Anyplace on the Internet I can learn more about this? Roger From: "Matthew Paulsen" Subject: RE: Help on R.F. signal identification This could be a frequency hopping Bluetooth air interface for a basestation. Spectrum spread in the US is from 2.402 to 2.480. 4591 From: Hawkspirit Date: Mon Jan 21, 2002 11:33am Subject: Help on R.F. signal identification Thanks, Jim, The overall bandwidth is by the numbers 66MHZ, The individual pulses appeared to be about 5MHZ each. As far as the time domain, I was using my surveillance receiver so I could not do any kind of frame capture. What would be the best technique for measurement in the time domain? I could get a general direction on the signal but the sweep was started after dark so I could not see the surrounding area. It is a residential neighborhood. The antenna's I am using are various flavors of wire wound configurations. It appears I will need some kind of dish for this. Would this be your recommendation for better directional analysis? Thanks as always for your expert R.F.help. Roger Roger, What was the bandwidth of the signals, and did you examine the signals in the time domain? I would suspect an 802.11 WLAN connection, but of course it has to be assumed a hostile signal until proven otherwise. Where did you trace the signal to? Was it originating INSIDE your clients facility? What kind of antenna where you using? -jma 4592 From: James M. Atkinson Date: Mon Jan 21, 2002 11:41am Subject: Re: Help on R.F. signal identification Roger, I have a copy of the current Bluetooth specification available on my website so feel free to download it, but be aware that it is something like 10+ MB is size. http://www.tscm.com/BluetoothSpec.pdf (10 MB core file) http://www.tscm.com/Bluetoothprofiles.pdf (4.3 MB supplement) -jma At 8:01 AM -0800 1/20/02, Hawkspirit wrote: >I'd like some help from the group in identifying an unknown R.F. signal. >This signal was received while doing a sweep in the northern part of Los >Angeles. >The signal operates between 2.402GHZ and 2.468 GHZ. This transmission is >some kind of pulsed microwave signal. The timing of the signal is as follows. > The signal first bursts five separate simultaneous pulses. The wave form >looks as if you hold your hand up in front of your face fingers pointed >toward the ceiling. Each finger would be a separate pulse. They range in >amplitude as you fingers appear a (bell curve). This burst lasts about one >half second and then the carrier is clear of signals. Next a single pulse >appears at the high side of the carrier (2.468) and starts to sweep down >frequency. When it reaches about the fifty percent point of the carrier >bandwidth the five finger burst array appears again for about one half >second. Then the single pulse reappears at the fifty percent point and >continues to sweep down frequency until it arrives at the lower frequency >of the carrier (2.402GHZ) and disappears and the five finger pulse bursts >again for a half second. This completes the cycle. The full cycle timing is >about 3 seconds. I monitored this signal for about four hours and I did not >detect any pattern variation. Any help appreciated > >Roger Tolces >www.bugsweeps.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- From: Matt Paulsen Date: Sat Jan 18, 2003 1:28pm Subject: RE: Public input on hacker sentencing $$$ -m Don't get me wrong.. Hacking is hacking, and murder is murder, but why can murder sometimes be called pre-meditated and sometimes called manslaughter? jmtpw -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: 17 January 2003 01:17 To: tscm-l@yahoogroups.com Subject: [TSCM-L] Public input on hacker sentencing OFF WITH THEIR HEADS! ... Steve "Feds Seek Public Input on Hacker Sentencing" SecurityFocus Online (01/13/03); Poulsen, Kevin The United States Sentencing Commission (USSC) engaged the public for advice last week on whether prison or probation sentences for cybercriminals are adequate enough, or should be stronger. Michael O'Neill of George Mason University Law School says, "We want to know whether or not the relevant community...believes that serious penalties will deter people from engaging in that sort of conduct." The public can provide suggestions by accessing a formal "Issue for Comment" posted on the USSC Web site; the period for public comment will continue until Feb. 18. In addition to a general overview of the question of whether penalties for cyber miscreants are strong enough, the forum seeks advice on eight proposals to take additional factors into consideration when determining a sentence. One proposal suggests adding points--and thus extra jail time--to sentences if the hackers commit their crimes for financial gain, or to violate a person's privacy. For now, the sentencing guidelines for computer crimes are the same as those for larceny, embezzlement, and theft, in which the financial loss inflicted is the primary consideration. However, the Homeland Security Act and the congressional emphasis on cyberterrorism required the USSC to review its cyber crime sentencing guidelines so that they take into account "the serious nature of such offenses, the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses." The Homeland Security Act also authorized the creation of penalties for hackers whose activities result in a loss of human life. Orin Kerr of George Washington University Law School thinks that computer crime sentences are as harsh as normal sentences, if not harsher, according to some provisions. http://online.securityfocus.com/news/2028 ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6784 From: Matt Paulsen Date: Sat Jan 18, 2003 1:51pm Subject: RE: This is already happening with some lunatics we know imho these systems are placebo panacea's for the public. They provide none, to very little real value, except to the telco's if phones are going to be used, guess you should buy some stock... I had the 'pleasure' of working with the VA recently on their patient locator system and was less than impressed - modems, telco's and landlines, good god, have we learned nothing yet? Next I get to see FEMA's efforts. I'm not encouraged, and I see 2 hours a month in work time going down the drain from hereon. At least there are still ham operators around, albeit, a dying breed. That's where real info will come from (imho again), at least, those that remain after an actual disaster. Hey.. that's interesting, EAS just ran their weekly test while I typed this up... And my wife says to me while she cleans some dishes "I don't even think they used that when September 11th happened." Now isn't that interesting..... -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Friday, January 17, 2003 11:12 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] This is already happening with some lunatics we know Officials consider faster ways to alert U.S. to terrorism By Audrey Hudson THE WASHINGTON TIMES Television sets suddenly turning on in the middle of the night, Internet messages or nontraditional telephone rings may be the next way Americans are alerted by the government they are under attack by terrorists. The Emergency Alert System (EAS) in 1997 replaced the Emergency Broadcast System that historically warned that "this is only a test," but lawmakers say new technology is needed to give Americans faster and more practical information. In announcing his candidacy for president, Sen. John Edwards, North Carolina Democrat, first proposed a telephone warning system for in the event a terrorist attack occurs while Americans are sleeping. "There are a lot of folks in this country who have no idea what they are supposed to do if an attack occurs," Mr. Edwards said. Mr. Edwards and Sen. Ernest F. Hollings, South Carolina Democrat and soon-to-be ranking member of the Commerce, Science and Transportation Committee, yesterday announced legislation to explore new alert systems. The bill would authorize the Homeland Security and Commerce departments to work with other government agencies and the media to set standards for warnings. The color-code warning system established by Tom Ridge, White House homeland security adviser, fails to give information on how to react to a terrorist attack, Mr. Edwards said. "We have to make sure effective warnings get to every American in times of danger, and we have to make sure those warnings tell folks just what they can do to protect themselves and their loved ones," Mr. Edwards said in a statement. The EAS is used daily on the local level to issue warnings of events that can endanger the public, including hazardous-material spills. The EAS is also used to transmit warnings from the AMBER (America's Missing Broadcast Emergency Response) alert system, which notifies the public about child abductions. AMBER was established on a state-by-state voluntary basis in 1996 in response to the abduction and slaying of 9-year-old Amber Hagerman in Dallas. It would be up to Congress to require the EAS to transmit terrorism warnings from a new alert system. The EAS has never been used for its primary function, which is to provide the president with a means to address the nation through all broadcast, cable and satellite systems in the event of a national emergency. It was not activated on September 11 because President Bush did not address the nation. The bill requires the Commerce Department to develop new technologies to issue warnings based on the National Weather Service system, which is decoded by EAS equipment at broadcast and cable stations and can be delivered almost immediately. Commerce would also explore new ways to disseminate the warnings through the Internet, cell phones and new technology to turn on TV sets. Specially equipped televisions, radios, pagers and other devices already exist to decode EAS messages, according to a fact sheet distributed by the Federal Communications Commission. Consumers can program these products to turn on automatically for the messages they want to receive. The Edwards-Hollings bill was based on recommendations from the Partnership for Public Warning. "National warning systems need significant improvement. They enable Americans at risk to save lives and reduce losses from natural and manmade disasters," said Peter Ward, partnership chairman. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6785 From: Andre Holmes <1ach@g...> Date: Sat Jan 18, 2003 3:22pm Subject: EBAY Greetings I have found 2 items that may be of interest. Item number 2906323884 ANDRE [Non-text portions of this message have been removed] 6786 From: Mitch D Date: Sun Jan 19, 2003 3:47am Subject: Marriot WiFi (test report, off topic) I tested the wireless network at a marriot recently,for all of 10 minutes. After I got the access package from the front desk at a nameless Marriot,(card, instructions,driver cd)I set my laptop up with the 2.4 gig card and found it really difficult to maintain an acceptable signal by holding the laptop over my head, with the top of the card facing the top of the wall by the room entrance(which was where I got the highest useable signal level)I tried reflecting it,moving it and waving the whole setup all over the room to no avail.......no wonder they keep Pringles in the "Mini Bar" in guests rooms,as well as coat hangars in the closet.( I didnt but I thought about it) What sucks even worse is Marriot charges over 10 bucks a day for this "vaporful" wifi svc....Ended up using my dial-up anyhow......no overhead contortion neccessary...... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6787 From: James M. Atkinson Date: Sun Jan 19, 2003 6:49am Subject: Re: Marriot WiFi (test report, off topic) If your going to use WiFi at a hotel bring along a small 16 dBi panel antenna and a really small palm sized tripod. Convert the connector on the antenna to an SMA and connect some premium grade coaxial cable (25-30 feet is good). I have found it helpful to have a right angle SMA connector on the cable where it connects to the antenna as it keeps things neat (remember to use a torque wrench on the connection). The 16 dBi panel antenna is roughly 10*10 inches square, and you can coil the cable around the back of the housing. Only use this antenna when you can't pick up a decent signal, otherwise you risk saturating the WiFi card in your computer. Also, if your room has a microwave oven you should use a gain antenna with caution. -jma At 1:47 AM -0800 1/19/03, Mitch D wrote: >I tested the wireless network at a marriot recently,for all of >10 minutes. >After I got the access package from the front desk at a >nameless Marriot,(card, instructions,driver cd)I set my laptop >up with the 2.4 gig card and found it really difficult to >maintain an acceptable signal by holding the laptop over my >head, with the top of the card facing the top of the wall by the >room entrance(which was where I got the highest useable signal >level)I tried reflecting it,moving it and waving the whole setup >all over the room to no avail.......no wonder they keep Pringles >in the "Mini Bar" in guests rooms,as well as coat hangars in the >closet.( I didnt but I thought about it) >What sucks even worse is Marriot charges over 10 bucks a day for >this "vaporful" wifi svc....Ended up using my dial-up >anyhow......no overhead contortion neccessary...... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6788 From: Date: Sun Jan 19, 2003 8:28am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 6789 From: Date: Sun Jan 19, 2003 8:28am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6790 From: Steve Uhrig Date: Sun Jan 19, 2003 4:21pm Subject: Motorola HT-220 portables The other day, list member Charles Patterson and I were reminiscing over communications and got to discussing some of our early ham radio activities 30 years ago. Back then you didn't buy a radio. You built it. My first non-HF radio was a Motorola 80D converted from taxicab service on lowband, operating on 6 volts and using a dynamotor for TX high voltage and a vibrator for RX high voltage. If you were around back in those days, you might enjoy this page: http://www.batnet.com/mfwright/HT220.html While this was not my first portable radio, it was an early one. I had an amateur HT200 portable before the local police had one. Most two way radios used tubes in those days. Nothing to do with TSCM, just remembering good times from 30 years ago. Steve (WA3SWS) ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6791 From: Matt Paulsen Date: Mon Jan 20, 2003 1:08am Subject: multilayered security system, update A while back I posted on a requirements list for 3 levels of security for pc's. The one area that drew a blank was the locality activated ID system - mostly comments such as 'that can be done easily' were returned, but nothing concrete. After a few months of research, this was put together for all 3 levels... comments anyone? www.rfideas.com - proximity activation - note: the bonus here is that this integrates with the existing physical security badge access system. www.rsasecurity.com - 2 phase fob, 5 year battery www.identix.com - biometric interface 6792 From: Matt Paulsen Date: Mon Jan 20, 2003 8:06pm Subject: RE: Marriot WiFi (test report, off topic) http://www.cantenna.com/ -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Sunday, January 19, 2003 4:50 AM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Marriot WiFi (test report, off topic) If your going to use WiFi at a hotel bring along a small 16 dBi panel antenna and a really small palm sized tripod. Convert the connector on the antenna to an SMA and connect some premium grade coaxial cable (25-30 feet is good). I have found it helpful to have a right angle SMA connector on the cable where it connects to the antenna as it keeps things neat (remember to use a torque wrench on the connection). The 16 dBi panel antenna is roughly 10*10 inches square, and you can coil the cable around the back of the housing. Only use this antenna when you can't pick up a decent signal, otherwise you risk saturating the WiFi card in your computer. Also, if your room has a microwave oven you should use a gain antenna with caution. -jma At 1:47 AM -0800 1/19/03, Mitch D wrote: >I tested the wireless network at a marriot recently,for all of >10 minutes. >After I got the access package from the front desk at a >nameless Marriot,(card, instructions,driver cd)I set my laptop >up with the 2.4 gig card and found it really difficult to >maintain an acceptable signal by holding the laptop over my >head, with the top of the card facing the top of the wall by the >room entrance(which was where I got the highest useable signal >level)I tried reflecting it,moving it and waving the whole setup >all over the room to no avail.......no wonder they keep Pringles >in the "Mini Bar" in guests rooms,as well as coat hangars in the >closet.( I didnt but I thought about it) >What sucks even worse is Marriot charges over 10 bucks a day for >this "vaporful" wifi svc....Ended up using my dial-up >anyhow......no overhead contortion neccessary...... -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6793 From: Romeo Mabasa Date: Mon Jan 20, 2003 3:56am Subject: TSCM Survey Information Database Hi guys, I'm currently designing a database to maintain the sweep information for scheduled tasks, incidence response, and ad-hoc tasks. So what I'd like to know is the kind of information/survey questions I need to ask for the following specialists - IT consultant (computer hardware, networks) - Telecomms consultant (telephone devices, fax machines) - Building services consultant (air ducts, aircons, etc) And what kind of output would I deal with? Your help in this regard would really be appreciated. P.S any interesting information on Scanlock M2 and Delta V? -- __________________________________________________________ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup Meet Singles http://corp.mail.com/lavalife 6794 From: Hawkspirit Date: Tue Jan 21, 2003 11:17am Subject: Double Sweep Last week I performed a sweep where the clients phone lines were compromised with two wiretaps. One a conventional bridge tap in the phone utility closet and the other a cordless phone intercept. At the end of the inspection, the client's lawyer decided that he would have me meet with telephone company security the next morning to verify and evidence the hardwire bridge tap. The next morning when I arrived, the client had on hand a second sweep team (separate independent company) to verify my results and have them do a complete inspection to further determine there own results. This is the first time in my thirty years of sweeping that I have had a "second team verification". It shows you how careful and accurate you must be in this business and have those results prepared and provable early on. Roger Tolces Electronic Security Co. www.bugsweeps.com 6795 From: Steve Uhrig Date: Tue Jan 21, 2003 0:03pm Subject: Re: Double Sweep On 21 Jan 2003 at 9:17, Hawkspirit wrote: > Last week I performed a sweep where the clients phone lines were > compromised with two wiretaps. And at this point you stopped, did your best to secure the scene and minimize every low level stupervisor from having to stick his nose in, and reported the find to law enforcement and remained on the scene until they arrived? Took some photos and kept everyone out of the area with their big muddy boots? Made a written record of everything from the moment you walked in the door up to and including a copy of the police report? Since you uncovered evidence of a felony? And any other action could lead to a conspiracy charge? > At the end of the inspection, the client's lawyer decided that he would > have me meet with telephone company security the next morning And this lawyer indemnified you in writing to hold up in court, promising to pay any and all legal bills you incur and to take a bullet for you if someone wants to make an issue of your actions in not immediately reporting a felony? Of course you had this in hand before beginning the job, and the client acknowledged in your contract any finds immediately would be reported to law enforcement as evidence of a crime? > The next morning when I arrived, the client had on hand a second sweep > team (separate independent company) to verify my results What a difference between coasts! Here my company is called to verify finds of Jim Ross and PI $500 sweepers. The only other group who has verified one of our finds was the FBI themselves, and I felt like a kindergarten teacher. Position yourself to where you're the one verifying other's work. You're the expert, not the lowball priced novice whose work needs vetting by someone else. You're the ultimate authority. > It shows you how careful and accurate you must be in this business and > have those results prepared and provable early on. And cover your ass legally if you do find something (which by the way is extremely unusual, for the novices on the list). Look out for #1 first. No one else will look out for you. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6796 From: Andre Holmes <1ach@g...> Date: Tue Jan 21, 2003 0:25pm Subject: Re: Double Sweep Hello It does not suprise me that a Second opinion was requested. There are Sweep companies that are missing or just not using the equipment correctly to ferret out the bug. Some client knows that the bug are gathering information but cannot find a good company to do the Sweep. I have been approach on the issue that there still is a bug there. I have witnessed a Large Sweep company inside a Sac box all service to customers were halted while they did there thing then they went down the line futher to install,inspect,or remove something. Phone service was restored they left. 1 They were not the phone company 2 I saw them there 3 My phone service was temp. down 4I know the name of the company who by the way they were convicted it made World news 2 guys own the company. 5 I cannot spell the name of the company begins with a A and ends with a F or a. maybe six letters. Andre Holmes ----- Original Message ----- From: "Hawkspirit" To: "TSCM" Sent: 21 January, 2003 12:17 PM Subject: [TSCM-L] Double Sweep > Last week I performed a sweep where the clients phone lines were > compromised with two wiretaps. One a conventional bridge tap in the phone > utility closet and the other a cordless phone intercept. > At the end of the inspection, the client's lawyer decided that he would > have me meet with telephone company security the next morning to verify and > evidence the hardwire bridge tap. > The next morning when I arrived, the client had on hand a second sweep > team (separate independent company) to verify my results and have them do a > complete inspection to further determine there own results. > This is the first time in my thirty years of sweeping that I have had a > "second team verification". It shows you how careful and accurate you must > be in this business and have those results prepared and provable early on. > > Roger Tolces > Electronic Security Co. > www.bugsweeps.com > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6797 From: Fernando Martins Date: Tue Jan 21, 2003 4:46pm Subject: Re: Re: Double Sweep I find here several things as the same kind of issues as in a IT security audit or penetration test, probably it's more like a zero knowledge pen-test. When Steve says "and at this point you stopped" it's kind of familiar :> Anyway ... one even being the best technician in the business, can step in some nasty legal problems, and the best way to avoid those is a very well made contract (=with a very good lawyer/law department at your side), that can clarify EVERY (and 10 more ....) possible grey issues. About the secound team ... also sometimes if one did his job well and found problems, sometimes a secound team that for sure will not find anything is needed ... yeah, such is life! the novice 20cents ;) FM ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, January 21, 2003 6:03 PM Subject: [TSCM-L] Re: Double Sweep > On 21 Jan 2003 at 9:17, Hawkspirit wrote: > > > Last week I performed a sweep where the clients phone lines were > > compromised with two wiretaps. > > And at this point you stopped, did your best to secure the scene and > minimize every low level stupervisor from having to stick his nose > in, and reported the find to law enforcement and remained on the > scene until they arrived? Took some photos and kept everyone out of > the area with their big muddy boots? Made a written record of > everything from the moment you walked in the door up to and including > a copy of the police report? > > Since you uncovered evidence of a felony? > > And any other action could lead to a conspiracy charge? > > > At the end of the inspection, the client's lawyer decided that he would > > have me meet with telephone company security the next morning > > And this lawyer indemnified you in writing to hold up in court, > promising to pay any and all legal bills you incur and to take a > bullet for you if someone wants to make an issue of your actions in > not immediately reporting a felony? > > Of course you had this in hand before beginning the job, and the > client acknowledged in your contract any finds immediately would be > reported to law enforcement as evidence of a crime? > > > The next morning when I arrived, the client had on hand a second sweep > > team (separate independent company) to verify my results > > What a difference between coasts! > > Here my company is called to verify finds of Jim Ross and PI $500 > sweepers. The only other group who has verified one of our finds was > the FBI themselves, and I felt like a kindergarten teacher. > > Position yourself to where you're the one verifying other's work. > You're the expert, not the lowball priced novice whose work needs > vetting by someone else. You're the ultimate authority. > > > It shows you how careful and accurate you must be in this business and > > have those results prepared and provable early on. > > And cover your ass legally if you do find something (which by the way > is extremely unusual, for the novices on the list). Look out for #1 > first. No one else will look out for you. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6798 From: Matt Paulsen Date: Tue Jan 21, 2003 8:25pm Subject: RE: Re: Double Sweep The 2nd team should have been around from the beginning, and suggested by the 1st team as a 2ndary validation for independant verification. -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Tuesday, January 21, 2003 2:47 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Re: Double Sweep I find here several things as the same kind of issues as in a IT security audit or penetration test, probably it's more like a zero knowledge pen-test. When Steve says "and at this point you stopped" it's kind of familiar :> Anyway ... one even being the best technician in the business, can step in some nasty legal problems, and the best way to avoid those is a very well made contract (=with a very good lawyer/law department at your side), that can clarify EVERY (and 10 more ....) possible grey issues. About the secound team ... also sometimes if one did his job well and found problems, sometimes a secound team that for sure will not find anything is needed ... yeah, such is life! the novice 20cents ;) FM ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, January 21, 2003 6:03 PM Subject: [TSCM-L] Re: Double Sweep > On 21 Jan 2003 at 9:17, Hawkspirit wrote: > > > Last week I performed a sweep where the clients phone lines were > > compromised with two wiretaps. > > And at this point you stopped, did your best to secure the scene and > minimize every low level stupervisor from having to stick his nose > in, and reported the find to law enforcement and remained on the > scene until they arrived? Took some photos and kept everyone out of > the area with their big muddy boots? Made a written record of > everything from the moment you walked in the door up to and including > a copy of the police report? > > Since you uncovered evidence of a felony? > > And any other action could lead to a conspiracy charge? > > > At the end of the inspection, the client's lawyer decided that he would > > have me meet with telephone company security the next morning > > And this lawyer indemnified you in writing to hold up in court, > promising to pay any and all legal bills you incur and to take a > bullet for you if someone wants to make an issue of your actions in > not immediately reporting a felony? > > Of course you had this in hand before beginning the job, and the > client acknowledged in your contract any finds immediately would be > reported to law enforcement as evidence of a crime? > > > The next morning when I arrived, the client had on hand a second sweep > > team (separate independent company) to verify my results > > What a difference between coasts! > > Here my company is called to verify finds of Jim Ross and PI $500 > sweepers. The only other group who has verified one of our finds was > the FBI themselves, and I felt like a kindergarten teacher. > > Position yourself to where you're the one verifying other's work. > You're the expert, not the lowball priced novice whose work needs > vetting by someone else. You're the ultimate authority. > > > It shows you how careful and accurate you must be in this business and > > have those results prepared and provable early on. > > And cover your ass legally if you do find something (which by the way > is extremely unusual, for the novices on the list). Look out for #1 > first. No one else will look out for you. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6799 From: Keith Ray Date: Tue Jan 21, 2003 10:54am Subject: RE: Rx powered when cell phone off Quoting George Shaw : > Out of curiosity tonight I took apart a Nokia 3210e (Orange) powered > down and took readings across the range on the Rx side of the circuits > and YES it is powered even when the "switch" is off. I am running > further tests now to see what exactly it is capable of receiving but all > indications are that it can indeed Rx when in "off" mode which really is > a standby mode I guess. I have several other phones here I can hack this > week. Now if Nokia are doing it I guess the others are as well, whether > its in the spec or not. I was going through some of the old TSCM-L archives and ran across this post from last May. Was there ever any more information regarding the ability of cell phones to be remotely programmed/operated even though in the off mode? -- Keith Ray -- OpenPGP Key: 0x79269A12 6800 From: kondrak Date: Wed Jan 22, 2003 0:42pm Subject: Re: RE: Rx powered when cell phone off Yes, sprint can do this here (US), and can make the cphone into a bug from remote. The obvious disadvantage is battery life. You turn on the transmitter, and battery life goes real fast. It takes a software load from the switch, and it can be done without any customer knowledge, no lights or any indication the phone transmitting. Readings on the contacts doesn't necessarily mean the phone is compromised. Most all phones show a small amount of current being drawn, even when off. Memories need to be held, dialing lists etc, which are almost always eprom stored. The only reliable method of securing the phone, IMHO is removal of the battery. At 10:54 1/21/03 -0600, you wrote: >Quoting George Shaw : > > > Out of curiosity tonight I took apart a Nokia 3210e (Orange) powered > > down and took readings across the range on the Rx side of the circuits > > and YES it is powered even when the "switch" is off. I am running > > further tests now to see what exactly it is capable of receiving but all > > indications are that it can indeed Rx when in "off" mode which really is > > a standby mode I guess. I have several other phones here I can hack this > > week. Now if Nokia are doing it I guess the others are as well, whether > > its in the spec or not. > >I was going through some of the old TSCM-L archives and ran across this post >from last May. Was there ever any more information regarding the ability of >cell phones to be remotely programmed/operated even though in the off mode? > > -- >Keith Ray -- OpenPGP Key: 0x79269A12 > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6801 From: James M. Atkinson Date: Wed Jan 22, 2003 7:24pm Subject: THEN and NOW THEN and NOW 1972: Long hair 2002: Longing for hair 1972: KEG 2002: EKG 1972: Acid rock 2002: Acid reflux 1972: Moving to California because it's cool 2002: Moving to California because it's warm 1972: Trying to look like Marlin Brando or Liz Taylor 2002: Trying NOT to look like Marlin Brando or Liz Taylor 1972: Hoping for a BMW 2002: Hoping for a BM 1972: The Grateful Dead 2002: Dr. Kevorkian 1972: Going to a new, hip joint 2002: Receiving a new hip joint 1972: Rolling Stones 2002: Kidney Stones 1972: Being called into the principal's office 2002: Calling the principal's office 1972: Screw the system 2002: Upgrade the system &! nbsp;1972: Disco 2002: Costco 1972: Parents begging you to get your hair cut 2002: Children begging you to get their heads shaved 1972: Passing the drivers' test 2002: Passing the vision test 1972: Whatever 2002: Depends Just in case you weren't feeling too old today, this will certainly change things: The people who are starting college this fall across the nation were born in 1983. They are too young to remember the space shuttle blowing up. Their lifetime has always included AIDS. Bottle caps have always been screw off and plastic. The CD was introduced the year they were born. They have always had an answering machine. They have always had cable. They cannot fathom not having a remote control. Jay Leno has always been on the Tonight Show. Popcorn has always been cooked in the microwave. They never took a swim and thought about Jaws. They can't imagine what hard contact lenses are. They don't know who Mork was or where he was from. They never heard: "Where's the Beef?", "I'd walk a mile for a Camel," or "de plane Boss, de plane." They do not care who shot J. R. and have no idea who J. R. even is. Michael Jackson has always been white. McDonald's never came in Styrofoam containers. They don't have a clue how to use a typewriter. Do you feel old yet? Pass this on to the other old fogies in your life. The statistics on sanity are that one out of every four is suffering from some form of mental illness. Think of your three best friends. If they're okay, then it's you. Have a good day! -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6802 From: Charles P. Date: Wed Jan 22, 2003 9:24pm Subject: Re: THEN and NOW Signs of age. A friend of mine who installs hi-end home theater systems asked me if I would help him set up and program the phone system at Paul Simon's new house in CT (the singer, not the politician). My 18 year old son came along to lend a hand. His question: "who's Paul Simon?" sigh Charles ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Wednesday, January 22, 2003 8:24 PM Subject: [TSCM-L] THEN and NOW > > THEN and NOW > > 1972: Long hair > 2002: Longing for hair > > 1972: KEG > 2002: EKG > > 1972: Acid rock > 2002: Acid reflux > > 1972: Moving to California because it's cool > 2002: Moving to California because it's warm > > 1972: Trying to look like Marlin Brando or Liz Taylor > 2002: Trying NOT to look like Marlin Brando or Liz Taylor > > 1972: Hoping for a BMW > 2002: Hoping for a BM > > 1972: The Grateful Dead > 2002: Dr. Kevorkian > > 1972: Going to a new, hip joint > 2002: Receiving a new hip joint > > 1972: Rolling Stones > 2002: Kidney Stones > > 1972: Being called into the principal's office > 2002: Calling the principal's office > > 1972: Screw the system > 2002: Upgrade the system > > &! nbsp;1972: Disco > 2002: Costco > > 1972: Parents begging you to get your hair cut > 2002: Children begging you to get their heads shaved > > 1972: Passing the drivers' test > 2002: Passing the vision test > > 1972: Whatever > 2002: Depends > > Just in case you weren't feeling too old today, this will certainly > change things: > > The people who are starting college this fall across the nation were > born in 1983. > > They are too young to remember the space shuttle blowing up. > > Their lifetime has always included AIDS. > > Bottle caps have always been screw off and plastic. > > The CD was introduced the year they were born. > > They have always had an answering machine. > > They have always had cable. > > They cannot fathom not having a remote control. > > Jay Leno has always been on the Tonight Show. > > Popcorn has always been cooked in the microwave. > > They never took a swim and thought about Jaws. > > They can't imagine what hard contact lenses are. > > They don't know who Mork was or where he was from. > > They never heard: "Where's the Beef?", "I'd walk a mile for a > Camel," or "de plane > Boss, de plane." > > They do not care who shot J. R. and have no idea who J. R. even is. > > Michael Jackson has always been white. > > McDonald's never came in Styrofoam containers. > > They don't have a clue how to use a typewriter. > > Do you feel old yet? > Pass this on to the other old fogies in your life. > > The statistics on sanity are that one out of every four is suffering > from some form of > mental illness. > > Think of your three best friends. If they're okay, then it's you. > > Have a good day! > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------------------- ------------------------ > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 6803 From: Steve Uhrig Date: Wed Jan 22, 2003 10:03pm Subject: Growth of American Surveillance The sky apparently is falling. And has been for as long as I can remember. http://www.wired.com/news/politics/0,1283,57226,00.html http://zdnet.com.com/2100-1105-980964.html We're all doomed. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6804 From: Matt Paulsen Date: Wed Jan 22, 2003 10:42pm Subject: RE: THEN and NOW Here's one - About 10 years ago, a cub scout here in Portland didn't know how to use the rotary phone in the local church to call his mother to pick him up. He had to come back, get a 'grown up' to show him how to use it... no buttons... sigh... -----Original Message----- From: Charles P. [mailto:charles@t...] Sent: Wednesday, January 22, 2003 7:25 PM To: James M. Atkinson; TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] THEN and NOW Signs of age. A friend of mine who installs hi-end home theater systems asked me if I would help him set up and program the phone system at Paul Simon's new house in CT (the singer, not the politician). My 18 year old son came along to lend a hand. His question: "who's Paul Simon?" sigh Charles ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L Mailing List" Sent: Wednesday, January 22, 2003 8:24 PM Subject: [TSCM-L] THEN and NOW > > THEN and NOW > > 1972: Long hair > 2002: Longing for hair > > 1972: KEG > 2002: EKG > > 1972: Acid rock > 2002: Acid reflux > > 1972: Moving to California because it's cool > 2002: Moving to California because it's warm > > 1972: Trying to look like Marlin Brando or Liz Taylor > 2002: Trying NOT to look like Marlin Brando or Liz Taylor > > 1972: Hoping for a BMW > 2002: Hoping for a BM > > 1972: The Grateful Dead > 2002: Dr. Kevorkian > > 1972: Going to a new, hip joint > 2002: Receiving a new hip joint > > 1972: Rolling Stones > 2002: Kidney Stones > > 1972: Being called into the principal's office > 2002: Calling the principal's office > > 1972: Screw the system > 2002: Upgrade the system > > &! nbsp;1972: Disco > 2002: Costco > > 1972: Parents begging you to get your hair cut > 2002: Children begging you to get their heads shaved > > 1972: Passing the drivers' test > 2002: Passing the vision test > > 1972: Whatever > 2002: Depends > > Just in case you weren't feeling too old today, this will certainly > change things: > > The people who are starting college this fall across the nation were > born in 1983. > > They are too young to remember the space shuttle blowing up. > > Their lifetime has always included AIDS. > > Bottle caps have always been screw off and plastic. > > The CD was introduced the year they were born. > > They have always had an answering machine. > > They have always had cable. > > They cannot fathom not having a remote control. > > Jay Leno has always been on the Tonight Show. > > Popcorn has always been cooked in the microwave. > > They never took a swim and thought about Jaws. > > They can't imagine what hard contact lenses are. > > They don't know who Mork was or where he was from. > > They never heard: "Where's the Beef?", "I'd walk a mile for a > Camel," or "de plane > Boss, de plane." > > They do not care who shot J. R. and have no idea who J. R. even is. > > Michael Jackson has always been white. > > McDonald's never came in Styrofoam containers. > > They don't have a clue how to use a typewriter. > > Do you feel old yet? > Pass this on to the other old fogies in your life. > > The statistics on sanity are that one out of every four is suffering > from some form of > mental illness. > > Think of your three best friends. If they're okay, then it's you. > > Have a good day! > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Ph: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > Vocatus atque non vocatus deus aderit > -------------------------------------------------------------------------- ------------------------ > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6805 From: Matt Paulsen Date: Thu Jan 23, 2003 0:25am Subject: RE: Growth of American Surveillance Ask me again in 50 years Mr. Yakamoto. Agency: Department of the Air Force Office: Air Force Materiel Command Location: ESC - Electronic Systems Center Posted: January 22, 2003 Type: RFP Program Files Title: 63--Force Protection Integrated Base Defense Security System SOL: R485 Agency: Department of the Army Office: Army Contracting Activity, North Region Location: ACA, White Sands Missile Range Posted: January 21, 2003 Type: Synopsis Title: 35--SUBJECT: THE OFFICE OF NATIONAL DRUG CONTROL POLICY, COUNTERDRUG TECHNOLOGY ASSESSMENT CENTER IS SEEKING STATE-OF-THE-ART COUNTERDRUG EQUIPMENT FOR DISTRIBUTION TO STATE AND LOCAL LAW ENFORCEMENT AGENCIES. SOL: DABJ47-03-R-ONDCP Agency: Department of the Treasury Office: Bureau of Alcohol, Tobacco and Firearms (ATF) Location: Acquisition and Property Management Division Posted: January 16, 2003 Type: Synopsis Title: 58 -- Long Haul Video Systems SOL: Reference-Number-LHVideo1 January 08, 2003 Agency: Department of Commerce Office: National Institute of Standards and Technology (NIST) Location: Acquisition and Logistics Division Posted: January 08, 2003 Type: Synopsis Title: X -- Biometric Consortium SOL: Reference-Number-03-346-2027 November 05, 2002 Agency: Department of Justice Office: Immigration & Naturalization Service Location: Headquarter's Procurement Division Posted: November 05, 2002 Type: Modification 1 Title: 70 -- Entry Exit System SOL: COW-2-R-0056 June 20, 2002 Agency: Department of Transportation Office: Research and Special Programs Administration (RSPA) Location: Research and Special Programs Administration HQ Posted: June 20, 2002 Type: Synopsis Title: A -- Transportation Worker Identification Credential (TWIC) System SOL: DTRS56-02-BAA-0005 May 29, 2002 Agency: Department of Health and Human Services Office: National Institutes of Health Location: National Library of Medicine Posted: May 29, 2002 Type: Amendment Title: A -- Application of Advanced Network Infrastructure in Health and Disaster Management SOL: BAA-RFP-NLM-02-103-VMS April 03, 2002 Agency: Department of Health and Human Services Office: National Institutes of Health Location: National Library of Medicine Posted: April 03, 2002 Type: Solicitation Title: A -- Application of Advanced Network Infrastructure in Health and Disaster Management SOL: BAA-RFP-NLM-02-103-VMS March 21, 2002 Agency: Other Defense Agencies Office: Defense Advanced Research Projects Agency Location: Contracts Management Office Posted: March 21, 2002 Type: Solicitation Title: A -- INFORMATION AWARENESS SOL: BAA02-08 Posted: March 21, 2002 Type: Synopsis Title: A -- INFORMATION AWARENESS SOL: BAA02-08 March 08, 2002 Agency: Department of Health and Human Services Office: National Institutes of Health Location: National Library of Medicine Posted: March 08, 2002 Type: Synopsis Title: A -- Application of Advanced Network Infrastructure in Health and Disaster Management SOL: BAA-RFP-NLM-02-103-VMS August 09, 2001 Agency: Department of Justice Office: Drug Enforcement Administration Location: Office of Acquisition Management Posted: August 09, 2001 Type: Synopsis Title: A -- Live-scan ultrasound imaging system SOL: DEA-01-R-0004 October 24, 2000 Agency: Department of the Air Force Office: Air Force Materiel Command Location: ESC - Electronic Systems Center Posted: October 24, 2000 Type: Synopsis Title: 63--Alarm, Signal; Security Detection Equipment SOL: R122 Posted: October 24, 2000 Type: Other Files Title: 63--Alarm, Signal; Security Detection Equipment SOL: R122 -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Wednesday, January 22, 2003 8:04 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Growth of American Surveillance The sky apparently is falling. And has been for as long as I can remember. http://www.wired.com/news/politics/0,1283,57226,00.html http://zdnet.com.com/2100-1105-980964.html We're all doomed. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6806 From: Ocean Group Date: Wed Jan 22, 2003 9:13am Subject: 2nd Sweep et al..... > At the end of the inspection, the client's lawyer decided that he would > have me meet with telephone company security the next morning And this lawyer indemnified you in writing to hold up in court, promising to pay any and all legal bills you incur and to take a bullet for you if someone wants to make an issue of your actions in not immediately reporting a felony? ## Is it your duty of care to report it to the Police or the telephone company.....if your duty of care is to report it to the telephone company for verification then surely it would be the phone company's duty of care to report it to the police.....Am I right? Of course you had this in hand before beginning the job, and the client acknowledged in your contract any finds immediately would be reported to law enforcement as evidence of a crime? ## Surely if the client said that he/she would report the find then the court would accept that you made a fair assumption that he would unless there was evidence to show that you knew the client was acting in bad fate....???! Here my company is called to verify finds of Jim Ross and PI $500 sweepers. The only other group who has verified one of our finds was the FBI themselves, and I felt like a kindergarten teacher. ## Ross Engineering right? Wait aren't they supposed to be respected professionals....why would their work usually need to be verified....? Position yourself to where you're the one verifying other's work. You're the expert, not the lowball priced novice whose work needs vetting by someone else. You're the ultimate authority. ## Well either way...people are human....if you make a mistake you shouldn't be shot for it....I'm sure pro's miss things from time to time....it's ok for a client to get a 2nd opinion...people do it with doctors all the time....a decent thing to do would be to inform the first specialist that you will be automatically getting a second opinion....that way they know and won't feel untrusted. And cover your ass legally if you do find something (which by the way is extremely unusual, for the novices on the list). Look out for #1 first. No one else will look out for you. ## I was just curious about some of the legal points raised here(at least the american side)....Here if you find something for a corporate company(depending on who they are) they may just ask you to keep the find confidential.....legally I'm not sure what your duty of care is in the Irish courts....I'll ring a lawyer and find out and post it up later...however if your goverment contracted...well lets just say it's slightly different reaction.... However any PI that got into that situation would simply claim ignorance...."Your honour I didn't have a f**kin clue what that little box was...I thought it was a on hold music generator.....I swear.... What? Why did I tell the client I thought it was a bug?.....For the cash....Duh!" Note: Thats not a reflection of any PI's professionalism or integrity. Just in case anyone gets mad....its just that here the people that sweep are PI's. There are some guy's from the UK on the list so I'd be interested to know what the situation is in the UK courts....? Cheers Vance Deran Ocean Group, Technical Security Division, Ireland. 6807 From: Ocean Group Date: Wed Jan 22, 2003 2:21pm Subject: 2nd sweeper.... I had a chat with a lawyer friend and she informed me that the specialist would not be charged as an accessory because the planting of the bug was not a joint enterprise between the specialist and the 3rd party(the bugger,em shall we say the bug planter.). The specialist would also have no reason to suspect that the client was acting in bad fate(unless he did) etc etc and it does not make the specialist liable by assuming that the client would report it. However interesting enough, she said that should the client keep the bug and "use" it, for any incrimination, the information would be naturally enough inadmissable but the specialist could be very well charged for accessory to the fact. So the moral of the story is, if you find a bug, a- to not give it to the client unless he is totally trustworthy or b- disable etc take reasonable precautions etc..... This is the situation as regards the Irish courts however I'd assume it's a pretty standard issue. All the best, Vance Deran Ocean Group, Technical Security Division, Ireland. 6808 From: Craig Snedden Date: Thu Jan 23, 2003 9:52am Subject: RE: 2nd sweeper....Long Post. My apologies My apologies in advance for the length of this posting. Got carried away with myself. :~ (sheepish smile) To follow up Vance's post, I believe the situation in the UK criminal justice system would be different in as much as; 1. Ownership and possession of a transmitting device of any type is not a crime within mainland UK. Unauthorised transmission or reception of RF emissions is.... 2. The connection of any type of device (which would include a simple parallel connection to a "speaker") to the "private" side of a telecommunications system (PBX) (or single line) is not "normally" a criminal offence (however there are lots of potholes with the Data Protection Act which fall into place at this point - a minefield which for the purposes of this discussion I shall ignore.). The principal exception being any device which might be deemed to cause "damage or disruption to the public telephone system - i.e. the carrier network. This would be a point for the courts to decide. 3. The connection of any device to the "private" side of a PBX (or single line) can only be done with the knowledge and consent of the system owner (usually whoever pays the phonebill). So...... What does all that mean? Scenario 1. If a "stand alone" (mic & tx) transmitter was discovered on the premises of a client which had been planted by a third party then the client is not the person responsible for either the tx or rx of any signal. Is he/she expected to know if the person who planted it has the necessary licence? Likewise, is the specialist expected to know if the buggist has the necessary licence? In law, no: Therefore, no trouble to the client if he leaves the device in situ. If he left it in situ and later reported it to the authorities, only the buggist (or any person found to be listening to the tx freq) not having the required authority to tx/rx on that freq (emission type, power etc.) would face any criminal charge. Scenario 2. If the specialist discovers a device connected to the "private" side of the telephone system and brings it to the attention of the system owner, then the call is with the system owner to decide whether to advise any responsible authority. If the device is left and later found to be a "hazard" to the public network, then the system owner, being knowledgeable about it's presence, would possibly be liable, as would be the buggist if caught. Scenario 3. A device having been found on the public network side should be reported firstly to the network provider. (They will take a dim view of anyone, TSCM "professional" or not, being anywhere near thier equipment). Omission to report may result in someone being pursued for having "endangered the integrity of the network". However, who that someone might be is another question. Certainly the buggist if caught. Possibly the system owner if he sanctioned the device to remain in situ. (reason being that you are engaged by the client and are acting at his direction. So long as you make it clear (in writing) that your advice is to inform the network operator asap, then the courts would have to take the view that you are not acting "in concert" with any other person and therefore have no responsibility for breaking any applicable law).... Clear...? No I thought not. Interestingly, this follows from Vance's point that to leave the "bug" in situ and use it as corroboration then any material gained from it would be inadmissable as evidence since it was obtained from an illegal source. Here in the UK, that approach would really depend on whether the "bug" was deemed to be "illegal" in the first place...... Certainly the unlicensed rx of any signal tx by the device would be illegal. But, would the feeding of "chicken feed" into such a bug and seeing who reacted to it be classed as an illegal transmission...? It might be argued not, since I did not switch the transmitter on and cause it to actually tx (it was the buggist) ("A big boy did it and ran away..!!"). Another might argue that it is illegal, since they might argue that I should, as a TSCM "professional" be aware that the tx from such a device is likely to be illegal and should therefore have taken steps to switch it off..... My defence to that one being that I did not know if the device was legal or not and therefore left it on in an effort to trace it's ownership. It might have belonged to the Security Services for all I knew....... Anyone know any UK caselaw on this? I can't find any right now. In truth, reporting such an incident to the police here would most likely be met with a blank stare and little if no response. The telecomms would certainly respond (mostly by just removing the object from the network). :-) Craig -----Original Message----- From: Ocean Group [mailto:inertia@o...] Sent: 22 January 2003 20:21 To: TSCM Group Subject: [TSCM-L] 2nd sweeper.... I had a chat with a lawyer friend and she informed me that the specialist would not be charged as an accessory because the planting of the bug was not a joint enterprise between the specialist and the 3rd party(the bugger,em shall we say the bug planter.). The specialist would also have no reason to suspect that the client was acting in bad fate(unless he did) etc etc and it does not make the specialist liable by assuming that the client would report it. However interesting enough, she said that should the client keep the bug and "use" it, for any incrimination, the information would be naturally enough inadmissable but the specialist could be very well charged for accessory to the fact. So the moral of the story is, if you find a bug, a- to not give it to the client unless he is totally trustworthy or b- disable etc take reasonable precautions etc..... This is the situation as regards the Irish courts however I'd assume it's a pretty standard issue. All the best, Vance Deran Ocean Group, Technical Security Division, Ireland. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6809 From: James M. Atkinson Date: Thu Jan 23, 2003 0:42pm Subject: Re: 2nd sweeper.... Vance, It rather depends on the laws of the area you are in, and you should always seek legal advice from a competent and honest attorney (most are neither). I know that here in the United States if a sweeper finds a bug the only option is to immediately secure the scene, and document as much as he can prior to law enforcement arriving. Failure to do so can lead to the sweeper being charged as being an accessory to the crime, and of obstructing justice. Now if the detective (not a PI, a real cop) feels that it would be prudent to feed it false information and to draw the spy out then that's one thing, but neither the sweeper, or the client should try to do this by themselves. If you find a bug the proper thing to do is to, DOCUMENT, SECURE, NOTIFY, ASSIST. -jma At 8:21 PM +0000 1/22/03, Ocean Group wrote: >I had a chat with a lawyer friend and she informed me that the specialist >would not be charged as an accessory because the planting of the bug was not >a joint enterprise between the specialist and the 3rd party(the bugger,em >shall we say the bug planter.). The specialist would also have no reason to >suspect that the client was acting in bad fate(unless he did) etc etc and it >does not make the specialist liable by assuming that the client would report >it. > >However interesting enough, she said that should the client keep the bug and >"use" it, for any incrimination, the information would be naturally enough >inadmissable but the specialist could be very well charged for accessory to >the fact. So the moral of the story is, if you find a bug, a- to not give it >to the client unless he is totally trustworthy or b- disable etc take >reasonable precautions etc..... > > >This is the situation as regards the Irish courts however I'd assume it's a >pretty standard issue. > >All the best, > >Vance Deran > >Ocean Group, >Technical Security Division, >Ireland. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6810 From: James M. Atkinson Date: Thu Jan 23, 2003 3:49pm Subject: THE YEAR'S WORST [ACTUAL] HEADLINES OF 2002 THE YEAR'S WORST [ACTUAL] HEADLINES OF 2002 Something Went Wrong in Jet Crash, Expert Says Police Begin Campaign to Run Down Jaywalkers Iraqi Head Seeks Arms Is There a Ring of Debris around Uranus? Prostitutes Appeal to Pope Panda Mating Fails; Veterinarian Takes Over Teacher Strikes Idle Kids Miners Refuse to Work after Death Juvenile Court to Try Shooting Defendant War Dims Hope for Peace If Strike Isn't Settled Quickly, It May Last Awhile Cold Wave Linked to Temperatures Enfield (London) Couple Slain; Police Suspect Homicide Red Tape Holds Up New Bridges Typhoon Rips Through Cemetery; Hundreds Dead Man Struck By Lightning Faces Battery Charge New Study of Obesity Looks for Larger Test Group Astronaut Takes Blame for Gas in Spacecraft Kids Make Nutritious Snacks Chef Throws His Heart into Helping Feed Needy Local High School Dropouts Cut in Half Hospitals are Sued by 7 Foot Doctors -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6811 From: James M. Atkinson Date: Thu Jan 23, 2003 4:03pm Subject: SOUTHERNISMS Actually, these are country southernisms. City folk spoke differently, but knew the sayings anyway. SOUTHERNISMS 1.) Only a true Southerner knows the difference between a "hissie fit" and a "conniption", and that you don't "HAVE" them, -- you "PITCH" them. 2.) Only a true Southerner knows how many fish, collard greens, turnip greens, peas, beans, etc. make up "a mess." 3.) Only a true Southerner can show or point out to you the general direction of "yonder." 4.) Only a true Southerner knows exactly how long "directly" is - as in: "Going to town, be back directly." 5.) All true Southerners, even babies, know that "Gimme some sugar" is not a request for the white, granular sweet substance that sits in a pretty little bowl on the middle of the table. 6.) All true Southerners know exactly when "by and by" is. They might not use the term, but they know the concept well. 7.) Only a true Southerner knows instinctively that the best gesture of solace for a neighbor who's got trouble is a plate of hot fried chicken and a big bowl of cold potato salad. (If the neighbor's trouble is a real crisis, they also know to add a large banana puddin'!) 8.) Only true Southerners grow up knowing the difference between "right near" and "a right far piece." They also know that "just down the road" can be 1 mile or 20. 9.) Only a true Southerner both knows and understands the difference between a redneck, a good ol' boy, and po' white trash. 10.) No true Southerner would ever assume that the car with the flashing turn signal is actually going to make a turn. 11.) A true Southerner knows that "fixin'" can be used as a noun, a verb, or an adverb. 12.) Only a true Southerner knows that the term "booger" can be a resident of the nose, a descriptive, as in "that ol' booger," a first name or something that jumps out at you in the dark and scares you senseless. 13.) Only true Southerners make friends while standing in lines. We don't do "queues", we do "lines," and when we're "in line," we talk to everybody! 14.) Put 100 true Southerners in a room and half of them will discover they're related, even if only by marriage. 15.) True Southerners never refer to one person as "y'all." 16.) True Southerners know grits come from corn and how to eat them. 17.) Every true Southerner knows tomatoes with eggs, bacon, grits, and coffee are perfectly wonderful; that redeye gravy is also a breakfast food; and that fried green tomatoes are not a breakfast food. 18.) When you hear someone say, "Well, I caught myself lookin' .. , " you know you are in the presence of a genuine Southerner! 19.) Only true Southerners say "sweet tea" and "sweet milk." Sweet tea indicates the need for sugar and lots of it - we do not like our tea unsweetened. "Sweet milk" means you don't want buttermilk. 20.) And a true Southerner knows you don't scream obscenities at little old ladies who drive 30 MPH on the freeway. You just say, "Bless her heart" and go your own way -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6812 From: James M. Atkinson Date: Thu Jan 23, 2003 4:18pm Subject: Exciting Historical information you need to know about shipping Manure via Nick Baldwin: Exciting Historical information you need to know about shipping Manure: In the 16th and 17th centuries, everything had to be transported by ship. It was also before commercial fertilizer's invention, so large shipments of manure were common. It was shipped dry, because in dry form it weighed a lot less than when wet, but once water (at sea) hit it, it not only became heavier, but the process of fermentation began again, of which a by-product is methane gas. As the stuff was stored below decks in bundles you can see what could (and did) happen. Methane began to build up below decks and the first time someone came below at night with a lantern, BOOOOM! Several ships were destroyed in this manner before it was determined just what was happening. After that, the bundles of manure were always stamped with the term "Ship High In Transit" on them which meant for the sailors to stow it high enough off the lower decks so that any water that came into the hold would not touch this volatile cargo and start the production of methane. Thus evolved the term "S.H.I.T," which has come down through the centuries and is in use to this very day. You probably did not know the true history of this word. Neither did I. I always thought it was a golf term. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- From: James M. Atkinson Date: Sun Jan 18, 2004 0:39pm Subject: Taiwanese Businessmen Admit Spying In China - Report http://framehosting.dowjonesnews.com/sample/samplestory.asp?StoryID=2004011605300012&Take=1 16 Jan 2004 05:30 GMT DJ Taiwanese Businessmen Admit Spying In China - Report TAIPEI (AP)--Two Taiwanese businessmen arrested in China last month on espionage charges admitted in interviews Friday that they were spies for Taiwan, cable television stations reported. The suspects said that Taiwanese intelligence agents recruited them after their businesses in China began to fail, Taiwan's TVBS, ETTV and CTI stations reported. The men said agents paid them 40,000 New Taiwan dollars (US$1=NT$33.683) a month, the reports said. The men - identified as Chang Keng-huan and Wang Chang-yung - were on a list issued by China this week that included seven alleged Taiwanese spies arrested last month, the cable stations reported. The TV reports didn't say what kind of information the men allegedly collected. TVBS said the Chinese government arranged the interviews at the Fuzhou No. 2 Detention Center in the southeastern province of Fujian. Taiwanese officials didn't immediately comment on the reports. But they have denied that the two men were spies, and have demanded that China provide evidence. Even if the men were spies, it's unlikely that Taiwan would confirm their activities. Relations have been tense between Taiwan and China since they split during a civil war in 1949. The rivals frequently accuse each other of spying, and the two governments don't have official ties. Although China-Taiwan political relations are frosty, trade ties are booming. More than 500,000 Taiwanese are in China doing business. Many of them run factories that benefit from China's cheap labor. The spy suspects said they originally went to China to do business in Fujian, directly across from Taiwan, TVBS reported. CTI said the men were emotional and at one point began crying. ETTV said they were homesick and wanted to tell their families that they are fine and not to worry. -Edited by Nick vonKlock (END) Dow Jones Newswires January 16, 2004 00:30 ET (05:30 GMT) ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8165 From: James M. Atkinson Date: Sun Jan 18, 2004 1:07pm Subject: FBI gets new acting CIO from Justice http://www.gcn.com/vol1_no1/daily-updates/24650-1.html 01/16/04 FBI gets new acting CIO from Justice By Wilson P. Dizard III GCN Staff FBI director Robert S. Mueller III has appointed Zalmai Azmi as the bureau's acting CIO. Azmi succeeds Wilson Lowery, the bureau's executive assistant director for administration, who had been acting CIO until Mueller announced Azmi's appointment Dec. 30. Azmi formerly was CIO of the Executive Office for U.S. Attorneys in the Justice Department, a bureau spokesman confirmed. Mueller also appointed Stephen Schmidt, former chief of the FBI Cyberdivision's special technologies and applications section, as the bureau 's acting chief technology officer. Schmidt succeeds Justin Lindsey, who moved to Justice as chief technology officer. Azmi "will be responsible for the FBI's overall information technology efforts, including developing IT strategy and planning operating budgets," a spokesman said. His other responsibilities include developing and maintaining the FBI's technology assets and providing technical direction for re-engineering, the memo said. At Justice, Azmi was responsible for telecommunications as well as information systems and security for U.S. attorney offices at more than 250 sites. During his three years at Justice, Azmi led development of several IT projects including the Victim Notification System and the National Legal Information On-Line System, which acts in concert with the department's Enterprise Case Management System. Sources inside and outside the bureau noted that Mueller himself has been a U.S. attorney and likely knew Azmi well during his tenure at Justice. In addition, both Mueller and Azmi are Marine Corps veterans, though Azmi served from 1984 to 1990, long after Mueller's Vietnam-era hitch. "It is good news not to have these chairs empty," a bureau IT official said, adding that Azmi has not yet announced any sweeping changes. One of Azmi's early actions was to approve the start of the so-called Build Four of the department's Trilogy system for managing bureau data. Trilogy comprises five builds; Build Four involves deploying additional servers, routers and other hardware, the bureau official said. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8166 From: James M. Atkinson Date: Sun Jan 18, 2004 1:13pm Subject: The FBI versus reality http://www.tricityherald.com/24hour/opinions/story/1121021p-7798050c.html DAN K. THOMASSON: The FBI versus reality This story was published Thursday, January 15th, 2004 Scripps Howard News Service (SH) - Clearly Hollywood hasn't caught up with the new FBI, and it may be adding to the public's perception that instead of practicing the highly refined art of counterintelligence, the bureau is doing business as usual - chasing the garden-variety bad person. And if that is the perception, FBI Director Robert Mueller told reporters, it is erroneous. After all, his much-maligned organization can't be blamed for the misconceptions of three current television shows depicting the bureau doing everything but hunting down al Qaeda and the rest of the terrorists who have disrupted life since 9/11. Almost 2-1/2 years out from that fateful day, Mueller says, nearly 50 percent of the FBI's 12,000-agent force has been refocused on those who follow Osama bin Laden and the like. The paradox, of course, is that the bureau and Hollywood have had a historic love affair that was fostered by J. Edgar Hoover as part of the FBI's vaunted publicity machine that through the years has brought it more and more public funds and more and more power. The three TV shows have agents chasing missing persons (outside of outright kidnapping, generally a province of local police); running undercover agents (something it has rarely done) and fighting organized crime (which it started doing only after Hoover's death). Mueller took over when confidence in the FBI had pretty much hit rock-bottom with critics, including some within the bureau itself, convinced that it muffed a big chance to have prevented the 9/11 attacks. It was a giant information collection agency without the ability to analyze what it had gleaned. From the start of his 10-year appointment, Mueller pledged to change things, to eliminate the John Dillinger mentality that shaped the bureau culture for most of its history, and to make it a sophisticated and sharing organization with global reach and analysis capability. He thinks this mission revamp is well on its way, with vastly improved information technology; the abolishing of notoriously tightfisted policies about sharing with sister agencies; improved cooperation with counterparts overseas; and expanded powers stemming from the Patriot Act, which he said the bureau is not abusing. The bureau is well on its way to making the nation safer, he says. The proof he cites is that there hasn't been any major terrorist act on U.S. soil since Sept. 11, 2001. Not that that couldn't occur, he is swift to acknowledge. And what about those critics in Congress who believe the bureau is really incapable of carrying out the intelligence mission and that a new agency should be created along the lines of Britain's MI5? Would it surprise you to know that he thinks that is a bad idea? He is careful in denouncing the plan, emphasizing that the British model is one that works much like that of combined FBI-CIA efforts, which taken together can do the job. That, of course, depends on the cooperation between the two agencies that was so elusive for more than 50 years. In fact, it didn't really exist. Does that now work, Mueller is asked. "Yes," he replies tersely. One could hardly expect different answers from the no-nonsense career public servant who became the sixth head of this vast federal law-enforcement agency since Hoover's death in 1972. In the meantime, the public perception that about 75 percent of bureau activities have nothing to do with terrorism is difficult to dispel given the barrage of news about FBI involvement in every crime from prostitution to street and motorcycle gangs and drugs and guns and anything else it sees as under its jurisdiction. It is difficult to read any crime story without finding the hand of the FBI, despite what the director says about cutting down on those things to concentrate on the big-time bomb throwers. Mueller says that the focus on terrorism has become a major part of the training given new agents. But at the same time there are reports that agent morale is low because of the often-mundane business of gathering and analyzing information that might provide a clue to the next terrorist act and that there is strong resistance in the field to breaking down the law-enforcement ethos. If the truth be known, Hollywood's latest vision of the FBI must suit most of its agents just fine. That's what a lot of them signed on to do. ----------------------------------------------------------------------------------------------------- We expertly hunt real spies, real eavesdroppers, and real wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8167 From: James M. Atkinson Date: Mon Jan 19, 2004 3:28am Subject: Free TSCM Tool Kits As a few of you are aware, a few years (1991 era) back I designed a comprehensive set of tools, and cases specifically for TSCM. The tool case is large enough to pack all your tools in, plus quite of bit of manuals and test gear. It has a retractable handle, and casters to make it, very, very easy to move. These cases are packed solid with tools, and you will appreciate that this has rollers. There are over 175 basic tools and accessories in the kit, including screwdrivers, wrenches, probes flashlights, can tools, butt sets, etc... all premium tools. Also included is a Harris TS45 (premium line-mans sets), full set of punch tools (and case), modular adapters, and a very high end Fluke 190 Series DMM. The retail value on these kits are over $1200... but I am giving them away to any customer who spends $20,000 or more with me before the end of this month. If you spend at least $50,000 before the end of this month I will throw in a free Fluke 200 MHz Scopemeter ($3000 value) along with the free tool kit. All tools and equipment are new, unused, and unopened. I would like to clear out the tool kits by the end of the month. This does not apply to other specials. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8168 From: Date: Tue Jan 20, 2004 10:59am Subject: Bell Labs Develops Engine for Cell Users January 19, 2004 Bell Labs Develops Engine for Cell Users By THE ASSOCIATED PRESS Filed at 2:46 p.m. ET NEW YORK (AP) -- Now that wireless companies can track a mobile phone's location, customers will want to control exactly who knows where they are and when. Bell Labs says it has developed a network software engine that can let cell users be as picky as they choose about disclosing their whereabouts, a step that may help wireless companies introduce ``location-based services'' in a way customers will find handy rather than intrusive. In a presentation this week at an industry conference, researchers for the Bell Labs division of Lucent Technologies Inc. plan to describe how their technology copes with the conflicting demands of speed, privacy and personalization on a live telephone network -- enabling users to specify what location information is shared, when, with whom, how and under what circumstances. While one U.S. mobile phone operator, AT&T Wireless, already offers a ``Find Friends'' feature that's somewhat analogous to a buddy list in instant messaging, location-based services have mostly remained an unfulfilled promise. More recently, under a federal mandate requiring that cell carriers be able to pinpoint the whereabouts of any customer who calls 911 during an emergency, expensive network upgrades have made wireless companies more anxious to deploy services which can exploit these new capabilities for a profit. Examples of such services would typically include the ability for restaurants and other businesses to send a solicitation by text message to a cell phone when its owner wanders within range of those merchants. Other applications might include the ability to locate co-workers and customers. While many cell phone users might like to be notified of a nearby eatery or find it helpful to let others keep track of their movements, most would rather not expose themselves to round-the-clock, everywhere-they-go surveillance. However, given the real-time requirements of transmitting information over a telephone network, it can be difficult to program a wide-range of options for individuals to personalize preferences such as when, where and with whom to share location information. One solution is to hard-code a network database with an ``on-off'' switch that activates or deactivates a service, for instance, during a window of time with set hours such as peak and off-peak. Bell Labs said it used a ``rules-driven'' approach to programming that can take personalization to a less-rigid level without bogging down the computing power of a network. While not all users will want or need an elaborate level of personalization, wireless companies would prefer the flexibility to service a variety of customers on the same network. ``You may have a power user who's very concerned about being able to show his or her location to different types of customers and family,'' said Rick Hull, director of Network Data and Services Research at Bell Labs. ``There may be notions about important customers and less important customers, breaking deals,'' he said. ``Maybe for his wife he wants to give very accurate information about his location, but for someone else only wants to give his location within 15 miles. Maybe he doesn't want one customer to know that he's visiting another customer's site.'' Bell Labs said it is negotiating with wireless operators to conduct trials with the technology, which it hopes will be ready for commercial deployment next year. The research is being presented at the 2004 IEEE International Conference on Mobile Data Management in Berkeley, Calif. Copyright 2004 The Associated Press | Home | Privacy Policy | Search | Corrections | Help | Back to Top [Non-text portions of this message have been removed] 8169 From: David Alexander Date: Wed Jan 21, 2004 8:05am Subject: new snooping powers in the UK From the BBC news website: http://news.bbc.co.uk/1/hi/technology/3414531.stm Snooping powers given to more than 600 public bodies look set to create a small industry of private firms that will help process requests for information about who people call, the websites they visit and who they swap e-mail with. Some firms are already marketing their services to the agencies granted the snooping powers under the controversial Regulation of Investigatory Powers Act. One firm, called Singlepoint, has been specifically created to act as a middleman between the bodies that want access to data and the net service providers and phone operators that hold it. Civil liberty groups said they were worried about the emergence of such firms and said the government must police them closely to ensure that access to sensitive information was not abused. Watch the watchers The new snooping powers and the rules governing how they can be used came into force on 5 January and have prompted some firms to take advantage of the new demand for data requests. "We saw an opportunity for a business or a facility that could provide secure processing for the data requests that will come out of this legislation," said a Singlepoint spokesman. He said without Singlepoint it would be more difficult and costly for public authorities to request data as they would have to set up relationships with all of the UK's communication service providers. Instead, he said, Singlepoint was setting up a system that would automatically route requests for information to relevant net or phone firms. He added that this system would ensure that all requests were submitted properly and would help government watchdogs policing RIPA requests for data. "One of the advantages we can offer is transparency and auditability for them to check any part of the process at any time," he said. The Interception Commissioner is charged with making sure that RIPA powers are not abused. The Home Office estimates that up to 2m requests per year are made for information about who pays for a particular phone or web account. About 90% of these requests are for subscriber information. Most of these requests are made by the police but approximately 4% are made by the many public authorities that have had new powers granted under RIPA. A Home Office spokesman said that there were likely to be more companies like Singlepoint that set themselves up to act as middlemen. Training day Other firms are starting to set themselves up as trainers for people within public bodies involved with investigations. The act demands that public bodies appoint single points of contact that will co-ordinate all requests under RIPA. It is estimated that more than 3,000 people will be designated as these single points of contact and all must go through training programmes to ensure they understand RIPA rules. A spokesman for the Focus Group said its training materials were currently being evaluated by the Home Office and soon it hoped to be offering courses to public authorities. He said the Home Office was keen to get firms offering courses because the police did not have the resources to take on the training of these public body workers itself. Bodies granted snooping powers include the Serious Fraud Office, all local authorities and councils plus other organisations such as the Charity Commission and the Centre for Environment, Fisheries and Aquaculture Science. When proposals to grant these snooping powers were first aired in mid-2002 they were greeted with alarm by privacy advocates and civil liberty groups. A campaign co-ordinated by the FaxYourMP website prompted the government to withdraw its proposals. However, following a consultation exercise the proposals were resurrected and the powers granted in a series of statutory instruments issued in November 2003. Danny O'Brien, of net lobby group Stand, said it would prefer if the police were the only ones with powers to get data from phone and net service firms. "We definitely want some public oversight over how much power to look into private files these groups have," he said David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8170 From: seleong Date: Tue Jan 13, 2004 1:00am Subject: Microtel PR-700B Documentation Hello! Curious if anyone has any technical documentation on the Micro-tel PR- 700B receiver? Anyone experience any power supply problems with this unit? Does anyone have the pinout for the 24VDC input on the rear panel? Thanks! Steve 8171 From: David Miller Date: Tue Jan 13, 2004 3:55am Subject: Nigerian scams We have all heard of the Nigerian scams that are so prevalent in our mail boxes. Here is a guy that is having some fun with it. You really need to read some of the letters to really appreciate this. They are hilarious! http://www.ebolamonkeyman.com/ 8172 From: wayne Macdonald Date: Wed Jan 14, 2004 0:39pm Subject: Plantronics CS50 wireless office headset system This week I carried out a full test with the Plantronics digital wireless headset. The company claims that it is a totally secure method of communication via telephone. To quote the company literature, "the headset provides ultimate sound quality and mobility for the office and crystal clean and secure conversations" The CS50 uses digital 900MHz technology to deliver calls that are clear, private and completely secure". During one of the tests, it was discovered, that when communicating with an analog telephone and portable phones , all digital security went out the window. (as expected). Another discovery was that the small headset mike is FM wireless and can transmit for about 100 feet. I arranged the small headset on a shelf in the conference room, dialed an old remote analog cellular and was able to monitor room conversations quite clearly. It can be an excellent bug. The mike is very directional and low powered, but I know many who can modify this and make it an excellent covert transmitter. My client was extremely happy with my report. Wayne Macdonald 8173 From: Steve Weinert Date: Fri Jan 16, 2004 9:10am Subject: RE: man flies Atlantic with 5 bullets in pocket > Date: Thu, 15 Jan 2004 16:24:58 -0000 > From: "David Alexander" > Subject: man flies Atlantic with 5 bullets in pocket > > The big news here in the UK this morning is that a man with a Sierra Leone > passport arrived at Heathrow Airport (London, England) with 5 rounds of > ammunition in his pocket. He arrived on a flight from the USA. > > I don't know if the US 'readers' of this list are aware of the > problems that > flights from the UK (and I suspect other countries too) have had. A lot of > flights have either been delayed or cancelled. A personal source in HMCS indicated that several of the UK delays were industrial actions by UK pilots & their unions. Having formerly had 450 unionized UK employees under my management and dealing first hand with the mechanisms their union put them up to, it would not be a surprising for this to have been part of the cause. > Also we are very > unhappy with > the (in our opinion) the high-handed way that the US security authorities > have been dealing with other countries. For example, the FBI and DHS are > insisting that European countries flout their own privacy laws and supply > data about passengers that should not be in the public domain. The net > result among most people I know is quite simple - we're not coming to > America as long as this is in force. We have zero confidence in > the security > authorities to keep the information safe and not misuse it. The data is not to be released into the public domain, but rather is cooperative governmental information. Was there a lot more than passenger lists and simple data for profiling (like methods of payment, citizenship/nationality, and such..) that was being shared? Much of that information was always available. I ended up being interviewed by Special Branch years ago for paying for tickets in cash, among other issues. The EU has dismantled their internal border systems to the point where after Canada & Mexico, the EU is a favored point for importing persons not desired in the USA. > > I'd just like to say that right now, we are laughing ourselves stupid. > > I know it's not you guys who read this list, please don't think > I'm having a > go at you personally, I'm not. Your postings show how dumba** you > think most > of this is and how ineffective it is on internal flights. Now you > know, it's > no better on the international ones either. > Airport security is (and in my estimation will always remain) marginally effective. The fellow had five rounds in his pocket. I've been in the secure areas of a commercial airport openly carrying ammo cans. Nobody asked me who, what or why. Having conducted numerous penetration inspections/exercises on supposedly secure facilities I've experienced a porosity of security that does not lead me to expect any "true security" in public facilities, like airports/airlines. > Considering how long your sea and land borders are I'm sure that, if I > wanted to, I could get a whole platoon of 'illegals' into the USA without > detection or going anywhere near a scheduled flight. The general step-up at other ingress points is noticeable. Whether it is REMS and UGS in border areas, the cutting back of foliage and the implimentation of modest security on other transpost crossings, there has been a change. Even at a sleepy Manitoba/USA crossing there were armed Military on site and the increase in other measures was noticeable. > I also think > that, with > the relatively low value of second-hand airliners at the moment, if I was > OBL and looking to repeat 9/11 I'd just buy a couple of old > soviet Aeroflot > transport aircraft and book them on 'one-way cargo runs' into the USA. > > My 2c. > > David Alexander > Dbi Consulting Ltd Valid issues. Expect that these types of vectors are a concern for any potential target country. Airborne & Seaborne infiltration of personnel & materials isn't all that hard, but there is no reason to make it as easy as a walk in the park. It is worth remembering that important aspects of physical security include deterring the wrong doers and providing a comfort to the secured peoples at a level that lets them get on with life, albeit hopefully not in a false sense of invincibility & immunity. As always your views from a UK vantage are enjoyed and appreciated. It does concern that you would consider not traveling over the issues. It does beg to wonder if the public demands for information sharing are only an acknowledgement of data long shared on a cooperative less public method. Steve W 8174 From: Does it matter Date: Fri Jan 16, 2004 5:33pm Subject: Question about antennas Hello, I have a wireless hot spot that I am setting up in my office for ppl in my office and then people down the street also. There is a company that makes a hotspot kit that allows people to log on enter cc information etc and this third party co. takes care of billing etc. Anyway to the point they are trying to sell me 1 of 2 antennas for 802.11b service (one directional or one omni directional) my question to you guys is realistically what is the range on these things. It would be mounted on a roof that is on a 2 story building and I would be trying to beam signal 1/10th to 1/5th of a mile away. Some of the places I want to try to reach are hotels so is it unrealistic to beam across the street into a hotel? Is the concrete and walls going to kill my signal? Thanks for your help. 8175 From: CP Date: Wed Jan 21, 2004 9:09pm Subject: Re: Plantronics CS50 wireless office headset system > Another discovery was that the small headset mike is FM wireless and can > transmit for about 100 feet. Are you saying that the headset was actually transmitting in FM, I would have expected it to be spread spectrum or possibly bluetooth? or was there just some extra modulated emissions that could be picked up? Charles Charles Patterson Global Communications Tarrytown, NY cp @ telephonesecurity.com ----- Original Message ----- From: "wayne Macdonald" To: Sent: Wednesday, January 14, 2004 1:39 PM Subject: [TSCM-L] Plantronics CS50 wireless office headset system > This week I carried out a full test with the Plantronics digital > wireless headset. The company claims that it is a totally secure method > of communication via telephone. To quote the company literature, "the > headset provides ultimate sound quality and mobility for the office and > crystal clean and secure conversations" The CS50 uses digital 900MHz > technology to deliver calls that are clear, private and completely > secure". During one of the tests, it was discovered, that when > communicating with an analog telephone and portable phones , all digital > security went out the window. (as expected). > > Another discovery was that the small headset mike is FM wireless and can > transmit for about 100 feet. I arranged the small headset on a shelf in > the conference room, dialed an old remote analog cellular and was able > to monitor room conversations quite clearly. It can be an excellent bug. > The mike is very directional and low powered, but I know many who can > modify this and make it an excellent covert transmitter. My client was > extremely happy with my report. > > Wayne Macdonald > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > > -------------------------------------------------------------------------- ------ > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 8176 From: Steve Uhrig Date: Wed Jan 21, 2004 9:15pm Subject: Re: Question about antennas On 16 Jan 2004 at 23:33, Does it matter wrote: > Some of the places I want to try to reach are hotels so is it > unrealistic to beam across the street into a hotel? Is the concrete > and walls going to kill my signal? All bets are off if there's anything between the transmit and receive antennas other than atmosphere. Concrete will kill most legal 802.11x signals unless you happen to be very close to the access point. You want directional as much as possible everywhere practical, to pick up gain. Remember +6dB (anywhere in the system) effectively doubles your range, all other factors being equal. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8177 From: Date: Wed Jan 21, 2004 8:00pm Subject: Easing of Internet Regulations Challenges Surveillance Efforts January 22, 2004 New York Times Easing of Internet Regulations Challenges Surveillance Efforts By STEPHEN LABATON ASHINGTON, Jan. 21 -- The Federal Communications Commission's efforts to reduce regulations over some Internet services have come under intense criticism from officials at law enforcement agencies who say that their ability to monitor terrorists and other criminal suspects electronically is threatened. In a series of unpublicized meetings and heated correspondence in recent weeks, officials from the Justice Department, the Federal Bureau of Investigation and the Drug Enforcement Administration have repeatedly complained about the commission's decision in 2002 to classify high-speed Internet cable services under a looser regulatory regime than the phone system. The Justice Department recently tried to block the commission from appealing a decision by a federal appeals court two months ago that struck down major parts of its 2002 deregulatory order. Justice Department officials fear that the deregulatory order impedes its ability to enforce wiretapping orders. The department ultimately decided to permit the F.C.C. to appeal, but took the highly unusual step of withdrawing from the lawsuit, officials involved in the case said. As a result of the commission's actions, said John G. Malcolm, a deputy assistant attorney general who has played a lead role for the Justice Department, some telecommunications carriers have taken the position in court proceedings that they do not need to make their networks available to federal agents for court-approved wiretapping. "I am aware of instances in which law enforcement authorities have not been able to execute intercept orders because of this uncertainty," Mr. Malcolm said in an interview last Friday. He declined to provide further details. The clash between the commission and officials from the Justice Department and other law enforcement agencies pits two cherished policies of the Bush administration against each other. On one side stand those who support deregulation of major industries and the nurturing of emerging technologies; on the other are those who favor more aggressive law enforcement after the Sept. 11 terrorist attacks. The outcome of the debate has far- reaching consequences. Law enforcement officials say it will determine whether they can effectively monitor communications between suspects over new kinds of phone services that otherwise might allow them to escape detection. Also at stake is whether the government or industry will bear the considerable costs of developing the technology for such surveillance. By contrast, some F.C.C. officials and telephone industry executives say that if the commission buckles to the other agencies and forces the industry to take on a host of expensive obligations the development of promising new communications services may be stalled or squelched for years to come. The law enforcement officials have also raised concerns about recent statements by the commission's chairman, Michael K. Powell, that suggest he intends to propose rules soon that would place nascent Internet-based telephone services under a looser regulatory regime than the traditional phone system. Through a spokesman, Mr. Powell declined to discuss the subject. David Fiske, the commission's chief spokesman, said that he could not respond to Mr. Malcolm's statement that the F.C.C.'s interpretation of the rules was making it more difficult to execute surveillance orders. A senior official at the F.C.C. said the commission was not unsympathetic to the concerns of the law enforcement agencies. "We're an economic regulatory agency as well as a law enforcement agency and we have to look at the interests of everyone," the official said. Some industry experts say that their biggest worry is that law enforcement demands may reshape the technical specifications of the new Internet voice services, an accusation that officials at the Justice Department and the F.B.I. deny. "What's most scary for industry and perhaps some people at the F.C.C. is the notion that the architecture of the Internet will depend on the permission of the F.B.I.," said Stewart A. Baker, a former general counsel of the National Security Agency, which monitors foreign communications. Mr. Baker now represents a number of telecommunications companies as a partner at the law firm of Steptoe & Johnson. But law enforcement officials say they are not seeking uniform technical standards but requirements that the new companies offering so-called "voice over Internet" services build into their systems easy ways for agents to tap into conversations between suspects. In a strange-bedfellows twist, officials from the F.B.I. and other agencies have found themselves the unlikely allies of groups like the American Civil Liberties Union, which have also argued that the new Internet services offered by cable companies should be under a regulatory regime like the phone system -- but for different reasons. The A.C.L.U. prefers that approach because it would prohibit cable companies from discriminating against Internet service providers, and as such would assure a greater diversity of voices. The law enforcement officials have repeatedly complained about the direction the agency has been taking on the issues. Last month, officials from the Justice Department, the F.B.I. and the drug agency warned officials of the F.C.C. that the commission's regulatory rulings on high-speed Internet access through cable systems "suffers from statutory interpretation problems" and "directly threatens" the ability to apply the law permitting them to monitor suspects, according to a letter on file at the F.C.C. describing a meeting on the issue. The meeting at the F.C.C. included lawyers from the Justice Department's criminal division, civil appellate division, narcotics and dangerous drugs section and solicitor general's office, as well as officials from the F.B.I., and D.E.A. Shortly before that meeting, the Justice Department tried to block the F.C.C. from appealing a decision by a three-judge panel of the United States Court of Appeals for the Ninth Circuit, sitting in Seattle, because of the problems it could pose for law enforcement, officials said. The commission lost the case last October, when the panel issued a ruling that may force the cable companies to share their broadband networks with competing Internet service providers. The F.C.C. order, which was partly struck down, had classified cable broadband as an "information service" under the 1996 Telecommunications Act. In so doing, it threatened to undermine the ability of law enforcement agencies to use the Communications Assistance for Law Enforcement Act of 1994, a wiretapping law that applies to phone services but exempts information services. The Justice Department ultimately reached a compromise that permitted the commission to go forward and petition the entire Ninth Circuit to review the case, Brand X Internet Services v. Federal Communications Commission. But government lawyers removed the department from the case, rejecting the Justice Department's traditional role as the main legal advocate for the United States in nearly all cases before federal appeals courts. Law enforcement officials have also warned the F.C.C. that the approach that Mr. Powell has begun to articulate to have few regulations over the emerging technology that will permit consumers to use the Internet to send and receive phone calls could make it significantly more difficult for prosecutors and federal agents to monitor those calls. The F.B.I. and the Justice Department have told the commission that greater use of high speed Internet phone services "offers increasing opportunities for terrorists, spies, and criminals to evade lawful electronic surveillance," according to a document on file at the F.C.C. Classifying Internet-based phone services as "telecommunications" would allow law enforcement officials to require companies to provide them with access to contemporaneous conversations on their networks under the 1994 wiretapping law. But such a classification also imposes on the companies a host of onerous requirements under the 1996 act, including those intended to assure that telephones are universally available and that everyone has access to 911 emergency services. These obligations, purveyors of the new Internet telephone services say, are so expensive that they will deter their development. Government and industry lawyers say that the commission could try to define the new services as "telecommunications" under the 1994 surveillance law and "information" under the 1996 act. But taking that potentially conflicting approach could undermine the F.C.C. in court in the inevitable legal challenges that would follow its rulings. Mr. Powell, in a series of recent speeches and interviews, has suggested that the new technologies need to be classified as "information services" and thus be subjected to fewer regulations. "Don't shove the round Internet into a square regulatory hole," Mr. Powell said at a luncheon appearance last week before the National Press Club. "We cannot contort the character of the Internet to suit our familiar notions of regulation. Do not dumb down the genius of the Net to match the limited visions of the regulator. "To regulate the Internet in the image of a familiar phone service is to destroy its inherent character and potential," Mr. Powell said. Such new technologies empower people, "giving them more choice and control." "And I think as consumers do more, governments do less, because we don't regulate our citizens." In the same speech, Mr. Powell added, "We will need to ensure the legitimate concerns of public safety and law enforcement are addressed." [Non-text portions of this message have been removed] 8178 From: Eric Butler Date: Thu Jan 22, 2004 0:11am Subject: TEMPEST prevention fonts I was wondering about the effectivness of tempest prevention fonts. i have found a picture of the letters, but no workable font files. i would appreciate any feedback/links. thanks! 8179 From: kondrak Date: Thu Jan 22, 2004 6:39pm Subject: Re: TEMPEST prevention fonts Depends on what signal you're sniffing I'd imagine....if you're looking at the radiation from the monitor, then they might help, but if your sniffing at the rs-232 outputs, keyboard or serial then the font doesn't much matter.... Any font with smooth sloping characteristics is helpful, so i guess a script file would do.... This may make much of this moot however.....http://www.chiark.greenend.org.uk/pipermail/ukcrypto/1998-February/000946.html At 01:11 1/22/2004, you wrote: >I was wondering about the effectivness of tempest prevention fonts. i >have found a picture of the letters, but no workable font files. i >would appreciate any feedback/links. thanks! 8180 From: Date: Thu Jan 22, 2004 4:41pm Subject: FBI investigating if Albuquerque police captain's phone was wiretapped FBI investigating if Albuquerque police captain's phone was wiretapped The Albuquerque Police Department is investigating whether the work phone line of Captain Sonny Leeper was wiretapped at the Northeast Substation. Last Update: 01/22/2004 6:00:21 PM By: Todd Dukart The Albuquerque Police Department called in the Federal Bureau of Investigation to find out if someone unlawfully wiretapped an officer’s work phone inside a police substation. Eyewitness News 4 has learned from several sources that the captain at the Northeast Substation at Osuna and Wyoming NE says he found his phone line bugged. If true, it would seem to suggest an inside job. Captain Sonny Leeper says he found his phone tapped in January 2003. Albuquerque Police Chief Gil Gallegos confirmed that former deputy chief Ray Schultz looked in to the alleged wiretapping a year ago. But, he “apparently thought that it was not what it may be,” Gallegos said. Sources say there was a U.S. marshal in Leeper’s office when the captain received a call alerting him to the alleged wiretap. Sources tell Eyewitness News 4 the marshal had the master phone box inside the substation checked out and found a wiretapping device attached to Leeper’s phone line. Retired APD lieutenant Tim Kline currently sits on the police oversight commission. He says he received an anonymous call Wednesday telling him that Captain Leeper’s work phone had been tapped. Kline says he called Leeper to ask if the claim was true. “And I got from him that, yes, his phone had been tapped,” said Kline. Kline says he would refer the matter to the police oversight commission’s independent review officer Thursday for a possible investigation. If it turns out Leeper’s phone was tapped, Kline expects a lot of questions. “Why were they doing it? How were they doing it and for what reason? And whether now some federal laws may have been totally, completely violated,” said Kline. Eyewitness News 4 contacted Albuquerque Police Chief Gil Gallegos Wednesday night. He says he never authorized any wiretapping of Captain Leeper’s phone line. Gallegos said he didn’t hear about the allegations until six days ago, and called the FBI Wednesday, asking for a federal investigation. He said he doesn’t know why it apparently took a year for anyone to tell him that one of his captains claimed to have been wiretapped. Eyewitness News 4 attempted to contact Schultz, who is now a deputy chief in Scottsdale, Arizona, but the call has not been returned. [Non-text portions of this message have been removed] 8181 From: Date: Fri Jan 23, 2004 4:54am Subject: "If theywant to do a wiretap, they can do it the old-fashioned way" January 23, 2004, 8:40 a.m. The Awfulness of Wesley Clark The candidate for people who want a really bad candidate. By the end of the Democratic presidential debate on Thursday night, it was impossible to avoid the question: Was Wesley Clark trying to hurt himself? Or had the retired four-star general simply not considered the possibility that debate moderators would ask him, like, questions? Consider Clark's response to a query about the lobbying work he did in 2002 and 2003 for an Arkansas-based company called Acxiom. The software firm has developed a product called CAPPS II, which is an airline screening system that gathers information on passengers and color-codes them according to their potential terrorist risk (the name stands for Computer Assisted Passenger Prescreening System). Clark earned a reported $500,000 for pitching the product to the Transportation Department, the FBI, and the CIA. Some civil libertarian groups have strongly criticized the CAPPS II system on privacy grounds, and in recent days, the campaign of Sen. John Kerry has attacked Clark for his lobbying. The Los Angeles Times quoted a Kerry spokesman saying recently, "Wes Clark was a high-paid Republican Washington lobbyist who cashed in on his military record." So it was no surprise that Clark's lobbying came up in the debate. But when he was asked whether CAPPS II might "step over the line" of airline passengers' privacy, Clark seemed to have no idea what it was all about. "Well, I don't know about CAPPS II because I have not seen the program, and I don't think many of the people who are worried about it have," Clark said. "I was on the board of the company [Acxiom], and I did take them around and introduce them to various members of the United States government, the Defense Department and so forth, because their technology will improve our security." But was CAPPS II a threat to privacy? "Had I still been on that board when all this was going through, I would have insisted that the American Civil Liberties Union and others be brought in to pre-approve CAPPS II," Clark said. "Whether that was done or not, I have no idea." End of answer. Consider also Clark's response to questions about his embrace of the radical leftist filmmaker Michael Moore. Moore, who famously wondered why terrorists struck New York City on September 11 when there were so many Bush voters they could have targeted elsewhere in the country, endorsed Clark recently, and the two shared an on-stage love-fest. In his remarks at the time, Moore referred to George W. Bush as, among other things, a "deserter." ABC's Peter Jennings, who shared moderating duties at the debate with Fox News's Brit Hume, asked Clark, "That's a reckless charge not supported by the facts. And I was curious to know why you didn't contradict [Moore], and whether or not you think it would've been a better example of ethical behavior to have done so." "Well, I think Michael Moore has the right to say whatever he feels about this," Clark answered. "I don't know whether this is supported by the facts or not. I've never looked at it. I've seen this charge bandied about a lot." Clark then said, "This election is about the future, Peter, and what we have to do is pull this country together." Clark explained that he believes he can accomplish that with "the support of a man like Michael Moore, [and] of a great American leader like Sen. George McGovern." Still, Jennings did not accept Clark's claim to know nothing about the "deserter" charge. "Since this question and answer in which you and Mr. Moore were involved in, you've had a chance to look at the facts," Jennings followed up. "Do you still feel comfortable with the fact that someone should be standing up in your presence and calling the president of the United States a deserter?" "To be honest with you, I did not look at the facts, Peter. You know, that's Michael Moore's opinion. He's entitled to say that. I've seen — he's not the only person who's said that. I've not followed up on those facts. And frankly, it's not relevant to me and why I'm in this campaign." It turned out Clark didn't know any more about Michael Moore than he knew about CAPPS II, the product he had made half a million dollars selling. On other topics, Clark backed away from an earlier statement that if he is elected president, the United States will not suffer any more 9/11-style attacks. What he really meant to say, Clark explained, is that "President Bush must be held accountable." Clark also announced that he would "suspend all portions of the Patriot Act that have to do with search and seizure." He called for returning federal law enforcement to the days before cell phones changed the ways criminals (and terrorists) do business. "If they [investigators] want to do a wiretap, they can do it the old-fashioned way," Clark said. Finally, Clark struggled to explain a decidedly pro-war article he wrote for the Times of London last April, shortly after U.S. forces entered Baghdad (See "Wesley Clark's Pro-War Manifesto). Clark repeated his assertion that "I did not support this war," but explained that in the article he simply did not want to criticize U.S. policy in a foreign publication. "I'm not going to take U.S. policy and my differences with the administration directly into a foreign publication," he said. All in all, Clark's was the weakest performance in a presidential debate since, well, his performance in the early debates. And it could have been even worse; the general was lucky, for example, that no one brought up his embarrassing attempts to pull rank on his rival, Sen. John Kerry, who served as a lieutenant in Vietnam. It is impossible to see how Clark's performance Thursday night, as well as his performance in New Hampshire in general, will help his chances in the upcoming primary. As for the other candidates, Sen. John Edwards, who has so far failed to capitalize on his surprise strong showing in Iowa, also had a weak night, bobbling a question on the nature of Islam and, on another occasion, showing a fundamental misunderstanding of the Defense of Marriage Act. Sen. Kerry, the frontrunner who has capitalized on his Iowa showing, turned in a generally strong performance. And Howard Dean, the former frontrunner who has never been particularly strong in debates, did as well as he could be expected to do, given the pressure created by his red-faced "YAAAAAAAAAAAAAARRRRHHHHHH!!!!!!!!!" speech in Iowa. Dean began the debate by explaining that his voice was hoarse, "not because I was whooping and hollering at my third- place finish in Iowa," but because he had a cold. Falling back on his now-stock explanation of the Iowa outburst, he said, "We did have a little fun in Iowa. I thought I owed it to the 3,500 kids that came out and worked for us." Later, Dean returned to the subject, suggesting that unguarded moments like the Iowa speech are in fact evidence of his superior genuineness. "You know, I'm not a perfect person," Dean explained. "I think a lot of people have had a lot of fun at my expense over the Iowa hooting and hollering, and that's justified. But one thing I can tell you is that I'm not kidding about what I say." Dean's non-mea culpa, clearly practiced and tested with his advisers, didn't fare any better than his early explanations of his Iowa rant. "Don't be hard on yourself about hooting and hollering," Al Sharpton advised the former Vermont governor. "If I had spent the money you did and got 18 percent, I'd still be in Iowa hooting and hollering." http://www.nationalreview.com/york/york200401230840.asp [Non-text portions of this message have been removed] 8182 From: CP Date: Fri Jan 23, 2004 10:04pm Subject: ISA ETA-1 on ebay I have an older ISA ETA-1 telephone analyzer on ebay if anyone is interested. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=3073220333 It's in good cosmetic condition with case (no manuals). --Charles 8183 From: Date: Sat Jan 24, 2004 6:41am Subject: Cold War Museum Cold War Museum Update 2004 Over the past eight years the Cold War Museum has made great strides in honoring Cold War Veterans and preserving Cold War history. However, the work has just begun and we need to continue our fundraising efforts in order to raise the millions of dollars necessary to build The Cold War Museum and Memorial. I am writing to provide you with a brief update on the Museum's activities and to ask that you consider making a year-end tax-deductible donation to the Cold War Museum's general fund. A donation to our general fund will allow us to develop architectural plans, conduct a site feasibility study, and prepare for our national fundraising campaign. If you know of any family members, friends, or colleagues that would like to assist with our efforts, please let them know that their support is welcomed. We are at a critical stage of our development. In January 2004, the Cold War Museum renewed its affiliation with the Smithsonian Institution. As a result we have pledges of support for artifact loans from Smithsonian Air and Space, American History, National Portrait, and US Postal Museum. The Cold War Museum has submitted a proposal to Fairfax County Park Authority to locate at the former Nike Missile Base in Lorton, Virginia. We are working with the Fort Meade Museum and the Historical Electronics Museum in Maryland, the International Spy Museum in Washington, DC, and the Florida International Museum to temporarily display artifacts from our collection. Annually, the Bulgaria, Estonian, Hungarian, Latvian, Lithuanian, Romanian, and Slovakian Embassies co-host a reception to promote The Museum to the International community in Washington, DC. The 2001 reception to commemorate the 10th Anniversary of the end of the Cold War was held at the Embassy of Slovakia. The 2002 reception was held at the Romanian Embassy. The 2003 event was held at the Embassy of Bulgaria on November 14, 2003. The Museum has acquired many important Eastern Bloc artifacts, including an East German admiral's uniform, a Checkpoint Charlie sign, a Stasi prison door and bed, and a piece of the "Iron Curtin" as a result of these receptions. The mobile exhibit on the U-2 Incident, the "Spies of Washington Tour," and our book signing receptions continue to generate interest and support. The mobile exhibit returned from a one-year display at the Florida International Museum in St. Petersburg, Florida and then began a one-year display at the EAA Museum in Oshkosh, WI. The exhibit opened to the public at the National Test Site Museum in Las Vegas, Nevada on October 2, 2003. The educational "Spies of Washington Tour" (www.spytour.com) now includes an optional stop at the International Spy Museum in Washington, DC. Our latest book signing reception took place at the National Archives and featured author John Fahey who wrote, "Licensed to Spy" about his involvement with the United States Military Liaison Mission (USMLM). As a result of our efforts, the Commonwealth of Virginia recently allocated a $28,000 matching grant for the Cold War Museum. We are grateful to the Springfield VFW (Post 7327) who in response to our matching grant campaign donated $20,000 to the Museum. Our Congressman, the Honorable Tom M. Davis, III (11th Virginia), is working to assist the museum at the Federal level. Once again the museum is part of the Combined Federal Campaign (CFC#7475), which allows for Federal government and military employees to donate to the museum through payroll deduction. Please consider making a donation to the Cold War Museum's general fund. Your gift will help us plan for the new year and the new physical location. Tax-deductible contributions and artifact donations to the Museum will ensure that future generations will remember Cold War events and personalities that forever altered our understanding of national security, international relations, and personal sacrifice for one's country. Please help spread the word about the Museum. Together we can make this vision a reality. If you should have any questions or want additional information, please contact: Francis Gary Powers, Jr. - Founder The Cold War Museum P.O. Box 178 - Fairfax, VA 22030 P-(703) 273-2381 / F-(703) 273-4903 www.coldwar.org / gpowersjr@c... [Non-text portions of this message have been removed] 8184 From: Andy Cuff Date: Thu Jan 22, 2004 3:05am Subject: Network Taps Copper and Fiber Hi I've created a new page http://www.securitywizardry.com/taps.htm providing salient details and a feature matrix for all the commercial vendors that supply network Taps, the page is aimed at those who wish to use the Taps for Intrusion Detection Systems but they can obviously also be used for more nefarious purposes. Additionally I have included a fiber Tap detection system that claims to get over the problem I used to have with level threshold detectors and false positives that occurred as the fibers degraded over time. What I'm looking for from TSCM is whether I'm missing any products that are out there either Taps or Tap detectors I'd also like details on any Gucci devices like vampire Taps for fiber or Taps that rely on refracting signal out of the fiber Any good home made DIY kit build instructions, I saw a nice Fiber Tap that used 3 media converters in various ways. If you can spare any time in responding to my query I'd really appreciate it, the site isn't a commercial one, and is vendor agnostic, though the banners allow me to break even on the running costs. In fact I've taken a days vacation to update some of the content take care -andy Talisker Security Tools Directory http://www.securitywizardry.com 8185 From: Andy Cuff Date: Thu Jan 22, 2004 9:09am Subject: Re: TEMPEST prevention fonts Hi Eric, In my experience they can be effective in making the reconstituted image more difficult to read but they don't really effect some of the more critical leading edges used to sync in with the original output. I produced a TEMPEST FAQ http://www.securitywizardry.com/tempest.htm a few years back, it was seriously edited for public consumption but I feel there are some interesting points that are still relevant today. For me the big thing to get across is that TEMPEST doesn't just apply to screens but any other repetitive processing that results in electromagnetic emanations; keyboards etc Hope it's of some use, though I do apologise for it's lameness -andy (former TEMPEST tester) Talisker Security Tools Directory http://www.securitywizardry.com ----- Original Message ----- From: "Eric Butler" To: Sent: Thursday, January 22, 2004 6:11 AM Subject: [TSCM-L] TEMPEST prevention fonts > I was wondering about the effectivness of tempest prevention fonts. i > have found a picture of the letters, but no workable font files. i > would appreciate any feedback/links. thanks! > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8186 From: Jeremy Funk Date: Thu Jan 22, 2004 1:25pm Subject: Farm Kid Joins The Marines LETTER FROM A FARM KID NOW AT THE MARINE CORPS RECRUIT DEPOT IN SAN DIEGO Dear Ma and Pa: I am well. Hope you are. Tell Brother Walt and Brother Elmer the Marine Corps beats working for old man Minch by a mile. Tell them to join up quick before maybe all of the places are filled. I was restless at first because you got to stay in bed till nearly 6 a.m., but am getting so I like to sleep late. Tell Walt and Elmer all you do before breakfast is smooth your cot and shine some things. No hogs to slop, feed to pitch, mash to mix, wood to split, fire to lay. Practically nothing. Men got to shave but it is not so bad, there's warm water. Breakfast is strong on trimmings like fruit juice, cereal, eggs, bacon, etc., but kind of weak on chops, potatoes, ham, steak, fried eggplant, pie and other regular food. But tell Walt and Elmer you can always sit by the two city boys that live on coffee. Their food plus yours holds you till noon when you get fed again. It's no wonder these city boys can't walk much. We go on "route" marches, which the Platoon Sergeant says are long walks to harden us. If he thinks so, it is not my place to tell him different. A route march" is about as far as to our mailbox at home. Then the city guys get sore feet and we all ride back in trucks. The country is nice, but awful flat. The Sergeant is like a schoolteacher. He nags some. The Captain is like the school board. Majors and Colonels just ride around and frown. They don't bother you none. This next will kill Walt and Elmer with laughing. I keep getting medals for shooting. I don't know why. The bulls-eye is near as big as a chipmunk head and don't move. And it ain't shooting at you, like the Higgett boys at home. All you got to do is lie there all comfortable and hit it. You don't even load your own cartridges. They come in boxes. Then we have what they call hand-to-hand combat training. You get to wrestle with them city boys. I have to be real careful though, they break real easy. It ain't like fighting with that ole bull at home. I'm about the best they got in this except for that Tug Jordan from over in Silver Lake. He joined up the same time as me. But I'm only 5'6" and 130 pounds and he's 6'8" and weighs near 300 pounds dry. Be sure to tell Walt and Elmer to hurry and join before other fellers get onto this setup and come stampeding in. Your loving daughter, Gail 8187 From: Does it matter Date: Thu Jan 22, 2004 6:25pm Subject: Washington computer break in I couldn't believe the guys name in this story William Pickle WASHINGTON -- Republican staff members of the US Senate Judiciary Commitee infiltrated opposition computer files for a year, monitoring secret strategy memos and periodically passing on copies to the media, Senate officials told The Globe. From the spring of 2002 until at least April 2003, members of the GOP committee staff exploited a computer glitch that allowed them to access restricted Democratic communications without a password. Trolling through hundreds of memos, they were able to read talking points and accounts of private meetings discussing which judicial nominees Democrats would fight -- and with what tactics. The office of Senate Sergeant-at-Arms William Pickle has already launched an investigation into how excerpts from 15 Democratic memos showed up in the pages of the conservative-leaning newspapers and were posted to a website last November. With the help of forensic computer experts from General Dynamics and the US Secret Service, his office has interviewed about 120 people to date and seized more than half a dozen computers -- including four Judiciary servers, one server from the office of Senate majority leader Bill Frist of Tennessee, and several desktop hard drives. But the scope of both the intrusions and the likely disclosures is now known to have been far more extensive than the November incident, staffers and others familiar with the investigation say. The revelation comes as the battle of judicial nominees is reaching a new level of intensity. Last week, President Bush used his recess power to appoint Judge Charles Pickering to the Fifth Circuit Court of Appeals, bypassing a Democratic filibuster that blocked a vote on his nomination for a year because of concerns over his civil rights record. Democrats now claim their private memos formed the basis for a February 2003 column by conservative pundit Robert Novak that revealed plans pushed by Senator Edward M. Kennedy, Democrat of Massachusetts, to filibuster certain judicial nominees. Novak is also at the center of an investigation into who leaked the identity of a CIA agent whose husband contradicted a Bush administration claim about Iraqi nuclear programs. Citing "internal Senate sources," Novak's column described closed- door Democratic meetings about how to handle nominees. Its details and direct quotes from Democrats -- characterizing former nominee Miguel Estrada as a "stealth right-wing zealot" and describing the GOP agenda as an "assembly line" for right-wing nominees -- are contained in talking points and meeting accounts from the Democratic files now known to have been compromised. Novak declined to confirm or deny whether his column was based on these files. "They're welcome to think anything they want," he said. "As has been demonstrated, I don't reveal my sources." As the extent to which Democratic communications were monitored came into sharper focus, Republicans yesterday offered a new defense. They said that in the summer of 2002, their computer technician informed his Democratic counterpart of the glitch, but Democrats did nothing to fix the problem. Other staffers, however, denied that the Democrats were told anything about it before November 2003. The emerging scope of the GOP surveillance of confidential Democratic files represents a major escalation in partisan warfare over judicial appointments. The bitter fight traces back to 1987, when Democrats torpedoed Robert Bork's nomination to the Supreme Court. In the 1990s, Republicans blocked many of President Clinton's nominees. Since President Bush took office, those roles have been reversed. Against that backdrop, both sides have something to gain and lose from the investigation into the computer files. For Democrats, the scandal highlights GOP dirty tricks that could result in ethics complaints to the Senate and the Washington Bar -- or even criminal charges under computer intrusion laws. "They had an obligation to tell each of the people whose files they were intruding upon -- assuming it was an accident -- that that was going on so those people could protect themselves," said one Senate staffer. "To keep on getting these files is just beyond the pale." But for Republicans, the scandal also keeps attention on the memo contents, which demonstrate the influence of liberal interest groups in choosing which nominees Democratic senators would filibuster. Other revelations from the memos include Democrats' race-based characterization of Estrada as "especially dangerous, because . . . he is Latino," which they feared would make him difficult to block from a later promotion to the Supreme Court. And, at the request of the NAACP, the Democrats delayed any hearings for the Sixth Circuit Court of Appeals until after it heard a landmark affirmative action case -- though a memo noted that staffers "are a little concerned about the propriety of scheduling hearings based on the resolution of a particular case." After the contents of those memos were made public in The Wall Street Journal editorial pages and The Washington Times, Judiciary Chairman Orrin Hatch, Republican of Utah, made a preliminary inquiry and described himself as "mortified that this improper, unethical and simply unacceptable breach of confidential files may have occurred on my watch." Hatch also confirmed that "at least one current member of the Judiciary Committee staff had improperly accessed at least some of the documents referenced in media reports." He did not name the staffer, who he said was being placed on leave and who sources said has since resigned, although he had apparently already announced plans to return to school later this year. Officials familiar with the investigation identified that person as a legislative staff assistant whose name was removed from a list of Judiciary Committee staff in the most recent update of a Capitol Hill directory. The staff member's home number has been disconnected and he could not be reached for comment. Hatch also said that a "former member of the Judiciary staff may have been involved." Many news reports have subsequently identified that person as Manuel Miranda, who formerly worked in the Judiciary Committee office and now is the chief judicial nominee adviser in the Senate majority leader's office. His computer hard drive name was stamped on an e-mail from the National Abortion and Reproductive Rights Action League that was posted along with the Democratic Senate staff communications. Reached at home, Miranda said he is on paternity leave; Frist's office said he is on leave "pending the results of the investigation" -- he denied that any of the handwritten comments on the memos were by his hand and said he did not distribute the memos to the media. He also argued that the only wrongdoing was on the part of the Democrats -- both for the content of their memos, and for their negligence in placing them where they could be seen. "There appears to have been no hacking, no stealing, and no violation of any Senate rule," Miranda said. "Stealing assumes a property right and there is no property right to a government document. . . . These documents are not covered under the Senate disclosure rule because they are not official business and, to the extent they were disclosed, they were disclosed inadvertently by negligent [Democratic] staff." Whether the memos are ultimately deemed to be official business will be a central issue in any criminal case that could result. Unauthorized access of such material could be punishable by up to a year in prison -- or, at the least, sanction under a Senate non- disclosure rule. The computer glitch dates to 2001, when Democrats took control of the Senate after the defection from the GOP of Senator Jim Jeffords, Independent of Vermont. A technician hired by the new judiciary chairman, Patrick Leahy, Democrat of Vermont, apparently made a mistake that allowed anyone to access newly created accounts on a Judiciary Committee server shared by both parties -- even though the accounts were supposed to restrict access only to those with the right password. 8188 From: Date: Mon Jan 26, 2004 4:02am Subject: Big Brother' brings peace of mind 'Big Brother' brings peace of mind By Malcolm Brown January 27, 2004 The death of student Mike Lee, whose body was found in a wheelie bin in Surry Hills on January 5, might have gone down as another of Sydney's unsolved murders, or at best, the unlawful disposal of a body. But it was not so, according to a security camera in Reservoir Street, Surry Hills. Lee had climbed into the wheelie bin on New Year's Eve. And Lyndsay van Blanken, found dead under units in the eastern suburbs on January 10, was filmed by a security camera at Bondi Junction railway station at 5.58pm the day she disappeared, November 24 last year. The low price, convenient storage and high definition of digital images has accelerated the boom in closed-circuit television (CCTV) in shops, offices, business districts, transport, car parks, streets and homes. While it has raised the spectre of Big Brother, particularly in the workplace, crimes have been solved. Terry Murphy, executive director of the Australian Security Industry Association, said: "As long as somebody is watching and making sure it cannot be used as a Big Brother, this industry does not have a problem." The association's commercial services manager, Bryan De Caires, said volume alone testified to the acceptance of the system. "Thousands and thousands" of cameras were being installed each year. The electronic security sector in Australia was worth just under $2 billion a year, including up to $200 million a year from CCTV. Steve Wheeler, the general manager, technology, for Chubb Security, said that its CCTV business in Australia was growing about 30 per cent a year. And Jeffrey Tonazzi, NSW regional manager for Vangren Technology, said that CCTV makes up to 50 per cent of its business in some markets. Mr Wheeler said the uncertain state of the world boosted the market, which might "taper off" if things settled down. Features are growing while prices fall. Glen Watkins, assistant CCTV manager for Ness Security Products, said a camera system that might have cost $20,000 three years ago now costs $7000. The market had been held back by cost and technical barriers, but now it was thriving. "You're looking at $500 for a good quality camera for a lunch shop or something like that," he said. "If you want an external camera you are looking at $1000 or $1200. But you can get a cheap one for $100. People are flocking to get them now." The NSW Electronic Surveillance Act covers the sector in this state. Security camera installers must be licensed, which entails a police check. Cameras must have signs saying they are there. Notices must accompany cameras at work stating their purpose, for example, assisting safety. And they cannot be used to see into private areas. Privacy NSW warned the State Government in a report that while surveillance cameras installed at work might initially be legitimate, they could over time be used for things such as spying. But the security industry warns that cameras do not guarantee security. Criminals can relocate their activities or use disguises. This story was found at: http://www.smh.com.au/articles/2004/01/26/1075087963249.html [Non-text portions of this message have been removed] 8189 From: Date: Mon Jan 26, 2004 1:08pm Subject: Wiretap capability January 26, 2004 09:05 AM US Eastern Timezone Messaging Expert Mirapoint Sharpens Its Email Security Appliance Product Line with RazorGate SUNNYVALE, Calif.--(BUSINESS WIRE)--Jan. 26, 2004-- Cutting-Edge RazorGate 100 & RazorGate 300 Appliances Provide Industrial-Strength Security Protection at the Network Edge to Stop Spam, Viruses, Hacker Attacks & More Building on its reputation as a customer-proven provider of airtight email security solutions, Mirapoint today announced the RazorGate(TM) appliances -- a new suite of email security solutions optimized to stop spam, viruses, hacker attacks, and other security threats that jeopardize today's mission-critical message networks. Deployed at the edge of a customer's network, the purpose-built RazorGate 100 and RazorGate 300 appliances are ideal email security solutions for small- to medium-sized businesses or for highly distributed organizations, and are designed to work with any existing email server. Oriented for sale through Mirapoint's reseller partners, the RazorGate solutions are faster to deploy, provide more complete protection, and offer lower total cost of ownership (TCO) when compared with competitive security products; including non-integrated "piece-meal" alternatives sourced from multiple vendors or inflexible filtering services provided by a hosting provider with limited customization and poor return on investment (ROI). Mirapoint's RazorGate appliances offer the industry's best and most complete email security protection available in convenient, easy-to-deploy form factors. Both RazorGate appliances employ Mirapoint's industry-recognized Full-Spectrum(TM) technology, which boasts the industry's "best accuracy for spam catch-rates with zero false positives" based on independent analysis by a leading trade magazine. Powerful, industry-leading anti-virus technology is also available pre-integrated with all RazorGate appliances, as well as additional security capabilities for advanced content filtering, policy enforcement, intrusion detection, and SMTP connection management. To meet the strong market demand for email security solutions, Mirapoint has partnered with over 50 worldwide resellers, including Paragon Systems, Secure Content Solutions, Newman Group, Intrinsic Networks, EZ Web Communications, Care Factor, KERNEL Networks, Drachenfels GmbH, and Inuit. Mirapoint will work with these and other channel partners to promote the RazorGate product family. "Spam, viruses, and other email-based attacks will all help to propel the email security market to strong growth over the next five years," said Robert Mahowald, research manager at IDC. "Mirapoint's new RazorGate solution joins the company's Message Server and Message Director products to form a comprehensive lineup of email security solutions for enterprise and service provider customers. Mirapoint's expertise in security for routing, storing, accessing, and managing email gives it insight into the security needs of customers of all sizes." The new RazorGate products complement Mirapoint's existing family of email security solutions. With high-end products like the Mirapoint Message Director, to the new cost-optimized RazorGate family, Mirapoint has the right solution to address the full range of needs for enterprise, service provider, education, or government customers. RazorGate 100 -- Fully Integrated Protection Against Spam, Virus, and Hacker Attacks The RazorGate 100 is a compact, 1U appliance designed for rapid deployment alongside any existing email server to provide protection against spam, viruses, and hacker attacks. Targeted at organizations with less than 1,500 users, the RazorGate 100 provides a more cost-effective, easy-to-manage solution than competitive software-only or service-based offerings. The RazorGate 100 includes the following key features: -- Mirapoint's Full-Spectrum email security technology -- Combines powerful spam analysis, identification, filtering, and management features, delivering industry's best catch-rates with zero false positives. -- DirectPath(TM) real-time scanning technology -- Provides in-line scanning of message traffic without the complexity of managing and backing-up the message queue. With DirectPath, no messages are ever stored in queues; and in the unlikely event of a system failure, there is no chance that mission-critical email messages get lost or deleted. -- Advanced content filtering -- Enables the filtering of messages based on keywords in message body, header, or attachments, including HTML, Word, Excel, or PowerPoint files. Administrators can also configure policies for managing incoming and outgoing email traffic to protect against harassment or other types of email abuse. "Small and mid-sized businesses are actively searching for highly effective yet affordable protection at the gateway against spam, viruses, and hacker attacks," said Vartan Ouzanian, president of Secure Content Solutions. "Mirapoint's new RazorGate appliances offer a customer-proven solution that addresses customers' end-to-end security needs. SCS is excited to offer the new RazorGate appliances to its customers and help boost the security and reliability of their message networks." RazorGate 300 -- Network-Hardened Multi-Layer Email Security for Larger Enterprises Designed for larger organizations of up to 5,000 users, the RazorGate 300 provides all of the features of the RazorGate 100, plus additional higher-end capabilities. The RazorGate 300 includes the following key features: -- Integrated LDAP routing and queue management capabilities -- Enables complex routing of email within an organization's message network or between multiple email servers. Integrated queue management tools provide granular control over incoming and outgoing message traffic, as well as quarantine queue capabilities for examining messages in transit. -- Wiretap capability -- Addresses emerging corporate liability, regulatory, or vertical industry requirements. Wiretap allows administrators to selectively and transparently monitor individual email. For example, if a message gets bounced, the end-user will not be notified in any way and the wiretap will not be compromised. -- Secure email access -- Provides a secure access proxy for existing web-based email applications, such as Microsoft Outlook Web Access, Lotus iNotes, or Mirapoint Webmail. -- Carrier-grade reliability -- Ensures 99.999% availability with redundant hardware components and battery backed-up redundant array of inexpensive disks (RAID) controllers. "Our government and business customers desire solutions that increase the reliability and security of their message networks, while driving down administrative overhead and TCO," said Gary Newgaard, president of Paragon Systems. "With Mirapoint's solutions, including the new RazorGate email security appliances, Paragon has a complete product offering to address any size organization -- from a few hundred users to tens of thousands -- to secure incoming and outgoing email against hackers, spam, and virus threats, or deliver more reliable, manageable email services." "With the addition of RazorGate, Mirapoint can offer protection against security threats to business of all sizes and requirements," said Johannes von Drachenfels, director of Drachenfels GmbH. "The RazorGate appliance is an ideal product for the channel because it is price optimized, can be deployed within minutes, and because its an appliance that companies don't have to worry about in dealing with multiple versions of software and integration." Go-to-Market Kit Empowers Channel Partners To simplify the sales and marketing of its new RazorGate appliances, Mirapoint will provide channel partners with a complete go-to-market kit. The kit includes data sheets, brochures, sales tools, customizable direct marketing and advertising materials, and comprehensive competitive information. Mirapoint will also provide funding of joint marketing efforts for the RazorGate appliances for qualified partners and programs. Pricing & Availability The RazorGate appliances are aggressively priced with a RazorGate 100 configuration for 300 users priced at $12,500 suggested U.S. list price. The RazorGate 100 is immediately available and the RazorGate 300 will be available in the first quarter of 2004. For more information or to purchase RazorGate appliances, please contact an authorized RazorGate reseller or Mirapoint directly at 1-800-937-8118 or info@m.... About Mirapoint Mirapoint(R) is a leader in solutions for message networks used by service provider, enterprise, education and government institutions. Customers use Mirapoint solutions to build message networks that intelligently and securely route, store, access and manage Internet messages, including email. Mirapoint is headquartered in Sunnyvale, Calif., with offices throughout North America, Europe For more information on Mirapoint, visit its Web site at www.mirapoint.com. Contacts Mirapoint, Inc. Jeff Brainard, 408-720-3861 jbrainard@m... or Engage PR Kristin Kiltz, 510-748-8200 ext. 204 kristin@e... [Non-text portions of this message have been removed] 8190 From: Date: Tue Jan 27, 2004 3:15am Subject: Citing Free Speech, Judge Voids Part of Antiterror Act January 27, 2004 New York Times Citing Free Speech, Judge Voids Part of Antiterror Act By ERIC LICHTBLAU ASHINGTON, Jan. 26 -- For the first time, a federal judge has struck down part of the sweeping antiterrorism law known as the USA Patriot Act, joining other courts that have challenged integral parts of the Bush administration's campaign against terrorism. In Los Angeles, the judge, Audrey B. Collins of Federal District Court, said in a decision made public on Monday that a provision in the law banning certain types of support for terrorist groups was so vague that it risked running afoul of the First Amendment. Civil liberties advocates hailed the decision as an important victory in efforts to rein in what they regard as legal abuses in the government's antiterrorism initiatives. The Justice Department defended the law as a crucial tool in the fight against terrorists and promised to review the Los Angeles ruling. At issue was a provision in the act, passed by Congress after the attacks of Sept. 11, 2001, that expanded previous antiterrorism law to prohibit anyone from providing "expert advice or assistance" to known terrorist groups. The measure was part of a broader set of prohibitions that the administration has relied heavily on in prosecuting people in Lackawanna, N.Y., Portland, Ore., Detroit and elsewhere accused of providing money, training, Internet services and other "material support" to terrorist groups. In Los Angeles, several humanitarian groups that work with Kurdish refugees in Turkey and Tamil residents of Sri Lanka had sued the government, arguing in a lawsuit that the antiterrorism act was so ill defined that they had stopped writing political material and helping organize peace conferences for fear that they would be prosecuted. Judge Collins agreed that the ban on providing advice and assistance to terrorists was "impermissibly vague" and blocked the Justice Department from enforcing it against the plaintiffs. "The USA Patriot Act places no limitation on the type of expert advice and assistance which is prohibited, and instead bans the provision of all expert advice and assistance regardless of its nature," Judge Collins wrote in a ruling issued late Friday. As a result, the law could be construed to include "unequivocally pure speech and advocacy protected by the First Amendment," wrote the judge, who was appointed to the bench by President Bill Clinton. At the same time, however, Judge Collins sided with the government in rejecting some of the plaintiffs' arguments, and she declined to grant a nationwide injunction against the Justice Department. Even so, lawyers for the humanitarian groups said they were heartened by the ruling. It came seven weeks after many of the same plaintiffs won a ruling in a separate but related case before a federal appeals court in San Francisco. That court, the United States Court of Appeals for the Ninth Circuit, found that a 1996 antiterrorism law prohibiting anyone from providing training or personnel for terrorist groups was too vague to pass constitutional muster. In recent months, other courts have also challenged the administration's designation of enemy combatants and other aspects of the campaign against terrorism, but the Los Angeles decision was the first by a federal judge to strike down any portion of the Patriot Act. "The critical thing here is that this is the first demonstration that courts will not allow Congress in the name of fighting terrorism to ignore our constitutional rights," said Nancy Chang, a senior lawyer with the Center for Constitutional Rights, the New York-based organization that brought the lawsuit against the Justice Department on behalf of the humanitarian groups. "By using a broad and vague definition of terrorism, that has a chilling effect on free speech." The Justice Department, which already sought a review of the related decision in San Francisco, also plans to review Judge Collins's ruling to decide whether it should be appealed, officials said. Administration officials have made clear that they consider the Patriot Act to be an integral part of their efforts to identify, track and disrupt terrorist activities. Indeed, President Bush < http://www.nytimes.com/top/news/washington/campaign2004/candidates/georgewbush/index.html> in his State of the Union message last week urged Congress to renew parts of the act that are scheduled to expire in 2005. But the administration may face a tough sell in Congress, with a growing number of lawmakers from both parties questioning whether the government's expanded powers in dozens of areas of law enforcement have infringed on civil liberties. In largely symbolic votes, more than 230 communities nationwide have raised formal objections to the law. Mark Corallo, a spokesman for the Justice Department, said in a statement on Monday that the language banning expert advice or assistance to terrorists represented only "a modest enhancement" of previous law. "By targeting those who provide material support by providing expert advice or assistance," Mr. Corallo said, "the law made clear that Americans are threatened as much by the person who teaches a terrorist to build a bomb as by the one who pushes the button." [Non-text portions of this message have been removed] 8191 From: Andy Cuff Date: Tue Jan 27, 2004 5:26am Subject: Re: Big Brother' brings peace of mind Hi Folks, Here in the UK you can hardly step outside your house without appearing on CCTV somewhere, have any surveys been conducted on a nation by nation basis comparing number of CCTV systems vs. populous? -andy Talisker Security Tools Directory http://www.securitywizardry.com ----- Original Message ----- From: To: Sent: Monday, January 26, 2004 3:02 PM Subject: [TSCM-L] Big Brother' brings peace of mind > 'Big Brother' brings peace of mind > By Malcolm Brown > January 27, 2004 > > The death of student Mike Lee, whose body was found in a wheelie bin in Surry > Hills on January 5, might have gone down as another of Sydney's unsolved > murders, or at best, the unlawful disposal of a body. > > But it was not so, according to a security camera in Reservoir Street, Surry > Hills. Lee had climbed into the wheelie bin on New Year's Eve. > > And Lyndsay van Blanken, found dead under units in the eastern suburbs on > January 10, was filmed by a security camera at Bondi Junction railway station at > 5.58pm the day she disappeared, November 24 last year. > > The low price, convenient storage and high definition of digital images has > accelerated the boom in closed-circuit television (CCTV) in shops, offices, > business districts, transport, car parks, streets and homes. > > While it has raised the spectre of Big Brother, particularly in the > workplace, crimes have been solved. Terry Murphy, executive director of the Australian > Security Industry Association, said: "As long as somebody is watching and > making sure it cannot be used as a Big Brother, this industry does not have a > problem." > > The association's commercial services manager, Bryan De Caires, said volume > alone testified to the acceptance of the system. "Thousands and thousands" of > cameras were being installed each year. > > The electronic security sector in Australia was worth just under $2 billion a > year, including up to $200 million a year from CCTV. > > Steve Wheeler, the general manager, technology, for Chubb Security, said that > its CCTV business in Australia was growing about 30 per cent a year. > > And Jeffrey Tonazzi, NSW regional manager for Vangren Technology, said that > CCTV makes up to 50 per cent of its business in some markets. > > Mr Wheeler said the uncertain state of the world boosted the market, which > might "taper off" if things settled down. > > Features are growing while prices fall. Glen Watkins, assistant CCTV manager > for Ness Security Products, said a camera system that might have cost $20,000 > three years ago now costs $7000. The market had been held back by cost and > technical barriers, but now it was thriving. > > "You're looking at $500 for a good quality camera for a lunch shop or > something like that," he said. > > "If you want an external camera you are looking at $1000 or $1200. But you > can get a cheap one for $100. People are flocking to get them now." > > The NSW Electronic Surveillance Act covers the sector in this state. Security > camera installers must be licensed, which entails a police check. Cameras > must have signs saying they are there. Notices must accompany cameras at work > stating their purpose, for example, assisting safety. And they cannot be used to > see into private areas. > > Privacy NSW warned the State Government in a report that while surveillance > cameras installed at work might initially be legitimate, they could over time > be used for things such as spying. But the security industry warns that cameras > do not guarantee security. Criminals can relocate their activities or use > disguises. > > This story was found at: > http://www.smh.com.au/articles/2004/01/26/1075087963249.html > > > > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to: > http://docs.yahoo.com/info/terms/ > > 8192 From: Fernando Martins Date: Wed Jan 28, 2004 1:30pm Subject: Re: Big Brother' brings peace of mind hi Andy The closest to the issue that I know of is this: http://www.privacyinternational.org/survey/phr2003/threats.htm#Video%20Surveillance But I think UK wins easy any survey ;> Regarding Big Brother issues, the news here is that, after cctv and access control databases, RF ID is now under the personal data protection law. FM ----- Original Message ----- From: "Andy Cuff" To: ; Sent: Tuesday, January 27, 2004 11:26 AM Subject: Re: [TSCM-L] Big Brother' brings peace of mind > Hi Folks, > Here in the UK you can hardly step outside your house without appearing on > CCTV somewhere, have any surveys been conducted on a nation by nation basis > comparing number of CCTV systems vs. populous? > > -andy > Talisker Security Tools Directory > http://www.securitywizardry.com 8193 From: Steve Uhrig Date: Wed Jan 28, 2004 8:14pm Subject: Riser Bond TDR recall Riser Bond, now known as Radiodetection Company, has issued a safety recall for their 6000 series TDRs. Most professional TSCMers use some form of TDR for checking phone lines, with the Riser Bond being by far the most popular. The specific models mentioned in the recall are 6000, 6000DSL, RD6000 (Standard, VF, DD) and 6000DT. There is a shock hazard, where under certain combinations of connection and operating conditions, the metallic parts of the connectors and case housing can become energized with potentially hazardous voltages. All units in this series are being taken out of service. Ultimately. the company will develop a mod for the unit to address the issues. That mod has not yet been released, so for now they're just recalling all units. Apparently they're taking this seriously, judging from the string of certified letters I've been receiving from them, seemingly one for every unit I've purchased. If you have one of the above, contact Mr. Chuck Morton of Radiodetection at 207-647-9495 x112 for instructions. Info on Riser Bond products can be found on their website www.riserbond.com. If anyone needs a TSCM industry standard 'yellow box' Riser Bond TDR (not the style being recalled), I have a number of used ones in stock for excellent prices, complete with documentation, accessories, fresh battery and recent calibration. Info here: http://www.swssec.com/part_one.html Other TSCM gear listed also. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: Cristian Date: Tue Jan 18, 2005 0:58pm Subject: second hand Any Oscor and Orion in second hand there? A friend of mine, with tight budget, wants them. Sorry for re-posting, I'm not sure about my bip@f... Please send a cc to cristianbip@y... Cristian 10648 From: A Grudko Date: Tue Jan 18, 2005 1:11pm Subject: RE: MI5 boss admits bugging Adams -----Original Message----- From: Tech Sec Lab [mailto:tscmteam@o...] > So, maybe, they would explain to me why the Gov would admit to doing something that they didn't actually do....? Diversion? --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10649 From: James Greenwold Date: Tue Jan 18, 2005 5:43pm Subject: Re: Tetrascanner Advice I have a fine wire kit in the display case. Last used about 1962 in eastern Europe. No insulation but it becomes invisable. -- James Greenwold Bureau Of Techncial Services P.O. Box 191 Chippewa Falls, WI 54729 http://www.tacticalsurveillance.com jlg@t... voice 715-726-1400 Fax 715-726-2354 > From: DEMTEC@a... > Reply-To: TSCM-L@yahoogroups.com > Date: Tue, 18 Jan 2005 10:52:25 EST > To: tscm-l@yahoogroups.com > Subject: [TSCM-L] Tetrascanner Advice > > > Many Thanks again for your reply and some excellent ideas. > Simple micro shielded wire does seem difficult to obtain. The best I can do > here in the UK is 1.5mm o/d single screen grey fairly low quality from CPC > [order number CBBR 4177]. > Further to some recent discussions re RFID detection the ELEKTOR ELECTRONICS > MAGAZINE Feb 2005 has printed an excellent article named RFID frenzy and a > project RFID Detector for 13.56 Mhz.I have not had time to assimilate all the > details but seems well worth a look. > The mag has a website _www.elektor-electronics.co.uk_ > (http://www.elektor-electronics.co.uk) > Regards to all Dave > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10650 From: savanted1 Date: Tue Jan 18, 2005 9:56am Subject: Privacy Activists Brace for White House Push to Augment Privacy Activists Brace for White House Push to Augment Controversial Domestic Surveillance Powers According to former Republican congressman Bob Barr, now working as a speaker and consultant to organizations such as the American Civil Liberties Union, "The administration has made it clear that they do intend to continue their move to dramatically reduce privacy and constitutional protection for our citizens." He and other civil liberties advocates expect Patriot Act II provisions to resurface piecemeal, such as in the Anti-Terrorism Intelligence Tools Improvement Act of 2003 (HR3179). Bills trying to remedy some of the more invasive provisions of the Patriot Act, such as the Security and Freedom Ensured (SAFE) Act of 2003, are still stuck in the Senate and House respectively. A driver's license provision of the National Intelligence Reform and Terrorism Act, passed before the holiday recess, requires all drivers' licenses to include machine-readable, encoded data by the end of 2006, and gives the secretaries of Transportation and Homeland Security until mid-2006 to define the data. http://www.wired.com/news/print/0,1294,66242,00.html 10651 From: savanted1 Date: Tue Jan 18, 2005 9:57am Subject: Judge Rules Police Can Use GPS to Track Suspect Without Warrant A New York federal court judge, David Hurd, ruled that law enforcement agents who used a Global Positioning System (GPS) to bug a suspect's car without a court order, did not need a court warrant, noting the suspect "had no expectation of privacy in the whereabouts of his vehicle on a public roadway." There is a growing concern by privacy advocates, who are seeing more and more court rulings upholding the law enforcement practice of using GPS to secretly track vehicles without following judicial safeguards protecting privacy rights of an individual. Another concern is the court rulings legitimizing these law enforcement practices will influence the Supreme Court when it is called on to consider the legality of secret GPS tracking. http://news.com.com/Snooping+by+satellite/2100-1028_3-5533560.html 10652 From: G P Date: Wed Jan 19, 2005 0:12am Subject: Re: Privacy Activists Brace for White House Push to Augment This needs to be stopped immediately, they have more than enough power to do whatever they want with the original Patriot Act abomination that flushed the Constitution down the toilet. Bush et al are using their newfound powers to disrupt and destroy the credibility of U.S. citizens that would dare speak out against their corrupt regime and practice the hallowed right of public dissent. Pro se lawsuits directed against Administration officials is likely the only recourse at this point, it's apparent that the vast majority of Congress is being blackmailed at this point. --- savanted1 wrote: > > > > Privacy Activists Brace for White House Push to > Augment > Controversial Domestic Surveillance Powers > > > According to former Republican congressman Bob Barr, > now working as a > speaker and consultant to organizations such as the > American Civil > Liberties Union, "The administration has made it > clear that they do > intend to continue their move to dramatically reduce > privacy and > constitutional protection for our citizens." He and > other civil > liberties advocates expect Patriot Act II provisions > to resurface > piecemeal, such as in the Anti-Terrorism > Intelligence Tools > Improvement Act of 2003 (HR3179). Bills trying to > remedy some of the > more invasive provisions of the Patriot Act, such as > the Security and > Freedom Ensured (SAFE) Act of 2003, are still stuck > in the Senate and > House respectively. A driver's license provision of > the National > Intelligence Reform and Terrorism Act, passed before > the holiday > recess, requires all drivers' licenses to include > machine-readable, > encoded data by the end of 2006, and gives the > secretaries of > Transportation and Homeland Security until mid-2006 > to define the > data. > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > In low income neighborhoods, 84% do not own > computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10653 From: G P Date: Wed Jan 19, 2005 0:44am Subject: OT: EST/Landmark and NLP in the Bush Administration The Bush Administration is surrounded by EST/Landmark folks, using NLP and other cognitive sciences to manipulate popular opinion and the entire cabinet. The word "reality" and the phrase "creating new realities" is the earmark of Neuro-Linguistic Programming, and for some bizarre reason corporate NLP training is now being offered (at least in Europe and the Far East) in tandem with computer security training. Some links to EST and NLP at the end of this email, it's bad stuff and can easily "reprogram" individuals not educated in detecting the use of NLP in communications. Landmark Education Corporation is the main group that is pushing NLP and Eriksonian-based hypnotics into the mainstream. For example: "Steve Zaffron, Vice President of Development in the Landmark Education Corporation, defines a distinction as an idea which, 'opens a new way of relating to reality because reality is experienced differently for the person realising the distinction.' (Wruck and Eastley, 1997, p 8)." From an article by Ron Suskind in the New York Times: "In the summer of 2002, after I had written an article in Esquire that the White House didn't like about Bush's former communications director, Karen Hughes, I had a meeting with a senior adviser to Bush. He expressed the White House's displeasure, and then he told me something that at the time I didn't fully comprehend -- but which I now believe gets to the very heart of the Bush presidency. The aide said that guys like me were 'in what we call the reality-based community,' which he defined as people who 'believe that solutions emerge from your judicious study of discernible reality.' I nodded and murmured something about enlightenment principles and empiricism. He cut me off. 'That's not the way the world really works anymore,' he continued. 'We're an empire now, and when we act, we create our own reality. And while you're studying that reality -- judiciously, as you will -- we'll act again, creating other new realities, which you can study too, and that's how things will sort out. We're history's actors . . . and you, all of you, will be left to just study what we do.'" Some info on EST, NLP, and Bandler: http://skepdic.com/neurolin.html More about Bandler and the murder he was acquitted of: http://www.geocities.com/bandlertrial/bandler1.html Info on Landmark: http://www.transformations.net.nz/trancescript/purpose.html 10654 From: Tech Sec Lab Date: Wed Jan 19, 2005 6:34am Subject: RE: Mic Wire Dave In terms of wire quality you get what you pay for, therefore you should be looking at an ultra thin stranded copper cable if anything. If you are looking for ultra covert and the run is not too long you can get a single strand copper wire, bare, and then spray it with a non conductive paint, this means you get a medium that is no larger than a single strand of wire. But for long runs this is not practical. If you have to use long runs and need serious concealment I suggest you use a fibre optic mic. Regards -Ois ********************* Message: 1 Date: Tue, 18 Jan 2005 10:52:25 EST From: DEMTEC@A... Subject: Tetrascanner Advice Many Thanks again for your reply and some excellent ideas. Simple micro shielded wire does seem difficult to obtain. The best I can do here in the UK is 1.5mm o/d single screen grey fairly low quality from CPC [order number CBBR 4177]. Further to some recent discussions re RFID detection the ELEKTOR ELECTRONICS MAGAZINE Feb 2005 has printed an excellent article named RFID frenzy and a project RFID Detector for 13.56 Mhz.I have not had time to assimilate all the details but seems well worth a look. The mag has a website _www.elektor-electronics.co.uk_ (http://www.elektor-electronics.co.uk) Regards to all Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) 10655 From: Date: Wed Jan 19, 2005 5:46am Subject: Re: Mic Wire In a message dated 19/01/2005 12:37:12 GMT Standard Time, tscmteam@o... writes: Dave In terms of wire quality you get what you pay for, therefore you should be looking at an ultra thin stranded copper cable if anything. If you are looking for ultra covert and the run is not too long you can get a single strand copper wire, bare, and then spray it with a non conductive paint, this means you get a medium that is no larger than a single strand of wire. But for long runs this is not practical. If you have to use long runs and need serious concealment I suggest you use a fibre optic mic. Regards -Ois ********************* Message: 1 Date: Tue, 18 Jan 2005 10:52:25 EST From: DEMTEC@A... Subject: Tetrascanner Advice Many Thanks again for your reply and some excellent ideas. Simple micro shielded wire does seem difficult to obtain. The best I can do here in the UK is 1.5mm o/d single screen grey fairly low quality from CPC [order number CBBR 4177]. Further to some recent discussions re RFID detection the ELEKTOR ELECTRONICS MAGAZINE Feb 2005 has printed an excellent article named RFID frenzy and a project RFID Detector for 13.56 Mhz.I have not had time to assimilate all the details but seems well worth a look. The mag has a website _www.elektor-electronics.co.uk_ (http://www.elektor-electronics.co.uk) Regards to all Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) ------------------------ Yahoo! Groups Sponsor --------------------~--> In low income neighborhoods, 84% do not own computers. At Network for Good, help bridge the Digital Divide! _Click Here!_ (http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Many Thanks for your reply Ois I have considered these various methods except the spray the wire option yes feasable for very short runs but still not screened Best Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) The manufacture and installation of custom designed covert electronic audio and video devices. Sweep Services - Professional physical and Electronic countermeasures utilising state of the art laboratory radio scanning and detection equipment. Note: Any fellow WAPI and UKPIN members welcome to phone or call in to discuss projects and applications or simply for free advice. Workshop located alongside M58 junc 3. [Non-text portions of this message have been removed] 10656 From: kondrak Date: Wed Jan 19, 2005 11:07am Subject: Sidebar: Fill Your Jump Bag This is prob second nature to all of us, but nice to see it on another source... >http://www.computerworld.com/securitytopics/security/story/0,10801,98913,00.html > >By Dan Verton >JANUARY 17, 2005 >COMPUTERWORLD > >A "jump bag" is a collection of critical items you might need during >crisis response when an attacker invades your network. It should >contain these items: > >* Tape recorder or minidisk > >* Backup media > >* Binary backup software > >* CDs with statically linked binaries of critical OS executables > >* Forensic software > >* Windows NT and 2000 resource kits > >* Bootable CD-ROMs > >* USB token memory device > >* External hard drive > >* Small hub > >* Patch cables > >* Laptop with dual operating system capability > >* Call list and cell phone > >* Plastic baggies for handling evidence > >* Extra notebooks for taking notes > > > >_________________________________________ >Open Source Vulnerability Database (OSVDB) Everything is Vulnerable - >http://www.osvdb.org/ 10657 From: kondrak Date: Wed Jan 19, 2005 11:30am Subject: Re: Privacy Activists Brace for White House Push to Augment But the police-state marches on....if theres any impediment to it, they'll undoubtedly nuke some city to use more terror to make people give up their liberty. At 01:12 1/19/2005, you wrote: >This needs to be stopped immediately, they have more >than enough power to do whatever they want with the >original Patriot Act abomination that flushed the >Constitution down the toilet. > >Bush et al are using their newfound powers to disrupt >and destroy the credibility of U.S. citizens that >would dare speak out against their corrupt regime and >practice the hallowed right of public dissent. > >Pro se lawsuits directed against Administration >officials is likely the only recourse at this point, >it's apparent that the vast majority of Congress is >being blackmailed at this point. > >--- savanted1 wrote: > > > > > > > > > Privacy Activists Brace for White House Push to > > Augment > > Controversial Domestic Surveillance Powers > > > > > > According to former Republican congressman Bob Barr, > > now working as a > > speaker and consultant to organizations such as the > > American Civil > > Liberties Union, "The administration has made it > > clear that they do > > intend to continue their move to dramatically reduce > > privacy and > > constitutional protection for our citizens." He and > > other civil > > liberties advocates expect Patriot Act II provisions > > to resurface > > piecemeal, such as in the Anti-Terrorism > > Intelligence Tools > > Improvement Act of 2003 (HR3179). Bills trying to > > remedy some of the > > more invasive provisions of the Patriot Act, such as > > the Security and > > Freedom Ensured (SAFE) Act of 2003, are still stuck > > in the Senate and > > House respectively. A driver's license provision of > > the National > > Intelligence Reform and Terrorism Act, passed before > > the holiday > > recess, requires all drivers' licenses to include > > machine-readable, > > encoded data by the end of 2006, and gives the > > secretaries of > > Transportation and Homeland Security until mid-2006 > > to define the > > data. > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10658 From: Agent Geiger Date: Wed Jan 19, 2005 0:20pm Subject: Re: Privacy Activists Brace for White House Push to Augment Pro Se lawsuits will only get you laughed out of courts and labeled a kook. If they actually got you somewhere, you'd be killed. --- kondrak wrote: > But the police-state marches on....if theres any > impediment to it, they'll > undoubtedly nuke some city to use more terror to > make people give up their > liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 10659 From: G P Date: Wed Jan 19, 2005 2:50pm Subject: Re: Privacy Activists Brace for White House Push to Augment > Pro Se lawsuits will only get you laughed out of > courts and labeled a kook. Interesting opinion, as pro se litigants are held to a much lesser standard of legal review. Going pro se with a defense (or offense) is a significant advantage over professional counsel. >If they actually got you somewhere, you'd be killed. Very interesting. So by retaining professional legal counsel, one is immune to assassination...? Per that logic, we're going about this war in Iraq thing all wrong - we should be sending squadrons of laywers over there to defend our interests ;) The law is the law, period. 2752 people died in the September 11th attacks, but millions have been killed protecting that very same Constitution that has been trampled upon with the Patriot Act and upcoming Patriot Act II legislation. Our elected officials swore to uphold and defend the Constitution, not to rewrite history and laws to suit the military-industrial complex. Regards Greg > > --- kondrak wrote: > > > But the police-state marches on....if theres any > > impediment to it, they'll > > undoubtedly nuke some city to use more terror to > > make people give up their > > liberty. > > > > > > At 01:12 1/19/2005, you wrote: > > > > >This needs to be stopped immediately, they have > > more > > >than enough power to do whatever they want with > the > > >original Patriot Act abomination that flushed the > > >Constitution down the toilet. > > > > > >Bush et al are using their newfound powers to > > disrupt > > >and destroy the credibility of U.S. citizens that > > >would dare speak out against their corrupt regime > > and > > >practice the hallowed right of public dissent. > > > > > >Pro se lawsuits directed against Administration > > >officials is likely the only recourse at this > > point, > > >it's apparent that the vast majority of Congress > is > > >being blackmailed at this point. > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > to > > > > Augment > > > > Controversial Domestic Surveillance > Powers > > > > > > > > > > > > According to former Republican congressman Bob > > Barr, > > > > now working as a > > > > speaker and consultant to organizations such > as > > the > > > > American Civil > > > > Liberties Union, "The administration has made > it > > > > clear that they do > > > > intend to continue their move to dramatically > > reduce > > > > privacy and > > > > constitutional protection for our citizens." > He > > and > > > > other civil > > > > liberties advocates expect Patriot Act II > > provisions > > > > to resurface > > > > piecemeal, such as in the Anti-Terrorism > > > > Intelligence Tools > > > > Improvement Act of 2003 (HR3179). Bills > trying > > to > > > > remedy some of the > > > > more invasive provisions of the Patriot Act, > > such as > > > > the Security and > > > > Freedom Ensured (SAFE) Act of 2003, are still > > stuck > > > > in the Senate and > > > > House respectively. A driver's license > > provision of > > > > the National > > > > Intelligence Reform and Terrorism Act, passed > > before > > > > the holiday > > > > recess, requires all drivers' licenses to > > include > > > > machine-readable, > > > > encoded data by the end of 2006, and gives the > > > > secretaries of > > > > Transportation and Homeland Security until > > mid-2006 > > > > to define the > > > > data. > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing > List > > > > "In a multitude of counselors there is > > strength" > > > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in > > motion. > > > > It is by the juice of Star Bucks that > thoughts > > > > acquire speed, > > > > the hands acquire shaking, the shaking is a > > > > warning. > > > > It is by caffeine alone I set my mind in > > motion. > > > > > > > =================================================== > > > > TSKS > > > > Yahoo! Groups Links > > > > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > >=================================================== > > TSKS > > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - now with 250MB free storage. Learn > more. > http://info.mail.yahoo.com/mail_250 > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > === message truncated === 10660 From: Agent Geiger Date: Wed Jan 19, 2005 3:24pm Subject: Re: Privacy Activists Brace for White House Push to Augment You mistook my previous posting. I am not saying I do not agree with people bringing forth suits and defending themselves(I do it in small claims court all the time). My piont is, that if you try and take on the juggernaut in power, via constitional pro-se means, e.g., tax resisting, rescinding your drivers license and SSN, etc. You in the practical sense, will lose. the judges will either rule against you, or dismiss. All the time, you spend a lot of money, and get little true justice. However, the system remains intact. I am not saying it right. It is the fact. The deck is stacked all the way to the Supreme Court. How in the world can you win in "their" system, by playing by the rules they themselves do not play by? --- G P wrote: > > Pro Se lawsuits will only get you laughed out of > > courts and labeled a kook. > > Interesting opinion, as pro se litigants are held to > a > much lesser standard of legal review. Going pro se > with a defense (or offense) is a significant > advantage > over professional counsel. > > >If they actually got you somewhere, you'd be > killed. > > Very interesting. So by retaining professional > legal > counsel, one is immune to assassination...? Per > that > logic, we're going about this war in Iraq thing all > wrong - we should be sending squadrons of laywers > over > there to defend our interests ;) > > The law is the law, period. 2752 people died in the > September 11th attacks, but millions have been > killed > protecting that very same Constitution that has been > trampled upon with the Patriot Act and upcoming > Patriot Act II legislation. > > Our elected officials swore to uphold and defend the > Constitution, not to rewrite history and laws to > suit > the military-industrial complex. > > Regards > > Greg > > > > > --- kondrak wrote: > > > > > But the police-state marches on....if theres any > > > impediment to it, they'll > > > undoubtedly nuke some city to use more terror to > > > make people give up their > > > liberty. > > > > > > > > > At 01:12 1/19/2005, you wrote: > > > > > > >This needs to be stopped immediately, they have > > > more > > > >than enough power to do whatever they want with > > the > > > >original Patriot Act abomination that flushed > the > > > >Constitution down the toilet. > > > > > > > >Bush et al are using their newfound powers to > > > disrupt > > > >and destroy the credibility of U.S. citizens > that > > > >would dare speak out against their corrupt > regime > > > and > > > >practice the hallowed right of public dissent. > > > > > > > >Pro se lawsuits directed against Administration > > > >officials is likely the only recourse at this > > > point, > > > >it's apparent that the vast majority of > Congress > > is > > > >being blackmailed at this point. > > > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > > to > > > > > Augment > > > > > Controversial Domestic Surveillance > > Powers > > > > > > > > > > > > > > > According to former Republican congressman > Bob > > > Barr, > > > > > now working as a > > > > > speaker and consultant to organizations such > > as > > > the > > > > > American Civil > > > > > Liberties Union, "The administration has > made > > it > > > > > clear that they do > > > > > intend to continue their move to > dramatically > > > reduce > > > > > privacy and > > > > > constitutional protection for our citizens." > > > He > > > and > > > > > other civil > > > > > liberties advocates expect Patriot Act II > > > provisions > > > > > to resurface > > > > > piecemeal, such as in the Anti-Terrorism > > > > > Intelligence Tools > > > > > Improvement Act of 2003 (HR3179). Bills > > trying > > > to > > > > > remedy some of the > > > > > more invasive provisions of the Patriot Act, > > > such as > > > > > the Security and > > > > > Freedom Ensured (SAFE) Act of 2003, are > still > > > stuck > > > > > in the Senate and > > > > > House respectively. A driver's license > > > provision of > > > > > the National > > > > > Intelligence Reform and Terrorism Act, > passed > > > before > > > > > the holiday > > > > > recess, requires all drivers' licenses to > > > include > > > > > machine-readable, > > > > > encoded data by the end of 2006, and gives > the > > > > > secretaries of > > > > > Transportation and Homeland Security until > > > mid-2006 > > > > > to define the > > > > > data. > > > > > > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups > Sponsor > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > > > TSCM-L Technical Security Mailing > > List > > > > > "In a multitude of counselors there is > > > strength" > > > > > > > > > > To subscribe to the TSCM-L mailing list > > > visit: > > > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > It is by the juice of Star Bucks that > > thoughts > > > > > acquire speed, > > > > > the hands acquire shaking, the shaking is a > > > > > warning. > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > > > > > > > =================================================== > > > > > TSKS > > > > > Yahoo! Groups Links > > > > > > > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > === message truncated === __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10661 From: G P Date: Wed Jan 19, 2005 5:49pm Subject: Seriously OT: Privacy Activists Brace for White House Push to Augment --- Agent Geiger wrote: > You mistook my previous posting. > > I am not saying I do not agree with people bringing > forth suits and defending themselves(I do it in > small claims court all the time). My piont is, that > if you try and take on the juggernaut in power, via > constitional pro-se means, e.g., tax resisting, > rescinding your drivers license and SSN, etc. You > in the practical sense, will lose. You are confusing self-representation with the so-called "Common Law Court" movement. Pro se representation, or defense "In Pro Per" (latin translation of "for oneself) finds very strong protections from the 6th Amendment to the U.S. Constitution. The "Common Law Court" movement is what you are speaking of, and has no bearing on representing oneself in a civil or criminal proceeding. > the judges will either rule against you, or dismiss. That's what the appellate system is for. Any judge that openly defies the law, then is overturned on appeal loses serious credibility, especially if overturned by a pro se litigant. > All the time, you spend a lot of money, and get > little true justice. However, the system remains > intact. Your cost is your time. Filing a federal lawsuit costs $250 and the cost of serving the Complaint. > I am not saying it right. It is the fact. The deck > is stacked all the way to the Supreme Court. How in > the world can you win in "their" system, by playing > by the rules they themselves do not play by? Less than 2% of any case goes to trial, or is "litigated" in the common sense. Laws are laws are laws. If 50% of the U.S. was truly split over the recent election, then you can guarantee close to 50% of the judges on the bench right now are against the power grab exhibited by this Administration. A sympathetic judge is only an appeal or two away... Cheers Greg > > > --- G P wrote: > > > > Pro Se lawsuits will only get you laughed out of > > > courts and labeled a kook. > > > > Interesting opinion, as pro se litigants are held > to > > a > > much lesser standard of legal review. Going pro > se > > with a defense (or offense) is a significant > > advantage > > over professional counsel. > > > > >If they actually got you somewhere, you'd be > > killed. > > > > Very interesting. So by retaining professional > > legal > > counsel, one is immune to assassination...? Per > > that > > logic, we're going about this war in Iraq thing > all > > wrong - we should be sending squadrons of laywers > > over > > there to defend our interests ;) > > > > The law is the law, period. 2752 people died in > the > > September 11th attacks, but millions have been > > killed > > protecting that very same Constitution that has > been > > trampled upon with the Patriot Act and upcoming > > Patriot Act II legislation. > > > > Our elected officials swore to uphold and defend > the > > Constitution, not to rewrite history and laws to > > suit > > the military-industrial complex. > > > > Regards > > > > Greg > > > > > > > > --- kondrak wrote: > > > > > > > But the police-state marches on....if theres > any > > > > impediment to it, they'll > > > > undoubtedly nuke some city to use more terror > to > > > > make people give up their > > > > liberty. > > > > > > > > > > > > At 01:12 1/19/2005, you wrote: > > > > > > > > >This needs to be stopped immediately, they > have > > > > more > > > > >than enough power to do whatever they want > with > > > the > > > > >original Patriot Act abomination that flushed > > the > > > > >Constitution down the toilet. > > > > > > > > > >Bush et al are using their newfound powers to > > > > disrupt > > > > >and destroy the credibility of U.S. citizens > > that > > > > >would dare speak out against their corrupt > > regime > > > > and > > > > >practice the hallowed right of public > dissent. > > > > > > > > > >Pro se lawsuits directed against > Administration > > > > >officials is likely the only recourse at this > > > > point, > > > > >it's apparent that the vast majority of > > Congress > > > is > > > > >being blackmailed at this point. > > > > > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House > Push > > > to > > > > > > Augment > > > > > > Controversial Domestic Surveillance > > > Powers > > > > > > > > > > > > > > > > > > According to former Republican congressman > > Bob > > > > Barr, > > > > > > now working as a > > > > > > speaker and consultant to organizations > such > > > as > > > > the > > > > > > American Civil > > > > > > Liberties Union, "The administration has > > made > > > it > > > > > > clear that they do > > > > > > intend to continue their move to > > dramatically > > > > reduce > > > > > > privacy and > > > > > > constitutional protection for our > citizens." > > > > > He > > > > and > > > > > > other civil > > > > > > liberties advocates expect Patriot Act II > > > > provisions > > > > > > to resurface > > > > > > piecemeal, such as in the Anti-Terrorism > > > > > > Intelligence Tools > > > > > > Improvement Act of 2003 (HR3179). Bills > > > trying > > > > to > > > > > > remedy some of the > > > > > > more invasive provisions of the Patriot > Act, > > > > such as > > > > > > the Security and > > > > > > Freedom Ensured (SAFE) Act of 2003, are > > still > > > > stuck > > > > > > in the Senate and > > > > > > House respectively. A driver's license > > > > provision of > > > > > > the National > > > > > > Intelligence Reform and Terrorism Act, > > passed > > > > before > > > > > > the holiday > > > > > > recess, requires all drivers' licenses to > > > > include > > > > > > machine-readable, > > > > > > encoded data by the end of 2006, and gives > > the > > > > > > secretaries of > > > > > > Transportation and Homeland Security until > > > > mid-2006 > > > > > > to define the > > > > > > data. > > > > > > > > > > > > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups > > Sponsor > > > > > > > === message truncated === 10662 From: Leanardo Date: Wed Jan 19, 2005 8:30am Subject: Off-topic Question re: Cellular system capacity Can anyone tell me what the "typical" call load of a single cellular base station? What I mean by call load is the total number of concurrent connections the base can handle at one time before a cellular user receives a network busy signal. I realize there are a number of variables, but I am just looking for a ball-park answer. Thanks, Bruce 10663 From: Nalesnik, Matthew Date: Wed Jan 19, 2005 0:15pm Subject: RE: Privacy Activists Brace for White House Push to Augment Does that mean you conspire to believe they crashed planes into the WTC and Pentagon, and PA, just to make provisions to take our liberties away? That's a strong accusation. If true, obviously it's time for revolution, and a new government (not that the current tax situation doesn't call for that anyway... different topic), but certainly NOT a Liberal one, cuz that's just a step towards Socialism, which is a step towards Communism, and if you think that your liberties are being trampled on now... But if it's not true - which I don't think it is - then we need to focus on real enemies... like the UN. -----Original Message----- From: kondrak [mailto:kondrak@s...] >>But the police-state marches on....if theres any impediment to it, they'll >>undoubtedly nuke some city to use more terror to make people give up their >>liberty. At 01:12 1/19/2005, you wrote: >This needs to be stopped immediately, they have more >than enough power to do whatever they want with the >original Patriot Act abomination that flushed the >Constitution down the toilet. > >Bush et al are using their newfound powers to disrupt >and destroy the credibility of U.S. citizens that >would dare speak out against their corrupt regime and >practice the hallowed right of public dissent. > >Pro se lawsuits directed against Administration >officials is likely the only recourse at this point, >it's apparent that the vast majority of Congress is >being blackmailed at this point. > >--- savanted1 wrote: > > > > > > > > > Privacy Activists Brace for White House Push to > > Augment > > Controversial Domestic Surveillance Powers > > > > > > According to former Republican congressman Bob Barr, > > now working as a > > speaker and consultant to organizations such as the > > American Civil > > Liberties Union, "The administration has made it > > clear that they do > > intend to continue their move to dramatically reduce > > privacy and > > constitutional protection for our citizens." He and > > other civil > > liberties advocates expect Patriot Act II provisions > > to resurface > > piecemeal, such as in the Anti-Terrorism > > Intelligence Tools > > Improvement Act of 2003 (HR3179). Bills trying to > > remedy some of the > > more invasive provisions of the Patriot Act, such as > > the Security and > > Freedom Ensured (SAFE) Act of 2003, are still stuck > > in the Senate and > > House respectively. A driver's license provision of > > the National > > Intelligence Reform and Terrorism Act, passed before > > the holiday > > recess, requires all drivers' licenses to include > > machine-readable, > > encoded data by the end of 2006, and gives the > > secretaries of > > Transportation and Homeland Security until mid-2006 > > to define the > > data. > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > the hands acquire shaking, the shaking is a > > warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== > > TSKS > > Yahoo! Groups Links > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10664 From: Bill & Tracy McDonnell Date: Wed Jan 19, 2005 6:33pm Subject: Re: Seriously OT: Privacy Activists Brace for White House Push to Augment It is very imprudent to deprive America of any of her privileges. If her commerce and friendship are of any importance to you, they are to be had on no other terms than leaving her in the full enjoyment of her rights." --Benjamin Franklin I found this and it fits perfectly with the Rights we have being taken away. I wrote an article not long ago about how we are no longer a Democracy. The U.S Reps. and Senators took it personal. They don't represent the constituents, they represent their investors, and the oil and pharmaceutical companies. You would be surprised the letters I received over the article! Bigdaddy www.bigdaddydanes.com ----- Original Message ----- From: G P To: TSCM-L@yahoogroups.com Sent: Wednesday, January 19, 2005 6:49 PM Subject: Seriously OT: [TSCM-L] Privacy Activists Brace for White House Push to Augment --- Agent Geiger wrote: > You mistook my previous posting. > > I am not saying I do not agree with people bringing > forth suits and defending themselves(I do it in > small claims court all the time). My piont is, that > if you try and take on the juggernaut in power, via > constitional pro-se means, e.g., tax resisting, > rescinding your drivers license and SSN, etc. You > in the practical sense, will lose. You are confusing self-representation with the so-called "Common Law Court" movement. Pro se representation, or defense "In Pro Per" (latin translation of "for oneself) finds very strong protections from the 6th Amendment to the U.S. Constitution. The "Common Law Court" movement is what you are speaking of, and has no bearing on representing oneself in a civil or criminal proceeding. > the judges will either rule against you, or dismiss. That's what the appellate system is for. Any judge that openly defies the law, then is overturned on appeal loses serious credibility, especially if overturned by a pro se litigant. > All the time, you spend a lot of money, and get > little true justice. However, the system remains > intact. Your cost is your time. Filing a federal lawsuit costs $250 and the cost of serving the Complaint. > I am not saying it right. It is the fact. The deck > is stacked all the way to the Supreme Court. How in > the world can you win in "their" system, by playing > by the rules they themselves do not play by? Less than 2% of any case goes to trial, or is "litigated" in the common sense. Laws are laws are laws. If 50% of the U.S. was truly split over the recent election, then you can guarantee close to 50% of the judges on the bench right now are against the power grab exhibited by this Administration. A sympathetic judge is only an appeal or two away... Cheers Greg > > > --- G P wrote: > > > > Pro Se lawsuits will only get you laughed out of > > > courts and labeled a kook. > > > > Interesting opinion, as pro se litigants are held > to > > a > > much lesser standard of legal review. Going pro > se > > with a defense (or offense) is a significant > > advantage > > over professional counsel. > > > > >If they actually got you somewhere, you'd be > > killed. > > > > Very interesting. So by retaining professional > > legal > > counsel, one is immune to assassination...? Per > > that > > logic, we're going about this war in Iraq thing > all > > wrong - we should be sending squadrons of laywers > > over > > there to defend our interests ;) > > > > The law is the law, period. 2752 people died in > the > > September 11th attacks, but millions have been > > killed > > protecting that very same Constitution that has > been > > trampled upon with the Patriot Act and upcoming > > Patriot Act II legislation. > > > > Our elected officials swore to uphold and defend > the > > Constitution, not to rewrite history and laws to > > suit > > the military-industrial complex. > > > > Regards > > > > Greg > > > > > > > > --- kondrak wrote: > > > > > > > But the police-state marches on....if theres > any > > > > impediment to it, they'll > > > > undoubtedly nuke some city to use more terror > to > > > > make people give up their > > > > liberty. > > > > > > > > > > > > At 01:12 1/19/2005, you wrote: > > > > > > > > >This needs to be stopped immediately, they > have > > > > more > > > > >than enough power to do whatever they want > with > > > the > > > > >original Patriot Act abomination that flushed > > the > > > > >Constitution down the toilet. > > > > > > > > > >Bush et al are using their newfound powers to > > > > disrupt > > > > >and destroy the credibility of U.S. citizens > > that > > > > >would dare speak out against their corrupt > > regime > > > > and > > > > >practice the hallowed right of public > dissent. > > > > > > > > > >Pro se lawsuits directed against > Administration > > > > >officials is likely the only recourse at this > > > > point, > > > > >it's apparent that the vast majority of > > Congress > > > is > > > > >being blackmailed at this point. > > > > > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House > Push > > > to > > > > > > Augment > > > > > > Controversial Domestic Surveillance > > > Powers > > > > > > > > > > > > > > > > > > According to former Republican congressman > > Bob > > > > Barr, > > > > > > now working as a > > > > > > speaker and consultant to organizations > such > > > as > > > > the > > > > > > American Civil > > > > > > Liberties Union, "The administration has > > made > > > it > > > > > > clear that they do > > > > > > intend to continue their move to > > dramatically > > > > reduce > > > > > > privacy and > > > > > > constitutional protection for our > citizens." > > > > > He > > > > and > > > > > > other civil > > > > > > liberties advocates expect Patriot Act II > > > > provisions > > > > > > to resurface > > > > > > piecemeal, such as in the Anti-Terrorism > > > > > > Intelligence Tools > > > > > > Improvement Act of 2003 (HR3179). Bills > > > trying > > > > to > > > > > > remedy some of the > > > > > > more invasive provisions of the Patriot > Act, > > > > such as > > > > > > the Security and > > > > > > Freedom Ensured (SAFE) Act of 2003, are > > still > > > > stuck > > > > > > in the Senate and > > > > > > House respectively. A driver's license > > > > provision of > > > > > > the National > > > > > > Intelligence Reform and Terrorism Act, > > passed > > > > before > > > > > > the holiday > > > > > > recess, requires all drivers' licenses to > > > > include > > > > > > machine-readable, > > > > > > encoded data by the end of 2006, and gives > > the > > > > > > secretaries of > > > > > > Transportation and Homeland Security until > > > > mid-2006 > > > > > > to define the > > > > > > data. > > > > > > > > > > > > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups > > Sponsor > > > > > > > === message truncated === ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------------ Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10665 From: Agent Geiger Date: Wed Jan 19, 2005 8:05pm Subject: RE: Privacy Activists Brace for White House Push to Augment I never said anything about planes did I? You are making incorrect inferences. --- "Nalesnik, Matthew" wrote: > > Does that mean you conspire to believe they crashed > planes into the WTC and Pentagon, and PA, just to > make provisions to take our liberties away? > That's a strong accusation. If true, obviously it's > time for revolution, and a new government (not that > the current tax situation doesn't call for that > anyway... different topic), but certainly NOT a > Liberal one, cuz that's just a step towards > Socialism, which is a step towards Communism, and if > you think that your liberties are being trampled on > now... > But if it's not true - which I don't think it is - > then we need to focus on real enemies... like the > UN. > > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any > impediment to it, they'll > >>undoubtedly nuke some city to use more terror to > make people give up their > >>liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > > > > > Yahoo! Groups Sponsor > > > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10666 From: G P Date: Wed Jan 19, 2005 9:54pm Subject: RE: Privacy Activists Brace for White House Push to Augment --- "Nalesnik, Matthew" wrote: > Does that mean you conspire to believe they crashed > planes into the WTC and Pentagon, and PA, just to > make provisions to take our liberties away? Doesn't take a rocket scientist to figure out that our interventionist foreign policy is to blame for the attacks. > then we need to focus on real enemies... like the > UN. Yep. This Iraq war is nothing but U.N. puppetry, and U.S. tax dollars have been enforcing U.N. mandates for decades. Bankruptcy is the preferred tactic for hostile takeover, insurmountable debt is the perfect leverage for a coup. Countries can be purposely bankrupted, just like companies routinely are. "...where the rule of law-governs the conduct of nations...in which a credible United Nations can use its peacekeeping role to fulfill the promise and vision of the UN's founders." -- George H. W. Bush, January 16, 1991, speech regarding hostilities with Iraq > > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any > impediment to it, they'll > >>undoubtedly nuke some city to use more terror to > make people give up their > >>liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > > > > > Yahoo! Groups Sponsor > > === message truncated === 10667 From: G P Date: Wed Jan 19, 2005 10:00pm Subject: Re: Seriously OT: Privacy Activists Brace for White House Push to Augment Good for you! Where was the article published? The U.S. Reps and Senators SHOULD take it personally, they are guilty of high treason and have shredded the Constitution that they swore to uphold, respect, and protect. Rep. Ron Paul (R-TX) is one of the few honest members left. --- Bill & Tracy McDonnell wrote: > It is very imprudent to deprive America of any of > her privileges. If her commerce and friendship are > of any importance to you, they are to be had on no > other terms than leaving her in the full enjoyment > of her rights." --Benjamin Franklin > I found this and it fits perfectly with the Rights > we have being taken away. I wrote an article not > long ago about how we are no longer a Democracy. The > U.S Reps. and Senators took it personal. They don't > represent the constituents, they represent their > investors, and the oil and pharmaceutical companies. > You would be surprised the letters I received over > the article! > > Bigdaddy > www.bigdaddydanes.com 10668 From: Agent Geiger Date: Wed Jan 19, 2005 10:24pm Subject: RE: Privacy Activists Brace for White House Push to Augment --- G P wrote: > --- "Nalesnik, Matthew" > wrote: > > > Does that mean you conspire to believe they > crashed > > planes into the WTC and Pentagon, and PA, just to > > make provisions to take our liberties away? > > Doesn't take a rocket scientist to figure out that > our > interventionist foreign policy is to blame for the > attacks. > > > then we need to focus on real enemies... like the > > UN. > > Yep. This Iraq war is nothing but U.N. puppetry, > and > U.S. tax dollars have been enforcing U.N. mandates > for > decades. Bankruptcy is the preferred tactic for > hostile takeover, insurmountable debt is the perfect > leverage for a coup. Countries can be purposely > bankrupted, just like companies routinely are. What about all the U.N. resolutions against Israel? They have been breaking those for years, but the U.S. does not enforce them? > "...where the rule of law-governs the conduct of > nations...in which a credible United Nations can use > its peacekeeping role to fulfill the promise and > vision of the UN's founders." -- George H. W. Bush, > January 16, 1991, speech regarding hostilities with > Iraq > > > > > -----Original Message----- > > From: kondrak [mailto:kondrak@s...] > > > > > > >>But the police-state marches on....if theres any > > impediment to it, they'll > > >>undoubtedly nuke some city to use more terror to > > make people give up their > > >>liberty. > > > > > > At 01:12 1/19/2005, you wrote: > > > > >This needs to be stopped immediately, they have > > more > > >than enough power to do whatever they want with > the > > >original Patriot Act abomination that flushed the > > >Constitution down the toilet. > > > > > >Bush et al are using their newfound powers to > > disrupt > > >and destroy the credibility of U.S. citizens that > > >would dare speak out against their corrupt regime > > and > > >practice the hallowed right of public dissent. > > > > > >Pro se lawsuits directed against Administration > > >officials is likely the only recourse at this > > point, > > >it's apparent that the vast majority of Congress > is > > >being blackmailed at this point. > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > to > > > > Augment > > > > Controversial Domestic Surveillance > Powers > > > > > > > > > > > > According to former Republican congressman Bob > > Barr, > > > > now working as a > > > > speaker and consultant to organizations such > as > > the > > > > American Civil > > > > Liberties Union, "The administration has made > it > > > > clear that they do > > > > intend to continue their move to dramatically > > reduce > > > > privacy and > > > > constitutional protection for our citizens." > He > > and > > > > other civil > > > > liberties advocates expect Patriot Act II > > provisions > > > > to resurface > > > > piecemeal, such as in the Anti-Terrorism > > > > Intelligence Tools > > > > Improvement Act of 2003 (HR3179). Bills > trying > > to > > > > remedy some of the > > > > more invasive provisions of the Patriot Act, > > such as > > > > the Security and > > > > Freedom Ensured (SAFE) Act of 2003, are still > > stuck > > > > in the Senate and > > > > House respectively. A driver's license > > provision of > > > > the National > > > > Intelligence Reform and Terrorism Act, passed > > before > > > > the holiday > > > > recess, requires all drivers' licenses to > > include > > > > machine-readable, > > > > encoded data by the end of 2006, and gives the > > > > secretaries of > > > > Transportation and Homeland Security until > > mid-2006 > > > > to define the > > > > data. > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > > > > > > >======================================================== > > > > TSCM-L Technical Security Mailing > List > > > > "In a multitude of counselors there is > > strength" > > > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in > > motion. > > > > It is by the juice of Star Bucks that > thoughts > > > > acquire speed, > > > > the hands acquire shaking, the shaking is a > > > > warning. > > > > It is by caffeine alone I set my mind in > > motion. > > > > > > > =================================================== > > > > TSKS > > > > Yahoo! Groups Links > > > > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > > strength" > > > > > > To subscribe to the TSCM-L mailing list > > visit: > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > acquire speed, > > > the hands acquire shaking, the shaking is a > > warning. > > > It is by caffeine alone I set my mind in > motion. > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 10669 From: A Grudko Date: Thu Jan 20, 2005 3:24am Subject: RE: Privacy Activists Brace for White House Push to Augment -----Original Message----- From: Nalesnik, Matthew [mailto:matthew.nalesnik@t...] > If true, obviously it's time for revolution, and a new government (not that the current tax situation doesn't call for that anyway... different topic), but certainly NOT a Liberal one, cuz that's just a step towards Socialism, which is a step towards Communism, and if you think that your liberties are being trampled on now. But if it's not true - which I don't think it is - then we need to focus on real enemies... like the UN. Can we stay away from political grandstanding and stick to TSCM issues? There are plenty of other places on the net to rant about conspiracies and the evils of politics. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10670 From: Tech Sec Lab Date: Thu Jan 20, 2005 7:30am Subject: RE: Cellular system capacity Well its more on topic than the rest of the posts at the mo. It depends on the cell system. GSM which uses FDMA/TDMA can usually cope with a thousand ish. This is divided up into various providers, ie maybe 3 or so, o2, Vodafone and Orange. CDMA can cope with more. It also depends on what freq bands the cell runs on. For GSM if it runs on 1800 and 1900 the you push capacity to whichever frequency band is light. In GSM-900 there is 124 channels, each divided into 8 timeslots. Time-slot number 0 is usually used to communicate control information, this gives the possibility to have 868 calls at the same time. Regards -Ois *************************** Message: 9 Date: Wed, 19 Jan 2005 14:30:36 -0000 From: "Leanardo" Subject: Off-topic Question re: Cellular system capacity Can anyone tell me what the "typical" call load of a single cellular base station? What I mean by call load is the total number of concurrent connections the base can handle at one time before a cellular user receives a network busy signal. I realize there are a number of variables, but I am just looking for a ball-park answer. Thanks, Bruce 10671 From: James M. Atkinson Date: Thu Jan 20, 2005 9:48am Subject: McDonald's in Boca to offer glimpse into world of espionage By Luis F. Perez Staff Writer January 14, 2005 Boca Raton ∑ He's an international man of intrigue who's bringing some of the old trade secrets from the espionage world to, well, a McDonald's. It's not just any McDonald's restaurant, however. H. Keith Melton -- an intelligence historian, author of several spy history books and businessman -- today opens the McDonald's Spy CafÈ at the tony Shoppes at Boca Center on Military Trail. The exhibit is a small sampling of the more than 7,000 artifacts Melton has collected from intelligence agencies all over the world. "These are real spy gadgets, not James Bond," Melton said. "James Bond is about assassinations and seduction, which is the antithesis of real espionage. In the real world, espionage is about information and communication." So the sizzle at the restaurant won't be between the sheets, but on the grill, and in the exhibit that includes a World War II-vintage Enigma cipher machine, one of the few remaining in the world, Mata Hari's bra and a Maxwell Smart-like spy shoe. Melton, who lives in the city, a crew of workers and Vladimir Alexeenko, who says he is a former KGB agent, on Thursday put the finishing touches on the exhibit. In 1994, the old spy met the spy historian in Moscow while Melton worked on a television documentary. Alexeenko, who said his father and grandfather before him also were spies, has since collaborated with Melton on several projects as a consultant on KGB history. While working for the Soviet Union, Alexeenko helped protect Soviet embassies and trade missions. He learned how to use different spy devices and became a member of the team that searched for bugs in new buildings, Alexeenko said. "I left the KGB in 1992," Alexeenko said in a heavy Russian accent. After his spy days, he started a security business. So aside from helping with Melton's exhibit, he also installed the restaurant's security cameras. On Thursday, Alexeenko worked at a laptop computer in a corner of the restaurant, putting on a gray trench coat with the collar turned up when the machine-cooled air became too cold. This isn't Alexeenko's first visit to Boca Raton. He traveled here in 1998 to work on Melton's private collection called The Spy Museum, which is one of a kind. "He has many, many absolutely unique items," said Peter Earnest, executive director of the International Spy Museum in Washington D.C. Many of those items are specific to spies and individuals, and the artifacts are "very well cared for," he said. "I think he has the largest private collection in the world," Earnest said. Melton serves on the board of the International Spy Museum, which opened in April 2002, and was a major contributor to getting it started. He advised on the content and where to procure the items, Earnest said. Melton's collection also has fed other major spy exhibits. More than 500 of his devices are on display at the U.S. Central Intelligence Agency's Cold War Museum. And he also contributed a major portion of his collection documenting the agency that preceded the CIA -- the Office of Strategic Services -- to an internal agency museum. Melton owns 24 McDonald's restaurants in Broward and Palm Beach counties. He opened his first themed McDonald's in 1998 focusing on motorcycles. Others soon followed, featuring rock 'n' roll and movie monster memorabilia. He said he plans on converting all of them to a theme in the next three years. But it's the spy cafÈ that matches Melton's double life as an expert on espionage history and McDonald's owner. Patrons can share that expertise while munching on a Big Mac. They can sit next to the Enigma, which Germans used during the war for their most secret communications without knowing Allied forces eventually broke the code. Those fries can come with a lesson about Dutch-born dancer Margaretha Zelle, who used the stage name Mata Hari. She took up spying on her influential lovers for the Germans, but was caught and executed in 1918. And Maxwell Smart would be proud to eat near the shoes ordered by the U.S. ambassador in Czechoslovakia in the 1960s. The Czech intelligence service intercepted them to plant an eavesdropping system in the heel. "This is the real world of espionage," Melton said. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10672 From: kondrak Date: Thu Jan 20, 2005 11:21am Subject: Fwd: Wow! (OT) Nuther candidate for the bad radio people.....know theres radio ppl here, just A FYI >Read down to the narrative and the negative comments this guy got !! > > > >http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&category=1502&item=5745431636&rd=1&ssPageName=WDVW > [Non-text portions of this message have been removed] 10673 From: kondrak Date: Thu Jan 20, 2005 11:27am Subject: Re: Off-topic Question re: Cellular system capacity Varies, by number of actual TX/RX units and the modulation scheme. At 09:30 1/19/2005, you wrote: >Can anyone tell me what the "typical" call load of a single cellular >base station? What I mean by call load is the total number of >concurrent connections the base can handle at one time before a >cellular user receives a network busy signal. I realize there are a >number of variables, but I am just looking for a ball-park answer. > >Thanks, Bruce > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10674 From: kondrak Date: Thu Jan 20, 2005 11:32am Subject: RE: Privacy Activists Brace for White House Push to Augment "I" don't, I'd never do that to my fellow citizens, but the possibility "someone" has, or will exists....theres certainly been enough conspiracies that are being covered up, all marching twords the same result, a totalitarian state replacing ours. Look at the recent cover-ups, OKC stands out. Especially under a socialist like Clinton's, (and her husband) watch. The DHS hires Primikov of the Ex-KGB to design "Internal passports" for US citizens, what conclusions should one draw? Im not liking what Im seeing.... At 13:15 1/19/2005, you wrote: >Does that mean you conspire to believe they crashed planes into the WTC >and Pentagon, and PA, just to make provisions to take our liberties away? >That's a strong accusation. If true, obviously it's time for revolution, >and a new government (not that the current tax situation doesn't call for >that anyway... different topic), but certainly NOT a Liberal one, cuz >that's just a step towards Socialism, which is a step towards Communism, >and if you think that your liberties are being trampled on now... >But if it's not true - which I don't think it is - then we need to focus >on real enemies... like the UN. > >-----Original Message----- >From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any impediment to it, they'll > >>undoubtedly nuke some city to use more terror to make people give up their > >>liberty. > > >At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob Barr, > > > now working as a > > > speaker and consultant to organizations such as the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically reduce > > > privacy and > > > constitutional protection for our citizens." He and > > > other civil > > > liberties advocates expect Patriot Act II provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying to > > > remedy some of the > > > more invasive provisions of the Patriot Act, such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still stuck > > > in the Senate and > > > House respectively. A driver's license provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed before > > > the holiday > > > recess, requires all drivers' licenses to include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until mid-2006 > > > to define the > > > data. > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > > > > >Yahoo! Groups Sponsor > > >ADVERTISEMENT > > > > > > > > > > > _____ > >Yahoo! Groups Links >* To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > >* To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > >* Your use of Yahoo! Groups is subject to the Yahoo! Terms of >Service . > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10675 From: kondrak Date: Thu Jan 20, 2005 11:33am Subject: Re: Seriously OT: Privacy Activists Brace for White House Push to Augment Got that right, I've always admired Ron Paul... At 23:00 1/19/2005, you wrote: >Good for you! Where was the article published? > >The U.S. Reps and Senators SHOULD take it personally, >they are guilty of high treason and have shredded the >Constitution that they swore to uphold, respect, and >protect. > >Rep. Ron Paul (R-TX) is one of the few honest members >left. > >--- Bill & Tracy McDonnell >wrote: > > > It is very imprudent to deprive America of any of > > her privileges. If her commerce and friendship are > > of any importance to you, they are to be had on no > > other terms than leaving her in the full enjoyment > > of her rights." --Benjamin Franklin > > I found this and it fits perfectly with the Rights > > we have being taken away. I wrote an article not > > long ago about how we are no longer a Democracy. The > > U.S Reps. and Senators took it personal. They don't > > represent the constituents, they represent their > > investors, and the oil and pharmaceutical companies. > > You would be surprised the letters I received over > > the article! > > > > Bigdaddy > > www.bigdaddydanes.com > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10676 From: Greg Horton Date: Wed Jan 19, 2005 10:47pm Subject: UN Resolutions? (Off Topic) What about all the U.N. resolutions against Israel? They have been breaking those for years, but the U.S. does not enforce them? Could you please be specific. Which resolutions are you talking about? I am not a real fan of Israel, but I don't remember a lot of resolutions that were brought forth unless it was the Muslim block of countries that proposed them. Greg From: James M. Atkinson, Comm-Eng Date: Fri Jan 19, 2001 0:24pm Subject: Re: Telephone Line Questions At 10:07 AM -0800 1/19/01, Dawn Star wrote: >From: Tom Suess >Subject: Telephone Line Questions > >Hi, > >Comments would be appreciated from list subscribers on the following >telephone line balance/audio amp./line noise questions: > >This ones easy, if you are not using a TDR you should not be >sweeping telephone lines for compensation. Roger > I have to agree with Roger. A good TDR and/or PINGer box is critical any any check of a phone line. In fact I feel that there are several "must have" instruments for performing any kind of legitimate telephone TSCM services (where someone is actually paying you for services). 1) A very high impedance low noise audio amplifier (ie 1059, uAmp, PicoDAC, etc) 2) A premium digital volt meter (Fluke 89, etc) 3) A decent hand held or similar small oscilloscope with bandwidth of 250 MHz of better, and a sensitivity down to at least 5mV (a 30-40 dB pre-amp may be handy here as well) 4) A dedicate TDR or PINGER box for the above mentioned oscilloscope. Personally I prefer a two line unit with a sync output 5) An interface so that the phone line can be tied into a search receiver or spectrum analyzer without blowing out either when the ring voltage comes down the wire. 6) Spectrum analyzer and/or Search Receiver from below 9 kHz up to at least 250 MHz and a DANL/Noise floor of at least -135 dBm. 7) Various craft tools and lesser instruments (tone generators, butt-in sets, inductive probes) Of course if you are only performing a cursory check of the lines then you have to limit your equipment and tests to a bare minimum. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2343 From: James M. Atkinson, Comm-Eng Date: Fri Jan 19, 2001 0:38pm Subject: Re: Telephone Line Questions At 3:40 PM -0800 1/18/01, Tom Suess wrote: >Reply to: James Atkinson > >Thanks for the help. The replies are listed below: > > > * line - 38.397 mA > * please explain "draw tone" The phone has to place a resistance across the line to create current flow. This current flow is detected at the central office/PBX where the line is seized. In days-of-old and in some modern systems the line actually runs though the coil of a relay which caused the relay to seize the line as the current started to flow. Determining how much current draw is required to "draw tone" is helpful to the TSCM'er as it flags potential mischief on the line. > > * line - infinity or no path > * instrument - 7.186 M Ohms You were not using the right DVM... the line resistance should be over 30 Mega ohms when battery is lifted. > > * no test instrument. James, could you list the methods for checking > 60 Hz to 5.0 kHz? Do you graph and overlay the frequency response, > or only look at several frequencies? What parameters are > considered normal/abnormal? Use a DVM specially designed for telcom work as they have a setting for C-Message noise, and one for broadband noise. If you have access to both ends of the wire you can use a sweep generator (with a loop voltage bias) and a spectrum analyzer. If you only have access to one end of the line they you can use a low frequency spectrum analyzer and check out the noise using the narrowest filters in the instrument. > > * no loading coils found...called and e-mailed TelCo for local office > field trip and they have not responded yet -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2344 From: Ray Fitgerald Date: Sat Jan 20, 2001 0:24am Subject: Re: Two new FBI agents were in a parking lot... [humor] They must have been blond female agents... -----Original Message----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Date: Thursday, January 18, 2001 4:33 PM Subject: [TSCM-L] Two new FBI agents were in a parking lot... [humor] > >Two new FBI agents were in a parking lot trying to unlock the door of >their car with a coat hanger. > >They tried and tried to get the door open, but they couldn't. > >The one with the coat hanger stopped for a moment to catch his >breath, and fellow agent said anxiously, "Hurry up! It's starting to >rain and the top is down." > >-jma >-- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > 2345 From: Rob Muessel Date: Fri Jan 19, 2001 0:47pm Subject: So much for digital phone security Take a look at this product's website, http://www.capturecalls.com/. and that of their parent company, http://www.mck.com . They are offering a recording interface compatible with many of the PBX protocols that are common in offices today. For under $400. Guess we'll have to work a little harder now. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2346 From: Dawn Star Date: Fri Jan 19, 2001 1:36pm Subject: Cover Your Ass "Second rule is always CYA (Cover Your Ass). You will be surprised how few friends and how many adversaries you will have if something goes wrong. Don't expect anyone else, like PI middlemen, to take a bullet for you. If I feel uncomfortable, even hold harmless agreements will not change that feeling." Steve Uhrig This is absolutely true, some years ago I had to leave Los Angeles and hide in the Desert for a month after one of those "everything goes wrong jobs" took place. It eventually got straightened out. Their was some confusion and until it was settled it was quite intense. Roger [Non-text portions of this message have been removed] 2347 From: Lesya Dyk Date: Fri Jan 19, 2001 4:21pm Subject: Re: So much for digital phone security Rob, This has been around for many years, at least for Nortel systems (I am a Canadian). Check out Nice Systems www.nice.com . They have a full line of digital monitoring gear originally designed for trading floors, dispatch, military etc. At the bottom end of their product line, they have a compact self contained unit that intercepts 4 channels of traffic transparently and has an easy to use analog audio output right on it (one per channel). It does however leave big tracks on your TDR display... > Take a look at this product's website, http://www.capturecalls.com/. > and that of their parent company, http://www.mck.com . > > They are offering a recording interface compatible with many of the PBX > protocols that are common in offices today. For under $400. > > Guess we'll have to work a little harder now. cheers, dyk@c... Robert Dyk Worldwide Security Ltd. Mississauga, Ontario Canada [Non-text portions of this message have been removed] 2348 From: Date: Fri Jan 19, 2001 1:36pm Subject: Linda Tripp Fired From Pentagon Job Linda Tripp Fired From Pentagon Job By DAVID PACE .c The Associated Press WASHINGTON (AP) - Linda Tripp, whose secret tape recordings spurred the impeachment of President Clinton, was fired Friday after she refused to resign like other political appointees. Her lawyers, who pleaded with the government to keep her in her job, portrayed the move as ``vindictive, mean-spirited and wrong.'' But administration officials said the termination letter she received was routine. They said she had to lose her job like nearly all other political appointees at the end of a presidential term. White House press secretary Jake Siewert said Tripp was treated as any other employee in her ``Schedule C'' classification. ``Most Schedule C employees were - virtually all were asked to submit their resignations, and if they didn't do so, they were terminated,'' said Siewert. Tripp's lawyers issued their statement just as Clinton reached a deal to settle the remaining legal issues from the Monica Lewinsky affair. It was Tripp's recordings of her conversations with the former White House intern that led to the scandal. Tripp, who earned $100,000 a year, was asked in recent days along with all other political appointees to resign in preparation for the change in administrations. On advice of her attorneys, she refused to do so, in a letter sent Thursday, addressed to Clinton. A Pentagon spokesman, Navy Rear Adm. Craig Quigley, said ``it really doesn't matter'' that Tripp did not resign. He said Tripp was notified, as a matter of routine, that her appointment ended Friday. ``All political appointees' term of service ends at the end of an administration,'' Quigley said. ``That's how it works.'' Stephen Kohn, a Tripp lawyer, blamed Clinton for the dismissal on the ground that the ultimate responsibility for firing political appointees rests solely with the president. ``She was asked to voluntarily submit her resignation, and she was not threatened with dismissal if she failed to submit it,'' Kohn said. Tripp was out of the country Friday and unavailable for comment. A 20-year government employee, Tripp began working in the White House in a civil service job under former President Bush. She stayed on after Clinton took office, receiving a political appointment, pay raise and a new job at the Pentagon in 1994. Tripp is suing the government, alleging the Clinton administration illegally released to The New Yorker magazine her statement on a security clearance form that she had never been arrested, when she had. She was arrested for grand larceny when she was a teen-ager, and the charge was later reduced to loitering. The Justice Department investigated the release of information but did not prosecute. ``She only became a political appointee after being fired by the White House,'' Kohn said. ``Her employer assisted in a smear campaign that renders her unemployable.'' Tripp was a public affairs specialist at the Defense Department's Defense Manpower Data Center in Arlington, Va. The tape recordings Tripp gave to Independent Counsel Kenneth Starr led to the perjury and obstruction of justice probe of Clinton, his impeachment by the House and a Senate trial that acquitted him. Tripp's tapes also led to her indictment on state wiretapping charges in Maryland, where a judge's ruling forced prosecutors to abandon their criminal case. AP-NY-01-19-01 1855EST 2349 From: Rob Muessel Date: Fri Jan 19, 2001 8:33pm Subject: Re: Linda Tripp Fired From Pentagon Job At least they didn't have her drawn and quartered. Might have been more appropriate. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2350 From: Mike Date: Fri Jan 19, 2001 0:11pm Subject: Micro pan-tilt devices I've been researching "Nitinol" properties lately with the thought of makeing VERY small pan-tilt devices that can be used with tiny CCD cameras or other small devices. Nitinol is a combination of 2 metals, usually about 55% nickle and the rest mostly Titanium. It has a few unique properties. A .003 " wire can exert 12 grams of force. (Nitinol can be bent to any shape and returns to its original shape when a small current is applied.) A larger diameter wire will exert more force if needed. When current is applied, Nitinol also contracts about 5% with a lot of force. This 5% contraction could easily be used in a simple ratcheting configuration that's spring biased thus allowing pan/tilt with few moving parts, no motors, ultra small sizes and "Remote" due to the low current required. (possible even mobile pan/tilt bugs/cameras in sizes smaller than a golf ball!) Very small robots using Nitinol in one way or another to provide remote mobility without motors already exist. Imagine one with a pan/tilt camera/bug being directed down a home or office air duct that can turn, climb, stop awhile then move if it spots someone sweeping? smiles... and with NO motors! I currently have one of the biggest producers on Nitinol making up a quote for a small simple pan/tilt device including a prototype and cost estimates for a large production run. Anyone interested in getting involved on a partnership basis? (X10 alone might buy thousands for their cheap remote cameras!) The possibilities for evolved and custom designs for the Gov or large companies or the Security Industry should be extrordinary. To do this right, I need more than just myself. Just too many money making pan/tilt devices can be made simply, at extremely low cost, with sizes from micro to mega. Reliability is far greater than motors driven units. Would like to hear from those that may be interested in Launching a product line form the beginning? (It will be fun designing these for various purposes!) Would also like to hear from any of you that may be able to sell "quantity" once things start going? Mostly, I'm hoping for some input? Do you think this is a viable product that will be succeed? Any ideas about designs/uses? (sure could use input here! smiles..) Nuff Said- Bootleg PS Nitinol is being used for many types of actuators and valves in recent inventions. Could have a "Lot" of Security uses as alarm actuators, pan/tilt, valves, Security robotics, auto trigger for cameras or even firearms, time delay, Gov applications and a million other things. (yes-that walking roach bug is easily possible and with a micro pan/tilt ccd camera built in!) What about a bug that can climb up your sinks drain and listen/view? Air ducts-piece of cake! Add small magnets or adhesive to its feet and the roach can go verticle or upside down on or in a metal surface. (Think what a Mouse size device packed with HE, BIO or Chem agents could do? Direct it through a companies/hotels air vent or even up the toilets drain to wait and watch until the target sits down?!! lol ) How about a roach that could sneak past guards or be guided to attach itself to a vehicle, then drop off or move to another location? How about a pan tilt ccd in a pager, cell phone, laptop, cars interior light dome, a baseball cap, pack of cigs, heel of a boot, etc., etc. Since a Nitinol pan/tilt device would basically have only a couple short nitinol wires, a bias spring and a small plastic ratcheting gear, it would weigh zip and could be very small in various configurations. If one used a short twisted Nitinol ribbon, one could apply current and the Nitinol ribbon would start untwisting and thus be another good pan/tilt device with only one moving part for each axis, the wire! WoW! Talk about making a small micro device? Nano/Millimeter applications/devices/robotics? Don't know yet! Centimeter or two? looks likely. IR, RF, laser, DC to Light or hard wired Remote Control? No Problemo [Non-text portions of this message have been removed] 2351 From: Tom Suess Date: Fri Jan 19, 2001 3:49pm Subject: Re: Telephone Line Questions Reply to: Roger Thanks for the help. The reply is listed below: < ...if you are not using a TDR you should not be sweeping telephone lines for compensation. * no compensation... I initiated the telephone troubleshooting question off list to a member, who suggested posting to this list for additional technical feedback. * I would never "sweep" for compensation without adequate instrumentation Regards, Tom Suess 2352 From: James M. Atkinson, Comm-Eng Date: Sat Jan 20, 2001 0:51am Subject: Last year I upgraded... Dear Tech Support: Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and noticed that the new program began making unexpected changes to the accounting modules, limiting access to flower and jewelry applications that had operated flawlessly under Boyfriend 5.0. In addition, Husband 1.0 uninstalled many other valuable programs, such as Romance 9.9 but installed undesirable programs such as NFL 5.0 and NBA 3.0. Conversation 8.0 no longer runs and Housecleaning 2.6 simply crashes the system. I've tried running Nagging 5.3 to fix these problems, but to no avail. --Desperate *** Dear Desperate: Keep in mind, Boyfriend 5.0 is an entertainment package, while Husband 1.0 is an operating system. Try to enter the command: C:/ I THOUGHT YOU LOVED ME and install Tears 6.2. Husband 1.0 should then automatically run the applications: Guilty 3.0 and Flowers 7.0. But remember, overuse can cause Husband 1.0 to default to GrumpySilence 2.5, Happyhour 7.0 or Beer 6.1. Beer 6.1 is a very bad program that will create "Snoring Loudly" wave files. DO NOT install MotherInLaw 1.0 or reinstall another Boyfriend program. These are not supported applications and will crash Husband 1.0. In summary, Husband 1.0 is a great program, but it does have limited memory and cannot learn new applications quickly. Consider buying additional software to improve performance. I personally recommend HotFood 3.0 WildSex 6.9 and Lingerie 5.3. Tech Support -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2353 From: Date: Sat Jan 20, 2001 6:39am Subject: links include a guide to common bugs and wiretaps http://www.spy-nexus.com/ or Bug Detectors & Counter-Surveillance Equipment seems to be a site for Great Southern Security. The above link looks interesting. 2354 From: Ed Naylor Date: Sat Jan 20, 2001 1:51pm Subject: Re: links include a guide to common bugs and wiretaps >http://www.spy-nexus.com/ >Bug >Detectors & Counter-Surveillance Equipment > >seems to be a site for Great Southern Security. The above link looks >interesting. ================================= OPPORTUNITIES in YOUR OWN 'DE-BUGGING' BUSINESS! Learn how individuals without experience earn more than $200 per hour conducting sweeps! ================================= jma, I had no idea this was such a lucrative business for people with no experience. Ed 2355 From: Miguel Puchol Date: Sat Jan 20, 2001 6:48pm Subject: RE: links include a guide to common bugs and wiretaps Best jokes site I've seen this week !!! I really think the CSD-18 is used by the U.N., probably for listening to the Cosby Show.... Enough said! Have a good weekend, Mike > -----Mensaje original----- > De: Ed Naylor [mailto:ednaylor@p...] > Enviado el: sabado, 20 de enero de 2001 20:52 > Para: TSCM-L@egroups.com > Asunto: Re: [TSCM-L] links include a guide to common bugs and wiretaps > > > > >http://www.spy-nexus.com/ >Bug > >Detectors & Counter-Surveillance Equipment > > > >seems to be a site for Great Southern Security. The above link looks > >interesting. > ================================= > OPPORTUNITIES in YOUR OWN 'DE-BUGGING' BUSINESS! > Learn how individuals without > experience earn more than $200 per hour > conducting sweeps! > ================================= > jma, > > I had no idea this was such a lucrative business for people with > no experience. > > Ed > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2356 From: Gregory Horton Date: Sat Jan 20, 2001 10:13pm Subject: Bogus Endorsement First, I went to the spy-nexus list and had a good laugh. Let me state to the list that, unless things have radically changed since I left the LAPD, they do not endorse any products. Especially the small group of technicians that make up our varied electronics groups. As far as I remember, it is against the policy to endorse anything. Second, I just landed a job as an investigator with the local DA's office and am getting out of the business. I wish to thank all the members of the list for increasing my knowledge tenfold and the professionalism that exudes from every pore of this group. I don't think that any other group of individuals can claim a greater degree of expertise than the incredible knowledge base that makes up this list. Thank you Jim for running such a class act and I hate to leave but it is time to move on. Thanks to you all. Greg Horton 2357 From: James M. Atkinson, Comm-Eng Date: Sun Jan 21, 2001 3:13am Subject: Re: Bogus Endorsement At 8:13 PM -0800 1/20/01, Gregory Horton wrote: >First, I went to the spy-nexus list and had a good laugh. Let me state >to the list that, unless things have radically changed since I left the >LAPD, they do not endorse any products. Especially the small group of >technicians that make up our varied electronics groups. As far as I >remember, it is against the policy to endorse anything. > >Second, I just landed a job as an investigator with the local DA's >office and am getting out of the business. I wish to thank all the >members of the list for increasing my knowledge tenfold and the >professionalism that exudes from every pore of this group. I don't >think that any other group of individuals can claim a greater degree of >expertise than the incredible knowledge base that makes up this list. >Thank you Jim for running such a class act and I hate to leave but it is >time to move on. > >Thanks to you all. >Greg Horton Greg, Thank you for your kind words, they are greatly appreciated. Good luck in your new position, and feel free keep in touch as you never know when a TSCM'er may come in handy. The spy-nexus site really tickled me, but if someone if foolish enough to buy one of their products they will not last very long in this business. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2358 From: Jim Date: Mon Jan 22, 2001 8:31am Subject: SECURITY NOTICE > > The following is provided for your information. This is only one of many > types of disguised firearms. It is sometimes frustrating to wait during > security screening at our facilities and certain prohibitions on various > types of equipment may be difficult to understand. The existence of > weapons like this require a thorough, professional and sometimes lengthy > search. > > > Deadly Decoys Cell Phone Guns Discovered > > > > <<...OLE_Obj...>> > > Hitting the 5, 6, 7 and 8 buttons on the phone gun fires four .22 caliber > rounds in quick succession. (U.S. Customs Service) > > At first sight it looks like a regular cell phone - same size, same shape, > same overall appearance. But beneath the digital face lies a .22 caliber > pistol - a phone gun capable of firing four rounds in quick succession > with a touch of the otherwise standard keypad. > > European law enforcement officials - stunned by the discovery of these > deadly decoys - say phone guns are changing the rules of engagement in > Europe. "We find it very, very alarming," says Wolfgang Dicke of the > German Police union. "It means police will have to draw their weapons > whenever a person being checked reaches for their mobile phone." > > Although cell phone guns have not hit America yet, the FBI, the Bureau of > Alcohol, Tobacco and Firearms, and the U.S. Customs Service say they've > been briefed on the new weapons. "This criminal invention represents a > potentially serious threat to law enforcement and the public," said U.S. > Customs Service Commissioner Raymond W. Kelly. "We received word about > these guns last month. We have since alerted our field personnel to be on > the lookout for "cell phone guns" at U.S. ports of entry." > > Guns on the Move These new covert guns were first discovered in October > when Dutch police stumbled on a cache during a drug raid in Amsterdam. In > another recent incident a Croatian gun dealer was caught attempting to > smuggle a shipment through Slovenia into Western Europe. Police say both > shipments are believed to have originated in Yugoslavia. INTERPOL sent > out a warning to law enforcement agencies around the world. European > border police and customs officers are at a heightened state of alert at > all ports, airports and border crossings. > > Realistic Appearance 'If you didn't know they were guns, you wouldn't > suspect anything," said Ari Zandbergen, spokesman for the Amsterdam > police. "Only when you have one in your hand do you realize that they are > heavier," says Birgit Heib of the German Federal Criminal Investigation > Agency. The guns are loaded by twisting the phone in half, the .22 > caliber rounds fit into the top of the phone under the screen. The lower > half, under the keyboard, holds the firing pins. The bullets fire through > the antenna by pressing the keypad from numbers five to eight. > > Amsterdam police says they are very sophisticated machines constructed > inside gutted cell phones which do not light up or operate as real phones. > "These are very difficult to make. We believe experts are involved," says > Zandbergen. > > America on Alert > U.S. authorities, including the FBI, ATF, Federal Aviation Administration > and the U.S. Customs Service Authority have been supplied detailed > information and pictures of these new weapons. "They've been given a heads > up," said Jim Crandall, ATF spokesman. To date no phone guns have been > discovered either in the United States or in the process of being smuggled > in, authorities say. But they know it's only a matter of time. FAA > spokeswoman Rebecca Trexler said airport security officers had been > trained to deal with this new threat. "We don't want to tell the bad guys > exactly what we're looking for," she says, "We are trying to stay one step > ahead." > > Will Affect Travelers > Airport authorities across Europe are implementing systems to X-ray all > cell phones, those procedures will likely be followed by airports around > the world. "This is just one more item that we need to pay special > attention to because nowadays, of course just about every passenger > carries a mobile phone," says the spokesman for Frankfurt airport > security. Customs officials in the U.S. say their safety procedure has > normally been to require travelers to turn their phones on, however that > may no longer be enough. Cell phone users will have to be made aware that > reaching for their phones in some circumstances could be misinterpreted as > a threat by authorities. [Non-text portions of this message have been removed] 2359 From: Steve Whitehead Date: Mon Jan 22, 2001 8:11am Subject: T Swift List Members I noticed in the past that T Swift, author of Checking Telephone Lines took part in discussions on this list. I would appreciate it if someone could assist me with his e-mail address or if he could contact me with his address. Regards Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2360 From: Craig Snedden Date: Mon Jan 22, 2001 8:24am Subject: Re: links include a guide to common bugs and wiretaps ...Fell about the floor laughing...! I'm sure I made something that looked like the CSD18 in high school! Craig ----- Original Message ----- From: "Miguel Puchol" To: Sent: Sunday, January 21, 2001 12:48 AM Subject: RE: [TSCM-L] links include a guide to common bugs and wiretaps > Best jokes site I've seen this week !!! > > I really think the CSD-18 is used by the U.N., probably for listening to the > Cosby Show.... > > Enough said! > > Have a good weekend, > > Mike > > > > -----Mensaje original----- > > De: Ed Naylor [mailto:ednaylor@p...] > > Enviado el: sabado, 20 de enero de 2001 20:52 > > Para: TSCM-L@egroups.com > > Asunto: Re: [TSCM-L] links include a guide to common bugs and wiretaps > > > > > > > > >http://www.spy-nexus.com/ >Bug > > >Detectors & Counter-Surveillance Equipment > > > > > >seems to be a site for Great Southern Security. The above link looks > > >interesting. > > ================================= > > OPPORTUNITIES in YOUR OWN 'DE-BUGGING' BUSINESS! > > Learn how individuals without > > experience earn more than $200 per hour > > conducting sweeps! > > ================================= > > jma, > > > > I had no idea this was such a lucrative business for people with > > no experience. > > > > Ed > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2361 From: Steve Uhrig Date: Mon Jan 22, 2001 4:25pm Subject: Re: T Swift Once upon a midnight dreary, Steve Whitehead pondered, weak and weary: > I noticed in the past that T Swift, author of Checking Telephone > Lines took part in discussions on this list. I would appreciate > it if someone could assist me with his e-mail address or if he > could contact me with his address. Ted Swift's website, with description of his excellent book on telephone wiretap detection: http://www.angelfire.com/biz/investigator/index.html You can email him through the site. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2362 From: James M. Atkinson, Comm-Eng Date: Mon Jan 22, 2001 5:12pm Subject: Re: Unfortunately there is way to much hype over this thing, and members of the law enforcement are going in complete hysterics without actually obtaining real information on the thing. It is not near the threat that people are claiming, is cumbersome to use, has very limited range, and would require the user to pretty much be in contact distance. If a suspect POINTS ANYTHING at you it should be considered a threat (not just a cell phone), but then you would be foolish to respond with lethal force when the guy was just trying to hand you a cell phone. Don't get all hysterical over such things... there are in effect firearms built into cell phone and pagers... but then you can also pack several grams of PETN into a cell phone an blow up a car with it. Be careful, be knowledgeable... but not hysterical... -jma At 9:31 AM -0500 1/22/01, Jim wrote: >SECURITY NOTICE >> >> The following is provided for your information. This is only one of many >> types of disguised firearms. It is sometimes frustrating to wait during >> security screening at our facilities and certain prohibitions on various >> types of equipment may be difficult to understand. The existence of >> weapons like this require a thorough, professional and sometimes lengthy >> search. >> >> >> Deadly Decoys Cell Phone Guns Discovered >> >> >> >> <<...OLE_Obj...>> >> >> Hitting the 5, 6, 7 and 8 buttons on the phone gun fires four .22 caliber >> rounds in quick succession. (U.S. Customs Service) >> >> At first sight it looks like a regular cell phone - same size, same shape, >> same overall appearance. But beneath the digital face lies a .22 caliber >> pistol - a phone gun capable of firing four rounds in quick succession >> with a touch of the otherwise standard keypad. >> >> European law enforcement officials - stunned by the discovery of these >> deadly decoys - say phone guns are changing the rules of engagement in >> Europe. "We find it very, very alarming," says Wolfgang Dicke of the >> German Police union. "It means police will have to draw their weapons >> whenever a person being checked reaches for their mobile phone." >> >> Although cell phone guns have not hit America yet, the FBI, the Bureau of >> Alcohol, Tobacco and Firearms, and the U.S. Customs Service say they've >> been briefed on the new weapons. "This criminal invention represents a >> potentially serious threat to law enforcement and the public," said U.S. >> Customs Service Commissioner Raymond W. Kelly. "We received word about >> these guns last month. We have since alerted our field personnel to be on >> the lookout for "cell phone guns" at U.S. ports of entry." >> >> Guns on the Move These new covert guns were first discovered in October >> when Dutch police stumbled on a cache during a drug raid in Amsterdam. In >> another recent incident a Croatian gun dealer was caught attempting to >> smuggle a shipment through Slovenia into Western Europe. Police say both >> shipments are believed to have originated in Yugoslavia. INTERPOL sent >> out a warning to law enforcement agencies around the world. European >> border police and customs officers are at a heightened state of alert at >> all ports, airports and border crossings. >> >> Realistic Appearance 'If you didn't know they were guns, you wouldn't >> suspect anything," said Ari Zandbergen, spokesman for the Amsterdam >> police. "Only when you have one in your hand do you realize that they are >> heavier," says Birgit Heib of the German Federal Criminal Investigation >> Agency. The guns are loaded by twisting the phone in half, the .22 >> caliber rounds fit into the top of the phone under the screen. The lower >> half, under the keyboard, holds the firing pins. The bullets fire through >> the antenna by pressing the keypad from numbers five to eight. >> >> Amsterdam police says they are very sophisticated machines constructed >> inside gutted cell phones which do not light up or operate as real phones. >> "These are very difficult to make. We believe experts are involved," says > > Zandbergen. >> >> America on Alert >> U.S. authorities, including the FBI, ATF, Federal Aviation Administration >> and the U.S. Customs Service Authority have been supplied detailed >> information and pictures of these new weapons. "They've been given a heads >> up," said Jim Crandall, ATF spokesman. To date no phone guns have been >> discovered either in the United States or in the process of being smuggled >> in, authorities say. But they know it's only a matter of time. FAA >> spokeswoman Rebecca Trexler said airport security officers had been >> trained to deal with this new threat. "We don't want to tell the bad guys >> exactly what we're looking for," she says, "We are trying to stay one step >> ahead." >> >> Will Affect Travelers >> Airport authorities across Europe are implementing systems to X-ray all >> cell phones, those procedures will likely be followed by airports around >> the world. "This is just one more item that we need to pay special >> attention to because nowadays, of course just about every passenger >> carries a mobile phone," says the spokesman for Frankfurt airport >> security. Customs officials in the U.S. say their safety procedure has >> normally been to require travelers to turn their phones on, however that >> may no longer be enough. Cell phone users will have to be made aware that >> reaching for their phones in some circumstances could be misinterpreted as > > a threat by authorities. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2363 From: James M. Atkinson, Comm-Eng Date: Mon Jan 22, 2001 5:03pm Subject: Re: links include a guide to common bugs and wiretaps All you really need is a cheap volt meter, a diode, a couple of cheap general purpose RF transistors, and several resistors for biasing with a coat hanger used for the antenna. Broadband diode detection systems actually do have a place in TSCM, but the TSCM'er has to be careful not to put too much faith in them, and always supplement them with a tuned system such as a spectrum analyzer, etc. Personally I prefer the REI CPM-700, and the Kaiser 2044 for broadband diode detection. IMHO, both instruments work very well, and seriously outperform the CSD and similar spy shop crap. -jma At 2:24 PM +0000 1/22/01, Craig Snedden wrote: >...Fell about the floor laughing...! > >I'm sure I made something that looked like the CSD18 in high school! > >Craig >----- Original Message ----- >From: "Miguel Puchol" >To: >Sent: Sunday, January 21, 2001 12:48 AM >Subject: RE: [TSCM-L] links include a guide to common bugs and wiretaps > > >> Best jokes site I've seen this week !!! >> >> I really think the CSD-18 is used by the U.N., probably for listening to >the >> Cosby Show.... >> >> Enough said! >> >> Have a good weekend, >> >> Mike >> >> >> > -----Mensaje original----- >> > De: Ed Naylor [mailto:ednaylor@p...] >> > Enviado el: sabado, 20 de enero de 2001 20:52 >> > Para: TSCM-L@egroups.com >> > Asunto: Re: [TSCM-L] links include a guide to common bugs and wiretaps >> > >> > >> > >> > >http://www.spy-nexus.com/ >Bug >> > >Detectors & Counter-Surveillance Equipment >> > > >> > >seems to be a site for Great Southern Security. The above link looks >> > >interesting. >> > ================================= >> > OPPORTUNITIES in YOUR OWN 'DE-BUGGING' BUSINESS! >> > Learn how individuals without >> > experience earn more than $200 per hour >> > conducting sweeps! >> > ================================= >> > jma, >> > >> > I had no idea this was such a lucrative business for people with >> > no experience. >> > > > > Ed -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2364 From: Dragos Ruiu Date: Mon Jan 22, 2001 2:54pm Subject: CanSecWest/core01 Conference Announcement I apologize in advance for the commercial content of this message, and I don't know the list policy about such matters, but I thought the subject material could be of interest to the readers. (And it's usually easier to get forgiveness than permission. :-) Some information for all of you regarding the CanSecWest/core01 Network Security Training Conference: The dates for this year's conference are March 28-30. It will be held again in downtown Vancouver, B.C. Canada. The current conference speaker lineup includes: Renaud Deraison - Author of Nessus, speaking about the Nessus attack scanner, giving an overview of scanner operations and a tutorial on Nessus Attack Scripting Language. [http://www.nessus.org] Martin Roesch - Author of the popular Snort Intrusion Detection System (IDS), speaking about new developments in IDSes. [http://www.snort.org] Ron Gula of Enterasys - VP of IDS products, Speaking about evading IDS systems. [http://www.network-defense.com] Dug Song of Arbor Networks - Author of many famous networking tools. Speaking about monkey in the middle attacks on encrypted protocols such as SSH and SSL. :-) [http://www.monkey.org/~dugsong/] Rain Forest Puppy - Will be speaking about assessing the web, with demonstrations of several new (previously unreleased) rfp.labs web tools including the release of Whisker 2.0 and other surprises in his inimitable style. [http://www.wiretrip.net] Mixter of 2XS Ltd. (Israel) - Author of several widely used distributed tools and some popular security whitepapers will give a talk about "The future of distributed applications" explaining the key elements of peer-to-peer networks, discussing a few examples/possibilities of distributed technology, and related security problems in distributed networks. [http://mixter.void.ru] K2 of w00w00 - Will present his new ADMutate, a multi-platform, polymorphic shell-code toolkit and libraries for detection evasion. [http://www.ktwo.ca] (Early reviews say it's scary good. --dr) Matthew Franz of Cisco - Author of Trinux, A Linux Security Toolkit, will give a presentation about rigorous product security testing, as implemented at Cisco. [http://www.trinux.org] Lance Spitzner of Sun - Will present more of the HoneyNet group's honeypot findings, including watching Romanian hackers on their own web cam while they were hacking one of his honeypots for their botnet. [http://project.honeynet.org] Theo DeRaadt of OpenBSD - Paper Title TBA [http://www.openbsd.org] Fyodor of insecure.org - Author of the popular nmap network scanner, will talk about new mapping and scanning tools and techniques. [http://www.insecure.org] Frank Heidt of @Stake - Paper Title TBA [http://www.atstake.com] HD Moore of Digital Defense- WIll give a surely popular talk about his more esoteric NT penetration test tricks in apresentation called "Making NT bleed." where he will cover some of the procedures he as had to develop during the course of cracking multiple systems for customers daily. [http://www.digitaldefense.net] Jay Beale of MandrakeSoft - Author the the Linux Bastille scripts and Security Team Director at MandrakeSoft, will talk about securing Linux. [http://www.bastille-linux.org] Kurt Seifried of SecurityPortal.com - Will moderate a panel debate about cryptography... a "two edged sword" including PKI, SSH and SSL. [http://www.securityportal.com] And some other excellent papers TBA. Schedule: ------- Afternoon (1-6), Wed Mar 28. All Day (10-6:30) (and night :-), Thurs Mar 29, Morning (10-2) Fri 30. There will be some Birds of a Feather sessions held at 6:30 on Thursday - these will be announced at the conference. -- The venue will be the Pacific Palisades Hotel Conference Center on Robson Street. The hotel web site can be found at www.pacificpallisadeshotel.com We have negotiated discounted rates for the CanSecWest conference with the hotel at $150/night regular, and $200/night suite for attendees. I'm told that some (but not all) suites now feature in room high speed network access. Attendees need to tell the reservations desk they are attending the CanSecWest conference. The conference this year will be held in the hotel itself in their meeting facility, and will feature a catering room, as well as a a vendor display area and a place to set up your computer to check e-mail. There will be a wireless 802.11 network and a "Capture The Flag" contest over the wireless net, on-going throughout the presentations. If you are bringing a PC with a wireless card, please ensure your firewalls are in good working order, as we assume no liability for what kind of traffic may be seen. (:-) This year, we will have a permanent coffee stand (after feedback from last year's sessions). Seating is limited and the venue is slightly smaller than last year so please book early to ensure a spot. How to register: -In the month of January, you may register by either sending PGP encrypted e-mail to dr@d... (gpg/pgp key on file at wwwkeys.pgp.net) with the following information: Your name Your company Your company address Visa card number/expiry Visa Billing Name and Address Your contact phone number. Your preferred e-mail address for conference mailings. (I'm sorry we still accept only VISA at this time and Mastercard or AmEx is not an option. We also accept pre-payment by couriered cheque or wire transfer of USD or CAD equivalents. Registrations are reserved upon receipt of cheque - please email dr@k... for further details about this payment method.) -Alternatively you can phone Dragos Ruiu at +1 (604) 722-3993 with the above information and he will process the VISA transaction manually. Please try to phone between 10:00AM-8:00PM PST, but an occasional odd hour phonecall from wierd timezones will be tolerated if it _absolutely_ cannot be avoided. If you prefer we can also reserve a hotel room on your credit card, if you specify dates. (We have been told that our block booking will have priority for the rooms with networking). In January the registration fee will be: USD$895 - for past attendees. USD$980 - for all others up until Jan 31. In February, an on-line booking system will be up at www.dursec.com and the registration fees for all will be USD$1120. In March, the registration fee will be USD$1350. Due to the slightly smaller venue we expect that registrations at the door will be extremely limited and potentially unavailable, at a cost of USD$1595. Vendor sponsorships are available at USD$2500, which as well as sponsoring a display table for the vendor also gives the vendor up to five attendee registrations at USD$580. The cut-off date for vendor sponsorships is March 15. Registration fees include catered lunches and coffee breaks. Thanks for your continuing support, and I hope we'll have a conference that will surpass the positive experiences of last years conference. I'm eager to see and hear the fascinating papers planned, and this year, we will be bringing back the popular technical book(s) (title TBD) that will be given to attendees, as well as having another conference CD-ROM full of goodies and some previously unreleased tools and information. I'm looking forward to seeing you ladies and gentlemen there. Thank You, --dr -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net 2365 From: Date: Tue Jan 23, 2001 3:27am Subject: Dashboard Double Agent Personal TechnologyTen O'clock Tech: Dashboard Double Agent Arik Hesseldahl, Forbes.com, 01.22.01, 10:00 AM ET NEW YORK - Possibly one of the most annoying aspects of business travel is keeping track of reimbursable expenses. From meals to travel expenses, entertainment and mileage, keeping track of it all is complicated, time-consuming and rarely fully accurate. So far, using computers has only made our final expense reports look neater when they're printed out. There's not much you can do to automate tracking the expenses you rack up. Or is there? TravelEyes2: Traveling tattletale A gadget announced last week called TravelEyes2 uses Global Positioning System (GPS) navigation satellites launched by the U.S. Department of Defense to help you keep track of where you've been. TravelEyes2's manufacturer, Advanced Tracking Technologies of Houston, has not released information about price or availability. It's basically a GPS receiver that remembers where you've been, how long you were on the road and all the stops you've made. It can then help produce reports based on the data it stores. Plus, when hitched to a laptop computer, which is optional, it can help you plan a trip, navigate your way from one place to another and keep you on course and on time. Powered by a cigarette lighter in the car, it can sit on the dashboard, constantly taking readings from the constellation of GPS satellites that circle the Earth, bombarding it with radio signals that can be used to pinpoint your precise location on the globe. When you get back to the office you can link it up to a desktop PC to produce a report. It can store data for up to 50 hours of driving time before needing to download to a computer. It collects data only while the car is moving. But it can also be used for tracking someone using the car without them knowing. Its manufacturer has gone a long way to making this device easy to conceal so that drivers may not know their movements are being tracked. Companies that mistrust their employees on company business may like this feature. So will some parents with teenage drivers who are prone to mischief or expensive speeding tickets. It can track routes traveled and vehicle speeds. TravelEyes2 is only about the size of the deck of cards. It also comes with an external antenna less than three inches square for picking up GPS signals from nearly anywhere in the car. Since GPS signals are generally weak and easily blocked (no typical GPS reader works in doors, for example), using a GPS receiver in the car usually requires having it sit on the dashboard so it can "see" the satellites. 2366 From: Dawn Star Date: Tue Jan 23, 2001 10:44am Subject: Broadband "Broadband diode detection systems actually do have a place in TSCM, but the TSCM'er has to be careful not to put too much faith in them, and always supplement them with a tuned system such as a spectrum analyzer, etc." jma They sure do! When the incompetents use them and get readings all over the place the pros get to redo the job, their good for business! Roger [Non-text portions of this message have been removed] 2367 From: James M. Atkinson, Comm-Eng Date: Tue Jan 23, 2001 11:34am Subject: Re: Broadband Diode Bovine Feces Detector At 8:44 AM -0800 1/23/01, Dawn Star wrote: >"Broadband diode detection systems actually do have a place in TSCM, >but the TSCM'er has to be careful not to put too much faith in them, >and always supplement them with a tuned system such as a spectrum >analyzer, etc." > jma > >They sure do! When the incompetents use them and get readings all >over the place the pros get to redo the job, their good for >business! Roger Good point, What really tickles are the guys who run out and buys a cheap broadband diode detection system with visions of instantly making millions of dollars a year as a bug sweeper, and then starts finding "signals from bugs" on every sweep. Of course he doesn't actually FIND the bug, but does lock onto the signals and classifies it as a "FBI, DEA, or CIA classified surveillance device" and goes on to tell his clients that the "feds are spying on him". The same thing happens when some green-horn TSCM'er gets their hands on a TDR... they see it as a magic box, and detect a bug behind every impedance bump out there (when there actually is no bug at all). Just because they see a -4 dB drop in a TDR trace does not near there is a parasitic device installed 1500 feet down the wire. All the equipment in the world is worthless unless the user has some real-world technical background (and not theoretical bovine feces) to put behind it. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2368 From: Steve Uhrig Date: Tue Jan 23, 2001 1:09pm Subject: Used equipment list updated Hello all, We have updated our used equipment page: http://www.swssec.com/used.html The page lists surveillance, countersurveillance, communications and other miscellaneous equipment for sale. We take credit cards and ship worldwide. Also updated is a similar page listing Minox submini cameras and accessories for sale: http://www.swssec.com/minox.html I buy used electronics and Minox items. Please contact me if you have anything available to sell. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2369 From: Dawn Star Date: Tue Jan 23, 2001 9:43pm Subject: Pole Climber "The same thing happens when some green-horn TSCM'er gets their hands on a TDR... they see it as a magic box, and detect a bug behind every impedance bump out there (when there actually is no bug at all). Just because they see a -4 dB drop in a TDR trace does not near there is a parasitic device installed 1500 feet down the wire." jma That's why if your not a pole climber, find another line of work Roger [Non-text portions of this message have been removed] 2370 From: A Grudko Date: Wed Jan 24, 2001 3:39am Subject: Climbing poles Our phone 'company' is owned by the State and they can get nasty if a non-employee goes up a pole, but I used to do it on all sweeps anyway, thanks to a 4 section folding ladder which was small enough to even fit in my Corvette. I used to be a hoby climber so I kept my harness, slings, Carabiners etc. in the car too for those really high cables, as well as a set of lock-picks, skeleton keys and lug keys to get into cable rooms and cupboards. But one fine morning I managed to loose both my 'vette and my left arm in one fell swoop, and now I have a legitimate reason to say I don't 'do' poles! Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2371 From: Dawn Star Date: Wed Jan 24, 2001 7:05pm Subject: LoJack System Does anyone on the list know the typical location in the vehicle of a LoJack auto theft transmitter, its general appearance and antenna configuration? Thanks, Roger [Non-text portions of this message have been removed] From: Nalesnik, Matthew Date: Thu Jan 20, 2005 7:59am Subject: RE: Privacy Activists Brace for White House Push to Augment Then what basis or precedent, besides a weak conspiracy theory, would you base this statement on "But the police-state marches on....if theres any impediment to it, they'll undoubtedly nuke some city to use *MORE* terror to make people give up their liberty"? (caps on 'MORE' mine) ? You've basically switched nukes for planes, and I may be mistaken, of course, but your implication is that the terror attacks that already happened were used to make people give up their liberty, and that the Bush administration would use *MORE* terror attacks (albeit nukes, or planes, or whatever) to take more liberties away. Would you like to clarify, or did I hit it on the head? -----Original Message----- From: Agent Geiger [mailto:agentgeiger@y...] Sent: Wednesday, January 19, 2005 9:06 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment I never said anything about planes did I? You are making incorrect inferences. --- "Nalesnik, Matthew" wrote: > > Does that mean you conspire to believe they crashed > planes into the WTC and Pentagon, and PA, just to > make provisions to take our liberties away? > That's a strong accusation. If true, obviously it's > time for revolution, and a new government (not that > the current tax situation doesn't call for that > anyway... different topic), but certainly NOT a > Liberal one, cuz that's just a step towards > Socialism, which is a step towards Communism, and if > you think that your liberties are being trampled on > now... > But if it's not true - which I don't think it is - > then we need to focus on real enemies... like the > UN. > > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any > impediment to it, they'll > >>undoubtedly nuke some city to use more terror to > make people give up their > >>liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Find what you need with new enhanced search. http://info.mail.yahoo.com/mail_250 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10678 From: Ian Wraith Date: Thu Jan 20, 2005 7:39am Subject: Re: Off-topic Question re: Cellular system capacity Hello Leanardo wrote: > Can anyone tell me what the "typical" call load of a single cellular > base station? What I mean by call load is the total number of > concurrent connections the base can handle at one time before a > cellular user receives a network busy signal. I realize there are a > number of variables, but I am just looking for a ball-park answer. Sadly I don't think there is anything like a typical base station ! With GSM (I don't know a lot about UMTS I'm afraid) there are some base stations that consist of a single carrier. As it is TDMA that would have 8 timeslots of which 7 could be used for calls. Then there are multi-sector sites transmitting multiple carriers with a capability of handling 100's of calls. Plus there are all sizes of base stations in-between. You also have to remember that in most urban environments a mobile can hear multiple base stations and if the strongest is totally saturated will use another. So I'm afraid there isn't an easy answer to your question. Regards Ian 10679 From: Nalesnik, Matthew Date: Thu Jan 20, 2005 8:01am Subject: RE: Privacy Activists Brace for White House Push to Augment True, and I even complained about that before, when the elections were near. That makes me a hypocrite, and I apologize... I never could resist an argument/debate, though - especially when it comes to something so close to my heart. -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Thursday, January 20, 2005 4:24 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment -----Original Message----- From: Nalesnik, Matthew [mailto:matthew.nalesnik@t...] > If true, obviously it's time for revolution, and a new government (not that the current tax situation doesn't call for that anyway... different topic), but certainly NOT a Liberal one, cuz that's just a step towards Socialism, which is a step towards Communism, and if you think that your liberties are being trampled on now. But if it's not true - which I don't think it is - then we need to focus on real enemies... like the UN. Can we stay away from political grandstanding and stick to TSCM issues? There are plenty of other places on the net to rant about conspiracies and the evils of politics. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system ( http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10680 From: Kohlenberg, Toby Date: Thu Jan 20, 2005 0:24am Subject: RE: Privacy Activists Brace for White House Push to Augment can we please please please get back to TSCM instead of strange rants that range from one political extreme to the other? >-----Original Message----- >From: Agent Geiger [mailto:agentgeiger@y...] >Sent: Wednesday, January 19, 2005 6:06 PM >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] Privacy Activists Brace for White House >Push to Augment > > >I never said anything about planes did I? You are >making incorrect inferences. > >--- "Nalesnik, Matthew" > wrote: > >> >> Does that mean you conspire to believe they crashed >> planes into the WTC and Pentagon, and PA, just to >> make provisions to take our liberties away? >> That's a strong accusation. If true, obviously it's >> time for revolution, and a new government (not that >> the current tax situation doesn't call for that >> anyway... different topic), but certainly NOT a >> Liberal one, cuz that's just a step towards >> Socialism, which is a step towards Communism, and if >> you think that your liberties are being trampled on >> now... >> But if it's not true - which I don't think it is - >> then we need to focus on real enemies... like the >> UN. >> >> -----Original Message----- >> From: kondrak [mailto:kondrak@s...] >> >> >> >>But the police-state marches on....if theres any >> impediment to it, they'll >> >>undoubtedly nuke some city to use more terror to >> make people give up their >> >>liberty. >> >> >> At 01:12 1/19/2005, you wrote: >> >> >This needs to be stopped immediately, they have >> more >> >than enough power to do whatever they want with the >> >original Patriot Act abomination that flushed the >> >Constitution down the toilet. >> > >> >Bush et al are using their newfound powers to >> disrupt >> >and destroy the credibility of U.S. citizens that >> >would dare speak out against their corrupt regime >> and >> >practice the hallowed right of public dissent. >> > >> >Pro se lawsuits directed against Administration >> >officials is likely the only recourse at this >> point, >> >it's apparent that the vast majority of Congress is >> >being blackmailed at this point. >> > >> >--- savanted1 wrote: >> > >> > > >> > > >> > > >> > > Privacy Activists Brace for White House Push to >> > > Augment >> > > Controversial Domestic Surveillance Powers >> > > >> > > >> > > According to former Republican congressman Bob >> Barr, >> > > now working as a >> > > speaker and consultant to organizations such as >> the >> > > American Civil >> > > Liberties Union, "The administration has made it >> > > clear that they do >> > > intend to continue their move to dramatically >> reduce >> > > privacy and >> > > constitutional protection for our citizens." He >> and >> > > other civil >> > > liberties advocates expect Patriot Act II >> provisions >> > > to resurface >> > > piecemeal, such as in the Anti-Terrorism >> > > Intelligence Tools >> > > Improvement Act of 2003 (HR3179). Bills trying >> to >> > > remedy some of the >> > > more invasive provisions of the Patriot Act, >> such as >> > > the Security and >> > > Freedom Ensured (SAFE) Act of 2003, are still >> stuck >> > > in the Senate and >> > > House respectively. A driver's license >> provision of >> > > the National >> > > Intelligence Reform and Terrorism Act, passed >> before >> > > the holiday >> > > recess, requires all drivers' licenses to >> include >> > > machine-readable, >> > > encoded data by the end of 2006, and gives the >> > > secretaries of >> > > Transportation and Homeland Security until >> mid-2006 >> > > to define the >> > > data. >> > > >> > > >> http://www.wired.com/news/print/0,1294,66242,00.html >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > >> > > ------------------------ Yahoo! Groups Sponsor >> > > >> > > >> > > >> >>======================================================== >> > > TSCM-L Technical Security Mailing List >> > > "In a multitude of counselors there is >> strength" >> > > >> > > To subscribe to the TSCM-L mailing list >> visit: >> > > >> http://www.yahoogroups.com/community/TSCM-L >> > > >> > > It is by caffeine alone I set my mind in >> motion. >> > > It is by the juice of Star Bucks that thoughts >> > > acquire speed, >> > > the hands acquire shaking, the shaking is a >> > > warning. >> > > It is by caffeine alone I set my mind in >> motion. >> > > >> =================================================== >> > > TSKS >> > > Yahoo! Groups Links >> > > >> > > >> > > TSCM-L-unsubscribe@yahoogroups.com >> > > >> > > >> > > >> > > >> > > >> > > >> > >> > >> > >> > >> >>======================================================== >> > TSCM-L Technical Security Mailing List >> > "In a multitude of counselors there is >> strength" >> > >> > To subscribe to the TSCM-L mailing list >> visit: >> > >> http://www.yahoogroups.com/community/TSCM-L >> > >> > It is by caffeine alone I set my mind in motion. >> > It is by the juice of Star Bucks that thoughts >> acquire speed, >> > the hands acquire shaking, the shaking is a >> warning. >> > It is by caffeine alone I set my mind in motion. >> >=================================================== >> TSKS >> >Yahoo! Groups Links >> > >> > >> > >> > >> >> >> >> >> >======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts >> acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== >> TSKS >> >> >> >> >> >> Yahoo! Groups Sponsor >> >> >> >=== message truncated === > > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Find what you need with new enhanced search. >http://info.mail.yahoo.com/mail_250 > > >------------------------ Yahoo! Groups Sponsor >--------------------~--> >In low income neighborhoods, 84% do not own computers. >At Network for Good, help bridge the Digital Divide! >http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM >--------------------------------------------------------------- >-----~-> > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > 10681 From: Nalesnik, Matthew Date: Thu Jan 20, 2005 7:53am Subject: RE: Privacy Activists Brace for White House Push to Augment > Doesn't take a rocket scientist to figure out that our > interventionist foreign policy is to blame for the > attacks. We don't have diplomats in the country of "Al Qaeda"...? If our interventionist foreign policy is to blame, who did we "intervene" against to cause terrorists, with no home country, to kill Americans, on American soil? -----Original Message----- From: G P [mailto:telos888@y...] Sent: Wednesday, January 19, 2005 10:54 PM --- "Nalesnik, Matthew" wrote: > Does that mean you conspire to believe they crashed > planes into the WTC and Pentagon, and PA, just to > make provisions to take our liberties away? Doesn't take a rocket scientist to figure out that our interventionist foreign policy is to blame for the attacks. > then we need to focus on real enemies... like the > UN. Yep. This Iraq war is nothing but U.N. puppetry, and U.S. tax dollars have been enforcing U.N. mandates for decades. Bankruptcy is the preferred tactic for hostile takeover, insurmountable debt is the perfect leverage for a coup. Countries can be purposely bankrupted, just like companies routinely are. "...where the rule of law-governs the conduct of nations...in which a credible United Nations can use its peacekeeping role to fulfill the promise and vision of the UN's founders." -- George H. W. Bush, January 16, 1991, speech regarding hostilities with Iraq > > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any > impediment to it, they'll > >>undoubtedly nuke some city to use more terror to > make people give up their > >>liberty. > > > At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have > more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to > disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime > and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this > point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob > Barr, > > > now working as a > > > speaker and consultant to organizations such as > the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically > reduce > > > privacy and > > > constitutional protection for our citizens." He > and > > > other civil > > > liberties advocates expect Patriot Act II > provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying > to > > > remedy some of the > > > more invasive provisions of the Patriot Act, > such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still > stuck > > > in the Senate and > > > House respectively. A driver's license > provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed > before > > > the holiday > > > recess, requires all drivers' licenses to > include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until > mid-2006 > > > to define the > > > data. > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is > strength" > > > > > > To subscribe to the TSCM-L mailing list > visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in > motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in > motion. > > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > > > > > Yahoo! Groups Sponsor > > === message truncated === ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10682 From: Riskbiz Date: Thu Jan 20, 2005 9:20am Subject: RE: Privacy Activists Brace for White House Push to Augment I subscribed to this list to learn and educate myself about TSCM and asso fields, not listen to a bunch of psychotic/hysterical social/political commentary. Please stick to the topic or post elsewhere and stop filling my inbox with this crap. DK -----Original Message----- From: Agent Geiger [mailto:agentgeiger@y...] Sent: Wednesday, January 19, 2005 11:24 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Privacy Activists Brace for White House Push to Augment You mistook my previous posting. I am not saying I do not agree with people bringing forth suits and defending themselves(I do it in small claims court all the time). My piont is, that if you try and take on the juggernaut in power, via constitional pro-se means, e.g., tax resisting, rescinding your drivers license and SSN, etc. You in the practical sense, will lose. the judges will either rule against you, or dismiss. All the time, you spend a lot of money, and get little true justice. However, the system remains intact. I am not saying it right. It is the fact. The deck is stacked all the way to the Supreme Court. How in the world can you win in "their" system, by playing by the rules they themselves do not play by? --- G P wrote: > > Pro Se lawsuits will only get you laughed out of courts and labeled > > a kook. > > Interesting opinion, as pro se litigants are held to a much lesser > standard of legal review. Going pro se with a defense (or offense) is > a significant advantage over professional counsel. > > >If they actually got you somewhere, you'd be > killed. > > Very interesting. So by retaining professional legal counsel, one is > immune to assassination...? Per that logic, we're going about this > war in Iraq thing all wrong - we should be sending squadrons of > laywers over there to defend our interests ;) > > The law is the law, period. 2752 people died in the September 11th > attacks, but millions have been killed protecting that very same > Constitution that has been trampled upon with the Patriot Act and > upcoming Patriot Act II legislation. > > Our elected officials swore to uphold and defend the Constitution, not > to rewrite history and laws to suit the military-industrial complex. > > Regards > > Greg > > > > > --- kondrak wrote: > > > > > But the police-state marches on....if theres any impediment to it, > > > they'll undoubtedly nuke some city to use more terror to make > > > people give up their liberty. > > > > > > > > > At 01:12 1/19/2005, you wrote: > > > > > > >This needs to be stopped immediately, they have > > > more > > > >than enough power to do whatever they want with > > the > > > >original Patriot Act abomination that flushed > the > > > >Constitution down the toilet. > > > > > > > >Bush et al are using their newfound powers to > > > disrupt > > > >and destroy the credibility of U.S. citizens > that > > > >would dare speak out against their corrupt > regime > > > and > > > >practice the hallowed right of public dissent. > > > > > > > >Pro se lawsuits directed against Administration officials is > > > >likely the only recourse at this > > > point, > > > >it's apparent that the vast majority of > Congress > > is > > > >being blackmailed at this point. > > > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > > to > > > > > Augment > > > > > Controversial Domestic Surveillance > > Powers > > > > > > > > > > > > > > > According to former Republican congressman > Bob > > > Barr, > > > > > now working as a > > > > > speaker and consultant to organizations such > > as > > > the > > > > > American Civil > > > > > Liberties Union, "The administration has > made > > it > > > > > clear that they do > > > > > intend to continue their move to > dramatically > > > reduce > > > > > privacy and > > > > > constitutional protection for our citizens." > > > He > > > and > > > > > other civil > > > > > liberties advocates expect Patriot Act II > > > provisions > > > > > to resurface > > > > > piecemeal, such as in the Anti-Terrorism Intelligence Tools > > > > > Improvement Act of 2003 (HR3179). Bills > > trying > > > to > > > > > remedy some of the > > > > > more invasive provisions of the Patriot Act, > > > such as > > > > > the Security and > > > > > Freedom Ensured (SAFE) Act of 2003, are > still > > > stuck > > > > > in the Senate and > > > > > House respectively. A driver's license > > > provision of > > > > > the National > > > > > Intelligence Reform and Terrorism Act, > passed > > > before > > > > > the holiday > > > > > recess, requires all drivers' licenses to > > > include > > > > > machine-readable, > > > > > encoded data by the end of 2006, and gives > the > > > > > secretaries of > > > > > Transportation and Homeland Security until > > > mid-2006 > > > > > to define the > > > > > data. > > > > > > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups > Sponsor > > > > > > > > > > > > > > > > > > > > > >=======================================================> > > > > TSCM-L Technical Security Mailing > > List > > > > > "In a multitude of counselors there is > > > strength" > > > > > > > > > > To subscribe to the TSCM-L mailing list > > > visit: > > > > > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > It is by the juice of Star Bucks that > > thoughts > > > > > acquire speed, > > > > > the hands acquire shaking, the shaking is a > > > > > warning. > > > > > It is by caffeine alone I set my mind in > > > motion. > > > > > > > > > > > ==================================================> > > > > TSKS > > > > > Yahoo! Groups Links > > > > > > > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > === message truncated == __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ======================================================= TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10683 From: G P Date: Thu Jan 20, 2005 0:03pm Subject: RE: Privacy Activists Brace for White House Push to Augment Sounds like DK needs a hug. --- Riskbiz wrote: > I subscribed to this list to learn and educate > myself about TSCM and asso > fields, not listen to a bunch of > psychotic/hysterical social/political > commentary. Please stick to the topic or post > elsewhere and stop filling my > inbox with this crap. > > DK > 10684 From: Agent Geiger Date: Thu Jan 20, 2005 0:21pm Subject: RE: Privacy Activists Brace for White House Push to Augment Nope, you have me mistaken with someone else. --- "Nalesnik, Matthew" wrote: > > Then what basis or precedent, besides a weak > conspiracy theory, would you base this statement on > "But the police-state marches on....if theres any > impediment to it, they'll undoubtedly nuke some > city to use *MORE* terror to make people give up > their liberty"? (caps on 'MORE' mine) ? > You've basically switched nukes for planes, and I > may be mistaken, of course, but your implication is > that the terror attacks that already happened were > used to make people give up their liberty, and that > the Bush administration would use *MORE* terror > attacks (albeit nukes, or planes, or whatever) to > take more liberties away. > Would you like to clarify, or did I hit it on the > head? > > -----Original Message----- > From: Agent Geiger [mailto:agentgeiger@y...] > Sent: Wednesday, January 19, 2005 9:06 PM > To: TSCM-L@yahoogroups.com > Subject: RE: [TSCM-L] Privacy Activists Brace for > White House Push to Augment > > I never said anything about planes did I? You are > making incorrect inferences. > > --- "Nalesnik, Matthew" > wrote: > > > > > Does that mean you conspire to believe they > crashed > > planes into the WTC and Pentagon, and PA, just to > > make provisions to take our liberties away? > > That's a strong accusation. If true, obviously > it's > > time for revolution, and a new government (not > that > > the current tax situation doesn't call for that > > anyway... different topic), but certainly NOT a > > Liberal one, cuz that's just a step towards > > Socialism, which is a step towards Communism, and > if > > you think that your liberties are being trampled > on > > now... > > But if it's not true - which I don't think it is - > > then we need to focus on real enemies... like the > > UN. > > > > -----Original Message----- > > From: kondrak [mailto:kondrak@s...] > > > > > > >>But the police-state marches on....if theres any > > impediment to it, they'll > > >>undoubtedly nuke some city to use more terror to > > make people give up their > > >>liberty. > > > > > > At 01:12 1/19/2005, you wrote: > > > > >This needs to be stopped immediately, they have > > more > > >than enough power to do whatever they want with > the > > >original Patriot Act abomination that flushed the > > >Constitution down the toilet. > > > > > >Bush et al are using their newfound powers to > > disrupt > > >and destroy the credibility of U.S. citizens that > > >would dare speak out against their corrupt regime > > and > > >practice the hallowed right of public dissent. > > > > > >Pro se lawsuits directed against Administration > > >officials is likely the only recourse at this > > point, > > >it's apparent that the vast majority of Congress > is > > >being blackmailed at this point. > > > > > >--- savanted1 wrote: > > > > > > > > > > > > > > > > > > > Privacy Activists Brace for White House Push > to > > > > Augment > > > > Controversial Domestic Surveillance > Powers > > > > > > > > > > > > According to former Republican congressman Bob > > Barr, > > > > now working as a > > > > speaker and consultant to organizations such > as > > the > > > > American Civil > > > > Liberties Union, "The administration has made > it > > > > clear that they do > > > > intend to continue their move to dramatically > > reduce > > > > privacy and > > > > constitutional protection for our citizens." > He > > and > > > > other civil > > > > liberties advocates expect Patriot Act II > > provisions > > > > to resurface > > > > piecemeal, such as in the Anti-Terrorism > > > > Intelligence Tools > > > > Improvement Act of 2003 (HR3179). Bills > trying > > to > > > > remedy some of the > > > > more invasive provisions of the Patriot Act, > > such as > > > > the Security and > > > > Freedom Ensured (SAFE) Act of 2003, are still > > stuck > > > > in the Senate and > > > > House respectively. A driver's license > > provision of > > > > the National > > > > Intelligence Reform and Terrorism Act, passed > > before > > > > the holiday > > > > recess, requires all drivers' licenses to > > include > > > > machine-readable, > > > > encoded data by the end of 2006, and gives the > > > > secretaries of > > > > Transportation and Homeland Security until > > mid-2006 > > > > to define the > > > > data. > > > > > > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > __________________________________ > Do you Yahoo!? > Yahoo! Mail - Find what you need with new enhanced > search. > http://info.mail.yahoo.com/mail_250 > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > > > > _____ > > Yahoo! Groups Links > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an > email to: > TSCM-L-unsubscribe@yahoogroups.com > > > > * Your use of Yahoo! Groups is subject to > the Yahoo! Terms of Service > . > > > > > > [Non-text portions of this message have been > removed] > > > === message truncated === __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10685 From: Agent Geiger Date: Thu Jan 20, 2005 0:22pm Subject: RE: Privacy Activists Brace for White House Push to Augment Sure --- "Kohlenberg, Toby" wrote: > > can we please please please get back to TSCM instead > of strange > rants that range from one political extreme to the > other? > > >-----Original Message----- > >From: Agent Geiger [mailto:agentgeiger@y...] > >Sent: Wednesday, January 19, 2005 6:06 PM > >To: TSCM-L@yahoogroups.com > >Subject: RE: [TSCM-L] Privacy Activists Brace for > White House > >Push to Augment > > > > > >I never said anything about planes did I? You are > >making incorrect inferences. > > > >--- "Nalesnik, Matthew" > > wrote: > > > >> > >> Does that mean you conspire to believe they > crashed > >> planes into the WTC and Pentagon, and PA, just to > >> make provisions to take our liberties away? > >> That's a strong accusation. If true, obviously > it's > >> time for revolution, and a new government (not > that > >> the current tax situation doesn't call for that > >> anyway... different topic), but certainly NOT a > >> Liberal one, cuz that's just a step towards > >> Socialism, which is a step towards Communism, and > if > >> you think that your liberties are being trampled > on > >> now... > >> But if it's not true - which I don't think it is > - > >> then we need to focus on real enemies... like the > >> UN. > >> > >> -----Original Message----- > >> From: kondrak [mailto:kondrak@s...] > >> > >> > >> >>But the police-state marches on....if theres > any > >> impediment to it, they'll > >> >>undoubtedly nuke some city to use more terror > to > >> make people give up their > >> >>liberty. > >> > >> > >> At 01:12 1/19/2005, you wrote: > >> > >> >This needs to be stopped immediately, they have > >> more > >> >than enough power to do whatever they want with > the > >> >original Patriot Act abomination that flushed > the > >> >Constitution down the toilet. > >> > > >> >Bush et al are using their newfound powers to > >> disrupt > >> >and destroy the credibility of U.S. citizens > that > >> >would dare speak out against their corrupt > regime > >> and > >> >practice the hallowed right of public dissent. > >> > > >> >Pro se lawsuits directed against Administration > >> >officials is likely the only recourse at this > >> point, > >> >it's apparent that the vast majority of Congress > is > >> >being blackmailed at this point. > >> > > >> >--- savanted1 wrote: > >> > > >> > > > >> > > > >> > > > >> > > Privacy Activists Brace for White House Push > to > >> > > Augment > >> > > Controversial Domestic Surveillance > Powers > >> > > > >> > > > >> > > According to former Republican congressman > Bob > >> Barr, > >> > > now working as a > >> > > speaker and consultant to organizations such > as > >> the > >> > > American Civil > >> > > Liberties Union, "The administration has made > it > >> > > clear that they do > >> > > intend to continue their move to dramatically > >> reduce > >> > > privacy and > >> > > constitutional protection for our citizens." > He > >> and > >> > > other civil > >> > > liberties advocates expect Patriot Act II > >> provisions > >> > > to resurface > >> > > piecemeal, such as in the Anti-Terrorism > >> > > Intelligence Tools > >> > > Improvement Act of 2003 (HR3179). Bills > trying > >> to > >> > > remedy some of the > >> > > more invasive provisions of the Patriot Act, > >> such as > >> > > the Security and > >> > > Freedom Ensured (SAFE) Act of 2003, are still > >> stuck > >> > > in the Senate and > >> > > House respectively. A driver's license > >> provision of > >> > > the National > >> > > Intelligence Reform and Terrorism Act, passed > >> before > >> > > the holiday > >> > > recess, requires all drivers' licenses to > >> include > >> > > machine-readable, > >> > > encoded data by the end of 2006, and gives > the > >> > > secretaries of > >> > > Transportation and Homeland Security until > >> mid-2006 > >> > > to define the > >> > > data. > >> > > > >> > > > >> > http://www.wired.com/news/print/0,1294,66242,00.html > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > ------------------------ Yahoo! Groups > Sponsor > >> > > > >> > > > >> > > > >> > >>======================================================== > >> > > TSCM-L Technical Security Mailing > List > >> > > "In a multitude of counselors there is > >> strength" > >> > > > >> > > To subscribe to the TSCM-L mailing list > >> visit: > >> > > > >> http://www.yahoogroups.com/community/TSCM-L > >> > > > >> > > It is by caffeine alone I set my mind in > >> motion. > >> > > It is by the juice of Star Bucks that > thoughts > >> > > acquire speed, > >> > > the hands acquire shaking, the shaking is a > >> > > warning. > >> > > It is by caffeine alone I set my mind in > >> motion. > >> > > > >> > =================================================== > >> > > TSKS > >> > > Yahoo! Groups Links > >> > > > >> > > > >> > > TSCM-L-unsubscribe@yahoogroups.com > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > >> > > >> > > >> > > >> > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10686 From: G P Date: Thu Jan 20, 2005 0:45pm Subject: RE: Privacy Activists Brace for White House Push to Augment Well let's see. We could start with the CIA-sponsored coup in Iran, where we tossed out the democratically-elected Mohammed Mosedegh in 1956 and replaced him with the Shah to insure access to Iran's oilfields (as Mosedegh was nationalizing Anglo-Iranian Oil, which later became British Petroleum under the Shah's reign). That single act, which the Sept. 11 attacks can be traced back directly to, then lead to the anti-American sentiment of the Ayatollah when he overthrew the Shah by way of the Islamic Revolution. Then we decided that we had to "balance the region" by providing weapons to Saddam Hussein (Rumsfeld and Cheney were directly involved in that one). On to arming and training the Islamic Fundamentalist Mujahedeen in Afganistan, as they were fighting the Soviet-backed Northern Alliance. Osama bin Laden visited the U.S. (and is rumored to have visited the White House under the moniker "Tim Osman"), and the CIA set up those same training camps that we're trying to bomb back to the dark ages. (I could mention the fact that several of Osama bin Laden's top generals are now working in very high positions of authority in the U.S. government, but I won't name any names.) Now it's back to sponsoring the Northern Alliance based on intelligence that we will have access to oil fields in Turkmenistan and Kazakstan, the list goes on and on and on and on. Same players, same companies, proletariat caught in the middle as cannon fodder. Cheers! Greg --- "Nalesnik, Matthew" wrote: > We don't have diplomats in the country of "Al > Qaeda"...? If our interventionist foreign policy is > to blame, who did we "intervene" against to cause > terrorists, with no home country, to kill Americans, > on American soil? 10687 From: Nalesnik, Matthew Date: Thu Jan 20, 2005 0:06pm Subject: RE: Privacy Activists Brace for White House Push to Augment Don't we go through this about once a month or so? D K - it will play itself out. Strong opinions are hard to keep contained. Especially when articles sent out are related to TSCM, but also personal freedom, and that sorta off-topic thing. Then it goes to a tangent! - Matt -----Original Message----- From: G P [mailto:telos888@y...] Sent: Thursday, January 20, 2005 1:04 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment Sounds like DK needs a hug. --- Riskbiz wrote: > I subscribed to this list to learn and educate > myself about TSCM and asso > fields, not listen to a bunch of > psychotic/hysterical social/political > commentary. Please stick to the topic or post > elsewhere and stop filling my > inbox with this crap. > > DK > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10688 From: Nalesnik, Matthew Date: Thu Jan 20, 2005 11:46am Subject: RE: Privacy Activists Brace for White House Push to Augment I agree with you to some point - there have always been conspiracies, and total power is the aim. There's always the talk of the "shadow government", and that the government in place really doesn't have any power... alas, it's too much. I believe that there's enough good people left in our great country to stop any such state of totalitarianism from taking over. When the 2nd amendment is trampled on, that truly is a problem as well - because that takes a key power away from us, the power to defend ourselves. That's not to disregard all the other rights we hold as free citizens, regarding free speech, and one close to my heart, freedom of religion. But those are intangibles, and can't actually be taken away by force (except from the fainthearted). The 2nd Amendment: "A well regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed." - - now that IS something that can physically be taken away - and people take that lightly, citing "safety" as an excuse. I hold true as an idealist at heart that, "Once people have tasted freedom they don't easily give it up." I know that will stand in our country until... at least until Armageddon and the end of the world as we know it is here. Until then, I guess we have to carry n as normal - otherwise we'd die from stress. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Thursday, January 20, 2005 12:33 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment "I" don't, I'd never do that to my fellow citizens, but the possibility "someone" has, or will exists....theres certainly been enough conspiracies that are being covered up, all marching twords the same result, a totalitarian state replacing ours. Look at the recent cover-ups, OKC stands out. Especially under a socialist like Clinton's, (and her husband) watch. The DHS hires Primikov of the Ex-KGB to design "Internal passports" for US citizens, what conclusions should one draw? Im not liking what Im seeing.... At 13:15 1/19/2005, you wrote: >Does that mean you conspire to believe they crashed planes into the WTC >and Pentagon, and PA, just to make provisions to take our liberties away? >That's a strong accusation. If true, obviously it's time for revolution, >and a new government (not that the current tax situation doesn't call for >that anyway... different topic), but certainly NOT a Liberal one, cuz >that's just a step towards Socialism, which is a step towards Communism, >and if you think that your liberties are being trampled on now... >But if it's not true - which I don't think it is - then we need to focus >on real enemies... like the UN. > >-----Original Message----- >From: kondrak [mailto:kondrak@s...] > > > >>But the police-state marches on....if theres any impediment to it, they'll > >>undoubtedly nuke some city to use more terror to make people give up their > >>liberty. > > >At 01:12 1/19/2005, you wrote: > > >This needs to be stopped immediately, they have more > >than enough power to do whatever they want with the > >original Patriot Act abomination that flushed the > >Constitution down the toilet. > > > >Bush et al are using their newfound powers to disrupt > >and destroy the credibility of U.S. citizens that > >would dare speak out against their corrupt regime and > >practice the hallowed right of public dissent. > > > >Pro se lawsuits directed against Administration > >officials is likely the only recourse at this point, > >it's apparent that the vast majority of Congress is > >being blackmailed at this point. > > > >--- savanted1 wrote: > > > > > > > > > > > > > > Privacy Activists Brace for White House Push to > > > Augment > > > Controversial Domestic Surveillance Powers > > > > > > > > > According to former Republican congressman Bob Barr, > > > now working as a > > > speaker and consultant to organizations such as the > > > American Civil > > > Liberties Union, "The administration has made it > > > clear that they do > > > intend to continue their move to dramatically reduce > > > privacy and > > > constitutional protection for our citizens." He and > > > other civil > > > liberties advocates expect Patriot Act II provisions > > > to resurface > > > piecemeal, such as in the Anti-Terrorism > > > Intelligence Tools > > > Improvement Act of 2003 (HR3179). Bills trying to > > > remedy some of the > > > more invasive provisions of the Patriot Act, such as > > > the Security and > > > Freedom Ensured (SAFE) Act of 2003, are still stuck > > > in the Senate and > > > House respectively. A driver's license provision of > > > the National > > > Intelligence Reform and Terrorism Act, passed before > > > the holiday > > > recess, requires all drivers' licenses to include > > > machine-readable, > > > encoded data by the end of 2006, and gives the > > > secretaries of > > > Transportation and Homeland Security until mid-2006 > > > to define the > > > data. > > > > > > http://www.wired.com/news/print/0,1294,66242,00.html > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ------------------------ Yahoo! Groups Sponsor > > > > > > > > > > >======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts > > > acquire speed, > > > the hands acquire shaking, the shaking is a > > > warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== > > > TSKS > > > Yahoo! Groups Links > > > > > > > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > > > > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > > > > >Yahoo! Groups Sponsor > > >ADVERTISEMENT > > > >< http://us.ard.yahoo.com/SIG=129uob3ev/M=298184.5639630.6699735.3001176/D=groups/S=1707216980:HM/EXP=1106242263/A=2532114/R=2/SIG=12kelmonn/*http://clk.atdmt.com/NFX/go/yhxxxnfx0020000014nfx/direct/01/ &time=1106155863563133> > > > >< http://us.adserver.yahoo.com/l?M=298184.5639630.6699735.3001176/D=groups/S=:HM/A=2532114/rand=371423117> > > > _____ > >Yahoo! Groups Links >* To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > >* To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > >* Your use of Yahoo! Groups is subject to the Yahoo! Terms of >Service < http://docs.yahoo.com/info/terms/> . > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10689 From: G P Date: Thu Jan 20, 2005 1:04pm Subject: RE: Privacy Activists Brace for White House Push to Augment > Then we decided that we had to "balance the region" > by providing weapons to Saddam Hussein (Rumsfeld and > Cheney were directly involved in that one). Golly gee I keep forgetting to mention that both Rumsfeld and Cheney are members of the Council on Foreign Relations, as was George H. W. Bush. Where there's a coup, there's a CFR member nearby. ;) Cheers! Greg PS: Bush Administration appointees that are members of the Council on Foreign Relations: Richard Cheney Vice President Condoleezza Rice National Security Advisor Franklin C. Miller Special Assistant to the President and Senior Director for Defense Policy and Arms Control Jendayi E. Frazer Special Assistant to the President and Senior Director for African Affairs at the National Security Council George J. Tenet CIA Director Anne O. Krueger Member of the Council of Economic Advisors James L. Connaughton Chairman, Presidentís Council on Environmental Quality Torkel L. Patterson Special Assistant to the President and Senior Director for Asian Affairs, National Security Council staff John B. Bellinger III Senior Associate Counsel to the President and Legal Adviser to the National Security Council Marcia E. Miller Member, Commission on Presidential Scholars Fr. Theodore Hesburgh Member, Commission on Presidential Scholars Zalmay Khalilzad Special Assistant to the President and Senior Director for Gulf, Southwest Asia and Other Regional Issues, National Security Council. Charles Blahous III Member of the National Economic Council, Executive Director of the Presidentís Commission to Strengthen Social Security Donald Rumsfeld Secretary of Defense Paul D. Wolfowitz Deputy Secretary of Defense Douglas Jay Feith Under Secretary of Defense for Policy James G. Roche Secretary of the Air Force Dov S. Zakheim Under Secretary of Defense (Comptroller) Leo S. Mackay Jr. Deputy Secretary of Veterans Affairs Peter W. Rodman Assistant Secretary of Defense Alberto Jose Mora General Counsel of the Department of the Navy Christine Todd Whitman EPA Administrator Elaine Chao Secretary of Labor Kenneth I. Juster Under Secretary of Commerce for Export Administration Faryar Shirzad Assistant Secretary of Commerce Kathleen B. Cooper Under Secretary of Commerce for Economic Affairs Peter S. Watson President of the Overseas Private Investment Corporation Kenneth W. Dam Deputy Secretary of the Treasury Peter R. Fisher Under Secretary of the Treasury for Domestic Finance Viet D. Dinh Assistant Attorney General Henrietta Holsman Fore Director of the U.S. Mint Jon M. Huntsman Jr. Deputy United States Trade Representative Robert B. Zoellick U.S. Trade Representative Colin L. Powell Secretary of State William J. Burns Assistant Secretary of State for Near Eastern Affairs Lorne W. Craner Assistant Secretary of State for Democracy, Human Rights, and Labor Walter H. Kansteiner Assistant Secretary of State for African Affairs C. David Welch Ambassador to Egypt Howard H. Baker Jr. Ambassador to Japan Paula J. Dobriansky Under Secretary of State for Global Affairs Richard Nathan Haass Director, State Department Policy Planning Staff William H. Taft IV Legal Adviser of the Department of State John Robert Bolton Under Secretary of State for Arms Control and International Security Charles A. Heimbold Jr. Ambassador to Sweden John D. Negroponte U.S. Representative to the United Nations Shirin R. Tahir-Kheli Head of the U.S. Delegation to the United Nations Commission on Human Rights Franklin L. Lavin Ambassador to Singapore Michael E. Guest Ambassador to Romania Alexander R. Vershbow Ambassador to the Russian Federation Daniel Charles Kurtzer Ambassador to Israel John Price Ambassador to Mauritius Carole L. Brookins Executive Director of the International Bank for Reconstruction and Development (a part of the World Bank) From: http://www.stoptheftaa.org/artman/publish/article_73.shtml 10690 From: James M. Atkinson Date: Thu Jan 20, 2005 1:02pm Subject: Inauguration Video Let it load, even though it is 6 MB long http://movies.yahoo.com/movies/feature/jibjabinaugural.html ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10691 From: James M. Atkinson Date: Thu Jan 20, 2005 5:09pm Subject: Inaugural Pictures Here is one of those secret Skull and Bones ceremonies http://conservativelife.com/blog/media/bushzipper.jpg Can anybody come up with an appropiate caption, or shall we just let the picture speak for itself. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10692 From: Michael Dever Date: Thu Jan 20, 2005 5:13pm Subject: Re: Inaugural Pictures Captions: "Keep looking, you'll find it!" "Looking for my weapon of mass destruction, heh heh heh!" On 21 Jan 2005, at 10:09, James M. Atkinson wrote: > > > Here is one of those secret Skull and Bones ceremonies > > http://conservativelife.com/blog/media/bushzipper.jpg > > Can anybody come up with an appropiate caption, or shall we just let > the > picture speak for itself. > > -jma > > > > > ----------------------------------------------------------------------- > ----------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ----------------------------------------------------------------------- > ----------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ----------------------------------------------------------------------- > ----------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ----------------------------------------------------------------------- > ----------------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10693 From: kondrak Date: Thu Jan 20, 2005 6:20pm Subject: Wireless Security (OT but interesting) > > > January 20, 2005 New York Times > >WHAT'S NEXT > > > Cargo Containers' Electronic Sensor Says 'Do Not Disturb' > >By ANNE EISENBERG > >MILLIONS of cargo containers full of toys, TV's and other consumer >products stream into United States ports each year. But security experts >fear the metal boxes could also be used to transport dangerous freight: >terrorist weapons. > >Researchers are working on modifications to the rugged containers, >adding electronic monitoring that can keep track of intrusions once the >boxes are sealed at a factory and on their way by train, truck and ship. > >General Electric > > >is testing a palm-size security device with a built-in microprocessor >and radio. The device, which has been tried out on a handful of >containers traveling between China and California, generates a magnetic >field. > >If the doors of the container move, the field changes, and the >microprocessor keeps track of the disturbance. At a port or loading >dock, the containers can be queried by radio, delivering a record of any >intrusions. > >"The microprocessor is always monitoring the sensor," said James >Petrizzi, a vice president for engineering in General Electric's >security business, who helped develop and test the wireless system. > >In trials, the device communicated with fixed dockside readers, as well >as with hand-held readers that could communicate wirelessly. "The system >creates a large wireless network where we can interrogate the security >device on the container," Mr. Petrizzi said. The reader notes the time >and date of any incursions since the container was sealed. The >communication between the security device and the reader is encrypted. > >A major manufacturer of containers, the China International Marine >Containers Group, incorporated the sensor in 18 of its containers as >prototypes to use for the General Electric trials. > >"We did the trials to make sure that the container and the electronic >pack would not be damaged or give false alarms," said David Wong, chief >technical officer at the company, which is based in Shenzhen, near Hong >Kong. "It can be operated under the most severe conditions in adverse >environments." > >The security devices were originally developed by All Set Marine >Security, based in Bromma, Sweden, near Stockholm. All Set is licensing >the technology to G.E. In the future, two versions of the monitoring >device will be available, ones built into the doors of new containers >and ones that can be retrofitted on an interior door post of old >containers, said Walt Dixon, project leader for port and cargo security >at the General Electric Global Research Center in Niskayuna, N.Y. > >Stephen E. Flynn, a senior fellow at the Council on Foreign Relations >and an expert on cargo security, said devices like G.E.'s were essential >if containers were to be made smarter. Dr. Flynn is a retired commander >in the United States Coast Guard. > >There are millions of containers in circulation, he said, any one of >which could be used by terrorists as a Trojan horse. "But if I knew a >particular container had been tampered with," he said, "I could >intercept it without causing problems for everyone else." A suspect >container could be identified and isolated for inspection without >interrupting regular cargo operations. > >Smart containers would also be important in the aftermath of an attack, >he said, for forensic investigation. "If we had an Al Qaeda-style attack >at two ports at the same time," he said, "it would create uncertainty >about all containers," possibly bringing trade to a standstill. "But if >you could go back into the data and find where the boxes came from, you >could narrow down the set of problems," he said, without having to close >down the whole system. > >General Electric tested the system in the laboratory and at sea. "The >freight can be subject to enormous forces," Mr. Dixon said, for example, >if the containers are stacked up to eight high on deck and rolling >through 40-foot seas. The group tried a number of approaches to sensing >whether the container doors were open at sea, including a pressure >sensor. But in one storm the container flexed so much that the pressure >between the door and the door frame went to zero. > >"So we decided pressure was not a good sensor," he said. "The zero >reading would give us a false alarm in heavy seas." > >Instead, the device senses magnetic flux density between the frame and >the door of the container, said Russell Mortenson, chairman of All Set >Marine Security. "When the door moves, the magnetic field changes," he >said, "and we can determine the distance between the door and the door >frame quite accurately." > >The device is built to last for the life of the container, typically 10 >years, he said. > >To interrogate the sensor, the G.E. group built wireless readers with a >100-foot range at dockside and prototypes of hand-held readers with a >30-foot range. "In the future," Mr. Petrizzi said, "we'd like a >hand-held device the size of a flashlight to allow people to arm and >read the status of the device." > >Unisys > > >paid for some of the tests for the new system. "It was an opportunity to >look at the competing types of technology," said Greg J. Baroni, who is >president of the global public sector of Unisys. "This one is relatively >inexpensive compared to the alternatives," he said. One alternative is >Global Positioning System-based systems with satellite communication to >keep track of goods on route. > >David Schrier, lead author of a report on container security by ABI >Research of Oyster Bay, N.Y., said there would eventually be >government-mandated rules for smart containers. His company estimated >that more than seven million containers enter the United States annually. > >"Once that government mandate comes," he said, "the market will lose its >apprehension about the costs of smart containers" and start providing >minimum protection. "That may well be simple devices to tell if the >container has been opened or not." > >Dr. Flynn said money spent on ensuring the integrity of cargo shipments >was justified. "The costs to improve the odds of preventing an attack, >and, in the worst case, to prevent shutting the whole system down, are a >good payment to make." > >E-mail: Eisenberg@n... 10694 From: Leanardo Date: Thu Jan 20, 2005 5:18pm Subject: Re: Inaugural Pictures I dont know which one bothers me more, the guy in thr front or the more "joyful" individual in the back... Bruce : ) --- In TSCM-L@yahoogroups.com, Michael Dever wrote: > Captions: > > "Keep looking, you'll find it!" > > "Looking for my weapon of mass destruction, heh heh heh!" > > > On 21 Jan 2005, at 10:09, James M. Atkinson wrote: > > > > > > > Here is one of those secret Skull and Bones ceremonies > > > > http://conservativelife.com/blog/media/bushzipper.jpg > > > > Can anybody come up with an appropiate caption, or shall we just let > > the > > picture speak for itself. > > > > -jma > > > > > > > > > > ------------------------------------------------------------------ ----- > > ----------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > ------------------------------------------------------------------ ----- > > ----------------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > ------------------------------------------------------------------ ----- > > ----------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > ------------------------------------------------------------------ ----- > > ----------------------------- > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > Michael J. Dever CPP > Dever Clark & Associates > GPO Box 1163 > Canberra ACT 2601 > Australia > Voice: +612 6254 5337 > Email: dca@b... > ********************************************************************** ** > ***** > This message is sent in strict confidence for the addressee only. > It may contain legally privileged information. The contents are not to > be disclosed to anyone other than the addressee. Unauthorised > recipients are requested to preserve this confidentiality and to advise > the sender immediately of any error in transmission. > > > > [Non-text portions of this message have been removed] 10695 From: Date: Thu Jan 20, 2005 1:15pm Subject: Re: Inaugural Pictures Yeap. Make sure it don't free-fall like Bill's Whooa there big fella ... Ted will take care of that end. [Non-text portions of this message have been removed] 10696 From: kondrak Date: Thu Jan 20, 2005 6:25pm Subject: RE: Privacy Activists Brace for White House Push to Augment Yes, hasn't been a lot of TSCM stuff, so its a break from watching an empty mailbox.... At 13:06 1/20/2005, you wrote: >Don't we go through this about once a month or so? D K - it will play >itself out. >Strong opinions are hard to keep contained. Especially when articles sent >out are related to TSCM, but also personal freedom, and that sorta >off-topic thing. Then it goes to a tangent! > >- Matt > >-----Original Message----- >From: G P [mailto:telos888@y...] >Sent: Thursday, January 20, 2005 1:04 PM >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] Privacy Activists Brace for White House Push to Augment > >Sounds like DK needs a hug. > >--- Riskbiz wrote: > > > I subscribed to this list to learn and educate > > myself about TSCM and asso > > fields, not listen to a bunch of > > psychotic/hysterical social/political > > commentary. Please stick to the topic or post > > elsewhere and stop filling my > > inbox with this crap. > > > > DK > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > >It is by caffeine alone I set my mind in motion. >It is by the juice of Star Bucks that thoughts acquire speed, >the hands acquire shaking, the shaking is a warning. >It is by caffeine alone I set my mind in motion. >=================================================== TSKS > > > > _____ > >Yahoo! Groups Links >* To visit your group on the web, go to: >http://groups.yahoo.com/group/TSCM-L/ > >* To unsubscribe from this group, send an email to: >TSCM-L-unsubscribe@yahoogroups.com > > >* Your use of Yahoo! Groups is subject to the Yahoo! Terms of >Service . > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10697 From: kondrak Date: Thu Jan 20, 2005 6:28pm Subject: RE: Privacy Activists Brace for White House Push to Augment Wholeheartedly agreed Matt, When they come for the 2nd Amendment, that's the trigger, and we all know it. Its the incrementalisim I worry about, the frog in the boiling water thing... At 12:46 1/20/2005, you wrote: >I agree with you to some point - there have always been conspiracies, and >total power is the aim. There's always the talk of the "shadow >government", and that the government in place really doesn't have any >power... alas, it's too much. >I believe that there's enough good people left in our great country to >stop any such state of totalitarianism from taking over. When the 2nd >amendment is trampled on, that truly is a problem as well - because that >takes a key power away from us, the power to defend ourselves. That's not >to disregard all the other rights we hold as free citizens, regarding free >speech, and one close to my heart, freedom of religion. But those are >intangibles, and can't actually be taken away by force (except from the >fainthearted). >The 2nd Amendment: "A well regulated militia, being necessary to the >security of a free state, the right of the people to keep and bear arms, >shall not be infringed." - - now that IS something that can physically be >taken away - and people take that lightly, citing "safety" as an excuse. > >I hold true as an idealist at heart that, "Once people have tasted freedom >they don't easily give it up." I know that will stand in our country >until... at least until Armageddon and the end of the world as we know it >is here. >Until then, I guess we have to carry n as normal - otherwise we'd die from >stress. 10698 From: kondrak Date: Thu Jan 20, 2005 6:31pm Subject: Re: Inauguration Video Ha!! Great! At 14:02 1/20/2005, you wrote: >Let it load, even though it is 6 MB long > >http://movies.yahoo.com/movies/feature/jibjabinaugural.html > > > >---------------------------------------------------------------------------------------------------- >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >---------------------------------------------------------------------------------------------------- > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10699 From: G P Date: Thu Jan 20, 2005 6:49pm Subject: Analysis of the Skype Protocol From ./ today: http://www.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-039-04.pdf Looks like Skype is utilizing a STUN-variant, with RSA 1536-2048 bit encryption for the key material, and AES-256 for the transport layer. Heavy duty crypto. 10700 From: G P Date: Thu Jan 20, 2005 6:52pm Subject: Re: Analysis of the Skype Protocol > From ./ today: /. rather (http://www.slashdot.org) 10701 From: Hawkspirit Date: Thu Jan 20, 2005 9:57pm Subject: US bugs in the UN Does anyone have confirming information on this? Roger I was wondering if you were aware of the story that appeared in the German media, but was censored from the American News, about Condelezza Rice having had the CIA bug the offices of the UN Security Counsel members during the hearings on Iraq? She admitted it to Der Speigel reporters, but nothing was ever mentioned in this country. The bugs were found during a routine search by British MI6 and were quickly identified as being CIA. The CIA said that they were ordered by Rice to place the bugs. Rice's reply was "yeah, so what!" It never went any further. -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.0 - Release Date: 1/17/2005 10702 From: G P Date: Thu Jan 20, 2005 10:15pm Subject: Re: US bugs in the UN Hey maybe Condi's not so bad after all ;) Why the heck would MI6 drop a dime on finding them, if this story is accurate? --- Hawkspirit wrote: > Does anyone have confirming information on this? > Roger > > I was wondering if you were aware of the story that > appeared in the > German media, but was censored from the American > News, about Condelezza > Rice having had the CIA bug the offices of the UN > Security Counsel > members during the hearings on Iraq? She admitted > it to Der Speigel > reporters, but nothing was ever mentioned in this > country. The bugs were > found during a routine search by British MI6 and > were quickly identified > as being CIA. The CIA said that they were ordered > by Rice to place the > bugs. Rice's reply was "yeah, so what!" It never > went any further. > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.7.0 - Release > Date: 1/17/2005 > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > What would our lives be like without music, dance, > and theater? > Donate or volunteer in the arts today at Network for > Good! > http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10703 From: Ramon Date: Thu Jan 20, 2005 6:53pm Subject: FBI abandons Carnivore wiretap software FBI abandons Carnivore wiretap software Commercial program, 3rd-party wiretaps now usedThe Associated Press Updated: 9:55 p.m. ET Jan. 18, 2005WASHINGTON - The FBI has effectively abandoned its custom-built Internet surveillance technology, once known as Carnivore, designed to read e-mails and other online communications among suspected criminals, terrorists and spies, according to bureau oversight reports submitted to Congress. Instead, the FBI said it has switched to unspecified commercial software to eavesdrop on computer traffic during such investigations and has increasingly asked Internet providers to conduct wiretaps on targeted customers on the government's behalf, reimbursing companies for their costs. The FBI performed only eight Internet wiretaps in fiscal 2003 and five in fiscal 2002; none used the software initially called Carnivore and later renamed the DCS-1000, according to FBI documents submitted to Senate and House oversight committees. The FBI, which once said Carnivore was "far better" than commercial products, said previously it had used the technology about 25 times between 1998 and 2000. 'We're using [commercially available software] more now and we're asking the Internet service providers that have the capabilities to collect data in compliance with court orders.' - Paul Bresson FBI spokesman The FBI said it could not disclose how much it spent to produce the surveillance software it no longer uses, saying part of its budget was classified. Outside experts said the government probably spent between $6 million and $15 million. The congressional oversight reports were obtained last week under the U.S. Freedom of Information Act by the Washington-based Electronic Privacy Information Center, a civil liberties group that criticized the surveillance software after it was first disclosed in 2000. Commercial alternatives FBI spokesman Paul Bresson said the bureau moved to popular commercial wiretap software because it was less expensive and had improved in its ability to copy e-mails and other communications of a targeted Internet account without affecting other subscribers. "We see the value in the commercially available software; we're using it more now and we're asking the Internet service providers that have the capabilities to collect data in compliance with court orders," Bresson said. The FBI said last week it was sending back to the drawing board its $170 million computer overhaul, which was intended to give agents and analysts an instantaneous and paperless way to manage criminal and terrorism cases. Related stories FBI may have to scrap new computer program From 2001: FBI software cracks encryption wall Experts said the life span of roughly four years for the bureau's homegrown surveillance technology was similar to the shelf life of cutting-edge products in private industry. "It's hard to criticize the FBI trying to keep pace with technology," said James Dempsey of the Washington-based Center for Democracy and Technology. "There is just a huge amount of innovation and development going on in the private sector." Henry H. Perritt Jr., who led an oversight study of Carnivore in 2000 for the Justice Department, said the FBI originally built its own surveillance system because commercial tools were inadequate. Perritt, a professor at the Chicago-Kent College of Law, said he was unaware of any commercial wiretap software that includes audit features robust enough to convince a federal judge that e-mails from innocent Internet users weren't captured by mistake. "You'd like to have a package that supervisors within a field office and in Washington could do an audit and make sure they're using the tools compliant with the court order," Perritt said. The FBI laboratory division, which produced Carnivore, was headed by Donald M. Kerr, who left the FBI in August 2001 to become the CIA's chief gadget-maker as head of its science and technology directorate. Kerr told lawmakers in 2000 that Carnivore was "far better than any commercially-available sniffer." http://www.msnbc.msn.com/id/6841403/ 10704 From: Gregory Hicks Date: Thu Jan 20, 2005 11:16pm Subject: Re: US bugs in the UN > To: > From: "Hawkspirit" > Date: Thu, 20 Jan 2005 19:57:55 -0800 > > Does anyone have confirming information on this? Roger > > I was wondering if you were aware of the story that appeared in the > German media, but was censored from the American News, about Condelezza > Rice having had the CIA bug the offices of the UN Security Counsel > members during the hearings on Iraq? She admitted it to Der Speigel > reporters, but nothing was ever mentioned in this country. The bugs were > found during a routine search by British MI6 and were quickly identified > as being CIA. The CIA said that they were ordered by Rice to place the > bugs. Rice's reply was "yeah, so what!" It never went any further. Actually, this is not 100% accurate. The story was on the front pages of the papers on the west coast, on the nightly news, and a few other news type places. The UN was apparently bugged but... It was quite a story for about 4 days. This was late last year... --------------------------------------------------------------------- I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10705 From: A Grudko Date: Fri Jan 21, 2005 4:26am Subject: RE: McDonald's in Boca to offer glimpse into world of espionage -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > Boca Raton ∑ He's an international man of intrigue who's bringing some of the old trade secrets from the espionage world to, well, a McDonald's. Now if he could just put up a poster revealing what REALLY goes into 'The Colonel's 14 Secret Herbs and Spices' and the fabled Coca Cola recipe which it is rumoured even the KGB could not get (in a failed 70's attempt to copy the US brand into the Eastern block - they should have left the vodka out). Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" [Non-text portions of this message have been removed] 10706 From: A Grudko Date: Fri Jan 21, 2005 4:27am Subject: wi-Fi ? clones LONDON, England -- "Evil twins" are the latest menace to threaten the security of Internet users, experts in the UK are warning. An "evil twin" is a bogus base station that latches on to someone using new "Wi-Fi" wireless technology. Victims think their laptops or mobile phones are connected to bona fide wireless internet connections. They may then transmit valuable bank details or other personal information, not suspecting that they are being intercepted by cybercriminals. Professor Brian Collins, from the Royal Military College of Science, Cranfield University, a former chief scientist at GCHQ -- the Government's secret eavesdropping station -- said: "Users need to be wary of not using their Wi-Fi enabled laptops or other portable devices in order to conduct financial transactions or anything that is of a sensitive personal nature, for fear of having disclosed this information to an unauthorised third party." Wireless devices link to the Internet via "hotspots" - nearby connection points that they lock on to. But these hotspots can act like an open door to thieves. Anyone with suitable equipment can locate a hotspot and take its place, substituting their own "evil twin." Dr. Phil Nobles, a wireless Internet and cybercrime expert at Cranfield University, said: "So-called 'evil twin' hotspots present a hidden danger for Web users. "In essence, users think they've logged on to a wireless hotspot connection when in fact they've been tricked to connect to the attacker's unauthorised base station. "The latter jams the connection to a legitimate base station by sending a stronger signal within close proximity to the wireless client -- thereby turning itself into an 'evil twin.' "Cybercriminals don't have to be that clever to carry out such an attack. Because wireless networks are based on radio signals they can be easily detected by unauthorised users tuning into the same channel hopping group. Unwitting web users are invited to log into the attacker's server with bogus login prompts, tempting them to give away sensitive information such as user names and passwords. Often users are unaware the have been duped until well after the incident has occurred. Dr. Nobles spelled out the warning at a wireless crime event held at the Dana Centre, the Science Museum's forum for discussing controversial science, in London. Lisa Jamieson, Head of Programmes at the Dana Centre, said: "Half of all business wireless networks in this country have inadequate security controls in place, making their information vulnerable to attack." --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 From: Hawkspirit Date: Mon Jan 21, 2002 11:51am Subject: Wireless LAN Test Gear Anyone have any experience with this test gear and software? Roger A handful of test equipment companies are currently developing advanced site survey tools - Berkeley Varitronics Systems (Metuchen, New Jersey) and Softbit (Oulu, Finland) now have products on the market. Softbit's TriCycle. is software that installs on a laptop equipped with a radio card and provides a very useful display of nearby access points, association status, signal levels, and has the ability to display coverage areas. This product doesn't get you away from lugging a laptop around, but it certainly has features that decrease the time and increase the accuracy of performing site surveys. Berkeley Varitronics Systems' Grasshopper. has fewer graphical features, but it is a small handheld device weighing only 3 lbs. http://www.80211-planet.com/tutorials/article/0,4000,10724_953661,00.html 4594 From: James M. Atkinson Date: Mon Jan 21, 2002 0:12pm Subject: Re: Help on R.F. signal identification You really don't need a dish, but you will need either a yagi or a horn. A dish tends to be a little too high of a gain antenna to use indoors, mostly due to the reflections of the signals. However, a small dish if really helpful as your outside and dealing with wide open spaces. Log periodic units are OK, but they are too broadband for this kind of situation, and don't have don't have sufficient gain to be of much value in cases like this. My personal preference would be a 16 dBi standard gain horn fed into an LNA with a filter on the front end. I prefer a 30-43+ dB LNA with a really sharp bandpass filter. When digging around in the 2.4 GHz ISM band you have to fight with PCS phones down below 1.9 GHz, and deal with MMDS and Aero Radar close to the band as well (many a sweeper has confused 2.7-2.9 GHz radar scatter with a burst transmission). You can get away with about 12 dB of antenna gain, but it is important to filter, then amplify. If your using something like a MSR-904 or SPECTRE then you have to fight with 20+ dB of system noise as well, so that filtered LNA is an absolute must. Figure the standard gain horn gives you a moderately directional signal (about a 20-30 degree pattern), but that the LNA actually cleans it up and isolates it so the receiver can hear it. On an MSR-904 you want to punch up the signals of interest by about 30 dB (plus the noise figure of the amplifier), and mount the LNA/Filter DIRECTLY on the horn. When you buy the horn get it with an SMA connector and attach the LNA directly to this (using an SMA to SMA L connector). If you are unable to find an LNA with the filter internal in the amp then buy an external and put it (or them) between the horn and the amplifier. The goal is to knock down the 1.8 PCS band by at least 60 dB, and preferably kill everything below 2 GHz by at least 40 dB. If your working near an airport you will also have to filter everything above 2.7 GHz. To measure the time domain crank the bandwidth of your receiver to about 50 MHz and dump the detected signal into a logarithmic amplifier and then to your scope. Set the trigger to be slightly above the noise floor of the incoming signal and document how it behaves. It is far more important to use the equipment to TRACE the source of the signal, then it is to try to figure out the mystery from a distance using passive techniques. -jma At 9:33 AM -0800 1/21/02, Hawkspirit wrote: >Thanks, Jim, > >The overall bandwidth is by the numbers 66MHZ, The individual pulses >appeared to be about 5MHZ each. As far as the time domain, I was using my >surveillance receiver so I could not do any kind of frame capture. >What would be the best technique for measurement in the time domain? >I could get a general direction on the signal but the sweep was started >after dark so I could not see the surrounding area. It is a residential >neighborhood. >The antenna's I am using are various flavors of wire wound configurations. >It appears I will need some kind of dish for this. Would this be your >recommendation for better directional analysis? >Thanks as always for your expert R.F.help. Roger > > >Roger, >What was the bandwidth of the signals, and did you examine the >signals in the time domain? >I would suspect an 802.11 WLAN connection, but of course it has to be >assumed a hostile signal until proven otherwise. >Where did you trace the signal to? >Was it originating INSIDE your clients facility? >What kind of antenna where you using? >-jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4595 From: Hawkspirit Date: Mon Jan 21, 2002 0:28pm Subject: Help on R.F. signal Identification From looking at these two articles, it sure seems that this describes my signal. Roger Part 4: the Frequency Hopping Spread Spectrum PHY (Naftali Chayat, BreezeCom) Part 5: the Direct Sequence Spread Spectrum PHY (Jan Boer, Lucent Technologies) http://grouper.ieee.org/groups/802/11/main.html 4596 From: James M. Atkinson Date: Mon Jan 21, 2002 0:59pm Subject: Re: Help on R.F. signal Identification OK, But you still have to find out where the signal is coming from. Bluetooth is quite capable of being used for voice eavesdropping, and as such you have to hunt down where the signals are coming from. For example, an eavesdropper can plant microphones all over someone office and then wire them into the companies LAN. Then extended the LAN "off premises" with Bluetooth so the eavesdropper can backdoor into the network and download the audio from the microphones. With some fairly cheap consumer technology the eavesdropper can have a VOX type voice recorder with a USB interface (like some of the 22 hour units) tied into a small controller that sits on the network. Every week of so the eavesdropper simply drives by the building and downloads a half dozen of these audio files from the controller in just a matter of minutes. A sophisticated eavesdropper could also have obtains a Bluetooth eavesdropping device, and what your picking up on is actually a signal a hostile device. Trace down where the signal is coming from, then trace the network connected to it. Suspect it is hostile until you can prove otherwise. -jma At 10:28 AM -0800 1/21/02, Hawkspirit wrote: > From looking at these two articles, it sure seems that this describes my >signal. Roger > >Part 4: the Frequency Hopping Spread Spectrum PHY (Naftali Chayat, BreezeCom) >Part 5: the Direct Sequence Spread Spectrum PHY (Jan Boer, Lucent >Technologies) > >http://grouper.ieee.org/groups/802/11/main.html > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4597 From: Aimee Farr Date: Mon Jan 21, 2002 0:59pm Subject: RE: China silent over spy devices found on its presidential plane > The story was not carried by any local media. Analysts said yesterday they > saw the lack of response by Beijing so far as a sign that the Chinese > leadership wanted to downplay the incident. Downplay...The Washington Post immediately jumps to mind, doesn't it? Pht. ~Aimee ''When the mass support is sufficiently good to block the leakage of news, it is often possible by various ruses to succeed in leading the enemy into a morass of wrong judgments and actions so that he loses his superiority and the initiative. The saying, "There can never be too much deception in war", means precisely this. What does "being caught unawares" mean? It means being unprepared. Without preparedness superiority is not real superiority and there can be no initiative either. Having grasped this point, a force which is inferior but prepared can often defeat a superior enemy by surprise attack. We say an enemy on the move is easy to attack precisely because he is then off guard, that is, unprepared.'' -- MAO 4598 From: James M. Atkinson Date: Mon Jan 21, 2002 1:09pm Subject: ONLY IN AMERICA ONLY IN AMERICA 1. Only in America...can a pizza get to your house faster than an ambulance. 2. Only in America...are there handicap parking places in front of a skating rink. 3. Only in America...do drugstores make the sick walk all the way to the back of the store to get their prescriptions while healthy people can buy cigarettes at the front. 4. Only in America...do people order double cheese burgers, large fries, and a diet coke. 5. Only in America...do banks leave safe doors open and then chain the pens to the counters. 6. Only in America...do we leave cars worth thousands of dollars in the driveway and put our useless junk in the garage. 7. Only in America...do we use answering machines to screen calls and then have call waiting so we won't miss a call from someone we didn't want to talk to in the first place. 8. Only in America...do we buy hot dogs in packages of ten and buns in packages of eight. 9. Only in America...do we use the word "politics" to describe the process so well: "Poli" in Latin meaning "many" and "tics" meaning "bloodsucking creatures." 10. Only in America...do they have drive-up ATM machines with Braille lettering -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4599 From: James M. Atkinson Date: Mon Jan 21, 2002 2:56pm Subject: Me want beer Indian walks into a bar with a shotgun in one hand and a bucket of Buffalo manure in the other. He says to the bartender: "Me want beer." The bartender says: "Sure Chief, coming right up." He gets the Indian a tall draft beer and the Indian drinks it down in one gulp, picks up the bucket, throws the manure into the air and blasts it with the shotgun, then he walks out. Four days later the Indian returns. He has his shotgun in one hand and another bucket of manure in the other. He walks up to the bar and says to the bartender: "Me want beer." The bartender says: "Whoa, Tonto, we're still cleaning up from the last time you were in here. What was that all about, anyway? "The Indian says, "Me in training for job as federal employee; drink beer, shoot the shit, and disappear for a few days." -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4600 From: gvp Date: Mon Jan 21, 2002 2:13pm Subject: [jmatk@tscm.com: Re: Help on R.F. signal Identification] Bluetooth probably isn't the culprit (although it operates in the 2.4 gig ISM band), as the range for Bluetooth and other Personal Area Networks is about 10 - 15 meters. One of the 802.11 variants is more likely. ----- Forwarded message from "James M. Atkinson" ----- Delivered-To: 25th.com-gvp@2... X-eGroups-Return: sentto-49964-5064-1011639627-gvp=25th.com@r... X-Sender: jmatk@tscm.com X-Apparently-To: TSCM-L@yahoogroups.com X-Sender: spook8@p... In-Reply-To: <5.1.0.14.0.20020121102529.00a3b020@1...> To: TSCM-L@yahoogroups.com From: "James M. Atkinson" X-Yahoo-Profile: graniteislandgroup Mailing-List: list TSCM-L@yahoogroups.com; contact TSCM-L-owner@yahoogroups.com Delivered-To: mailing list TSCM-L@yahoogroups.com Precedence: bulk List-Unsubscribe: Date: Mon, 21 Jan 2002 13:59:36 -0500 Subject: Re: [TSCM-L] Help on R.F. signal Identification OK, But you still have to find out where the signal is coming from. Bluetooth is quite capable of being used for voice eavesdropping, and as such you have to hunt down where the signals are coming from. For example, an eavesdropper can plant microphones all over someone office and then wire them into the companies LAN. Then extended the LAN "off premises" with Bluetooth so the eavesdropper can backdoor into the network and download the audio from the microphones. With some fairly cheap consumer technology the eavesdropper can have a VOX type voice recorder with a USB interface (like some of the 22 hour units) tied into a small controller that sits on the network. Every week of so the eavesdropper simply drives by the building and downloads a half dozen of these audio files from the controller in just a matter of minutes. A sophisticated eavesdropper could also have obtains a Bluetooth eavesdropping device, and what your picking up on is actually a signal a hostile device. Trace down where the signal is coming from, then trace the network connected to it. Suspect it is hostile until you can prove otherwise. -jma At 10:28 AM -0800 1/21/02, Hawkspirit wrote: > From looking at these two articles, it sure seems that this describes my >signal. Roger > >Part 4: the Frequency Hopping Spread Spectrum PHY (Naftali Chayat, BreezeCom) >Part 5: the Direct Sequence Spread Spectrum PHY (Jan Boer, Lucent >Technologies) > >http://grouper.ieee.org/groups/802/11/main.html > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ----- End forwarded message ----- 4601 From: James M. Atkinson Date: Mon Jan 21, 2002 6:45pm Subject: The cat walked by and broke wind... Good Evening, I just had a little chat with some salesmen who called and tried to hustle me into becoming an "exclusive dealer" for some highly sophisticated counter-surveillance which I can sell in my "store" (like I have time to run a storefront). I decided to entertain the call for a few minutes, and played the "gosh, what is a bug detector" game; which cause the sales weenie to explain how sophisticated the equipment was. I asked if they made the equipment themselves, and he proudly answered in the affirmative. He kept pushing me to visit his website, which I did (I am not going to give out the link on the off chance one of our membership is foolish enough to buy the gear). He explains to me that the pricing on their website is for dealers only, and that I can markup the prices by at least 800% or more. I of course feigned getting excited about all the money that could be made selling his equipment. I let him go through his little sales script, then I started lobbing "clueless questions" about "gee, what kinds of wiretaps will it detect", then asked him to explain what they meant by series and parallel, etc. Then, I dropped a bomb on the poor guy and asked him if it would detect "high impedance wiretaps" and he walked right into it. "Oh, Sure" he tells me after consulting with someone on his end, "but you have to get our Advanced System". He then went on to tell me that the engineers on his end have spent the last 15 years designing this equipment, etc... etc... The CIA buys is, the NSA certified it, the FBI is trying to force them out of business, and so on. I then explained that he can "insert and rotate" his little spy shop toys, that his descriptions are fraudulent, that his products are crap, and are being offered in violation of the law. Sheesh, it is really unbelievable the crap some of these people are trying to foist on the public. The sad part is that I have actually seen some of their equipment in the hands of neophytes (who paid the 800%). While it didn't detect any covert eavesdropping equipment it did blink when the cat walked by and broke wind... other then that it was a worthless paperweight. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4602 From: Matthew Paulsen Date: Mon Jan 21, 2002 7:58pm Subject: RE: The cat walked by and broke wind... hehe.. Reminds me of a buddy of mine that has one that goes off when you put it up to your head. Best $100 toy I've seen in years. -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Monday, January 21, 2002 4:46 PM To: TSCM-L Mailing List Subject: [TSCM-L] The cat walked by and broke wind... Good Evening, I just had a little chat with some salesmen who called and tried to hustle me into becoming an "exclusive dealer" for some highly sophisticated counter-surveillance which I can sell in my "store" (like I have time to run a storefront). I decided to entertain the call for a few minutes, and played the "gosh, what is a bug detector" game; which cause the sales weenie to explain how sophisticated the equipment was. I asked if they made the equipment themselves, and he proudly answered in the affirmative. He kept pushing me to visit his website, which I did (I am not going to give out the link on the off chance one of our membership is foolish enough to buy the gear). He explains to me that the pricing on their website is for dealers only, and that I can markup the prices by at least 800% or more. I of course feigned getting excited about all the money that could be made selling his equipment. I let him go through his little sales script, then I started lobbing "clueless questions" about "gee, what kinds of wiretaps will it detect", then asked him to explain what they meant by series and parallel, etc. Then, I dropped a bomb on the poor guy and asked him if it would detect "high impedance wiretaps" and he walked right into it. "Oh, Sure" he tells me after consulting with someone on his end, "but you have to get our Advanced System". He then went on to tell me that the engineers on his end have spent the last 15 years designing this equipment, etc... etc... The CIA buys is, the NSA certified it, the FBI is trying to force them out of business, and so on. I then explained that he can "insert and rotate" his little spy shop toys, that his descriptions are fraudulent, that his products are crap, and are being offered in violation of the law. Sheesh, it is really unbelievable the crap some of these people are trying to foist on the public. The sad part is that I have actually seen some of their equipment in the hands of neophytes (who paid the 800%). While it didn't detect any covert eavesdropping equipment it did blink when the cat walked by and broke wind... other then that it was a worthless paperweight. -jma -- -------------------------------------------------------------------------- ------------------------ The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com -------------------------------------------------------------------------- ------------------------ People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell ------------------------------------------------------------------------ -------------------------- Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4603 From: Aimee Farr Date: Mon Jan 21, 2002 9:40pm Subject: RE: The cat walked by and broke wind... I bet Jim makes for colorful testimony. Deceptive advertising and deceptive trade practice seem to run rampant in your industry on all sides. In many states, the deceptive trade practice statutes might offer assistance (goods and services), but only if people are knowledgeable enough to seek relief through counsel, and view it as worth the trouble. You've also got AGs and the FTC (federal deceptive trade practices and deceptive advertising). Lobbying for special provisions might offer extra bite. The Texas deceptive trade practice statute has special provisions for secondhand watches, kosher foods and Indian artifacts. (One would think that if the 'secondhand watch people' can get legislation....) Because of the unique natures of the goods and services in this area, I think it warrants a special deceptive trade practice provision, or a separate statute. Elected officials see a personal stake in many of these issues, they might be more receptive than you think. ~Aimee 4604 From: A Grudko Date: Tue Jan 22, 2002 10:23am Subject: The cat walked by and broke wind... - Original Message - From: James M. Atkinson I have an advantage in that I was born with a cat fart detector in the middle of my face - sorry I don't know the frequency it works on or any other tech specs.. > I let him go through his little sales script, then I started lobbing > "clueless questions" about "gee, what kinds of wiretaps will it > detect", then asked him to explain what they meant by series and > parallel, etc. I had a guy working for me who could not tell wire from 4x4 timber who now offers TSCM services. > Then, I dropped a bomb on the poor guy and asked him if it would > detect "high impedance wiretaps" and he walked right into it. "Oh, > Sure" he tells me after consulting with someone on his end, "but you > have to get our Advanced System". 60M ohm, 0.1 pf parallel, invisible to all but the best. > He then went on to tell me that the engineers on his end have spent > the last 15 years designing this equipment, etc... etc... The CIA > buys is, the NSA certified it, the FBI is trying to force them out of > business, and so on. Yada yada.... > > I then explained that he can "insert and rotate" his little spy shop > toys, that his descriptions are fraudulent, that his products are > crap Such mild language jma? Perhaps buy some under bcontroled conditons do a media exposure. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4605 From: Shawn Hughes Date: Tue Jan 22, 2002 11:32pm Subject: computer question I'm sitting here watching a show on cable ( I know). They are discussing the encroachment of surveillance by the gov against citizens. One detail they gave was on the Ames case. They stated that the FBI was remotely powering on Ames home computer, then subsequently removed data from, and powered it back down via the residential power lines. I am a little skeptical, unless they put a black box inside his pc. For instance, what kept ALL pc's on that transformer circuit from waking up? But, I am low on the knowledge base totem pole. What say ye, experts? Thanks! Shawn 4606 From: Matthew Paulsen Date: Wed Jan 23, 2002 3:16am Subject: RE: computer question The Ames case goes back to February, 1994 with Aldrich Ames, a counterintelligence officer with the CIA. In February, 1997 Ames plead guilt to committing espionage for Russia. From what I've been exposed to, various government and private groups have been developing alternative measure to pass information through alternate methods such as power lines and water, such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and subcontractors), etc. Power line theory for transmission of information for intercommunication between generating stations, substations and control rooms holds that this sort of espionage is feasible at lower levels down to the receiving devices - such as remote espionage of consumer television sets, etc. Further, this could be used for non-compliant networks which are operating antiquated systems - C64, Altos, TSR 80's, etc. Remote power switches are available commerically, so it is conceivable that one was used, but it would have to be planted and integrated into a LAN/WAN connection or remote dialup/LAN connection to work, or chips / circuits (ie: a board is installed in the PC, station, remote manager, etc). Baud rates vary depending on who you talk to as well as data transmission distances - I've seen 300bps to 1gb/s at distances of a few hundred yards to worldwide, and phy being water, fiber, cable, PL, etc. Outside this range, there are microchip capable devices that are available with no power supply source that are attachable, injected, injested, that can be worn, carried, etc, but this would not provide the scope of services that you are describing, and they are only for intermittent use, but are capable of being interfaced via RF and then to LAN/WAN for public transmission through PPTP / HTTP, etc over IP, IPX, whatever, for global communication. I've worked on some systems that have provided PL monitoring from centralize base stations for power utilities for automated billing and other services - downtimes, line failures, etc, which can be automated to interoperate with MRP/ERP systems and other systems, so it's not a hard feat to take that integration and migrate it from consumer/commerical applications to industrial and government espionage services. Minature digital transceivers based on these technologies are under development, and in use by some organizations, federal and otherwise. Normally though, it's easier to plant a trojan to access the system and manage remote booting, kslogging, etc, microphones, and any cameras if present. Guess it comes down to... It's easier, cheaper, and more reliable - "engineers viewpoint - It's not broken, so lets add more to it, vs 'normal' person viewpoint - it's not broken, so don't fix it" being a reasonable assumption. But, in the world of unlimited budgets without justification for expenses... who knows. Probably not much of an answer, but it's a start. If anyone else has other information, I'd be happy to find out what others have used/seen beyond what I have. -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: Tuesday, January 22, 2002 9:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] computer question I'm sitting here watching a show on cable ( I know). They are discussing the encroachment of surveillance by the gov against citizens. One detail they gave was on the Ames case. They stated that the FBI was remotely powering on Ames home computer, then subsequently removed data from, and powered it back down via the residential power lines. I am a little skeptical, unless they put a black box inside his pc. For instance, what kept ALL pc's on that transformer circuit from waking up? But, I am low on the knowledge base totem pole. What say ye, experts? Thanks! Shawn Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4607 From: Michael Puchol Date: Wed Jan 23, 2002 4:57am Subject: Re: computer question Matthew, You are right - the technology is there. A friend of mine has a patent for implementing an automated electricity meter reading system (by tapping into the integrator), which sends the consumption totals every so often to the nearest substation, which in turn forwards it to the billing computer, all done via your standard power lines. There are kits available that provide a standard LAN interface to computers, but that use your home's electrical wiring to send the data between these 'access points'. So, I presume it would be easy to implement such a concept. The way I'd do it, I would insert a custom PCB inside the power supply of the target computer, connected to the PC's wake-on-LAN port (most computers provide this function, or at least a wake-on-ring from a modem). That way, I could send a message to my 'bug' to turn on or off the computer at will, as it would also control the power supply. Getting it to send data afterwards is a different matter, but there are ways around that too. I guess your custom PCB could tap into the keyboard port, and send you the keystrokes logged. In any case, sufficient time and physical access to the target computer are needed, and certainly these functions are not built-in into any computer I know of. All the best, Mike ----- Original Message ----- From: "Matthew Paulsen" To: Sent: Wednesday, January 23, 2002 10:16 AM Subject: RE: [TSCM-L] computer question > The Ames case goes back to February, 1994 with Aldrich Ames, a > counterintelligence officer with the CIA. In February, 1997 Ames plead guilt > to committing espionage for Russia. From what I've been exposed to, various > government and private groups have been developing alternative measure to > pass information through alternate methods such as power lines and water, > such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, > Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and 4608 From: Matthew Paulsen Date: Wed Jan 23, 2002 0:29pm Subject: RE: computer question I totally forgot about WOL and other techs. I worked at Intel to help develop portions of the technology in 1995/96. The network adapter is fed constant power through a secondary interface from the power supply in the system - the power supply maintains current to the NIC when the rest of the system is turned off. Another system we had at Intel was codenamed hammerhead, now part of LANDesk, that allowed you to access systems through WOL and rebuild the entire system from scratch. These two systems together were designed to allow large corporations to hire untrained techs to roll out tens of thousands of systems on a LAN, or to allow the end user to install their system and have centralized IT blast the image down over the wire - simply plug in the system into the lan, setup kb/mouse, power cord, etc, and we'll turn it on via a WOL wakeup token, rebuild it to corporate standard and reboot it and leave it at a login prompt, all remotely. HP & Compaq & others have integrated remote management adapters for their servers. -----Original Message----- From: Michael Puchol [mailto:mpuchol@s...] Sent: Wednesday, January 23, 2002 2:57 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] computer question Matthew, You are right - the technology is there. A friend of mine has a patent for implementing an automated electricity meter reading system (by tapping into the integrator), which sends the consumption totals every so often to the nearest substation, which in turn forwards it to the billing computer, all done via your standard power lines. There are kits available that provide a standard LAN interface to computers, but that use your home's electrical wiring to send the data between these 'access points'. So, I presume it would be easy to implement such a concept. The way I'd do it, I would insert a custom PCB inside the power supply of the target computer, connected to the PC's wake-on-LAN port (most computers provide this function, or at least a wake-on-ring from a modem). That way, I could send a message to my 'bug' to turn on or off the computer at will, as it would also control the power supply. Getting it to send data afterwards is a different matter, but there are ways around that too. I guess your custom PCB could tap into the keyboard port, and send you the keystrokes logged. In any case, sufficient time and physical access to the target computer are needed, and certainly these functions are not built-in into any computer I know of. All the best, Mike ----- Original Message ----- From: "Matthew Paulsen" To: Sent: Wednesday, January 23, 2002 10:16 AM Subject: RE: [TSCM-L] computer question > The Ames case goes back to February, 1994 with Aldrich Ames, a > counterintelligence officer with the CIA. In February, 1997 Ames plead guilt > to committing espionage for Russia. From what I've been exposed to, various > government and private groups have been developing alternative measure to > pass information through alternate methods such as power lines and water, > such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, > Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and Yahoo! Groups Sponsor ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4609 From: James M. Atkinson Date: Wed Jan 23, 2002 3:00pm Subject: Re: computer question - Dangling the Dongle Shawn, It's really no big mystery. Most computers have a specific key on the keyboard (or motherboard) that when pressed allows the computer to wake up and go through a boot. This function can be remotely controlled by installing a "remote boot dongle" inside the keyboard, or inside the computer so an eavesdropper can turn the computer on or off remotely. The dongle either turns the machine on/off at a preset time, waits until a certain period of non usage has occurred, or wakes up in response to a remote command. The remote activation command can come in via any variety of conductors (phone line, power line, Cable TV, LAN, etc) or though a wireless connection. Once the computer is up and booted the eavesdropper can then access the OS remotely, and depending on which software they are using they perform any number of tasks. Occasionally, you will come across such goodies on larger corporate sweeps, and most often on servers, remote machines, or problem children where the sys admin doesn't want to keep running to remote parts of the campus to tweak software. Such a system allows the sys admin to remotely wake-up or boot the machine in question and "do those things which admins do so well". Usually on the corporate sweeps the 'wake up" signal goes out though the LAN as a wake-up packet addressed to the dongle, and more recently though a 802.11 network. If the bug the FBI used on Ames utilized the power lines, then the listening post would have to be fairly close to the Ames home as you lose quite a bit of your signal at the distribution transformer. In all probability they where camped out in a home nearby and simply brought up the OS, and then issued basic DOS commands (from their end) to browse through the hard drive and suck down files. After they where done it would have been quite simple to shut the machine down. -jma PS: Ames was a putz, and didn't follow good tradecraft Technical Counterintelligence Rule #374 Agent shall always turn of his/her computer when not in immediate use, and shall remove the power cord from the wall and/or disengaged the breaker on the individual UPS when the machine will not be in use for more then two hours. In the event the agent does not have a positive 7/24 security force in place the computer will also be powered down and locked into an approved security container (such as a safe) and physically disconnected from both the telephone circuits, LAN circuits, and all other conductive or radiated paths. At 12:32 AM -0500 1/23/02, Shawn Hughes wrote: >I'm sitting here watching a show on cable ( I know). They are discussing >the encroachment of surveillance by the gov against citizens. > >One detail they gave was on the Ames case. They stated that the FBI was >remotely powering on Ames home computer, then subsequently removed data >from, and powered it back down via the residential power lines. > >I am a little skeptical, unless they put a black box inside his pc. For >instance, what kept ALL pc's on that transformer circuit from waking up? > >But, I am low on the knowledge base totem pole. What say ye, experts? > >Thanks! > >Shawn -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4610 From: James M. Atkinson Date: Wed Jan 23, 2002 4:24pm Subject: China plane bugs Sloppy U.S. spying or untrue? http://famulus.msnbc.com/FamulusIntl/reuters01-22-174254.asp?reg=PACRIM China plane bugs Sloppy U.S. spying or untrue? WASHINGTON, Jan. 22 - Either U.S. spy agencies were incredibly sloppy by planting so many eavesdropping devices in a Chinese presidential plane that detection was almost certain, or it was not their work, U.S. intelligence experts said on Tuesday. The experts expressed skepticism that American spies had a hand in what newspaper reports said were more than two dozen bugs found inside a plane to be used by Chinese President Jiang Zemin, including in the bathroom and the headboard of the bed. On one hand, the CIA, National Security Agency and FBI have a strong national security interest in collecting intelligence on China. But on the other hand, the intelligence experts questioned whether the spy agencies would have been so slipshod to have planted more than two dozen bugs, increasing the risk of discovery, in a plane they knew would be carefully swept for just such items. Weekend reports in The Washington Post and the Financial Times, citing Chinese officials, raised the specter of American spies at work because the Boeing 767 spent close to a year in Texas being refurbished before it was sent to China last August. Official Washington from the White House to the CIA has simply declined to comment, leaving the issue murky without a firm denial. And Beijing offered a similar lack of comment, saying China had no knowledge of such an incident. The reports of possible espionage uncovered came at a delicate moment, with President George W. Bush due to visit China next month. But the methods outlined in the media raised questions for some U.S. experts. 'FAIR GAME' ''I'm skeptical,'' one intelligence expert said. ''It seems an odd way to go about it if it is true.'' The CIA, which is generally not allowed to spy on Americans, could bug equipment heading for key targets such as Iran, North Korea or China. ''It's fair game,'' a former intelligence official said on condition of anonymity. But on putting two dozen bugs into plane upholstery that could be easily detected, he said: ''It would be surprising, and increase risk of discovery.'' One version of the story circulating in Beijing, according to a New York Times report on Tuesday, suggested the bugs were placed by the Chinese Air Force, which was guarding the plane during its construction in the United States. Intelligence experts also said it would be difficult to conduct such an operation without informing the American firm. Philip O'Connor, a vice president at Dee Howard Aircraft Maintenance, said the San Antonio, Texas, firm that provided the space and security for refitting the plane had no knowledge of any listening devices planted. ''We were surprised because there is no way we would jeopardize this company,'' he told Reuters in a telephone interview. ''We've done so many heads-of-state aircraft and never had a complaint about anything like that.'' The company has worked previously on aircraft belonging to the king of Saudi Arabia, the sultan of Oman and the sultan of Brunei, among others, he said. ''There is no way that we would get involved with that. We don't build our integrity and reputation on that kind of stuff,'' O'Connor said. Asked whether the U.S. government would have had to notify the firm for such a mission, O'Connor replied: ''I don't know. I don't have a clue how that works. I don't know what these covert actions are like.'' He said the company had not heard about any bugging incident from either the Chinese or American governments. O'Connor said a six-foot (two-meter) fence had surrounded the plane while the work was going on, with a single entrance that was monitored around the clock. The company was gathering all its daily reports on who had access to the plane in the event they were needed, he said. Also, about 20 Chinese security guards monitored security over three shifts a day, seven days a week, O'Connor added. Copyright 2002 Reuters Limited. All rights reserved. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4611 From: Hawkspirit Date: Thu Jan 24, 2002 6:43am Subject: Pricey? Are these rates a bit pricey or is it just that I work a lot harder for less? Roger Tolces www.bugsweeps.com ∑ Each average size office area , or conference room .................$ 1,275.00 ∑ Each telephone instrument ......................................................$ ...280.00 ∑ Each telephone trunk line .......................................................$ ...300.00 ∑ Each telephone Main Frame Room , including PBX or KSU ..$ ...750.00 ∑ Each intermediate Frame Room .............................................$ ...300.00 ∑ Each outside pedestal box or overhead junction box ..............$ ...300.00 http://www.segnow.com/SWEEP%20BROUCHERE.htm 4612 From: Hawkspirit Date: Thu Jan 24, 2002 6:50am Subject: Your Gonna love this one! The Truth: For years, counter surveillance technicians have used sophisticated heavy equipment, such as Time Domain Reflectometers, Oscilloscopes, Signal Generators, Frequency Counters and even Volt Meters. All of this equipment is ACTUALLY GOOD. From being a seasoned company, we have used all of these types of equipment to find Telephone Intrusions by doing physical sweeps. But through literally years of research and time, we have come up with a practical solution to REPLACE this equipment.. It almost seems unbelievable. Most Counter Surveillance technicians even find it hard to believe until they have used our products. . http://www.antispy.com/telephone.html 4613 From: James M. Atkinson Date: Thu Jan 24, 2002 7:03am Subject: Re: Pricey? At 4:43 AM -0800 1/24/02, Hawkspirit wrote: >Are these rates a bit pricey or is it just that I work a lot harder for less? >Roger Tolces >www.bugsweeps.com > > > >∑ Each average size office area , or conference room >.................$ 1,275.00 >∑ Each telephone instrument >......................................................$ ...280.00 >∑ Each telephone trunk line >.......................................................$ ...300.00 >∑ Each telephone Main Frame Room , including PBX or KSU ..$ ...750.00 >∑ Each intermediate Frame Room >.............................................$ ...300.00 >∑ Each outside pedestal box or overhead junction box ..............$ >...300.00 > >http://www.segnow.com/SWEEP%20BROUCHERE.htm Personally, I think the way they have their pricing broken down is unrealistic. You can't charge "by the room" unless you know how big the rooms are, and how they are appointed. For example, is it a storage room? a conference room? an executive office? or a computer room... each takes a drastically varying amount of time for a sweep. I was quite tickled to see that they are charging almost nothing for private planes, but 400 dollars for at least 4 days of work doesn't seem like much. Oh well, if their client are paying it, and their are getting a fair service, then I guess they can pretty much charge whatever they like. I have my own estimate worksheet at: http://www.tscm.com/estimate.html My terms and conditions can be found at: http://www.tscm.com/howcost.html -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4614 From: James M. Atkinson Date: Thu Jan 24, 2002 7:08am Subject: Re: Your Gonna love this one! At 4:50 AM -0800 1/24/02, Hawkspirit wrote: >The Truth: >For years, counter surveillance technicians have used sophisticated heavy >equipment, such as Time Domain Reflectometers, Oscilloscopes, Signal >Generators, Frequency Counters and even Volt Meters. All of this equipment >is ACTUALLY GOOD. > From being a seasoned company, we have used all of these types of >equipment to find Telephone Intrusions by doing physical sweeps. But >through literally years of research and time, we have come up with a >practical solution to REPLACE this equipment.. It almost seems >unbelievable. Most Counter Surveillance technicians even find it hard to >believe until they have used our products. . > >http://www.antispy.com/telephone.html > The product being offered would appear to be a hoax, and they are making seriously unrealistic claims. Looks like just another spyshop toy. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4615 From: Steve Uhrig Date: Thu Jan 24, 2002 8:08am Subject: Re: Pricey? Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > Are these rates a bit pricey or is it just that I work a lot > harder for less? > http://www.segnow.com/SWEEP%20BROUCHERE.htm This is a well known spy shop and spy groupie in the Northern VA/DC area. He has no professional equipment and zero experience, and is a laughing stock. He is also a crook. I personally witnessed him deliver, in Mexico City, kit bugs and kit 'tracking transmitters' claiming them as his own top of the line stuff, for several thousand dollars. He's holding a little circuit board half the size of a pack of matches and claiming 20 mile range. I'm sitting there with a professional beacon the size of a chalkboard eraser having just told the client the range would be 1 to 2 miles at most in their environment, and my price was the same as his. He's a Jim Ross acolyte, so that should tell the story. He has never and will never do a sweep for real, let alone for the prices listed. They are purely eyewash to lend credibility to his spy shop. In no way can they be used as references. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4616 From: Johnston, Richard Date: Thu Jan 24, 2002 8:08am Subject: RE: Your Gonna love this one! Just as they predicted! "It almost seems unbelievable. Most Counter Surveillance technicians even find it hard to believe until they have used our products." After you have used it please tell us about your "conversion," your immediate change of heart or (dare I say it?) your epiphany. 8>) Rico -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, January 24, 2002 6:09 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Your Gonna love this one! At 4:50 AM -0800 1/24/02, Hawkspirit wrote: >The Truth: >For years, counter surveillance technicians have used sophisticated heavy >equipment, such as Time Domain Reflectometers, Oscilloscopes, Signal >Generators, Frequency Counters and even Volt Meters. All of this equipment >is ACTUALLY GOOD. > From being a seasoned company, we have used all of these types of >equipment to find Telephone Intrusions by doing physical sweeps. But >through literally years of research and time, we have come up with a >practical solution to REPLACE this equipment.. It almost seems >unbelievable. Most Counter Surveillance technicians even find it hard to >believe until they have used our products. . > > http://www.antispy.com/telephone.html > The product being offered would appear to be a hoax, and they are making seriously unrealistic claims. Looks like just another spyshop toy. -jma -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell ---------------------------------------------------------------------------- ---------------------- Yahoo! Groups Sponsor [] _____ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 4617 From: Date: Thu Jan 24, 2002 3:59am Subject: Re: Pricey? In a message dated 1/24/02 4:47:21 AM Pacific Standard Time, hawkspirit@e... writes: << Are these rates a bit pricey or is it just that I work a lot harder for less? >> A visit to his web site was revealing. It appears that he copied a copyrighted sweep estimate form from one of the oldest and established TSCM practitioners. It does appear that he's using top of the line equipment from one of the oldest established TSCM equipment manufacturers. Perhaps a visit to the state licensing board for a perusal of his application is the next step. M. 4618 From: James M. Atkinson Date: Thu Jan 24, 2002 8:48am Subject: Farmer Joe Farmer Joe decided his injuries from his recent accident were serious enough to take the trucking company responsible for the accident to court. In court, the trucking company's fancy lawyer was questioning farmer Joe. "Didn't you say, at the scene of the accident, that you were fine?" ''Well, I'll tell you what happened. I had just loaded my favorite mule Bessie into the--" ''I didn't ask for any details,'' the lawyer interrupted. ''Just answer the question. Did you not say, at the scene of the accident, that you were fine?" ''Well I had just got Bessie into the trailer and was driving down the road--'' ''Judge, I am trying to establish the fact that, at the scene of the accident, this man told the Highway Patrolman on the scene that he was just fine. Now several weeks after the accident he is trying to sue my client. I believe he is a fraud. Please tell him to simply answer the question.'' By this time the Judge was fairly interested in Farmer Joe's answer and told the lawyer so. ''Well," said the farmer, "as I was saying, I had just loaded Bessie, my favorite mule, into the trailer and was driving her down the highway when this huge semi-truck and trailer ran the stop sign and smacked my truck right in the side. I was thrown into one ditch and Bessie was thrown into the other. I was hurting real bad and didn't want to move. However, I could hear ol' Bessie moaning and groaning. I knew she was in terrible shape just by her groans. Shortly after the accident a Highway Patrolman came on the scene. He could hear Bessie moaning and groaning so he went over to her. After he looked at her he took out his gun and shot her between the eyes. Then the Patrolman came across the road with his gun in his hand and looked at me. He said, 'Your mule was in such bad shape I had to shoot her. How are you feeling?'" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4619 From: David Alexander Date: Thu Jan 24, 2002 10:47am Subject: re: computer question This is my area of expertise. I'm a computer security/Information Warfare geek, not a 'bug-hunter' (no offence intended or implied). I'll give you the short answer: Yes, there is a system that allows LAN awakening and control of a PC. This system normally depends on a special cable from the Network card to a connector on the motherboard that awakens the PC. Any self-respecting company removes this cable to disable the facility as the very first thing they do when the PC arrives as it is a massive security hole and should never, ever be allowed to be active. Half of me wants to say that any company that does not deserves everything they get, but that is counter to the philosophy of this group. If your outfit has these cables in place, get them removed ASAP, they are a hackers dream. On Windows 2000 and Windows XP (TM acknowledged) there is another way of taking over a PC through the Netmeeting utility. Great for remote support and software installations. The remote install function via network wake-up is not needed due to something called Remote Install Server. I won't bore you with the details here. If anyone has more questions I'd be happy to take them offline direct to my e-mail address unless JMA thinks the info is of interest to all (your call) regards _____________________________ David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc Tel: +44 (0) 1235 837823 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1235 837201 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4620 From: David Alexander Date: Thu Jan 24, 2002 10:52am Subject: computer question parts 2 There is a much simpler way that Ames could have been monitored - TEMPEST emissions In case some of you are unaware, with a decent yagi and some software you can see what someone's' PC is doing real-time while they are doing it. Fibre-glass bodied van with aerial inside and you can sit some distance away and see what's happening without entering premises and leaving a bug to be found or anything to recover afterwards. Any surveillance team could do this...if they are not putz's (with acknowledgement to the previous poster) _____________________________ David Alexander M.INSTIS Global Client-Server, Communications & Infrastructure Director Bookham Technology plc Tel: +44 (0) 1235 837823 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1235 837201 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4621 From: Hawkspirit Date: Thu Jan 24, 2002 11:29am Subject: Jim Ross From: "Steve Uhrig" "He's a Jim Ross acolyte, so that should tell the story." Steve I never have heard your take on Jim Ross, I don't know whether you heard my rather public debate with Ross in the early 1980's about TDR when he continually insisted they were worthless for TSCM. Roger 4622 From: Steve Uhrig Date: Thu Jan 24, 2002 1:23pm Subject: Re: computer question parts 2 Once upon a midnight dreary, David Alexander pondered, weak and weary: > There is a much simpler way that Ames could have been monitored - > TEMPEST emissions > In case some of you are unaware, with a decent yagi and some > software you can see what someone's' PC is doing real-time while > they are doing it. > Fibre-glass bodied van with aerial inside and you can sit some > distance away and see what's happening without entering premises > and leaving a bug to be found or anything to recover afterwards. > Any surveillance team could do this...if they are not putz's > (with acknowledgement to the previous poster) Don't believe everything you read in the spy books. Or everything Frank Jones says either. Sorry to dump on your guru. It would be a waste of bandwidth to go into all the reasons why the above statements are ludicrous. Surveillance technology is advancing in leaps and bounds, but do you see anyone advertising or any government specifying Tempest- shielded equipment anymore? Why? Other than a staged highly controlled demo by the FBI during a security briefing almost 20 years ago, I've never seen a demo or real world application of an intercept of this sort. Maybe we're all just putzes. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: A Grudko Date: Fri Jan 21, 2005 4:27am Subject: RE: Privacy Activists Brace for White House Push to Augment -----Original Message----- From: G P [mailto:telos888@y...] > Golly gee I keep forgetting to mention that both Rumsfeld and Cheney are members of the Council on Foreign Relations, as was George H. W. Bush. Where there's a coup, there's a CFR member nearby. ;) And John F Kerry and Bill Clinton according to the CFR's 1992 Membership Roster. Relevance to the TSCM list and it's intelligence theme - very limited. Oh, since we are off topic anyway, my caption for the Inauguration photo JMA posted is "Monica, I love what ya've done with your hair" Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 10708 From: Andy Moore Date: Thu Jan 20, 2005 1:51pm Subject: Mains Mover/Current Carrier A firm called Devolo, based in Germany, is now marketing a device which modulates stereo, high bandwidth audio onto the power cabling in order to distribute music etc around households - it's not hard to see other uses for such a device! It en/decodes audio, at 44KHz CD quality, onto OFDM carriers, across the HF band, on to cabling for subsequent conversion a couple of hundred metres away. Probably quite obvious on a SA but also very easy to deploy.... http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html Andy M 10709 From: kondrak Date: Fri Jan 21, 2005 11:01am Subject: Re: Analysis of the Skype Protocol Good! At 19:49 1/20/2005, you wrote: > From ./ today: > >http://www.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-039-04.pdf > >Looks like Skype is utilizing a STUN-variant, with RSA >1536-2048 bit encryption for the key material, and >AES-256 for the transport layer. Heavy duty crypto. > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10710 From: kondrak Date: Fri Jan 21, 2005 11:02am Subject: Re: US bugs in the UN I cant think of a better bunch of commies to bug...specially since they have a liking for OUR money to line their pockets with. At 22:57 1/20/2005, you wrote: >Does anyone have confirming information on this? Roger > > > >I was wondering if you were aware of the story that appeared in the >German media, but was censored from the American News, about Condelezza >Rice having had the CIA bug the offices of the UN Security Counsel >members during the hearings on Iraq? She admitted it to Der Speigel >reporters, but nothing was ever mentioned in this country. The bugs were >found during a routine search by British MI6 and were quickly identified >as being CIA. The CIA said that they were ordered by Rice to place the >bugs. Rice's reply was "yeah, so what!" It never went any further. > > > >-- >No virus found in this outgoing message. >Checked by AVG Anti-Virus. >Version: 7.0.300 / Virus Database: 265.7.0 - Release Date: 1/17/2005 > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10711 From: kondrak Date: Fri Jan 21, 2005 11:03am Subject: Re: US bugs in the UN Professional jealousy.... At 23:15 1/20/2005, you wrote: >Hey maybe Condi's not so bad after all ;) > >Why the heck would MI6 drop a dime on finding them, if >this story is accurate? 10712 From: kondrak Date: Fri Jan 21, 2005 11:03am Subject: Re: FBI abandons Carnivore wiretap software Oh SURE they have..uh huh...... At 19:53 1/20/2005, you wrote: >FBI abandons Carnivore wiretap software >Commercial program, 3rd-party wiretaps now usedThe Associated Press >Updated: 9:55 p.m. ET Jan. 18, 2005WASHINGTON - The FBI has >effectively >abandoned its custom-built Internet surveillance technology, once >known as >Carnivore, designed to read e-mails and other online communications >among >suspected criminals, terrorists and spies, according to bureau >oversight >reports submitted to Congress. >Instead, the FBI said it has switched to unspecified commercial >software to >eavesdrop on computer traffic during such investigations and has >increasingly asked Internet providers to conduct wiretaps on targeted >customers on the government's behalf, reimbursing companies for >their costs. >The FBI performed only eight Internet wiretaps in fiscal 2003 and >five in >fiscal 2002; none used the software initially called Carnivore and >later >renamed the DCS-1000, according to FBI documents submitted to Senate >and >House oversight committees. The FBI, which once said Carnivore >was "far >better" than commercial products, said previously it had used the >technology >about 25 times between 1998 and 2000. >'We're using [commercially available software] more now and we're >asking the >Internet service providers that have the capabilities to collect >data in >compliance with court orders.' > >- Paul Bresson >FBI spokesman > >The FBI said it could not disclose how much it spent to produce the >surveillance software it no longer uses, saying part of its budget >was >classified. Outside experts said the government probably spent >between $6 >million and $15 million. >The congressional oversight reports were obtained last week under >the U.S. >Freedom of Information Act by the Washington-based Electronic Privacy >Information Center, a civil liberties group that criticized the >surveillance >software after it was first disclosed in 2000. >Commercial alternatives >FBI spokesman Paul Bresson said the bureau moved to popular >commercial >wiretap software because it was less expensive and had improved in >its >ability to copy e-mails and other communications of a targeted >Internet >account without affecting other subscribers. >"We see the value in the commercially available software; we're >using it >more now and we're asking the Internet service providers that have >the >capabilities to collect data in compliance with court orders," >Bresson said. >The FBI said last week it was sending back to the drawing board its >$170 >million computer overhaul, which was intended to give agents and >analysts an >instantaneous and paperless way to manage criminal and terrorism >cases. > >Related stories >FBI may have to scrap new computer program > From 2001: FBI software cracks encryption wall >Experts said the life span of roughly four years for the bureau's >homegrown >surveillance technology was similar to the shelf life of cutting-edge >products in private industry. >"It's hard to criticize the FBI trying to keep pace with >technology," said >James Dempsey of the Washington-based Center for Democracy and >Technology. >"There is just a huge amount of innovation and development going on >in the >private sector." >Henry H. Perritt Jr., who led an oversight study of Carnivore in >2000 for >the Justice Department, said the FBI originally built its own >surveillance >system because commercial tools were inadequate. Perritt, a >professor at the >Chicago-Kent College of Law, said he was unaware of any commercial >wiretap >software that includes audit features robust enough to convince a >federal >judge that e-mails from innocent Internet users weren't captured by >mistake. >"You'd like to have a package that supervisors within a field office >and in >Washington could do an audit and make sure they're using the tools >compliant >with the court order," Perritt said. >The FBI laboratory division, which produced Carnivore, was headed by >Donald >M. Kerr, who left the FBI in August 2001 to become the CIA's chief >gadget-maker as head of its science and technology directorate. Kerr >told >lawmakers in 2000 that Carnivore was "far better than any >commercially-available sniffer." > >http://www.msnbc.msn.com/id/6841403/ > > > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10713 From: Nalesnik, Matthew Date: Fri Jan 21, 2005 0:01pm Subject: RE: US bugs in the UN Amen! -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Friday, January 21, 2005 12:03 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] US bugs in the UN I cant think of a better bunch of commies to bug...specially since they have a liking for OUR money to line their pockets with. At 22:57 1/20/2005, you wrote: >Does anyone have confirming information on this? Roger > > > >I was wondering if you were aware of the story that appeared in the >German media, but was censored from the American News, about Condelezza >Rice having had the CIA bug the offices of the UN Security Counsel >members during the hearings on Iraq? She admitted it to Der Speigel >reporters, but nothing was ever mentioned in this country. The bugs were >found during a routine search by British MI6 and were quickly identified >as being CIA. The CIA said that they were ordered by Rice to place the >bugs. Rice's reply was "yeah, so what!" It never went any further. > > > >-- >No virus found in this outgoing message. >Checked by AVG Anti-Virus. >Version: 7.0.300 / Virus Database: 265.7.0 - Release Date: 1/17/2005 > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10714 From: littledog Date: Fri Jan 21, 2005 1:00pm Subject: Re: Mains Mover/Current Carrier I have 2 tv's bought new (4 yrs. ago) from wal-mart that came with carrier current bugs already installed they appeared to be after factory instalations, I also have an answering machine (purchased 3 yrs. ago) from radio shack that came with a rather sophisticated infinity bug and a call forwarding device already installed..any comments? should I sue? what's up with this, anyone else experience such things?> -----Original Message----- > From: Andy Moore [mailto:ASMoore@A...] > Sent: Friday, January 21, 2005, 3:36 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Mains Mover/Current Carrier > > > A firm called Devolo, based in Germany, is now marketing a device which > modulates stereo, high bandwidth audio onto the power cabling in order to > distribute music etc around households - it's not hard to see other uses for > such a device! It en/decodes audio, at 44KHz CD quality, onto OFDM > carriers, across the HF band, on to cabling for subsequent conversion a > couple of hundred metres away. Probably quite obvious on a SA but also very > easy to deploy.... > > http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html > > Andy M > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10715 From: Ramon Date: Fri Jan 21, 2005 1:40pm Subject: China to launch communication satellite China will send a communication satellite owned by a Hong Kong company into space during the first half of this year. China National Space Administration says the European-made satellite is expected to orbit for 13 years and will be responsible for transmitting radio and television signals for China, East Asia, Australia and Hawaii. Meanwhile, a multi-purpose small satellite developed by China, Pakistan, Thailand, Bangladesh, Mongolia, South Korea, and Iran will be launched in 2006. It will be used to carry out scientific experiments and environmental observations for countries in the Asia-Pacific region. http://english.people.com.cn/200501/21/eng20050121_171494.html 10716 From: James M. Atkinson Date: Fri Jan 21, 2005 5:26pm Subject: US, Is the FBI covering up its spies? http://www.keralanext.com/news/indexread.asp?id=95631 US, Is the FBI covering up its spies? Wednesday, January 19, 2005 [US News]: Was the case of former FBI agent Robert Hanssen turned Russian informant just a blip or one of many? The FBI is currently going through a major investigation following the complaints of a former translator; who insists that there is espionage going on from within the bureau. According to Sibel Edmond she was fired from her position only after she had made complaints to senior officials in the FBI and put forward an official memo stating so. She has since sued for un lawful dismissal and asked for compensation only for her case to be thrown out by the presiding judge following the intervention of then Attorney General John Ashcroft who said her claims might expose government secrets and be damaging toÖnational security. The case concerning Edmonds has been handed to the U.S. Justice Department's senior oversight official whose report states that her allegations regarding shoddy work and possible espionage from within the bureau's translator program were never properly investigated. Former translator Sibel Edmond's allegations were backed up by evidence and witnesses but the FBI's response to her complaints was "significantly flawed" said Inspector General Glenn Fine. Moreover, Edmond's claims "raised substantial questions and were supported by various pieces of evidence." Edmonds has continuously stated that she was only fired after she had made complaints to FBI managers about poor wiretap translations and that one interpreter who had a relative at a foreign embassy, may have compromised national security by blocking certain translations and notifying the targets of FBI surveillance. The FBI has claimed that it is still investigating Edmond's claims. The report also revealed that Edmonds was fired for using her home computer in which she wrote the memorandum detailing her suspicions; the FBI had deemed the actions as a security violation. However, the translator had held "Top Secret" clearance and was given the permission to work on her memo from home by an FBI supervisor. So having been given the permission to work from home, and submitted an official memorandum stating that espionage is being carried out from within the FBI, claims for which she had substantial evidence to back up why did senior officials not follow up? In the wake of the scandal involving Robert Hanssen, the FBI agent, who'd been a Russian agent for more than a decade, the lack of review by the FBI into Edmond's allegations has provoked a strong rebuke from several senators. Senator Patrick Leahy, who also sits on the Senate Judiciary Committee, said "The bureau has reflexively ignored and punished its whistleblowers, to the detriment of the bureau's effectiveness and sometimes to the detriment of the public's safety." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10717 From: Tech Sec Lab Date: Sat Jan 22, 2005 9:08pm Subject: RE: US bugs in the UN Really, what bunch of commies would that be Kindrak? Would it be the commies in Russia? Or the Nazi commies? Or the US secret commies? Or the alien commies? Or the nice people that live next door to you but who have different outlooks "on the world" commies? Please take your pick....your contribution to TSCM is truly enlighting.... Please don't stop now, you're on a role..... **************************** Message: 2 Date: Fri, 21 Jan 2005 12:02:34 -0500 From: kondrak Subject: Re: US bugs in the UN I cant think of a better bunch of commies to bug...specially since they have a liking for OUR money to line their pockets with. At 22:57 1/20/2005, you wrote: 10718 From: James M. Atkinson Date: Sat Jan 22, 2005 10:30pm Subject: Russian Republic Charges Topographer With Selling State Secrets http://www.fas.org/irp/news/2005/01/tass011905.html Russian Republic Charges Topographer With Selling State Secrets ITAR-TASS Wednesday, January 19, 2005 Yoshkar-Ola, 19 January: The Federal Security Service (FSB) directorate for the Republic of Mari El has instituted criminal proceedings for divulging state secrets. The charge has been levelled against a principal specialist in the topographic department of the Mari Trust for Survey and Construction Work. He faces up to four years in prison for the offence. The head of the press service of the FSB directorate for Mari El, Dmitriy Izotov, told an ITAR-TASS correspondent that the accused, who has not yet been named, sold secret documents to somebody without access to state secrets, namely a catalogue of coordinates of all geodesic points in the republic. The suspect had access to secret information and, therefore, realized he was committing a crime. When investigators searched his flat, they found another 250 documents, half of which, according to experts, are secret. Investigators are trying to establish what damage has been done, as a result, to the state. This is the first criminal case in the republic's history to be instituted under Article 283 of the Criminal Code of the Russian Federation, which deals with the divulging of state secrets. (Description of Source: Moscow ITAR-TASS in Russian -- main government information agency) ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10719 From: mpaulsen6 Date: Sun Jan 23, 2005 0:36am Subject: Re: Mains Mover/Current Carrier Hey.. I think I know what you're talking about.. my computer came with this onboard 'category 5 cable attachment' thingy. Looks kinda like a phone plug but larger and the phone company guy came out and hooked up my CABLE TV!?! line to it with this little gray box. And it was 'preloaded' with this 'software' from this company called 'microsoft' that made me 'accept' these 'license agreement's before I could use it. You don't think that they could be spying on me do you? Should I sue this strange 'microsoft'. Can anyone tell me how? Maybe I should hire someone to investigate them. I'm really concerned. Really. --- In TSCM-L@yahoogroups.com, littledog wrote: > > I have 2 tv's bought new (4 yrs. ago) from wal-mart that came with carrier current bugs already installed they appeared to be after factory instalations, I also have an answering machine (purchased 3 yrs. ago) from radio shack that came with a rather sophisticated infinity bug and a call forwarding device already installed..any comments? should I sue? what's up with this, anyone else experience such things?> -----Original Message----- > > From: Andy Moore [mailto:ASMoore@A...] > > Sent: Friday, January 21, 2005, 3:36 AM > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Mains Mover/Current Carrier > > > > > > A firm called Devolo, based in Germany, is now marketing a device which > > modulates stereo, high bandwidth audio onto the power cabling in order to > > distribute music etc around households - it's not hard to see other uses for > > such a device! It en/decodes audio, at 44KHz CD quality, onto OFDM > > carriers, across the HF band, on to cabling for subsequent conversion a > > couple of hundred metres away. Probably quite obvious on a SA but also very > > easy to deploy.... > > > > http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html > > > > Andy M > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > 10720 From: mpaulsen6 Date: Sun Jan 23, 2005 0:38am Subject: Re: FBI abandons Carnivore wiretap software Yea.. maybe they found out about etheral.. wow.. $110 million saved. Guess they should revamp their voicemail next. --- In TSCM-L@yahoogroups.com, kondrak wrote: > Oh SURE they have..uh huh...... > > > At 19:53 1/20/2005, you wrote: > > > > >FBI abandons Carnivore wiretap software > >Commercial program, 3rd-party wiretaps now usedThe Associated Press > >Updated: 9:55 p.m. ET Jan. 18, 2005WASHINGTON - The FBI has > >effectively > >abandoned its custom-built Internet surveillance technology, once > >known as > >Carnivore, designed to read e-mails and other online communications > >among > >suspected criminals, terrorists and spies, according to bureau > >oversight > >reports submitted to Congress. > >Instead, the FBI said it has switched to unspecified commercial > >software to > >eavesdrop on computer traffic during such investigations and has > >increasingly asked Internet providers to conduct wiretaps on targeted > >customers on the government's behalf, reimbursing companies for > >their costs. > >The FBI performed only eight Internet wiretaps in fiscal 2003 and > >five in > >fiscal 2002; none used the software initially called Carnivore and > >later > >renamed the DCS-1000, according to FBI documents submitted to Senate > >and > >House oversight committees. The FBI, which once said Carnivore > >was "far > >better" than commercial products, said previously it had used the > >technology > >about 25 times between 1998 and 2000. > >'We're using [commercially available software] more now and we're > >asking the > >Internet service providers that have the capabilities to collect > >data in > >compliance with court orders.' > > > >- Paul Bresson > >FBI spokesman > > > >The FBI said it could not disclose how much it spent to produce the > >surveillance software it no longer uses, saying part of its budget > >was > >classified. Outside experts said the government probably spent > >between $6 > >million and $15 million. > >The congressional oversight reports were obtained last week under > >the U.S. > >Freedom of Information Act by the Washington-based Electronic Privacy > >Information Center, a civil liberties group that criticized the > >surveillance > >software after it was first disclosed in 2000. > >Commercial alternatives > >FBI spokesman Paul Bresson said the bureau moved to popular > >commercial > >wiretap software because it was less expensive and had improved in > >its > >ability to copy e-mails and other communications of a targeted > >Internet > >account without affecting other subscribers. > >"We see the value in the commercially available software; we're > >using it > >more now and we're asking the Internet service providers that have > >the > >capabilities to collect data in compliance with court orders," > >Bresson said. > >The FBI said last week it was sending back to the drawing board its > >$170 > >million computer overhaul, which was intended to give agents and > >analysts an > >instantaneous and paperless way to manage criminal and terrorism > >cases. > > > >Related stories > >FBI may have to scrap new computer program > > From 2001: FBI software cracks encryption wall > >Experts said the life span of roughly four years for the bureau's > >homegrown > >surveillance technology was similar to the shelf life of cutting- edge > >products in private industry. > >"It's hard to criticize the FBI trying to keep pace with > >technology," said > >James Dempsey of the Washington-based Center for Democracy and > >Technology. > >"There is just a huge amount of innovation and development going on > >in the > >private sector." > >Henry H. Perritt Jr., who led an oversight study of Carnivore in > >2000 for > >the Justice Department, said the FBI originally built its own > >surveillance > >system because commercial tools were inadequate. Perritt, a > >professor at the > >Chicago-Kent College of Law, said he was unaware of any commercial > >wiretap > >software that includes audit features robust enough to convince a > >federal > >judge that e-mails from innocent Internet users weren't captured by > >mistake. > >"You'd like to have a package that supervisors within a field office > >and in > >Washington could do an audit and make sure they're using the tools > >compliant > >with the court order," Perritt said. > >The FBI laboratory division, which produced Carnivore, was headed by > >Donald > >M. Kerr, who left the FBI in August 2001 to become the CIA's chief > >gadget-maker as head of its science and technology directorate. Kerr > >told > >lawmakers in 2000 that Carnivore was "far better than any > >commercially-available sniffer." > > > >http://www.msnbc.msn.com/id/6841403/ > > > > > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 10721 From: mpaulsen6 Date: Sun Jan 23, 2005 0:42am Subject: Re: Inaugural Pictures "Sir, they'll never guess the microtransmitter is here." "I feel like I'm back in Texas. Steers and..." well you know.. --- In TSCM-L@yahoogroups.com, Michael Dever wrote: > Captions: > > "Keep looking, you'll find it!" > > "Looking for my weapon of mass destruction, heh heh heh!" > > > On 21 Jan 2005, at 10:09, James M. Atkinson wrote: > > > > > > > Here is one of those secret Skull and Bones ceremonies > > > > http://conservativelife.com/blog/media/bushzipper.jpg > > > > Can anybody come up with an appropiate caption, or shall we just let > > the > > picture speak for itself. > > > > -jma > > > > > > > > > > ----------------------------------------------------------------- ------ > > ----------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > ----------------------------------------------------------------- ------ > > ----------------------------- > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: > > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > ----------------------------------------------------------------- ------ > > ----------------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > ----------------------------------------------------------------- ------ > > ----------------------------- > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > Michael J. Dever CPP > Dever Clark & Associates > GPO Box 1163 > Canberra ACT 2601 > Australia > Voice: +612 6254 5337 > Email: dca@b... > ********************************************************************* *** > ***** > This message is sent in strict confidence for the addressee only. > It may contain legally privileged information. The contents are not to > be disclosed to anyone other than the addressee. Unauthorised > recipients are requested to preserve this confidentiality and to advise > the sender immediately of any error in transmission. > > > > [Non-text portions of this message have been removed] 10722 From: mpaulsen6 Date: Sun Jan 23, 2005 0:43am Subject: Re: Inaugural Pictures I thought Dick had that end.. Ha.. I kill me.. --- In TSCM-L@yahoogroups.com, PGibson957@a... wrote: > > Yeap. Make sure it don't free-fall like Bill's > > Whooa there big fella ... Ted will take care of that end. > > > [Non-text portions of this message have been removed] 10723 From: mpaulsen6 Date: Sun Jan 23, 2005 0:45am Subject: Re: US bugs in the UN So, is the subject line of this thread the joke or the leadin? --- In TSCM-L@yahoogroups.com, "Tech Sec Lab" wrote: > Really, what bunch of commies would that be Kindrak? > > Would it be the commies in Russia? > > Or the Nazi commies? > > Or the US secret commies? > > Or the alien commies? > > Or the nice people that live next door to you but who have different > outlooks "on the world" commies? > > Please take your pick....your contribution to TSCM is truly enlighting.... > > > Please don't stop now, you're on a role..... > > > > > **************************** > > > Message: 2 > Date: Fri, 21 Jan 2005 12:02:34 -0500 > From: kondrak > Subject: Re: US bugs in the UN > > I cant think of a better bunch of commies to bug...specially since they have > a liking for OUR money to line their pockets with. > > At 22:57 1/20/2005, you wrote: 10724 From: mpaulsen6 Date: Sun Jan 23, 2005 0:46am Subject: Re: Russian Republic Charges Topographer With Selling State Secrets Russian Republic Charges Topographer... I bet he never pays the bill.. Just ask IBM. --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > http://www.fas.org/irp/news/2005/01/tass011905.html > > Russian Republic Charges Topographer With Selling State Secrets > ITAR-TASS > Wednesday, January 19, 2005 > > > Yoshkar-Ola, 19 January: The Federal Security Service (FSB) directorate for > the Republic of Mari El > has instituted criminal proceedings for divulging state secrets. The charge > has been levelled > against a principal specialist in the topographic department of the Mari > Trust for Survey and > Construction Work. He faces up to four years in prison for the offence. > > > The head of the press service of the FSB directorate for Mari El, Dmitriy > Izotov, told an ITAR-TASS > correspondent that the accused, who has not yet been named, sold secret > documents to somebody > without access to state secrets, namely a catalogue of coordinates of all > geodesic points in the > republic. The suspect had access to secret information and, therefore, > realized he was committing a > crime. When investigators searched his flat, they found another 250 > documents, half of which, > according to experts, are secret. Investigators are trying to establish > what damage has been done, > as a result, to the state. > > > This is the first criminal case in the republic's history to be instituted > under Article 283 of the > Criminal Code of the Russian Federation, which deals with the divulging of > state secrets. > > > (Description of Source: Moscow ITAR-TASS in Russian -- main government > information agency) > > > > > > ------------------------------------------------------------------- --------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------- --------------------------------- > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------- --------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------- --------------------------------- 10725 From: mpaulsen6 Date: Sun Jan 23, 2005 0:46am Subject: Re: wi-Fi ? clones oh.. hullo? UH? This again.. Damn, didn't we cover this in.. what 2002? --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > > LONDON, England -- "Evil twins" are the latest menace to threaten the > security of Internet users, experts in the UK are warning. > > An "evil twin" is a bogus base station that latches on to someone using new > "Wi-Fi" wireless technology. > > Victims think their laptops or mobile phones are connected to bona fide > wireless internet connections. > > They may then transmit valuable bank details or other personal information, > not suspecting that they are being intercepted by cybercriminals. > > Professor Brian Collins, from the Royal Military College of Science, > Cranfield University, a former chief scientist at GCHQ -- the Government's > secret eavesdropping station -- said: "Users need to be wary of not using > their Wi-Fi enabled laptops or other portable devices in order to conduct > financial transactions or anything that is of a sensitive personal nature, > for fear of having disclosed this information to an unauthorised third > party." > > Wireless devices link to the Internet via "hotspots" - nearby connection > points that they lock on to. But these hotspots can act like an open door to > thieves. > > Anyone with suitable equipment can locate a hotspot and take its place, > substituting their own "evil twin." > > Dr. Phil Nobles, a wireless Internet and cybercrime expert at Cranfield > University, said: "So-called 'evil twin' hotspots present a hidden danger > for Web users. > > "In essence, users think they've logged on to a wireless hotspot connection > when in fact they've been tricked to connect to the attacker's unauthorised > base station. > > "The latter jams the connection to a legitimate base station by sending a > stronger signal within close proximity to the wireless client -- thereby > turning itself into an 'evil twin.' > > "Cybercriminals don't have to be that clever to carry out such an attack. > Because wireless networks are based on radio signals they can be easily > detected by unauthorised users tuning into the same channel hopping group. > > Unwitting web users are invited to log into the attacker's server with bogus > login prompts, tempting them to give away sensitive information such as user > names and passwords. > > Often users are unaware the have been duped until well after the incident > has occurred. > > Dr. Nobles spelled out the warning at a wireless crime event held at the > Dana Centre, the Science Museum's forum for discussing controversial > science, in London. > > Lisa Jamieson, Head of Programmes at the Dana Centre, said: "Half of all > business wireless networks in this country have inadequate security controls > in place, making their information vulnerable to attack." > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 > > > [Non-text portions of this message have been removed] 10726 From: mpaulsen6 Date: Sun Jan 23, 2005 0:49am Subject: Re: US, Is the FBI covering up its spies? for using her home > computer in which she wrote the memorandum detailing her suspicions; > the FBI had deemed the actions as a security violation. See = proves to work for the Secret Service! --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > > > http://www.keralanext.com/news/indexread.asp?id=95631 > > > US, Is the FBI covering up its spies? > Wednesday, January 19, 2005 > > > > [US News]: Was the case of former FBI agent Robert Hanssen turned > Russian informant just a blip or one of many? > > > The FBI is currently going through a major investigation following the > complaints of a former translator; who insists that there is espionage > going on from within the bureau. > > > According to Sibel Edmond she was fired from her position only after > she had made complaints to senior officials in the FBI and put forward > an official memo stating so. > > > She has since sued for un lawful dismissal and asked for compensation > only for her case to be thrown out by the presiding judge following > the intervention of then Attorney General John Ashcroft who said her > claims might expose government secrets and be damaging toÖnational > security. > > > > The case concerning Edmonds has been handed to the U.S. Justice > Department's senior oversight official whose report states that her > allegations regarding shoddy work and possible espionage from within > the bureau's translator program were never properly investigated. > > > Former translator Sibel Edmond's allegations were backed up by > evidence and witnesses but the FBI's response to her complaints was > "significantly flawed" said Inspector General Glenn Fine. Moreover, > Edmond's claims "raised substantial questions and were supported by > various pieces of evidence." > > > Edmonds has continuously stated that she was only fired after she had > made complaints to FBI managers about poor wiretap translations and > that one interpreter who had a relative at a foreign embassy, may have > compromised national security by blocking certain translations and > notifying the targets of FBI surveillance. > > > The FBI has claimed that it is still investigating Edmond's claims. > The report also revealed that Edmonds was fired for using her home > computer in which she wrote the memorandum detailing her suspicions; > the FBI had deemed the actions as a security violation. However, the > translator had held "Top Secret" clearance and was given the > permission to work on her memo from home by an FBI supervisor. > > > So having been given the permission to work from home, and submitted > an official memorandum stating that espionage is being carried out > from within the FBI, claims for which she had substantial evidence to > back up why did senior officials not follow up? > > > In the wake of the scandal involving Robert Hanssen, the FBI agent, > who'd been a Russian agent for more than a decade, the lack of review > by the FBI into Edmond's allegations has provoked a strong rebuke from > several senators. Senator Patrick Leahy, who also sits on the Senate > Judiciary Committee, said "The bureau has reflexively ignored and > punished its whistleblowers, to the detriment of the bureau's > effectiveness and sometimes to the detriment of the public's safety." > > > > > ------------------------------------------------------------------- --------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------- --------------------------------- > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------- --------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------- --------------------------------- 10727 From: mpaulsen6 Date: Sun Jan 23, 2005 0:51am Subject: Re: China to launch communication satellite Oh no.. More public access channels with strange soaps! To the freezer foil role! --- In TSCM-L@yahoogroups.com, "Ramon" wrote: > > > China will send a communication satellite owned by a Hong Kong > company > into space during the first half of this year. > China National Space Administration says the European-made satellite > is > expected to orbit for 13 years and will be responsible for > transmitting > radio and television signals for China, East Asia, Australia and > Hawaii. > Meanwhile, a multi-purpose small satellite developed by China, > Pakistan, > Thailand, Bangladesh, Mongolia, South Korea, and Iran will be > launched > in 2006. > It will be used to carry out scientific experiments and environmental > observations for countries in the Asia-Pacific region. > > http://english.people.com.cn/200501/21/eng20050121_171494.html 10728 From: mpaulsen6 Date: Sun Jan 23, 2005 0:53am Subject: Re: McDonald's in Boca to offer glimpse into world of espionage Maybe he'll get on a wifi basestation at a McDonalds and get hacked :) --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > > > Boca Raton ∑ He's an international man of intrigue who's bringing > some of the old trade secrets from the espionage world to, well, a > McDonald's. > > Now if he could just put up a poster revealing what REALLY goes into 'The > Colonel's 14 Secret Herbs and Spices' and the fabled Coca Cola recipe which > it is rumoured even the KGB could not get (in a failed 70's attempt to copy > the US brand into the Eastern block - they should have left the vodka out). > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > [Non-text portions of this message have been removed] 10729 From: mpaulsen6 Date: Sun Jan 23, 2005 0:54am Subject: Re: Analysis of the Skype Protocol I wonder if that goes to a pron site. --- In TSCM-L@yahoogroups.com, G P wrote: > > From ./ today: > > /. rather (http://www.slashdot.org) 10730 From: mpaulsen6 Date: Sun Jan 23, 2005 0:57am Subject: Suspects copy 'Wire' Ok.. so here's something that's o/t... Suspects copy 'Wire' NEW YORK (AP) -- David Simon's HBO series "The Wire" -- a fictional account of a police investigation of Baltimore drug dealers -- allegedly had some real-life dealers taking notes. While announcing a crackdown on Friday of a cocaine ring, police said their investigation was hampered by the suspects' habit of switching cell phones -- a technique for evading electronic eavesdropping they picked up from TV. "Believe it or not, these guys copied 'The Wire,' " one of the investigators, Sgt. Felipe Rodriguez, said at a news conference. "They were constantly dumping their phones. It made our job so much harder." Police relied largely on wiretaps to infiltrate the gang, which made up to $15 million a year. The result: 12 arrests and seizure of 43 kilograms of cocaine, 18 handguns, $500,000 cash and five luxury vehicles. While doing business by cell phone, the suspects often spoke to each other about "The Wire" after it aired on Sunday nights, Rodriguez said. Some of the officers listening to them also were fans. "If we missed anything, we got it from them Monday morning," the sergeant said of the television show. 10731 From: Steve Whitehead Date: Sun Jan 23, 2005 1:44am Subject: Re: Re: McDonald's in Boca to offer glimpse into world of espionage Dear Mr Paulsen Do you have to comment on everything. Who cares what you think!!!!!!!!!!! This List has become very boring and a big waste of time. When I joined a few years ago the members really contributed value. I do not have time for this rubbish anymore. This List no longer makes any contribution to TSCM. I will unsubscribe myself. Bye! Steve Whitehead ----- Original Message ----- From: "mpaulsen6" To: Sent: Sunday, January 23, 2005 8:53 AM Subject: [TSCM-L] Re: McDonald's in Boca to offer glimpse into world of espionage Maybe he'll get on a wifi basestation at a McDonalds and get hacked :) --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > > > Boca Raton ∑ He's an international man of intrigue who's bringing > some of the old trade secrets from the espionage world to, well, a > McDonald's. > > Now if he could just put up a poster revealing what REALLY goes into 'The > Colonel's 14 Secret Herbs and Spices' and the fabled Coca Cola recipe which > it is rumoured even the KGB could not get (in a failed 70's attempt to copy > the US brand into the Eastern block - they should have left the vodka out). > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10732 From: littledog Date: Sun Jan 23, 2005 2:46am Subject: Re: Re: Mains Mover/Current Carrier yea mr. paulson your a real wit, I think I've seen your work on other lists too..'till now I've really enjoyed this list.> -----Original Message----- > From: mpaulsen6 [mailto:mpaulsen6@a...] > Sent: Saturday, January 22, 2005, 10:34 PM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: Mains Mover/Current Carrier > > > > Hey.. I think I know what you're talking about.. my computer came > with this onboard 'category 5 cable attachment' thingy. Looks kinda > like a phone plug but larger and the phone company guy came out and > hooked up my CABLE TV!?! line to it with this little gray box. And > it was 'preloaded' with this 'software' from this company > called 'microsoft' that made me 'accept' these 'license agreement's > before I could use it. You don't think that they could be spying on > me do you? Should I sue this strange 'microsoft'. Can anyone tell > me how? Maybe I should hire someone to investigate them. I'm > really concerned. Really. > --- In TSCM-L@yahoogroups.com, littledog wrote: > > > > I have 2 tv's bought new (4 yrs. ago) from wal-mart that came with > carrier current bugs already installed they appeared to be after > factory instalations, I also have an answering machine (purchased 3 > yrs. ago) from radio shack that came with a rather sophisticated > infinity bug and a call forwarding device already installed..any > comments? should I sue? what's up with this, anyone else experience > such things?> -----Original Message----- > > > From: Andy Moore [mailto:ASMoore@A...] > > > Sent: Friday, January 21, 2005, 3:36 AM > > > To: TSCM-L@yahoogroups.com > > > Subject: [TSCM-L] Mains Mover/Current Carrier > > > > > > > > > A firm called Devolo, based in Germany, is now marketing a > device which > > > modulates stereo, high bandwidth audio onto the power cabling in > order to > > > distribute music etc around households - it's not hard to see > other uses for > > > such a device! It en/decodes audio, at 44KHz CD quality, onto > OFDM > > > carriers, across the HF band, on to cabling for subsequent > conversion a > > > couple of hundred metres away. Probably quite obvious on a SA > but also very > > > easy to deploy.... > > > > > > http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html > > > > > > Andy M > > > > > > > > > > > > > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > It is by caffeine alone I set my mind in motion. > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > the hands acquire shaking, the shaking is a warning. > > > It is by caffeine alone I set my mind in motion. > > > =================================================== TSKS > > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10733 From: littledog Date: Sun Jan 23, 2005 3:03am Subject: to moderator hello, this guy at mpaulsen6@a... who has been insulting every single member is doing it from a fake address. Thought you might want to check on this. littledog...enjoy the list. 10734 From: Tech Sec Lab Date: Sun Jan 23, 2005 7:57am Subject: RE: TSCM list It's a shame this list has gone the way it has... If anyone is interested in being part of an active professionals only list that stays focused on the topic rather than what has become a free for all, please feel free to sign up, http://ocean-research.net/mailman/listinfo/c4i-l_ocean-research.net Regards -Ois *********************** Date: Sun, 23 Jan 2005 09:44:23 +0200 From: "Steve Whitehead" Subject: Re: Re: McDonald's in Boca to offer glimpse into world of espionage Dear Mr Paulsen Do you have to comment on everything. Who cares what you think!!!!!!!!!!! This List has become very boring and a big waste of time. When I joined a few years ago the members really contributed value. I do not have time for this rubbish anymore. This List no longer makes any contribution to TSCM. I will unsubscribe myself. Bye! Steve Whitehead 10735 From: Thomas Shaddack Date: Sun Jan 23, 2005 8:46am Subject: Re: Re: Mains Mover/Current Carrier I suggest to not bother much about it and if he makes problems, just plonk[1] him in accordance with the ages old Usenet tradition. Most of email clients allow moving messages to folders or deleting them at the moment of receiving, according to a set of user-defined rules. Implementation of a killfile in that way is pretty simple. [1] http://catb.org/~esr/jargon/html/P/plonk.html On Sun, 23 Jan 2005, littledog wrote: > > > yea mr. paulson your a real wit, I think I've seen your work on other lists too..'till now I've really enjoyed this list.> -----Original Message----- > > From: mpaulsen6 [mailto:mpaulsen6@a...] > > Sent: Saturday, January 22, 2005, 10:34 PM > > To: TSCM-L@yahoogroups.com > > Subject: [TSCM-L] Re: Mains Mover/Current Carrier > > > > > > > > Hey.. I think I know what you're talking about.. my computer came > > with this onboard 'category 5 cable attachment' thingy. Looks kinda > > like a phone plug but larger and the phone company guy came out and > > hooked up my CABLE TV!?! line to it with this little gray box. And > > it was 'preloaded' with this 'software' from this company > > called 'microsoft' that made me 'accept' these 'license agreement's > > before I could use it. You don't think that they could be spying on > > me do you? Should I sue this strange 'microsoft'. Can anyone tell > > me how? Maybe I should hire someone to investigate them. I'm > > really concerned. Really. > > --- In TSCM-L@yahoogroups.com, littledog wrote: > > > > > > I have 2 tv's bought new (4 yrs. ago) from wal-mart that came with > > carrier current bugs already installed they appeared to be after > > factory instalations, I also have an answering machine (purchased 3 > > yrs. ago) from radio shack that came with a rather sophisticated > > infinity bug and a call forwarding device already installed..any > > comments? should I sue? what's up with this, anyone else experience > > such things?> -----Original Message----- > > > > From: Andy Moore [mailto:ASMoore@A...] > > > > Sent: Friday, January 21, 2005, 3:36 AM > > > > To: TSCM-L@yahoogroups.com > > > > Subject: [TSCM-L] Mains Mover/Current Carrier > > > > > > > > > > > > A firm called Devolo, based in Germany, is now marketing a > > device which > > > > modulates stereo, high bandwidth audio onto the power cabling in > > order to > > > > distribute music etc around households - it's not hard to see > > other uses for > > > > such a device! It en/decodes audio, at 44KHz CD quality, onto > > OFDM > > > > carriers, across the HF band, on to cabling for subsequent > > conversion a > > > > couple of hundred metres away. Probably quite obvious on a SA > > but also very > > > > easy to deploy.... > > > > > > > > http://www.devolo.com/co_EN/produkte/dlan/mldlanaudio.html > > > > > > > > Andy M > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.yahoogroups.com/community/TSCM-L > > > > > > > > It is by caffeine alone I set my mind in motion. > > > > It is by the juice of Star Bucks that thoughts acquire speed, > > > > the hands acquire shaking, the shaking is a warning. > > > > It is by caffeine alone I set my mind in motion. > > > > =================================================== TSKS > > > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10736 From: A Grudko Date: Sun Jan 23, 2005 10:23am Subject: RE: Suspects copy 'Wire' -----Original Message----- From: mpaulsen6 [mailto:mpaulsen6@a...] > While announcing a crackdown on Friday of a cocaine ring, police said their investigation was hampered by the suspects' habit of switching cell phones -- a technique for evading electronic eavesdropping they picked up from TV. "Believe it or not, these guys copied 'The Wire,' " one of the (NY) investigators, Sgt. Felipe Rodriguez, said... If this is correct I guess our criminals are wayyyy ahead of New York's crooks and cops. I had clients nearly a decade ago, who I strongly suspected of being organised crime figures but they were charged but never convicted, who swoped SIM cards and phones daily - to the extent that they set up a cellphone trade-in business at the back of a garage in Pretoria mainly to get hold of other peoples' phones to avoid 'spoopers'. Andy G South Africa From: kondrak Date: Thu Jan 23, 2003 7:33pm Subject: WE WIN ONE!~ http://www.washingtonpost.com/wp-dyn/articles/A34837-2003Jan23.html Senate Blocks Funding for Pentagon Database WASHINGTON (Reuters) - Saying they feared government snooping against ordinary Americans, U.S. senators voted on Thursday to block funding for a Pentagon computer project that would scour databases for terrorist threats. By a voice vote, the Senate voted to ban funding for the Total Information Awareness program, under former national security adviser John Poindexter, until the Pentagon explains the program and assesses its impact on civil liberties. The measure, introduced by Sen. Ron Wyden, an Oregon Democrat, also said the computer dragnet being developed could not be deployed without congressional approval, although it allowed exceptions for national security. It was tacked onto a spending package in the Senate, but it is not yet law. It is now expected to go to House and Senate negotiators. If the negotiators keep the provision in the spending package, it will advance to the House and Senate for final passage before going to the president for signing into law. "This makes it clear that Congress wants to make sure there is no snooping on law-abiding Americans," Wyden told Reuters after the vote. He said the electronic data dragnet as proposed was "the most far-reaching government surveillance program in history." The Defense Department says the aim of the Total Information Awareness project, which is still in its infancy, is to seek patterns in transactions data like credit card bills and travel records to stop terrorist plots. Wyden and other Democrats announced last week they would try to block funding for it, citing concerns that it will amount to electronic surveillance of personal data of all Americans by the government and trample privacy rights. Senior Republican senators worked with Wyden on the wording of the Senate measure, including Sen. Charles Grassley of Iowa. He said he was worried the lines were getting blurred between domestic law enforcement and military security efforts. CONCERNS ABOUT POINDEXTER Critics of the project also have expressed concern that the project is being directed by Poindexter, a retired admiral who was convicted of deceiving Congress in the Iran-Contra scandal. His conviction was set aside on the grounds his immunized congressional testimony had been used against him. A Pentagon spokeswoman defended the program after the Senate vote on Thursday, saying officials continued to believe that the research and development planned was important. "TIA will develop innovative information technology tools that will give the Department of Defense's intelligence, counter-intelligence and counter-terrorism communities important capabilities to prevent terrorist attacks against the U.S.," the Pentagon spokeswoman said. The Senate measure requires the Pentagon to report to Congress on the goals of the program within 60 days of the bill's final passage, including recommendations from the Attorney General on minimizing the impact on civil liberties. The measure also would keep the Pentagon from deploying the program or transferring it to another department, such as the FBI or the new Homeland Security department, without congressional authorization. But these limitations would not apply if the deployment or transfer of technology was being made for lawful foreign intelligence activities or U.S. military operations outside the United States. Wyden said there had to be exceptions for national security. "There has got to be congressional approval to deploy these technologies, so this information doesn't get circulated indiscriminately all over government," he said. "But in striking the balance, when talking about matters of national security, those matters can go forward," he said. 6814 From: James M. Atkinson Date: Thu Jan 23, 2003 9:50pm Subject: USAF 4 Star Speaks Out USAF 4 Star Speaks Out For those of you who don't know who General Hawley is, he is a newly-retired 4-star General who commanded the U.S. Air Force Air Combat Command. He recently delivered this speech, now that he's retired and no longer restricted to being politically correct, at the Air Force Association Annual Meeting: "Since the attack, I have seen, heard, and read thoughts of such incredible and surpassing stupidity that they must be addressed. You've heard them too. Here they are: 1) "We're not good, they're not evil, everything is relative." Listen carefully: We're good, they're evil, nothing is relative. Say it with me now and free yourselves. You see, folks, saying "We're good" doesn't mean, "We're perfect." Okay? The only perfect being is the bearded guy on the ceiling of the Sistine Chapel. The plain fact is that our country has, with all our mistakes and blunders, always been and always will be the greatest beacon of freedom, charity, opportunity, and affection in history. If you need proof, open all the borders on Earth and see what happens. In about half a day, the entire world would be a ghost town, and the United States would look like one giant line to see "The Producers. 2) "Violence only leads to more violence." This one is so stupid you usually have to be the president of an Ivy League university to say it. Here's the truth, which you know in your heads and hearts already: Ineffective, unfocused violence leads to more violence. Limp, panicky, half-measures lead to more violence. However, complete, fully thought-through, professional, well-executed violence never leads to more violence because, you see, afterwards, the other guys are all dead. That's right, dead. Not "on trial," not "reeducated," not "nurtured back into the bosom of love." DEAD. D-E --Well, you get the idea. 3) "The CIA and the rest of our intelligence community has failed us." For 25 years we have chained our spies like dogs to a stake in the ground, and now that the house has been robbed, we yell at them for not protecting us. Starting in the late seventies, under Carter appointee Stansfield Turner, the giant brains who get these giant ideas decided that the best way to gather international intelligence was to use spy satellites. "After all," they reasoned, "you can see a license plate from 200 miles away." This is very helpful if you've been attacked by a license plate. Unfortunately, we were attacked by humans. Finding humans is not possible with satellites. You have to use other humans. When we bought all our satellites, we fired all our humans, and here's the really stupid part. It takes years, decades to infiltrate new humans into the worst places of the world. You can't just have a guy who looks like Gary Busey in a Spring Break'93 sweatshirt plop himself down in a coffee shop in Kabul and say "Hiya, boys. Gee, I sure would like to meet that bin Laden fella. "Well, you can, but all you'd be doing is giving the bad guys a story they'l be telling for years. 4) "These people are poor and helpless, and that's why they're angry at us." Uh-huh, and Jeffrey Dahmer's frozen head collection was just a desperate cry for help. The terrorists and their backers are richer than Elton John and, ironically, a good deal less annoying. The poor helpless people, you see, are the villagers they tortured and murdered to stay in power. Mohammed Atta, one of the evil scumbags who steered those planes into the killing grounds (I'm sorry, one of the "alleged hijackers," according to CNN-they stopped using the word "terrorist," you know), is the son of a Cairo surgeon. But you knew this, too. In the sixties and seventies, all the pinheads marching against the war were upper-middle-class college kids who grabbed any cause they could think of to get out of their final papers and spend more time drinking. At least, that was my excuse. It's the same today. Take the Anti-Global-Warming (or is it World Trade? Oh-who-knows-what-the-hell -they-want demonstrators) They all charged their black outfits and plane tickets on dad's credit card before driving to the airport in their SUV's. 5) "Any profiling is racial profiling." Who's killing us here, the Norwegians? Just days after the attack, the New York Times had an article saying dozens of extended members of the gazillionaire bin Laden family living in America were afraid of reprisals and left in a huff, never to return to studying at Harvard and using too much Drakkar. I'm crushed. I think we're all crushed. Please come back. With a cherry on top? Why don't they just change their names, anyway? It's happened in the past. Think about it. How many Adolfs do you run into these days? Shortly after that, I remember watching TV with my jaw on the floor as a government official actually said, "That little old grandmother from Sioux City could be carrying something." Okay, how about this: No, she couldn't. It would never be the grandmother from Sioux City. Is it even possible? What are the odds? Winning a hundred Powerball lotteries in a row? A thousand? A million? And now a Secret Service guy has been tossed off a plane and we're all supposed to cry about it because he's an Arab? Didn't it have the tiniest bit to do with the fact that he filled out his forms incorrectly- - three times? And then left an Arab history book on his seat as he strolled off the plane? And came back? Armed? Let's please all stop singing "We Are the World" for a minute and think practically. I don't want to be sitting on the floor in the back of a plane four seconds away from hitting Mt. Rushmore and turn, grinning, to the guy next to me to say, "Well, at least we didn't offend them." SO HERE'S what I resolve for the New Year: Never to forget our murdered brothers and sisters. Never to let the relativists and bleeding-heart liberals get away with their immoral thinking. After all, no matter what your daughter's political science professor says, we didn't start this. Have you seen that bumper sticker that says, "No More Hiroshimas"? I wish I had one that says, "You First. No More Pearl Harbors." Dick Hawley -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6815 From: Matt Paulsen Date: Thu Jan 23, 2003 9:52pm Subject: spectrum analyzer A while ago I posted that I was looking for a spectrum analyzer up to around 6ghz. Anyone use these? HP/Agilent E4404B I need something portable that will take a beating, be in rain, wind, snow, jounced around cars, etc...What is the general cost for the above? 6816 From: Matt Paulsen Date: Thu Jan 23, 2003 10:57pm Subject: RE: USAF 4 Star Speaks Out There is a piece zooming around the internet that attributes some pretty forceful statements to me, Dick Hawley - one time fighter pilot, General, thoughtful consultant, neophyte strategist, master of the artful compromise. The words did not flow from my pen, but if the e-mails mean anything, those words are now indelibly linked to my name. So do me a favor - if you receive this, please send it on to the same people to whom you forwarded the one that I did not write. It's not that I don't share many, if not most, of the sentiments attributed to me, but the piece is just not my style. Here's what I would have said if I'd been asked to comment on those five important issues. 1) Goodness, Evil and Relativity: There are some really good people in this world. They volunteer to help those who need it, and ask nothing in return. There are also some really bad people in this world. They exploit those who need help, or who have less wit or "charisma", and motivate them to join in committing unspeakable acts of cruelty against people they don't even know. Then there are the rest of us. Average people who try each day to do no harm, to provide for their families, to do an occasional act of kindness. The evil that was perpetrated against our land on 9/11 was the product of Mullahs who see our prosperity and power as a threat to their control over the uneducated Muslim masses on whose shoulders they ride through life. And so they preach hate. They are evil. 2) Violence begets violence: It's true. Violence does beget violence. But sometimes there is no alternative but to confront those who would perpetrate evil acts against us. This is one of those times. We are blessed to have courageous men and women willing to put their lives on the line to track down and annihilate those who have been so imbued with evil as to be beyond redemption. But violence is not a strategy. It is a necessary and fully justified reaction to an unimaginable threat. But it is not a strategy. If we are to win this war, we must defeat the Mullahs. And to defeat the Mullahs, we must find ways to separate them from their uneducated flocks. We cannot kill all those who have been taught to hate us, nor should we wish to. Far better to change their minds than to change their state of being. 3) The intelligence community let us down: Well, maybe just a little. Lots of senior and not so senior intelligence people became just as enamored of high tech gadgets as their political masters. The protests over our evisceration of the human intelligence component of the agency were not very loud or forceful. Keeping spies on the ground is a high risk and often dirty business, and it wasn't just liberal politicians who didn't have much stomach for it. 4) Poverty is the breeding ground for terrorists: No, it isn't; but religious extremism is. The Mullahs fear our wealth and power because it shows that a secular society with democratic institutions and a free market economy can do a better job of taking care of its peoples' needs, both spiritual and physical, than the oppressive Islamic regimes that they aspire to lead. The Mullahs are the problem, not poverty, but poverty does make it easier for the Mullahs to spread their evil - as do governments that tolerate and even reinforce their hateful message. 5) Profiling: We are at war here! We are not talking about traffic stops. If we were at war with Iceland, I would expect those charged with our defense to pay very close attention to any Icelander who ventured near our shores. In this war I expect them to pay very close attention to Muslims with ties to the places that spew hatred against us. Random checks when there are no such obvious targets available are a good way to keep the evil ones guessing, but let's not make small children and grandmothers take their shoes off while we watch far more likely candidates walk aboard unchecked. 6) Resolutions: a. Never forget that what happened on September the 11th of 2001 was an act of war. b. Never sit silently by while someone tries to justify what happened on that day as an understandable reaction to U.S. policies in the Middle East or elsewhere. c. Fly our nation's flag proudly - it represents this world's greatest hope to move beyond the pain and suffering that inflict so many across the globe. Richard E. Hawley General, USAF, Retired Former Commander, Air Combat Command 6817 From: Matt Paulsen Date: Thu Jan 23, 2003 10:55pm Subject: RE: USAF 4 Star Speaks Out Claim: Former USAF General Dick Hawley delivered a caustic speech about "thoughts of such surpassing stupidity that they must be addressed." Status: False. Origins: Yes, Gen. Richard E. Hawley is a real person, a United States Air Force general who served as commander of the USAF's Air Combat Command until his retirement in 1999, but no, he didn't write or deliver the speech quoted above. This "speech" is actually a column by humorist Larry Miller which appeared in The Daily Standard on 14 January 2002; the version circulating on the Internet omits the opening and closing paragraphs.. continued... http://www.snopes2.com/rumors/hawley.htm -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, January 23, 2003 7:51 PM To: TSCM-L Mailing List Subject: [TSCM-L] USAF 4 Star Speaks Out USAF 4 Star Speaks Out For those of you who don't know who General Hawley is, he is a newly-retired 4-star General who commanded the U.S. Air Force Air Combat Command. He recently delivered this speech, now that he's retired and no longer restricted to being politically correct, at the Air Force Association Annual Meeting: "Since the attack, I have seen, heard, and read thoughts of such incredible and surpassing stupidity that they must be addressed. You've heard them too. Here they are: 1) "We're not good, they're not evil, everything is relative." Listen carefully: We're good, they're evil, nothing is relative. Say it with me now and free yourselves. You see, folks, saying "We're good" doesn't mean, "We're perfect." Okay? The only perfect being is the bearded guy on the ceiling of the Sistine Chapel. The plain fact is that our country has, with all our mistakes and blunders, always been and always will be the greatest beacon of freedom, charity, opportunity, and affection in history. If you need proof, open all the borders on Earth and see what happens. In about half a day, the entire world would be a ghost town, and the United States would look like one giant line to see "The Producers. 2) "Violence only leads to more violence." This one is so stupid you usually have to be the president of an Ivy League university to say it. Here's the truth, which you know in your heads and hearts already: Ineffective, unfocused violence leads to more violence. Limp, panicky, half-measures lead to more violence. However, complete, fully thought-through, professional, well-executed violence never leads to more violence because, you see, afterwards, the other guys are all dead. That's right, dead. Not "on trial," not "reeducated," not "nurtured back into the bosom of love." DEAD. D-E --Well, you get the idea. 3) "The CIA and the rest of our intelligence community has failed us." For 25 years we have chained our spies like dogs to a stake in the ground, and now that the house has been robbed, we yell at them for not protecting us. Starting in the late seventies, under Carter appointee Stansfield Turner, the giant brains who get these giant ideas decided that the best way to gather international intelligence was to use spy satellites. "After all," they reasoned, "you can see a license plate from 200 miles away." This is very helpful if you've been attacked by a license plate. Unfortunately, we were attacked by humans. Finding humans is not possible with satellites. You have to use other humans. When we bought all our satellites, we fired all our humans, and here's the really stupid part. It takes years, decades to infiltrate new humans into the worst places of the world. You can't just have a guy who looks like Gary Busey in a Spring Break'93 sweatshirt plop himself down in a coffee shop in Kabul and say "Hiya, boys. Gee, I sure would like to meet that bin Laden fella. "Well, you can, but all you'd be doing is giving the bad guys a story they'l be telling for years. 4) "These people are poor and helpless, and that's why they're angry at us." Uh-huh, and Jeffrey Dahmer's frozen head collection was just a desperate cry for help. The terrorists and their backers are richer than Elton John and, ironically, a good deal less annoying. The poor helpless people, you see, are the villagers they tortured and murdered to stay in power. Mohammed Atta, one of the evil scumbags who steered those planes into the killing grounds (I'm sorry, one of the "alleged hijackers," according to CNN-they stopped using the word "terrorist," you know), is the son of a Cairo surgeon. But you knew this, too. In the sixties and seventies, all the pinheads marching against the war were upper-middle-class college kids who grabbed any cause they could think of to get out of their final papers and spend more time drinking. At least, that was my excuse. It's the same today. Take the Anti-Global-Warming (or is it World Trade? Oh-who-knows-what-the-hell -they-want demonstrators) They all charged their black outfits and plane tickets on dad's credit card before driving to the airport in their SUV's. 5) "Any profiling is racial profiling." Who's killing us here, the Norwegians? Just days after the attack, the New York Times had an article saying dozens of extended members of the gazillionaire bin Laden family living in America were afraid of reprisals and left in a huff, never to return to studying at Harvard and using too much Drakkar. I'm crushed. I think we're all crushed. Please come back. With a cherry on top? Why don't they just change their names, anyway? It's happened in the past. Think about it. How many Adolfs do you run into these days? Shortly after that, I remember watching TV with my jaw on the floor as a government official actually said, "That little old grandmother from Sioux City could be carrying something." Okay, how about this: No, she couldn't. It would never be the grandmother from Sioux City. Is it even possible? What are the odds? Winning a hundred Powerball lotteries in a row? A thousand? A million? And now a Secret Service guy has been tossed off a plane and we're all supposed to cry about it because he's an Arab? Didn't it have the tiniest bit to do with the fact that he filled out his forms incorrectly- - three times? And then left an Arab history book on his seat as he strolled off the plane? And came back? Armed? Let's please all stop singing "We Are the World" for a minute and think practically. I don't want to be sitting on the floor in the back of a plane four seconds away from hitting Mt. Rushmore and turn, grinning, to the guy next to me to say, "Well, at least we didn't offend them." SO HERE'S what I resolve for the New Year: Never to forget our murdered brothers and sisters. Never to let the relativists and bleeding-heart liberals get away with their immoral thinking. After all, no matter what your daughter's political science professor says, we didn't start this. Have you seen that bumper sticker that says, "No More Hiroshimas"? I wish I had one that says, "You First. No More Pearl Harbors." Dick Hawley -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- Vocatus atque non vocatus deus aderit ---------------------------------------------------------------------------- ---------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6818 From: Robert Motzer <1RCM@M...> Date: Fri Jan 24, 2003 8:49am Subject: Sometimes Honesty Really Doesn't Pay! Hi List, I thought I'd share a local saga of a dumb cop, a polygraph and "wiretapping laws": http://www.pottsmerc.com/site/news.cfm newsid=6802795&BRD=1674&PAG=461&dept_id=18041&rfi=6 And a quick 'my two cents' aside here as well: For years this list has had a debate going on regarding a TSCM'ers obligation to notify Law Enforcement of a "find". I won't extend this any farther than Pennsylvania, but I can say conclusively that locally many of our County District Attorneys now have some real authority (and thus new-found interest) over the legal employment of "wiretapping" as well as the interpretation and prosecution of any mis-applications. As such they have begun to guard what they see as 'their turf' jealously and with fervor. So if they go after 'one of their own' with such vigor do you think they'd lose any sleep in going after someone, who for the most part they consider nothing more than a 'James Bond wanna-be' anyway, for their failure to report a witnessed felony? Think about it as it just may apply to your locale as well. Just Another Bob _________________________________________________________________ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 6819 From: James M. Atkinson Date: Fri Jan 24, 2003 9:49am Subject: Re: Sometimes Honesty Really Doesn't Pay! The correct link is: http://www.pottsmerc.com/site/news.cfm?newsid=6802795&BRD=1674&PAG=461&dept_id=18041&rfi=6 Sex tape trips up Norco officer Jason McKee, jmckee@p...January 24, 2003 PHOENIXVILLE -- The truth shall set you free, but sometimes it gets you arrested. North Coventry Police Officer Bruce Hetrick was smart enough to be honest when filling out a job application for the state police last September. After all, aspiring troopers are thoroughly screened. If they lie on the written application, it's bound to come out in the polygraph exam. So when Hetrick, who has since left the police force, was asked if had ever recorded someone without the person's consent, he said yes, according to court records. "Sex with my ex-girlfriend," Hetrick wrote on the application. "But I did tell her afterwards, and showed her (the tape)." Police said the ex-girlfriend wasn't the only woman Hetrick secretly videotaped in his Phoenixville apartment, but only one woman was named in the criminal complaint. The exact date of the taping is not known, but occurred between 1998 and March 2001, court records state. Recording someone with video or audio equipment without their knowledge is a felony. Felons are not permitted to work in law enforcement. Why Hetrick, who was working as a patrolman in the North Coventry Police Department at the time of his interview with state police, allegedly admitted to committing a felony, is not clear. Hetrick, who lives in Exton, has an unlisted telephone number and could not be reached for comment. Police said Hetrick was given a polygraph Oct. 17, several weeks after the initial interview, and repeated the incriminating answers he had written on the job application. But after the interview, Hetrick must have realized the troopers were not impressed with his honesty. According to court records, Hetrick contacted his ex-girlfriend after taking the lie detector test and told her to tell the cops she knew she was in one of his films. "No victim, no crime," he allegedly told the woman. That is true, but the victim did not cooperate. She said Hetrick showed her the videotape last January. According to police, the woman was not happy about it. "He admitted that he knew she was upset about the filming," court records state. North Coventry Police Chief Robert Schurr said he contacted the Chester County District Attorney's office when he found out about Hetrick's criminal honesty. "He was put on administrative leave immediately," Schurr said. "And he resigned in December." The charges were filed Jan. 2. In addition to the wiretap violation, Hetrick is also facing felony insurance fraud and misdemeanor invasion of privacy charges. The insurance fraud charge comes from another admission of guilt Hetrick generously provided on his job application. Hetrick said four years ago he filed a fraudulent insurance claim to cover a broken windshield on his car, court records state. Hetrick received $257 from a trucking company to cover the cost of a windshield they did not break, according to police. Schurr said the incident has marred the reputation of his department. "We had a bad apple," he said. "It's a black eye for the police department and law enforcement in general." ©The Mercury 2003 At 9:49 AM -0500 1/24/03, Robert Motzer wrote: >Hi List, > >I thought I'd share a local saga of a dumb cop, a polygraph and "wiretapping >laws": > >http://www.pottsmerc.com/site/news.cfm >newsid=6802795&BRD=1674&PAG=461&dept_id=18041&rfi=6 > >And a quick 'my two cents' aside here as well: For years this list has had a >debate going on regarding a TSCM'ers obligation to notify Law Enforcement of >a "find". I won't extend this any farther than Pennsylvania, but I can say >conclusively that locally many of our County District Attorneys now have >some real authority (and thus new-found interest) over the legal employment >of "wiretapping" as well as the interpretation and prosecution of any >mis-applications. As such they have begun to guard what they see as 'their >turf' jealously and with fervor. So if they go after 'one of their own' with >such vigor do you think they'd lose any sleep in going after someone, who >for the most part they consider nothing more than a 'James Bond wanna-be' >anyway, for their failure to report a witnessed felony? Think about it as it >just may apply to your locale as well. > >Just Another Bob > > > > > >_________________________________________________________________ >Protect your PC - get McAfee.com VirusScan Online >http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6820 From: ed Date: Fri Jan 24, 2003 10:49am Subject: Suspected car bomb turns out to be tracking device http://www.theitem.com/CityDesk/030118a_news.cfm Date Posted: January 18, 2003 False Alarm Suspected car bomb turns out to be tracking device By BRADEN BUNCH Item Staff Writer A device that appeared to be a bomb on a vehicle parked outside Simpson's Hardware and Sports on Wesmark Boulevard kept local and state authorities busy for nearly four hours Friday before the object was found to be a tracking system placed on the car by the driver's wife. Sumter Police Chief Patty Patterson said police were called at 3:23 p.m. when a sales representative for Simpson's Sales Co., who was delivering an order of Browning firearms, spotted a suspicious package on the undercarriage of his Chevrolet Suburban as he came out of the store. After a preliminary inspection indicated to authorities that the device could be an explosive, surrounding businesses were ordered closed and authorities evacuated the area within a mile of the vehicle. Described as a "very professional-looking device," the object was thought to be several sticks of dynamite with a remote detonation transmitter attached. The entire device, authorities said, was attached to the vehicle with duct tape. Hours later, Patterson said, authorities learned from a call by the Florence man's wife that she had placed the tracking device on the car so she could keep tabs on her husband. Soon after the initial 911 call, local police were joined by several dozen safety workers from Shaw Air Force Base, the State Law Enforcement Division, Sumter Fire Department, Sumter County Emergency Medical Services and the Sumter County Department of Public Safety. Wesmark Boulevard was shut down from Broad Street to Alice Drive and traffic was temporarily rerouted along Broad Street into the Sumter Mall parking lot. After determining there was no danger to vehicles on Broad Street, authorities reopened the road. Patterson, who was attending an event at Shaw, arrived shortly afterward and a command center was set up across the street from Simpson's in the Alltel parking lot. At 5:53 p.m., with both the Shaw Air Force Base Explosive Ordnance Disposal Unit and the SLED bomb squad in place, authorities detonated the apparent transmitter of the device using a RONS (Remote Ordnance Neutralization System), a remote-controlled robot equipped with cameras and detonation devices. Fearing a large explosion, all public safety workers at the scene were ordered to take cover before the detonation. Authorities had been working on this for about an hour when the call came in that the package was a tracking device. Despite the nearly four hours spent on the call, Patterson said both the man reporting the bomb and all the officers responding to the scene acted appropriately. We can't stress enough that it appeared to look like a bomb, both to local officers and to the bomb squads," Patterson said. The police chief also stressed the evacuation and road closures were appropriate measures. "Especially in these times, it's important to act with diligence, she said. Sumter Writer Braden Bunch can be called at 803-774-1222 or e-mailed at bradenb@t... 6821 From: Ocean Group Date: Fri Jan 24, 2003 11:45am Subject: USAF 4 Star Speaks Out While this is certainly an interesting read... I would like to say this, at least on a personal level...if this stuff is posted then I'd like the right to react. "b. Never sit silently by while someone tries to justify what happened on that day as an understandable reaction to U.S. policies in the Middle East or elsewhere." There is no justification is taking life. It is wrong. Let me get this straight, the general is saying that anyone who tries to tell the USA why they were attacked shouldn't be allowed to voice their opinions. They should be silenced. Right? Or is he saying that the attack is not "understandable"... I understand the attack. I understand why they did it. So do millions. Why can't the USA(or in this case a USAF general) understand. I know they are capable of understanding. There are bright, intelligent, caring Americans so why is it they are not able to understand? Is it because they are not being presented with the facts to allow them to understand? Is it because the government is afraid of the way it might make their country look? Would it show the government in a bad light...? Why is it that they say..."The first casualty of war is truth..." "c. Fly our nation's flag proudly - it represents this world's greatest hope to move beyond the pain and suffering that inflict so many across the globe." The USA flag does not represent the worlds greatest hope at moving beyond pain and suffering. At the moment it represents the infliction of pain and suffering . It also represents war. In many people it brings up a deep hatred. How did this hatred get instilled in so many people...? And before anyone says this again, I am not anti-American. I have American family. Why is it when I turn on the TV at night, and I mean almost every night I see a picture of someone burning a US flag. I have to laugh, the guy that makes these things must be raking it in! Your flag represents a greedy self interested country to many people. A country who's fight abroad is disease ridden with insinuations of money and oil and weapons. I think I almost burst into tears of laughter when they reported on TV that the USA would kindly and selflessly hold the Iraqi oil "in trust" for the Iraqi people when they get rid of Saddam. That is going to make alot of people question the US's intentions. I cannot name one other country in the world who's flag gets burned so much! And I know what people will say, but that's because we are the worlds greatest superpower, we can't please everybody. But in the words of Denis Leary, that's "...because we got the bomb, two words, nuclear f**kin weapons...". With great power comes great responsibility, so why is it then that power corrupts and absolute power corrupts absolutely? This is an old argument, and quite frankly a tiring one. I do know that if I wanted to represent a hope for the end of pain and suffering I wouldn't need to look at a country's flag, and especially not the US one. No long established country has no blood on their hands. But at the moment the US is at the forefront. I'm sure you guys have heard of that guy from Michigan called Michael Moore. I went to see his movie called Bowling for Columbine. It was very interesting and very eye opening. A colleague in Australia recently pointed me towards his website, www.michaelmoore.com . When people see this kind of stuff it makes them think that your government is controlled my money and corporations...can you understand that? Then they see this war and they think you are wrong, not only are you wrong but then you start killing people, then people have as much respect for American life as did those hijackers. Is that what the US wants? It thought me one thing, the problem does lie with the USA. Not only that but the country is spawning violence. It's sickening. I just hope that things get better before it gets worse. In the movie it lays alot of questions on arms makers and the media's role in brain washing people. Not surprising really, in the UK the media are already meeting with the government to decide what they can and cannot publish regarding the upcoming war. Anyway the list goes on, I know we can argue about this all day, I know I'll get someone emailing me telling me how much of a disgrace I am and giving out for me questioning this stuff. But this isn't what we are here for, we're here to share and learn something about TSCM as people, hopefully something most of us enjoy doing, and I want to discuss and learn things from you, if you want to post this kind of stuff do it somewhere else, please. All the best Vance PS. Ship high in transit...is that really the origin?? :) 6822 From: Shawn Hughes Date: Fri Jan 24, 2003 6:44pm Subject: vegas casinos >Vegas' High-Stakes Surveillance Lab; >In using sophisticated systems and software to pinpoint cheats, casinos are >providing valuable lessons for law enforcement > >Copyright 2003 The McGraw-Hill Companies, Inc. All Rights Reserved >Business Week Online...01/23/2003 > >Jane Black > >For high rollers, the Bellagio Hotel & Casino in Las Vegas is paradise on >earth. Amid the gilt ceilings and sumptuous, florid surroundings, patrons >focus on one thing: Gambling. The casino even pumps in extra oxygen to keep >the customers awake and alert. > >All the while, the Bellagio is watching -- especially if you start winning >big -- with 1,900 security cameras. Every gambling table has one above it, >while hundreds more tilt, pan, and zoom in on any suspicious activity from >strategic locations throughout the facility. Upstairs, in a location the >Bellagio won't disclose, half a dozen surveillance experts watch and record >patrons' moves. If they see someone suspicious, they capture the face and >plug it into a facial-recognition program, which will quickly check to see >if it matches any known cheats. > >DEMANDING RESULTS. Privacy advocates don't protest the spy technology, which >is used in most casinos. After all, when you enter one, you give up your >right to privacy. And because these are profit-driven establishments, >executives aren't lured by fancy systems that don't deliver results. The >upshot: The Vegas Strip has become a testing ground for what does and >doesn't work in the field of surveillance. The idea is to catch crooks -- >and keep honest people honest. > >In some ways, surveillance in Vegas is much like the world of computer >network security. As quickly as casinos upgrade their system protections, >crooks find a new hole in them. Witness a recent "cooler deck" scam that >robbed one of Las Vegas' most famous casinos of $ 250,000. It worked like >this: A gang of fraudsters, which included a crooked dealer and a security >guard, managed to get hold of six official decks of cards. They put the >cards in these decks in a specific order and sneaked them into the casino. >Then they did some surveillance of their own, waiting for the camera above >their table to be momentarily turned off while a new tape was inserted into >the VCR. > >At that point, the crooks switched the real deck for their ordered one. >Because they knew which cards would be dealt when, they won every hand. And >since no camera was taping, the casino couldn't prove that they had cheated. >(That's why this casino doesn't want to be named.) > >DIGITAL ADVANTAGES. In Vegas, crooks' innovation invariably leads to >improvements by the casinos. Incidents such as the one described here >explain why the outfits are now moving from analog-tape surveillance to >digital, which requires no tape changing that would allow crooks to act >unrecorded. Besides, digital images don't get lost or degrade over time. The >information will be stored on massive hard drives or optical storage systems. > >Digital setups also allow for easier access to crucial information. If, for >example, a casino using tape is robbed, surveillance experts have to watch >hours of recordings -- sometimes days of it -- in search of evidence. With >digital recordings, staff can simply request that the computer system show >every time that a cash drawer was opened. Then security can zoom in on each >instance, with time and date, immediately. > >In the past, "by the time you reviewed seven days of tapes and figure out >what happened, the crooks were already on their way to Bermuda," says Scott >Bartlett, CEO of Southwest Surveillance Systems, a Las Vegas technology >provider. "Digital helps you ID the problem in minutes and catch the bad >guys before they get away." > >PLAYING CATCH-UP. Here's another scam executed in South Africa last year >that has led to innovation in surveillance. The crooks knew the cameras were >never turned off -- unless a patron had a dispute with the house. So five >scamsters sat down at a blackjack table, and one of them kept staging >arguments with the dealer about the amount he had bet. Finally, the angry >gambler demanded to see the tape. The security team obliged and stopped >taping what was going on at the table. Meanwhile, the crooks lifted tens of >thousands of dollars while the blackjack dealer and security officials were >distracted. > >Many casinos have now installed backup systems that ensure every moment is >captured on camera. "We're always one step behind them," admits Patricia >Fischer, Bellagio's surveillance director. "But we always catch up." As the >technology in Vegas proves its worth, similar precautions may soon appear in >airports and other high-risk areas. > >Vegas' latest spy toy is facial-recognition software. In the old days, >security guys memorized books of mug shots, then peered down on gamblers >through binoculars from the catwalks. Now they use this software to match >known criminals' facial characteristics with those of gamblers in the casino. > >"NOT THERE YET." The use of such technology in public areas (as opposed to >inside a casino) has drawn the ire of privacy rights groups, who say it >doesn't work as advertised and is a needless intrusion on privacy. Indeed, >initial testing in Vegas has had mixed results. On the one hand, >facial-recognition software can save surveillance experts time by comparing >a suspicious face to tens of thousands of known cheats. But it can't yet >pick out crooks in a crowd on its own. "At some point, the software will be >good enough to just run in the background and alert you when it finds a >match. But it's not there yet," says Fischer. > >Experts in Vegas say the key lesson that terrorist-hunting feds can learn >from the casinos is to rely on smart, properly trained people, not the >latest gizmos. Determined crooks, after all, will always find a way to >circumvent technology. > >"The technology is only as good as the people behind it," says George Lewis, >director of surveillance training at the University of Nevada Las Vegas >International Gaming Institute and the author of The Eye that Never Blinks. >"You have to think like a crook to catch a crook." The intelligence >community would be wise to remember that. > Shawn Hughes ---------------------------------------------------------------------------- ----------------------------------------------- Mistakes have been made. Others will be blamed......... 6823 From: Steve Uhrig Date: Sun Jan 26, 2003 2:38pm Subject: Decent lead acid battery info This site: http://www.uuhome.de/william.darden/ has very decent info on lead acid batteries such as are used in automobiles. The info is not directly pertinent to TSCM, but good to know the characteristics. Much TSCM gear, like the OSCOR, is powered by lead acid batteries, called SLA, for Sealed Lead Acid. The same info pertains to lead acid in test equipment. Many Riser Bond TDRs also have lead acid. The main thing is to keep them charged. The site is worth some time. Read it and you'll know more about lead acid batteries than practically anyone you'll meet. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6824 From: Steve Weinert at Excel.Net Date: Sat Jan 25, 2003 11:43am Subject: Re: Please take your own advice ( WAS: USAF 4 Star Speaks Out) Please take your own advice. You were spot on in your observation that isn't the forum for your diatribute. Thanks, Steve W > Anyway the list goes on, I know we can argue about this all day, I know I'll > get someone emailing me telling me how much of a disgrace I am and giving > out for me questioning this stuff. But this isn't what we are here for, > we're here to share and learn something about TSCM as people, hopefully > something most of us enjoy doing, and I want to discuss and learn things > from you, if you want to post this kind of stuff do it somewhere else, > please. > > All the best > Vance 6825 From: Date: Sat Jan 25, 2003 10:15pm Subject: INTEL threat (high potential) about to blossom Imagine if you will.... You wake up and drive into the C3I complex. A package is awaiting you. You have been expecting it and are looking forward to the bug fixes for the servers you take care of. The shrink wrap is intact on the package. You get through your checkpoint, authorize your presence, the package is cleared and go into the NOC. You install the software on a few test servers, (never on production equip first) and analyze them for 48 hrs or more. Things seemed good so it's planned and deployed to the production network. Congratulations! You just installed Sleeperware v.2.1!!!! And got a FIS past the checkpoints! Yes the holograms are real, the signatures are valid. The source code was compromised. Other scenario. You notice (maybe you don't notice it) activity on your systems. The anti virus and CERT teams show nothing unusual. What's up? Congratulations! You've just become the target of a Foreign Intelligence Service (or private). They know the complete core guts of the OS you run. And are attacking a previously unknown weakness in the OS. Okay, reality check here. Why the drama above? To get your mid thinking in certain directions. Yes the scenarios are not perfect, they are flawed, but the principle is solid. Why do I write this and take up these bytes of data saying all this? Be very afraid: http://www.cnn.com/2003/TECH/biztech/01/21/russia.microsoft.reut/index.html The risk is obvious to those who are aware that it's not Dr. No on the other side out there. Not to mention the containment of the info will undoubtedly leak. There's more to say but it's mostly obvious to those on this list. Or it should be :-) $0.02 -James Let me know if you have comments. 6826 From: Matt Paulsen Date: Sun Jan 26, 2003 8:04pm Subject: RE: INTEL threat (high potential) about to blossom ..."Microsoft has said it will make its source code mainly available to them over the Internet and for free, provided they do not disclose it. "... hahahahahaha -----Original Message----- From: jamesworld@i... [mailto:jamesworld@i...] Sent: Saturday, January 25, 2003 8:16 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] INTEL threat (high potential) about to blossom Imagine if you will.... You wake up and drive into the C3I complex. A package is awaiting you. You have been expecting it and are looking forward to the bug fixes for the servers you take care of. The shrink wrap is intact on the package. You get through your checkpoint, authorize your presence, the package is cleared and go into the NOC. You install the software on a few test servers, (never on production equip first) and analyze them for 48 hrs or more. Things seemed good so it's planned and deployed to the production network. Congratulations! You just installed Sleeperware v.2.1!!!! And got a FIS past the checkpoints! Yes the holograms are real, the signatures are valid. The source code was compromised. Other scenario. You notice (maybe you don't notice it) activity on your systems. The anti virus and CERT teams show nothing unusual. What's up? Congratulations! You've just become the target of a Foreign Intelligence Service (or private). They know the complete core guts of the OS you run. And are attacking a previously unknown weakness in the OS. Okay, reality check here. Why the drama above? To get your mid thinking in certain directions. Yes the scenarios are not perfect, they are flawed, but the principle is solid. Why do I write this and take up these bytes of data saying all this? Be very afraid: http://www.cnn.com/2003/TECH/biztech/01/21/russia.microsoft.reut/index.html The risk is obvious to those who are aware that it's not Dr. No on the other side out there. Not to mention the containment of the info will undoubtedly leak. There's more to say but it's mostly obvious to those on this list. Or it should be :-) $0.02 -James Let me know if you have comments. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6827 From: Trey A Mujakporue Date: Mon Jan 27, 2003 4:58am Subject: RE: INTEL threat (high potential) about to blossom There is nothing new about what you are saying.. Its just that given the distribution of microsoft products, we will now be more exposed to greater privacy invasion than ever before. Take for instace the following.. http://cryptome.unicast.org/cryptome022401/msnsa-law.htm paragraph 39 to do with Swiss company CryptoAG and the NSA... Sounds crazy but is true..and shooting from the hip, I'll say that that was just the tip of the Ice-berg... For those who use microsoft windows 2000, did you know that in order to install the latest service pack,.. You must agree to Bill gates having admin rights on your computer... Hmmm.. Really now I hear you ask.. Check it out!! http://212.100.234.54/content/4/25956.html or if you don't have time.. Check out a windows 2000 service pack 3 EULA near you! Ps... In the cryptome article Svenska Dagbalet is the equivalent of the NY times... I wouldn't say the email im responding to is a whole heap of FUD but it was near enough! :) -----Original Message----- From: jamesworld@i... [mailto:jamesworld@i...] Sent: 26 January 2003 04:16 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] INTEL threat (high potential) about to blossom Imagine if you will.... You wake up and drive into the C3I complex. A package is awaiting you. You have been expecting it and are looking forward to the bug fixes for the servers you take care of. The shrink wrap is intact on the package. You get through your checkpoint, authorize your presence, the package is cleared and go into the NOC. You install the software on a few test servers, (never on production equip first) and analyze them for 48 hrs or more. Things seemed good so it's planned and deployed to the production network. Congratulations! You just installed Sleeperware v.2.1!!!! And got a FIS past the checkpoints! Yes the holograms are real, the signatures are valid. The source code was compromised. Other scenario. You notice (maybe you don't notice it) activity on your systems. The anti virus and CERT teams show nothing unusual. What's up? Congratulations! You've just become the target of a Foreign Intelligence Service (or private). They know the complete core guts of the OS you run. And are attacking a previously unknown weakness in the OS. Okay, reality check here. Why the drama above? To get your mid thinking in certain directions. Yes the scenarios are not perfect, they are flawed, but the principle is solid. Why do I write this and take up these bytes of data saying all this? Be very afraid: http://www.cnn.com/2003/TECH/biztech/01/21/russia.microsoft.reut/index.h tml The risk is obvious to those who are aware that it's not Dr. No on the other side out there. Not to mention the containment of the info will undoubtedly leak. There's more to say but it's mostly obvious to those on this list. Or it should be :-) $0.02 -James Let me know if you have comments. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6828 From: David Vine Date: Mon Jan 27, 2003 9:06pm Subject: SC (USA) Salesperson W/Law Enf. Background Needed I operate a seminar and publishing business in Aiken, SC selling to law enforcement and corporate security markets. We are looking for a sales person with a background in that or related areas (former intel or military, etc.) to work from our office or possibly your home. Compensation for a real producer could easily exceed $50,000 the first year. We have several seminars in various stages of development and you would have a marketing budget to make it happen. Please take a look at www.investigativetechnology.net to see what we're doing right now. If you are qualified and highly motivated, please contact me directly via email. David Vine 6829 From: Steve Uhrig Date: Tue Jan 28, 2003 8:41am Subject: Reorganization of ATF (USA) Effective Friday, January 24, 2003, the Bureau of Alcohol, Tobacco and Firearms (ATF) officially transfers from the Department of the Treasury to the Department of Justice, retaining its bureau status. 6830 From: frost_bitten_ca Date: Tue Jan 28, 2003 0:08pm Subject: Court rejects infrared drug search POSTED AT 2:07 AM EST Tuesday, January 28 Court rejects infrared drug search By KIRK MAKIN From Tuesday's Globe and Mail Your home is your castle ≠ right down to the heat that leaks out of it. The Ontario Court of Appeal extended the right of privacy to intrusive technological advances Monday, acquitting a man whose hydroponic marijuana operation was detected by police who flew overhead with infrared equipment. "The nature of the intrusiveness is subtle, but almost Orwellian in its theoretical capacity," the court said in a 3-0 ruling. It said police must henceforth obtain search warrants for these flyovers, since the heat they measure may emanate from other private activities that generate surges of energy. "Some perfectly innocent internal activities in the home can create the external emanations detected and measured by forward looking infrared aerial cameras," Madam Justice Rosalie Abella wrote. "Many of them, such as taking a bath or using lights at unusual hours, are intensely personal." There is a clear distinction between the kind of observation police make using the naked eye or binoculars and more threatening forms of intrusion that are the product of technology, she said. The ruling erased an 18-month sentence imposed against a Windsor, Ont., handyman, Walter Tessling, whose home contained enough marijuana plants to yield many kilograms of the narcotic. The court noted that in view of an evolving "public, judicial and political" recognition that marijuana is a less serious narcotic than it was once seen to be, it was preferable to exclude the ill-gotten evidence. Writing on behalf of Mr. Justice Dennis O'Connor and Mr. Justice Robert Sharpe, Judge Abella said Mr. Tessling must also be acquitted of possessing several unlicensed handguns. RCMP conducted the aerial surveillance in 1999, after getting a tip from an informant who was unfamiliar to them that Mr. Tessling and a friend were producing and trafficking marijuana. Defence counsel Frank Miller said Monday's ruling under the Charter of Rights signals that courts are aware of the threat future technology poses to vital civil liberties. "As far as I'm concerned, this is the essence of freedom," he said in an interview. "Why should the police know whether someone is taking a sauna, firing a kiln, growing orchids or growing marijuana?" He said infra-red surveillance will be subject to the same laws that exist for obtaining warrants to conduct a raid, plant a listening device or intercept phone calls. "What is novel is that this case involves what is known as 'off-the- wall technology' ≠ where inferences can be drawn about what is going on in your home without the police going anywhere near it," Mr. Miller said. Police in the Tessling case were told by Ontario Hydro officials that there was no unusual hydro usage at his home. Still suspicious, they flew over using equipment. Crown counsel James Leising and Moiz Rahman defended the evidence on the basis that any violation of Mr. Tessling's privacy interest was trivial. They said individuals have no reasonable expectation of privacy about the heat emitted from their homes, and nor does it reveal intimate details about their activities. However, the court said that Mr. Tessling clearly had a reasonable expectation of privacy, and that it was unreasonably violated. "While I accept that technically what is being scrutinized is heat from the surface of a home, it is impossible to ignore the fact that those surface emanations have a direct relationship to what is taking place inside the home," it said. http://www.globeandmail.com/servlet/ArticleNews/front/RTGAM/20030128/w xgrow0128/Front/homeBN/breakingnews 6831 From: Mitch D Date: Tue Jan 28, 2003 7:32pm Subject: Re: Court rejects infrared drug search Not advocating an idiot growing pot plants but;Glad someone in a courtroom still understands "Curtilage".......... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6832 From: Matt Paulsen Date: Tue Jan 28, 2003 8:06pm Subject: tscming a lan Hi there... Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of determining what is 'normal' vs 'not normal' within the context of a network being abused by 'real life' non-software based devices used to eavesdrop using network infrastructure vs. phone infrastructure. Not interested in software intrusions/surveillance/etc. Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are here and there, mostly between the HSRP routing switches at the core. Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... Backbone is fiber down to ether, some token, co/twinax, decnet, and other things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from there to more 3508's and/or 2950's using mdics/gbics (can't remember which acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some 3 here and there. VLAN'd and using spanning tree... . Routers are a smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... so it's hard to say who a 'top dog' sender is in this, unless you put 50 sniffers on the lan at once, especially since vlan's are everywhere and blocking traffic... snooping would be nice.... but papa's checkbook isn't that big. I guess the obvious points would be to sniff the subnet where the internet access is, as well as the servers, which is already being done, but since the servers tend to drown out a client here or there and client traffic looks like routers at the core, it's harder to say than find it. Almost makes me want to run a cisco switch report. Almost. To break down the page a bit and ask some questions... At this point the physical wiring will be checked for any eavesdropping device, or anomaly. - Any suggestion on what types of anomalies to look for with the tools above or are you talking about cable dragging it in the ceiling here? near-end/far-end cross talk analysis will be performed to locate inductive or capacitor isolated devices - what would this look like on a fluke? mostly next/fext is a pretty basic yes/no, like when doing a wire map.. it either is or isn't there/is or isn't paired up right. Anything specific to look for? Should I run specific wire tests that aren't the norm or look for specific characteristics? Be sure to check all conductor combinations, and all references to ground, and structural components for signal paths. --- Most LAN's are dead runs from LAN access device to patch panel to port, not grounded... unless you're counting the grounding of the LAN access device. It's been a long long time since I've seen a distributed fault on a network. What are you referencing here? When checking UTP wiring be sure to check all four cable pairs, and check the voice cabling at the same time (easy to do when four Smart Remotes are being used), but ensure that all cabling is "dry" (has no signal on it) before performing any tests. -- I have 6 remotes, but don't know what you mean by this. Mine are just numbered 1 -6 and ring out on the display and I can test 2 out at a time on my fluke ie: 2 full cables... am I misinterpreting something here or are you talking about something different entirely? It may also be beneficial to also perform a Sweep Analysis of the cabling (with a Spectrum Analyzer and Sweep Generator) to identify any frequency response related anomalies. - Can you give me a manufacturer/model sweep generator suggestion? HP 8601A or is there one better for field work? What range and resolution should I look for? What RF ranges should I disregard as normal when doing the spectrum analysis and the oscope tests for cat5/5e/6? 100MHz.. and? Lastly, what are some things to consider given fiber is prevalant in the ethernet environment (disregarding other media types for a moment), as well as media bridges pretty much all over the place? How would physical eavesdropping devices cope with this sort of briding? Thanks, Matt 6833 From: kondrak Date: Tue Jan 28, 2003 10:47pm Subject: Reorganization of ATF (USA) > > >The A.T.F has split into two groups, one keeping its present name and >moving to the Department of Justice. The other department is changing its >name to The Alcohol and Tobacco Tax Bureau (TTB) however, that one is >still under the control of the Treasury Department. > >http://www.ttb.gov/ [Non-text portions of this message have been removed] 6834 From: Hawkspirit Date: Wed Jan 29, 2003 8:43am Subject: tscming a lan Matt, I have been doing a lot of research in this area in the last year. I have several T-spans set up in my lab and I have purchased every major CSU/DSU and so far eight bit error rate detectors and framing generators. Your most accurate way to secure wire is still the use of TDR which means your resolution will be so much better if you shut down the data flow during the test. You will still have the problem of repeaters and routers every mile or so. Remote loop back testing is the way to go to identify those units and their location on the span. The biggest threat may be monitoring ports on those devices. Roger Tolces Electronic Security www.bugsweeps.com Date: Tue, 28 Jan 2003 18:06:08 -0800 From: "Matt Paulsen" Subject: tscming a lan Hi there... Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of determining what is 'normal' vs 'not normal' within the context of a network being abused by 'real life' non-software based devices used to eavesdrop using network infrastructure vs. phone infrastructure. Not interested in software intrusions/surveillance/etc. Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are here and there, mostly between the HSRP routing switches at the core. Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... Backbone is fiber down to ether, some token, co/twinax, decnet, and other things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from there to more 3508's and/or 2950's using mdics/gbics (can't remember which acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some 3 here and there. VLAN'd and using spanning tree... . Routers are a smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... so it's hard to say who a 'top dog' sender is in this, unless you put 50 sniffers on the lan at once, especially since vlan's are everywhere and blocking traffic... snooping would be nice.... but papa's checkbook isn't that big. I guess the obvious points would be to sniff the subnet where the internet access is, as well as the servers, which is already being done, but since the servers tend to drown out a client here or there and client traffic looks like routers at the core, it's harder to say than find it. Almost makes me want to run a cisco switch report. Almost. To break down the page a bit and ask some questions... At this point the physical wiring will be checked for any eavesdropping device, or anomaly. - Any suggestion on what types of anomalies to look for with the tools above or are you talking about cable dragging it in the ceiling here? near-end/far-end cross talk analysis will be performed to locate inductive or capacitor isolated devices - what would this look like on a fluke? mostly next/fext is a pretty basic yes/no, like when doing a wire map.. it either is or isn't there/is or isn't paired up right. Anything specific to look for? Should I run specific wire tests that aren't the norm or look for specific characteristics? Be sure to check all conductor combinations, and all references to ground, and structural components for signal paths. --- Most LAN's are dead runs from LAN access device to patch panel to port, not grounded... unless you're counting the grounding of the LAN access device. It's been a long long time since I've seen a distributed fault on a network. What are you referencing here? When checking UTP wiring be sure to check all four cable pairs, and check the voice cabling at the same time (easy to do when four Smart Remotes are being used), but ensure that all cabling is "dry" (has no signal on it) before performing any tests. -- I have 6 remotes, but don't know what you mean by this. Mine are just numbered 1 -6 and ring out on the display and I can test 2 out at a time on my fluke ie: 2 full cables... am I misinterpreting something here or are you talking about something different entirely? It may also be beneficial to also perform a Sweep Analysis of the cabling (with a Spectrum Analyzer and Sweep Generator) to identify any frequency response related anomalies. - Can you give me a manufacturer/model sweep generator suggestion? HP 8601A or is there one better for field work? What range and resolution should I look for? What RF ranges should I disregard as normal when doing the spectrum analysis and the oscope tests for cat5/5e/6? 100MHz.. and? Lastly, what are some things to consider given fiber is prevalant in the ethernet environment (disregarding other media types for a moment), as well as media bridges pretty much all over the place? How would physical eavesdropping devices cope with this sort of briding? Thanks, Matt 6835 From: MailExp Date: Tue Jan 28, 2003 8:42pm Subject: RE: Court rejects infrared drug search Not advocating either, BUT - how is it an intrusion when you don't know, feel or suffer the presence of an observation that you did not know was taking place from 1000' above your head? AND, since when is "the area common to or surrounding a house" consisting of the airspace above? It does not for any other right or law. It would be nicer to see someone in a courtroom apply common sense and logic, instead of wasting time making people file more papers just to do their job. Just another viewpoint from the peanut gallery... -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Tuesday, January 28, 2003 8:33 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Court rejects infrared drug search Not advocating an idiot growing pot plants but;Glad someone in a courtroom still understands "Curtilage".......... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 6836 From: Hugo Drax Date: Wed Jan 29, 2003 0:45am Subject: Re: tscming a lan If your customer has sensitive data it should sit behind a secured isolated server in a tamper-resistant cabinet include tamper evidence seals with a firewall protecting the device, IDS/logging system residing in the cabinet for alerting and only permit timed access to the server via VPN with SecureID tokens(fobs). Physical security is a must. Anyways get ready for a manual verification every cable and have fun :) all the questions you ask would require a book to answer them all in the world of Data I have seen it all and then some :) ----- Original Message ----- From: "Matt Paulsen" To: "'TSCM submissions'" Sent: Tuesday, January 28, 2003 9:06 PM Subject: [TSCM-L] tscming a lan > Hi there... > > Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, > scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of > determining what is 'normal' vs 'not normal' within the context of a network > being abused by 'real life' non-software based devices used to eavesdrop > using network infrastructure vs. phone infrastructure. Not interested in > software intrusions/surveillance/etc. > > Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are > here and there, mostly between the HSRP routing switches at the core. > Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... > > Backbone is fiber down to ether, some token, co/twinax, decnet, and other > things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from > there to more 3508's and/or 2950's using mdics/gbics (can't remember which > acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some > 3 here and there. VLAN'd and using spanning tree... . Routers are a > smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private > t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. > > IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... > so it's hard to say who a 'top dog' sender is in this, unless you put 50 > sniffers on the lan at once, especially since vlan's are everywhere and > blocking traffic... snooping would be nice.... but papa's checkbook isn't > that big. I guess the obvious points would be to sniff the subnet where the > internet access is, as well as the servers, which is already being done, but > since the servers tend to drown out a client here or there and client > traffic looks like routers at the core, it's harder to say than find it. > Almost makes me want to run a cisco switch report. Almost. > > To break down the page a bit and ask some questions... > > At this point the physical wiring will be checked for any eavesdropping > device, or anomaly. - Any suggestion on what types of anomalies to look for > with the tools above or are you talking about cable dragging it in the > ceiling here? > > near-end/far-end cross talk analysis will be performed to locate inductive > or capacitor isolated devices - what would this look like on a fluke? mostly > next/fext is a pretty basic yes/no, like when doing a wire map.. it either > is or isn't there/is or isn't paired up right. Anything specific to look > for? Should I run specific wire tests that aren't the norm or look for > specific characteristics? > > Be sure to check all conductor combinations, and all references to ground, > and structural components for signal paths. --- Most LAN's are dead runs > from LAN access device to patch panel to port, not grounded... unless you're > counting the grounding of the LAN access device. It's been a long long time > since I've seen a distributed fault on a network. What are you referencing > here? > > When checking UTP wiring be sure to check all four cable pairs, and check > the voice cabling at the same time (easy to do when four Smart Remotes are > being used), but ensure that all cabling is "dry" (has no signal on it) > before performing any tests. -- I have 6 remotes, but don't know what you > mean by this. Mine are just numbered 1 -6 and ring out on the display and I > can test 2 out at a time on my fluke ie: 2 full cables... am I > misinterpreting something here or are you talking about something different > entirely? > > It may also be beneficial to also perform a Sweep Analysis of the cabling > (with a Spectrum Analyzer and Sweep Generator) to identify any frequency > response related anomalies. - Can you give me a manufacturer/model sweep > generator suggestion? HP 8601A or is there one better for field work? What > range and resolution should I look for? > > What RF ranges should I disregard as normal when doing the spectrum analysis > and the oscope tests for cat5/5e/6? 100MHz.. and? > > Lastly, what are some things to consider given fiber is prevalant in the > ethernet environment (disregarding other media types for a moment), as well > as media bridges pretty much all over the place? How would physical > eavesdropping devices cope with this sort of briding? > > > Thanks, > > Matt > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6837 From: Mitch D Date: Wed Jan 29, 2003 3:17pm Subject: RE: Court rejects infrared drug search(slightly off topic) --- MailExp wrote: > Not advocating either, BUT - how is it an intrusion when you > don't know, > feel or suffer the presence of an observation that you did not > know was > taking place from 1000' above your head? AND, since when is > "the area > common to or surrounding a house" consisting of the airspace > above? It > does not for any other right or law. It would be nicer to see > someone > in a courtroom apply common sense and logic, instead of > wasting time > making people file more papers just to do their job. > > Just another viewpoint from the peanut gallery... Seems like the bottom line in the case presented, is what one can see, or gather, from an area that is accessible to the general public(sidewalk, street), versus utilizing a device to gain view of an area of concern.(helicopter,ladder,thermal gear) ie; if one could see illegal plants from the street,sidewalk through a window, that has the blinds open,and the stuff is in plain view,identifiable with ease, theres grounds for a warrant,versus using a ladder to look through a window upstairs or in this case using FLIR gear,from anyplace air or ground may fall within the guidelines of curtilage.....which is what seems the ruling judge in the case decided.... I read a 5 page curtilage report from a LEA,(US)that was published to discuss removal of trash from a trash can from someones home. Cliff note version: If the trash was placed on the street for collection,the contents were allowed to be used as evidence in a subject case whereas if it was behind the house,in an area that does not allow the trash collectors to have access to it,it would be deemed unallowable to be used in court. With todays laws, a lot has changed in regards to this due to the types of investigation that more or less have,less "guidelines",or borders to be adhered to based on what type of wrongdoing is being checked out..... I do think the judge had a tough decision to make..... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6838 From: R. Snyder Date: Wed Jan 29, 2003 4:02pm Subject: Parasitic illumination of passive radiators? Since the Soviets remotely illuminated the "Great Seal" resonant cavity, there seems to be a tacit presumption that passive radiators require illumination from a remote source. However, how much of a threat would local sources, such as the microwave motion detectors for burglar alarms, pose in the context of illumination of a correspondingly tuned microphonic resonant cavity? It seems that the majority of the microwave motion detectors are X-band, although I'm aware of a few Ku-band ones. Their input power appears to be typically a few hundred milliwatts, so their output power would be a fraction of that (especially if some of the power is being used by a PIR sensor in a PIR + microwave detector). Other potential microwave sources include 2.4 GHz and 5.8 GHz wireless data, cordless phones, etc., although I suspect the bursty nature of some of these sources (as well as their correspondingly larger cavities) might make them less of a threat. Any thoughts on illicit modulation of pre-existing RF as a TSCM threat? __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6839 From: gratefuldeadbolt Date: Wed Jan 29, 2003 10:51pm Subject: New member...with question.... Hi, what a great group this is... I hope to get to all of you a lot more... I am currently working as a Security/Alarm Technician right now and have done a fair amount of Locksmithing in the past... Two things I am wondering about... First, does anyone know of training/schooling/opportunities in Canada in the TSCM field? Second, Does anyone care to expand upon the THREAT ANALYSIS MODEL that one would use when talking to a client... I know that some of you have met some REALLY interesting folks (good for another post), and forwarded them to some very interesting sights like www.? the one for the foil caps to protect ones brain from microwave transmissions... Well not all of them are so easy to laugh away... Take for example a client that thinks they have been followed in a car... more than one occansion... and not by just any traffic, by someone that "seemed" to go out of their way to stay 'Line of sight' (and this was not someone they 'cut off the road while merging') so road rage can be ruled out! Are there any books, sights info that is recommended for a customer to look up to improve their evasive driving technique as to better "Make" sure they are NOT being followed... or in this occasion to "Make" sure they ARE being followed instead of just "thinking" they are being followed? Btw... Driving in circles in a parking lot is not an option for this customer. How would you handle this... P.s. the customer also thinks they are being bugged, and can't prove it...probably related to the paranoia of being followed. Now if we can only solve this 'following' enigma, the 'bugs' would be less an issue. Mabey this is better answered by a P.I. group with knowledge of 'traking and surveillance" but I thougt I'd ask here first because I am sure you have all dealt with customers that think they are being 'bugged' but only because this is justified by the feeling of being 'tracked' or 'WATCHED'! I guess I am really wondering the ethics of customer service vs the almighty "$" It would be easy for some to say "Yes, SIR, THEY are on to you now!!! we need to get going on the BUG sweep ASAP... I even need to borrow your satellite reciever for "TESTING" Ok... That will be $900/hr for the sweep..." and their are some that will send this customer to the FOIL CAP web sight before listening to thier story. I need to know the best way to serve this customer, and is there common ground? Thanks in advance... -ALWAYS GRATEFUL- Dave 6840 From: Kirk Adirim Date: Thu Jan 30, 2003 0:11am Subject: RE: Parasitic illumination of passive radiators? It takes a LOT of energy (watts) to illuminate a passive radiator so that it will reflect a decent signal. The energies generated from unfocused part 15 type devices are not great enough to re-radiate a passive reflector any useable distance. However, if you were to use focused energy say from a radar gun, you could use this on a resonant cavity. Some of the other techniques used today are beaming a signal onto tuned schottky diodes, then using the detected energy to power a microwatt audio transmitter. This is the same technology used on some of the RFID tags on toll roads. As I understand it, the Great Seal was operated at 300 mhz not microwave. If you really want to take passive radiators to the extreme, imagine using the naturally occurring RF pulses that bombard our planet from the cosmos, and using that energy as a passive stealth RADAR system to track foreign aircraft and ships etc. Sort of like radio astronomy..... Kirk www.tactronix.com -----Original Message----- From: R. Snyder [mailto:rds_6@y...] Sent: Wednesday, January 29, 2003 2:03 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Parasitic illumination of passive radiators? Since the Soviets remotely illuminated the "Great Seal" resonant cavity, there seems to be a tacit presumption that passive radiators require illumination from a remote source. However, how much of a threat would local sources, such as the microwave motion detectors for burglar alarms, pose in the context of illumination of a correspondingly tuned microphonic resonant cavity? It seems that the majority of the microwave motion detectors are X-band, although I'm aware of a few Ku-band ones. Their input power appears to be typically a few hundred milliwatts, so their output power would be a fraction of that (especially if some of the power is being used by a PIR sensor in a PIR + microwave detector). Other potential microwave sources include 2.4 GHz and 5.8 GHz wireless data, cordless phones, etc., although I suspect the bursty nature of some of these sources (as well as their correspondingly larger cavities) might make them less of a threat. Any thoughts on illicit modulation of pre-existing RF as a TSCM threat? __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6841 From: Matt Paulsen Date: Wed Jan 29, 2003 11:47pm Subject: RE: tscming a lan Hi Roger, Thanks for the information. Most of what you're discussing looks wan based voice/data - t1's, ds0's, opx's, etc. If we're still back to using a TDR (dry not wet, correct?), why should I bother with the other equipment I have? Does it provide any value to TSCM a lan in the context as I've laid it out? If you're saying that we have to break the lan to test, that's not very easy to do in a life systems level network where if you break the lan you endanger lives and set off physical security systems and impact engineering systems - chillers, electrical, etc. Or do I place that under this is a ISO issue, talk to the CEO if you've got an issue with it. Second, I'm still trying to understand how a TDR fits into the larger context of a fiber rich network with single & multimode cable all over the place. Third, I'm looking for surreptitious testing before breaking the lan. RE: CSU/DSU's, I've done from network loop back, 0x's, 1's, etc., as well as from the CO down to the CSU. Mostly I get 'it's all ok' from my testing. I tend to find that the telco's are braindead for the most part unless you get a senior engineer involved that realizes that there's this thing called a switch, and it runs on this other thing called software at their end. -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Wednesday, January 29, 2003 6:44 AM To: TSCM Subject: [TSCM-L] tscming a lan Matt, I have been doing a lot of research in this area in the last year. I have several T-spans set up in my lab and I have purchased every major CSU/DSU and so far eight bit error rate detectors and framing generators. Your most accurate way to secure wire is still the use of TDR which means your resolution will be so much better if you shut down the data flow during the test. You will still have the problem of repeaters and routers every mile or so. Remote loop back testing is the way to go to identify those units and their location on the span. The biggest threat may be monitoring ports on those devices. Roger Tolces Electronic Security www.bugsweeps.com Date: Tue, 28 Jan 2003 18:06:08 -0800 From: "Matt Paulsen" Subject: tscming a lan Hi there... Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of determining what is 'normal' vs 'not normal' within the context of a network being abused by 'real life' non-software based devices used to eavesdrop using network infrastructure vs. phone infrastructure. Not interested in software intrusions/surveillance/etc. Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are here and there, mostly between the HSRP routing switches at the core. Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... Backbone is fiber down to ether, some token, co/twinax, decnet, and other things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from there to more 3508's and/or 2950's using mdics/gbics (can't remember which acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some 3 here and there. VLAN'd and using spanning tree... . Routers are a smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... so it's hard to say who a 'top dog' sender is in this, unless you put 50 sniffers on the lan at once, especially since vlan's are everywhere and blocking traffic... snooping would be nice.... but papa's checkbook isn't that big. I guess the obvious points would be to sniff the subnet where the internet access is, as well as the servers, which is already being done, but since the servers tend to drown out a client here or there and client traffic looks like routers at the core, it's harder to say than find it. Almost makes me want to run a cisco switch report. Almost. To break down the page a bit and ask some questions... At this point the physical wiring will be checked for any eavesdropping device, or anomaly. - Any suggestion on what types of anomalies to look for with the tools above or are you talking about cable dragging it in the ceiling here? near-end/far-end cross talk analysis will be performed to locate inductive or capacitor isolated devices - what would this look like on a fluke? mostly next/fext is a pretty basic yes/no, like when doing a wire map.. it either is or isn't there/is or isn't paired up right. Anything specific to look for? Should I run specific wire tests that aren't the norm or look for specific characteristics? Be sure to check all conductor combinations, and all references to ground, and structural components for signal paths. --- Most LAN's are dead runs from LAN access device to patch panel to port, not grounded... unless you're counting the grounding of the LAN access device. It's been a long long time since I've seen a distributed fault on a network. What are you referencing here? When checking UTP wiring be sure to check all four cable pairs, and check the voice cabling at the same time (easy to do when four Smart Remotes are being used), but ensure that all cabling is "dry" (has no signal on it) before performing any tests. -- I have 6 remotes, but don't know what you mean by this. Mine are just numbered 1 -6 and ring out on the display and I can test 2 out at a time on my fluke ie: 2 full cables... am I misinterpreting something here or are you talking about something different entirely? It may also be beneficial to also perform a Sweep Analysis of the cabling (with a Spectrum Analyzer and Sweep Generator) to identify any frequency response related anomalies. - Can you give me a manufacturer/model sweep generator suggestion? HP 8601A or is there one better for field work? What range and resolution should I look for? What RF ranges should I disregard as normal when doing the spectrum analysis and the oscope tests for cat5/5e/6? 100MHz.. and? Lastly, what are some things to consider given fiber is prevalant in the ethernet environment (disregarding other media types for a moment), as well as media bridges pretty much all over the place? How would physical eavesdropping devices cope with this sort of briding? Thanks, Matt ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6842 From: Matt Paulsen Date: Wed Jan 29, 2003 11:50pm Subject: RE: tscming a lan Hi Hugo, Thanks for the input. Most of what you've laid out is already done. If the questions I've asked require a book to answer, I'll buy it. Any suggestions? Thanks, Matt -----Original Message----- From: Hugo Drax [mailto:hugodrax@d...] Sent: Tuesday, January 28, 2003 10:46 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] tscming a lan If your customer has sensitive data it should sit behind a secured isolated server in a tamper-resistant cabinet include tamper evidence seals with a firewall protecting the device, IDS/logging system residing in the cabinet for alerting and only permit timed access to the server via VPN with SecureID tokens(fobs). Physical security is a must. Anyways get ready for a manual verification every cable and have fun :) all the questions you ask would require a book to answer them all in the world of Data I have seen it all and then some :) ----- Original Message ----- From: "Matt Paulsen" To: "'TSCM submissions'" Sent: Tuesday, January 28, 2003 9:06 PM Subject: [TSCM-L] tscming a lan > Hi there... > > Have read http://www.tscm.com/fluke785.html a bit. Given a fluke, sniffer, > scope and 0-2ghz spectrum analyzer, I am interested in the nuts & bolts of > determining what is 'normal' vs 'not normal' within the context of a network > being abused by 'real life' non-software based devices used to eavesdrop > using network infrastructure vs. phone infrastructure. Not interested in > software intrusions/surveillance/etc. > > Utilization runs around .5-1.5% on a bad day and broadcast/multicasts are > here and there, mostly between the HSRP routing switches at the core. > Traffic is around 40%ipx, 55%ip, 5% other... 65 subnets, 1000+ devices... > > Backbone is fiber down to ether, some token, co/twinax, decnet, and other > things..... Mostly cisco, 4908's using HSRP down to 3508's (all fiber), from > there to more 3508's and/or 2950's using mdics/gbics (can't remember which > acronym goes where...) out to 10/100 switches/hubs, mostly cat 5/5e/6, some > 3 here and there. VLAN'd and using spanning tree... . Routers are a > smattering of 4000's, 3600's, 4500's, 25xx's, 17xx's, 3000's, etc on private > t1's, vpn's, frames, ds0's, ds1's, wifi, and more.. > > IE: a lot of pipe.. not a lot of use.. mostly bursty traffic and dead air... > so it's hard to say who a 'top dog' sender is in this, unless you put 50 > sniffers on the lan at once, especially since vlan's are everywhere and > blocking traffic... snooping would be nice.... but papa's checkbook isn't > that big. I guess the obvious points would be to sniff the subnet where the > internet access is, as well as the servers, which is already being done, but > since the servers tend to drown out a client here or there and client > traffic looks like routers at the core, it's harder to say than find it. > Almost makes me want to run a cisco switch report. Almost. > > To break down the page a bit and ask some questions... > > At this point the physical wiring will be checked for any eavesdropping > device, or anomaly. - Any suggestion on what types of anomalies to look for > with the tools above or are you talking about cable dragging it in the > ceiling here? > > near-end/far-end cross talk analysis will be performed to locate inductive > or capacitor isolated devices - what would this look like on a fluke? mostly > next/fext is a pretty basic yes/no, like when doing a wire map.. it either > is or isn't there/is or isn't paired up right. Anything specific to look > for? Should I run specific wire tests that aren't the norm or look for > specific characteristics? > > Be sure to check all conductor combinations, and all references to ground, > and structural components for signal paths. --- Most LAN's are dead runs > from LAN access device to patch panel to port, not grounded... unless you're > counting the grounding of the LAN access device. It's been a long long time > since I've seen a distributed fault on a network. What are you referencing > here? > > When checking UTP wiring be sure to check all four cable pairs, and check > the voice cabling at the same time (easy to do when four Smart Remotes are > being used), but ensure that all cabling is "dry" (has no signal on it) > before performing any tests. -- I have 6 remotes, but don't know what you > mean by this. Mine are just numbered 1 -6 and ring out on the display and I > can test 2 out at a time on my fluke ie: 2 full cables... am I > misinterpreting something here or are you talking about something different > entirely? > > It may also be beneficial to also perform a Sweep Analysis of the cabling > (with a Spectrum Analyzer and Sweep Generator) to identify any frequency > response related anomalies. - Can you give me a manufacturer/model sweep > generator suggestion? HP 8601A or is there one better for field work? What > range and resolution should I look for? > > What RF ranges should I disregard as normal when doing the spectrum analysis > and the oscope tests for cat5/5e/6? 100MHz.. and? > > Lastly, what are some things to consider given fiber is prevalant in the > ethernet environment (disregarding other media types for a moment), as well > as media bridges pretty much all over the place? How would physical > eavesdropping devices cope with this sort of briding? > > > Thanks, > > Matt > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: mpaulsen6 Date: Sun Jan 23, 2005 3:45pm Subject: Re: Suspects copy 'Wire' It's correct as far as CNN is concerned. As you said, it's old news. It's more amazing to me that people are purchasing contracts still and not purchasing throwaways and encrypting their conversations using PGP with a laptop and coupler. They should just purchase a vendor visa at a Fred Meyer, get a throwaway, use it for a few hours, get another and move on to a new one. All cash transactions, no names, just numbers and no localization issues, just streamed garbage. A simple PGP keyset hand exchanged and life is grand. Have another pizza... As it is.. criminals get caught because their stupid. Thanks for PGPfone Phil, we miss it. :) --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > -----Original Message----- > From: mpaulsen6 [mailto:mpaulsen6@a...] > > > While announcing a crackdown on Friday of a cocaine ring, police > said their investigation was hampered by the suspects' habit of > switching cell phones -- a technique for evading electronic > eavesdropping they picked up from TV. > "Believe it or not, these guys copied 'The Wire,' " one of the (NY) > investigators, Sgt. Felipe Rodriguez, said... > > If this is correct I guess our criminals are wayyyy ahead of New York's > crooks and cops. I had clients nearly a decade ago, who I strongly suspected > of being organised crime figures but they were charged but never convicted, > who swoped SIM cards and phones daily - to the extent that they set up a > cellphone trade-in business at the back of a garage in Pretoria mainly to > get hold of other peoples' phones to avoid 'spoopers'. > > Andy G > South Africa > > > [Non-text portions of this message have been removed] 10738 From: mpaulsen6 Date: Sun Jan 23, 2005 3:47pm Subject: Re: to moderator James can call my office desk if he likes, he has the number. --- In TSCM-L@yahoogroups.com, littledog wrote: > > hello, this guy at mpaulsen6@a... who has been insulting every single member is doing it from a fake address. Thought you might want to check on this. littledog...enjoy the list. 10739 From: mpaulsen6 Date: Sun Jan 23, 2005 3:59pm Subject: Re: TSCM list I checked the page you mentioned. Here's some feedback that you should consider. 1: I'd rather not have a username / password on a system that is overseas and owned by a corporation I know nothing about. 2: Yahoo has a good system, and I don't really see any reason why anyone would join a 'private' list server such as you're offering. 3: Anyone that knows anything about this list knows that JMA and others have a private by invite only list that they use to discuss items of that nature and they don't use anyone elses already, so you've recreated the wheel. Good luck with your list, I do hope it does well, I just have a feeling it won't just as others haven't for the same reasons. I know it takes a lot of initiate and effort to get a list going and maintained so best to you. But don't try to use your list promotion efforts as a diatribe against me as you know nothing about me. --- In TSCM-L@yahoogroups.com, "Tech Sec Lab" wrote: > It's a shame this list has gone the way it has... > > If anyone is interested in being part of an active professionals only list > that stays focused on the topic rather than what has become a free for all, > please feel free to sign up, > > http://ocean-research.net/mailman/listinfo/c4i-l_ocean-research.net > > Regards > > -Ois > > > *********************** > > > > > Date: Sun, 23 Jan 2005 09:44:23 +0200 > From: "Steve Whitehead" > Subject: Re: Re: McDonald's in Boca to offer glimpse into world of espionage > > Dear Mr Paulsen > > Do you have to comment on everything. Who cares what you think!!!!!!!!!!! > > This List has become very boring and a big waste of time. > > When I joined a few years ago the members really contributed value. > > I do not have time for this rubbish anymore. > > This List no longer makes any contribution to TSCM. > > I will unsubscribe myself. > > Bye! > > Steve Whitehead 10740 From: James M. Atkinson Date: Sun Jan 23, 2005 6:20pm Subject: Gentle Reminder I would like to remind list members to be polite, considerate, and respectful to other list members. We have well over 1200 subscribers, so everybody needs to make an effort to be nice or I will have to step in and remove problems in a rather unpleasant manner. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10741 From: mpaulsen6 Date: Sun Jan 23, 2005 9:04pm Subject: want to purchase. quotes please Purchasing in mar/apr timeline, need quotes in by end of feb. Please contact me offline with final quotes, 1 time only bid attempts please, so bid your best. Terms are net 30, gov/ed pricing - buying for a 501c(3). 1: fluke otdr for fiber scope 850 1300nm, single and multimode 62.5/125 primarily 2: fluke 635 quickbert-t1 tester 3: fluke dtx-1800 4: fluke fiberinspector pro video microscope 5: gold support on items listed above 5a: renewal on gold for an existing fluke onetouch series II 6: wildpackets omni3 v2 with 2x quad copper gac's (8 total for 4x full duplex), omnipeek and peek dnx engine - 3 consoles needed - 2 desktops, 1 laptop to be used. 7: 1x hp ml350 g4 rackmount kitted w/512mb ram upgrade to 1gb total and 2x10k rpm hot swap 72gb hdd's Thanks, Matt 10742 From: Andre Holmes <1ach@g...> Date: Sun Jan 23, 2005 9:18pm Subject: Foreign Tech. While surfing after brushing up on my reading material I ran across this site thought some of you might find this benificial. Andre Holmes Neptune Enterprise Security http://www.nes-ets-usa.com 1ach@G... The message is ready to be sent with the following file or link attachments: Shortcut to: http://www.alarm.de/security/pd-231463241.htm?categoryId=1 Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. Check your e-mail security settings to determine how attachments are handled. [Non-text portions of this message have been removed] 10743 From: mpaulsen6 Date: Sun Jan 23, 2005 9:30pm Subject: a good spectrum analyzer between 2 and 6ghz Any suggestions? I have one already that does 1hz step to 2ghz, but I need to go up to 6. 10744 From: Agent Geiger Date: Sun Jan 23, 2005 10:54pm Subject: Wraase WSD-690RX Does anyone know anything about a Wraase WSD-690RX weather satellite receiver, or at least where I could find some info on it? I know it's a German company, but their website has little infomation. Thanks, AG __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10745 From: Blake Bowers Date: Sun Jan 23, 2005 6:31pm Subject: Re: Gentle Reminder By being a dicator and deleting people with more knowledge and experience than you from the list? ----- Original Message ----- From: "James M. Atkinson" To: "TSCM-L" Sent: Sunday, January 23, 2005 6:20 PM Subject: [TSCM-L] Gentle Reminder > > > I would like to remind list members to be polite, considerate, and > respectful to other list members. We have well over 1200 subscribers, so > everybody needs to make an effort to be nice or I will have to step in and > remove problems in a rather unpleasant manner. > > -jma > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: > http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10746 From: A Grudko Date: Mon Jan 24, 2005 2:27am Subject: c4i TSCM list -----Original Message----- From: Tech Sec Lab [mailto:tscmteam@o...] > If anyone is interested in being part of an active professionals only list that stays focused on the topic rather than what has become a free for all, please feel free to sign up, http://ocean-research.net/mailman/listinfo/c4i-l_ocean-research.net Yesterday I was involuntarily subscribed to this new TSCM list, presumably by the owner as I had not applied to sign up. A poor start for a group that claims to be for 'professionals only' as this is highly unprofessional spamming. So I immediately asked the owner to unsubscribe me - I'm not spending my time and money to unsubscribe myself. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 [Non-text portions of this message have been removed] 10747 From: contranl Date: Mon Jan 24, 2005 6:54am Subject: Re: c4i TSCM list . I don't agree to much in having 1000 groups on the same subject that will divert and spread all knowledge. Also it is not good ethics to ask members in one group to come to another group because you feel the current group is no good Maybe you are right but you can't do that...how would you feel if someone came to your group saying "leave this group and come to mine" you can't do that it's not correct behaviour...if you want members to join your group you gonna have to do that in a different way. ofcourse that involves some work and effort...but that's the way it is. I agree that political issues should not be discussed to much here allthough bugging occurs many times for political reasons.so it is somewhhat related,also the owner of this group is obviously interested in politics ...there is not much you can do about that..i guess we have to live with that. So OK if you complain but don't "steal" members...be creative and do it in a different way. Greetings Tetrascanner 10748 From: A Grudko Date: Mon Jan 24, 2005 7:49am Subject: An apology I owe Oisin of Tech Sec Labs a public apology over my comments this morning re the c4i list. Contrary to what I wrote this morning I did subscribe to the c4i group on the 16th of this month. The reasons for my mistake are 3-fold; 1) When I replied to Oisin's offer to join it was to Tech Sec Lab so I was not aware that the new group was going to be called c4i 2) Unfortunately Osin's offer to TSCM members to join c4i group after all the off topic noise came on the 23rd and on the 24th I was informed that I had joined c41. I incorrectly linked these 2 events and did not link my acceptance of the 24th to c4i to my application on the 16th to the new Tech Sec Labs group 3) Like mpaulsen6, I (erroneously) though that the c4i membership invitation was an opportunistic one due to the 'noise' on TSCM-list. I apologise to Oisin, Tech Sec Lab and the c4i group for my error. My harsh reaction resulted from having been previously 'subscribed' to groups I had not applied to join by unscrupulous list owners and having to waste much time in unsubscribing. This was obviously NOT the case here. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 10749 From: Tech Sec Lab Date: Mon Jan 24, 2005 8:08am Subject: RE: An apology To whom it may concern: I am concerned by a couple of emails I received, in summary, accusing that the list had been established by Ocean Group as a front to derive technical security intelligence to use against US assets, in the form of espionage. I am dismayed. The list was not created by the company, it was solely my idea and it simply resides on the company server with their kind permission. It is not here to derive espionage against US assets! Ireland's biggest corporate investor is US companies, who we work very closely with, and many as clients. Secondly, we co operate and work very closely with many US security organisations on a repeated basis because of this fact. Any assertion to the contrary is sheer nonsense. Thank you for your time. > -----Original Message----- > From: A Grudko [mailto:agrudko@i...] > Sent: 24 January 2005 13:49 > To: Tech Sec Lab > Cc: TSCM-L@yahoogroups.com > Subject: An apology > > I owe Oisin of Tech Sec Labs a public apology over my > comments this morning re the c4i list. > > Contrary to what I wrote this morning I did subscribe to the > c4i group on the 16th of this month. > > The reasons for my mistake are 3-fold; > > 1) When I replied to Oisin's offer to join it was to Tech Sec > Lab so I was not aware that the new group was going to be called c4i > > 2) Unfortunately Osin's offer to TSCM members to join c4i > group after all the off topic noise came on the 23rd and on > the 24th I was informed that I had joined c41. I incorrectly > linked these 2 events and did not link my acceptance of the > 24th to c4i to my application on the 16th to the new Tech Sec > Labs group > > 3) Like mpaulsen6, I (erroneously) though that the c4i > membership invitation was an opportunistic one due to the > 'noise' on TSCM-list. > > I apologise to Oisin, Tech Sec Lab and the c4i group for my > error. My harsh reaction resulted from having been previously > 'subscribed' to groups I had not applied to join by > unscrupulous list owners and having to waste much time in > unsubscribing. This was obviously NOT the case here. > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 > 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) > 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > --- > Outgoing mail is certified Virus Free. > Checked by AVG anti-virus system (http://www.grisoft.com). > Version: 6.0.816 / Virus Database: 554 - Release Date: 2004/12/14 > > > > 10750 From: James M. Atkinson Date: Mon Jan 24, 2005 11:20am Subject: Re: a good spectrum analyzer between 2 and 6ghz You might want to consider the R&S hand-held units. The units are easy to use, very inexpensive, but you will need to use an external pre-amplifier. -jma At 10:30 PM 1/23/2005, mpaulsen6 wrote: >Any suggestions? > >I have one already that does 1hz step to 2ghz, but I need to go up to >6. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10752 From: Robert Motzer <1RCM@M...> Date: Mon Jan 24, 2005 2:12pm Subject: Re: Gentle Reminder Any idea who he's talking about????? >From: "James M. Atkinson" >Reply-To: TSCM-L@yahoogroups.com >To: TSCM-L@yahoogroups.com >Subject: Re: [TSCM-L] Gentle Reminder >Date: Mon, 24 Jan 2005 12:44:51 -0500 > [Non-text portions of this message have been removed] 10753 From: L. F. Elia Date: Mon Jan 24, 2005 2:18pm Subject: Re: FBI abandons Carnivore wiretap software Carnivore was a commercial product, a sniffer with plugins. I forget the name. --- Ramon wrote: ===== Solaris/LINUX/Windows administration Internet consulting & Web site design ------------------------------------- lfelia@y..., Virginia Beach VA, 23462 __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10754 From: savanted1 Date: Mon Jan 24, 2005 2:45pm Subject: Editorial: Anatomy of a bank fraud WHEN DATES DON'T MATCH Anatomy of a bank fraud WHEN DATES DON'T MATCH By James E. Muir, CFE, CPA FRAUD Magazine Vol. 19, No. 1 January/February 2005 Editorial: Introduction This article by Mr. Muir expounds on an actual audit of a mortagage company and exposes an act of fraud. The fraud occurs from a transaction that is used in banking in particular a demand deposit account (DDA). The act of fraud is found by tracing a financial institutions transactions with the actual borrower and loan officer. The tracing process actually points out that the banking institution had poor internal controls meaning the debit transactions were not properly documented showing the financial transactions that were needed by the actual auditors. This already tedious process was prolonged by the poor documentation process that was discovered by the auditors. The discrepancy noted was that the bank would post the checks to the debit side of its ledgers and would post the credit portion of the check at a later date. This would be sometimes be days or weeks before these transactions would be posted to the actual credit side of the ledgers. The tracing process which was the most intricately time consuming part of the audit revealed to the auditors that the deposits were used improperly and used against other borrowers loans. These transactions were subsequently hidden by the loan officer to hide the fraudulent activity. In summary, this example of poor internal controls demonstrate the actual need for a periodic audit. This particular type of fraud may have not been noticed for quite sometime if it had not been for the bank's audit. This article I found very interesting and informative due to its ability to demonstrate some of the roles that may be encountered by a fraud examiner in particukar a Certified Fraud Examiner (CFE). Mr. Muir does a great job of illustration to the reader by explaining the process of the investiagtion by the auditor. He also does an excellent job of explaining the resolution to this form of weakness in an internal control. I enjoyed this article because of its brief but clear and concise methodology that explained some things that a fraud examiner may look for while investigating a financial institution. I will say this the author could have briefly covered the Graham-Leach Bliley Act of 2002 a tad bit and incorporated it the article. Overall I will give Mr. Muir a grade of "A" due to the fact that he informed the populace how and where to look for some weak inernal controls. Very Respectfully Mr. Garrett Hord 10755 From: wiggyyy2000 Date: Mon Jan 24, 2005 8:26pm Subject: Re: Gentle Reminder i have a pretty good idea... --- In TSCM-L@yahoogroups.com, "Robert Motzer" <1RCM@M...> wrote: > Any idea who he's talking about????? > > > > >From: "James M. Atkinson" > >Reply-To: TSCM-L@yahoogroups.com > >To: TSCM-L@yahoogroups.com > >Subject: Re: [TSCM-L] Gentle Reminder > >Date: Mon, 24 Jan 2005 12:44:51 -0500 > > > > > > [Non-text portions of this message have been removed] 10756 From: J. Coote Date: Mon Jan 24, 2005 10:59pm Subject: WTD: Tek 492 Cover I'm looking for sources for a cover for a Tek 492 spectrum analyzer. Jay 10757 From: Date: Tue Jan 25, 2005 0:32am Subject: Reminder - Counterintelligence Awareness Briefing We would like to remind you of this upcoming event. Counterintelligence Awareness Briefing Date: Friday, January 28, 2005 Time: 8:30AM - 12:30PM EET (GMT+02:00) TSCM Services is hosting a corporate counterinteligence awareness briefing for decision-makers and security professionals at the Centurion Lake Hotel, Pretoria, South Africa. To register or for additional information, please visit the 'Events' page on www.tscm.co.za 10758 From: savanted1© Date: Tue Jan 25, 2005 9:19am Subject: TSCM News Teen Monitoring Goes High-Tech According to Sean Dodds, owner of Spy Depot in Toronto, "High-tech surveillance is the next best thing to being there" if parents are looking for a way to monitor their teenagers. Several new small mini cams that can be hidden throughout the house, software programs that monitor everything a teenager does on the computer, as well as a Global Position Satellite (GPS) Vehicle Logger that stores vehicle tracks and can be downloaded to a PC, are now available to parents. However, Dodds, who has his own teenagers, notes that while surveillance equipment is an excellent way to find out what is going on, the bottom line is that parents need to talk to their children about what they discovered and do everything possible to keep the lines of communication open. http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=1106047095257&call_pageid=970599119419 ========================================================================== Virginia Traffic Photo Bills Pass Senate Despite "Big Brother" Arguments Virginia State Senator Kenneth Cuccinelli (R-Fairfax County) led the opposition against three bills expanding or extending use of cameras to capture license plates of drivers running red lights. Cuccinelli argued, "A simple engineering change at the intersections [longer yellow lights] solves the problem without issuing citations, without any of the Big Brother arguments." However, all three bills won final passage in the Virginia Senate. http://www.wavy.com/Global/story.asp?S=2833695&nav=23iiVP3G ====================================================================== Parliamentarians Can Talk Freely Without Fear of Wiretapping A proposal introduced to the Knesset by Uri Yehuda Ariel (National Union), which would give parliamentarians immunity from wiretapping unless the Supreme Court justice granted permission, was approved by a majority vote of 15-0. http://www.haaretz.com/hasen/spages/528963.html Related Article: Wiretapping Immunity Bill Advances http://www.jpost.com/servlet/Satellite?pagename=JPost/JPArticle/ShowFull&cid=1106018362157 Savanted1Æ Mr. Garrett Hord __|__ -@--@--(_)--@--X-- savanted1@y... savanted1@h... savanted1@n... Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ It Is Wise To Educate A Child Than To Raise An AdultÆ ================================================== This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10759 From: Gerald Date: Tue Jan 25, 2005 10:37am Subject: RFID I have noted the reduced number of kidnappings in Iraq. Could RFID beused to trace victims if imbedded in their skin, or wouldn't it have the range? GW 10760 From: dj Date: Tue Jan 25, 2005 10:10am Subject: Looking for a used ICOM PCR1000 Anyone want to sell a ICOM PCR1000 or equiv. set with all freq open? Also looking for a parabolic reflector.. not mic... just the reflector (20-24 inches) acrylic or fiber v/r, IT2 --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10761 From: Hawkspirit Date: Tue Jan 25, 2005 0:01pm Subject: Sweep needed Residential sweep needed in Cartersville, GA. Roger Tolces 760-329-4404 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.3 - Release Date: 1/24/2005 [Non-text portions of this message have been removed] 10762 From: Hawkspirit Date: Tue Jan 25, 2005 0:07pm Subject: Sweep needed Residential sweep needed in WHEELING,WV. Roger Tolces Electronic Security Co. HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com 760-329-4404 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.3 - Release Date: 1/24/2005 [Non-text portions of this message have been removed] 10763 From: James M. Atkinson Date: Tue Jan 25, 2005 0:50pm Subject: Police probe Nicole Kidman 'bug' http://www.cnn.com/2005/WORLD/asiapcf/01/25/aus.kidman.reut/index.html Police probe Nicole Kidman 'bug' SYDNEY, Australia (Reuters) -- Police were investigating a possible bugging attempt on Australian actress Nicole Kidman after a listening device was found across the road from her Sydney harborside home. "At the time this device was found there were media paparazzi, if I may use that term, in the street," police inspector Grant Taylor told reporters Tuesday. Police had notified the Oscar-winning Hollywood star of the discovery of the device, Taylor said. "She is undoubtedly concerned in regards to why this device may have been placed there and if she is the potential target of this device," he said. The Daily Telegraph newspaper reported that security footage shot from Kidman's home showed a man planting the listening device on Sunday, shortly after she returned home to prepare for a new film, "Eucalyptus," based on an Australian novel of that name. "We have conclusive evidence that it was planted and this has been captured on video," Noel McMaster, director of Kidman's personal security agency, told the newspaper. "There is no doubt that any information that we were transmitting would have been heard," he said. Police said the listening device was commonly available in electronics stores and was being examined by police. It was not the first time Kidman has been at the center of a bugging scandal. In 1999, a freelance journalist was convicted in the United States of illegally taping an intercepted telephone call from Kidman to her then husband, actor Tom Cruise, and selling the tape to a tabloid newspaper. The tabloid newspaper said a woman's voice on the tape could be heard telling a man that their marriage was "hanging by a thread." The couple's 10-year marriage ended in 2001. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10764 From: James Greenwold Date: Tue Jan 25, 2005 4:47pm Subject: Re: Police probe Nicole Kidman 'bug' Imagine probing Nicole Kidman > From: "James M. Atkinson" > Reply-To: TSCM-L@yahoogroups.com > Date: Tue, 25 Jan 2005 13:50:32 -0500 > To: TSCM-L > Subject: [TSCM-L] Police probe Nicole Kidman 'bug' > > > > http://www.cnn.com/2005/WORLD/asiapcf/01/25/aus.kidman.reut/index.html > > Police probe Nicole Kidman 'bug' > > SYDNEY, Australia (Reuters) -- Police were investigating a possible bugging > attempt on Australian actress Nicole Kidman after a listening device was > found across the road from her Sydney harborside home. > > "At the time this device was found there were media paparazzi, if I may use > that term, in the street," police inspector Grant Taylor told reporters > Tuesday. > > Police had notified the Oscar-winning Hollywood star of the discovery of > the device, Taylor said. > > "She is undoubtedly concerned in regards to why this device may have been > placed there and if she is the potential target of this device," he said. > > The Daily Telegraph newspaper reported that security footage shot from > Kidman's home showed a man planting the listening device on Sunday, shortly > after she returned home to prepare for a new film, "Eucalyptus," based on > an Australian novel of that name. > > "We have conclusive evidence that it was planted and this has been captured > on video," Noel McMaster, director of Kidman's personal security agency, > told the newspaper. > > "There is no doubt that any information that we were transmitting would > have been heard," he said. > > Police said the listening device was commonly available in electronics > stores and was being examined by police. > > It was not the first time Kidman has been at the center of a bugging scandal. > > In 1999, a freelance journalist was convicted in the United States of > illegally taping an intercepted telephone call from Kidman to her then > husband, actor Tom Cruise, and selling the tape to a tabloid newspaper. > > The tabloid newspaper said a woman's voice on the tape could be heard > telling a man that their marriage was "hanging by a thread." The couple's > 10-year marriage ended in 2001. > > > > > > > > ------------------------------------------------------------------------------ > ---------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ------------------------------------------------------------------------------ > ---------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ------------------------------------------------------------------------------ > ---------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ------------------------------------------------------------------------------ > ---------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10765 From: James M. Atkinson Date: Tue Jan 25, 2005 5:00pm Subject: Signs of the Times Signs of the Times Actual signs seen in England: Sign in a Launderette: AUTOMATIC WASHING MACHINES: PLEASE REMOVE ALL YOUR CLOTHES WHEN THE LIGHT GOES OUT. Sign in a London department store: BARGAIN BASEMENT UPSTAIRS. In an office: WOULD THE PERSON WHO TOOK THE STEP LADDER YESTERDAY PLEASE BRING IT BACK OR FURTHER STEPS WILL BE TAKEN. Outside a farm: HORSE MANURE 50p PER PRE-PACKED BAG 20p DO-IT-YOURSELF. In an office: AFTER TEA BREAK STAFF SHOULD EMPTY THE TEAPOT AND STAND UPSIDE DOWN ON THE DRAINING BOARD. On a church door: THIS IS THE GATE OF HEAVEN. ENTER YE ALL BY THIS DOOR. (THIS DOOR IS KEPT LOCKED BECAUSE OF THE DRAUGHT. PLEASE USE SIDE DOOR.) Outside a secondhand shop: WE EXCHANGE ANYTHING - BICYCLES, WASHING MACHINES ETC. WHY NOT BRING YOUR WIFE ALONG AND GET A WONDERFUL BARGAIN. Sign outside a new town hall which was to be opened by the Prince of Wales: THE TOWN HALL IS CLOSED UNTIL OPENING. IT WILL REMAIN CLOSED AFTER BEING OPENED. OPEN TOMORROW. Outside a photographer's studio: OUT TO LUNCH: IF NOT BACK BY FIVE, OUT FOR DINNER ALSO. Seen at the side of a Sussex road: SLOW CATTLE CROSSING. NO OVERTAKING FOR THE NEXT 100 YRS. Outside a disco: SMARTS IS THE MOST EXCLUSIVE DISCO IN TOWN. EVERYONE WELCOME. Sign warning of quicksand: QUICKSAND. ANY PERSON PASSING THIS POINT WILL BE DROWNED. BY ORDER OF THE DISTRICT COUNCIL. Notice sent to residents of a Wiltshire parish: DUE TO INCREASING PROBLEMS WITH LETTER LOUTS AND VANDALS WE MUST ASK ANYONE WITH RELATIVES BURIED IN THE GRAVEYARD TO DO THEIR BEST TO KEEP THEM IN ORDER. Notice in a dry-cleaner's window: ANYONE LEAVING THEIR GARMENTS HERE FOR MORE THAN 30 DAYS WILL BE DISPOSED OF. Sign on motorway garage: PLEASE DO NOT SMOKE NEAR OUR PETROL PUMPS. YOUR LIFE MAY NOT BE WORTH MUCH BUT OUR PETROL IS. Notice in health food shop window: CLOSED DUE TO ILLNESS. Spotted in a safari park: ELEPHANTS PLEASE STAY IN YOUR CAR. Seen during a conference: FOR ANYONE WHO HAS CHILDREN AND DOESN'T KNOW IT, THERE IS A DAY CARE ON THE FIRST FLOOR. Notice in a field: THE FARMER ALLOWS WALKERS TO CROSS THE FIELD FOR FREE, BUT THE BULL CHARGES. Message on a leaflet: IF YOU CANNOT READ, THIS LEAFLET WILL TELL YOU HOW TO GET LESSONS. Sign on a repair shop door: WE CAN REPAIR ANYTHING. (PLEASE KNOCK HARD ON THE DOOR - THE BELL DOESN'T WORK) Sign at Norfolk farm gate: BEWARE! I SHOOT EVERY TENTH TRESPASSER AND THE NINTH ONE HAS JUST LEFT. Spotted in a toilet in a London office block: TOILET OUT OF ORDER. PLEASE USE FLOOR BELOW ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10766 From: J.A. Terranson Date: Tue Jan 25, 2005 11:32am Subject: Re: RFID On Tue, 25 Jan 2005, Gerald wrote: > I have noted the reduced number of kidnappings in Iraq. > Could RFID beused to trace victims if imbedded in their skin, or > wouldn't it have the range? AFAIK, depending on the specific RFID technology used, range goes as far as ~30 feet today, using COTS or near COTS equipment. I have heard theoretical discussions which insist that 100feet *may* be feasible soon, but it is unclear if "feasible" would necessarily equate to "available" in a reasonable time frame. Besides, I doubt a 100foot range would prove to be of much use. -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner 10767 From: J. Oquendo Date: Tue Jan 25, 2005 8:24pm Subject: CCTV Questions Hey all, sorry for throwing something in a little bit offtopic but I figured someone here might have a little more information you'd be willing to share on your experiences with CCTV systems. I know this isn't necessarily the forum for it, but again, I'm hoping someone can perhaps contact me offlist even on this subject. So here goes... Soon I will be looking for a CCTV systems with about 6 cameras per location, with about 5 locations. Small offices to be exact. Can anyone recommend a starting point with a product you have used, and its curves (learning, operation, OS, etc.) I would need to set up a centralized mechanism to monitor the other offices remotely from one focal point. Any pointers would help. Yes, before someone flames this message take note, I am currently on Google searching as well, but figured someone might have come across somehting particularly good to use. James: On another note, please contact me off-list for some questions personally for you. Would have called the MA number but am sort of tied up with work. Perhaps some email exchanges before I call would do some justice. Thanks. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How a man plays the game shows something of his character - how he loses shows all" - Mr. Luckey From: James M. Atkinson, Comm-Eng Date: Wed Jan 24, 2001 8:03pm Subject: Re: LoJack System At 5:05 PM -0800 1/24/01, Dawn Star wrote: >Does anyone on the list know the typical location in the vehicle of >a LoJack auto theft transmitter, its general appearance and antenna >configuration? Thanks, Roger It usually interfaces though the AM/FM radio antenna, but the actual command module can be in any of 50 or more hidden locations. The fastest way to find one is to TDR the antenna (I use a 1502 with an impedance matching network), or use a SA connected to the vehicle antenna and look for IF/RF bleed. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2373 From: Kohlenberg, Toby Date: Wed Jan 24, 2001 7:16pm Subject: Signal capturing for Wireless LAN protocol 802.11b Does anyone have experience with 802.11b wireless networks? I am looking for data on maximum distance from source that the signal can be picked up and/or transmitted from; How far away can you be and listen in AND How far away can you be and connect? Thanks, Toby All opinions stated are my own and in no way reflect the views of my employer Toby Kohlenberg, CISSP Intel Corporate Information Security STAT Team Information Security Specialist 503-264-9783 Office & Voicemail 877-497-1696 Pager "Just because you're paranoid, doesn't mean they're not after you." PGP Fingerprint: 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 2374 From: Andre Holmes <1ach@g...> Date: Wed Jan 24, 2001 10:21pm Subject: Bugging, spying and privacy - analysis by Dr Patrick Dixon, Global Change Ltd http://www.globalchange.com/bug.htm [Non-text portions of this message have been removed] 2375 From: Miguel Puchol Date: Thu Jan 25, 2001 3:05am Subject: RE: Signal capturing for Wireless LAN protocol 802.11b Toby, Your questions depend, at the receiving side, on the sensitivity of the equipment used. Good directional antennas and good hardware will allow someone to receive the signals from much greater distances. Also take into account that buildings and other obstructions can block the signal and cause multipath interference which would thwart reception. With these type of wireless networks, the location of the hub's antenna is the determining factor. I've seen a network cover a large factory with a couple of well placed antennas. How far you can connect from will depend on the location of the hub's antenna, and your equipment's characteristics. A PC-Card interface has a poor performance antenna, and you can expect distances of around 100 to 150 meters in optimum conditions. PCI based cards with external antennas can achieve much greater distances, as the antenna can be located in an optimal position. I hope it helps, all the best, Mike > -----Mensaje original----- > De: Kohlenberg, Toby [mailto:toby.kohlenberg@i...] > Enviado el: jueves, 25 de enero de 2001 2:16 > Para: TSCM-L@egroups.com > Asunto: [TSCM-L] Signal capturing for Wireless LAN protocol 802.11b > > > Does anyone have experience with 802.11b wireless > networks? I am looking for data on maximum distance > from source that the signal can be picked up and/or > transmitted from; > How far away can you be and listen in > AND > How far away can you be and connect? > > Thanks, > Toby > > All opinions stated are my own and in no way reflect the views of my > employer > > Toby Kohlenberg, CISSP > Intel Corporate Information Security > STAT Team > Information Security Specialist > 503-264-9783 Office & Voicemail > 877-497-1696 Pager > "Just because you're paranoid, doesn't mean they're not after you." > > PGP Fingerprint: > 92E2 E2FC BB8B 98CD 88FA 01A1 6E09 B5BA 9E84 9E70 > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2376 From: William Knowles Date: Thu Jan 25, 2001 3:45am Subject: Re: Signal capturing for Wireless LAN protocol 802.11b On Wed, 24 Jan 2001, Kohlenberg, Toby wrote: Toby, If this is an area of continuing interest for you and your organization, You might want to jump on a few of the wireless mailing lists, One I highly recommend is the one site run by Brewster Kahle. Its an absolute goldmine of information on IEEE 802.11 networks. http://www.sflan.com Cheers! William Knowles wk@c... > Does anyone have experience with 802.11b wireless networks? I am > looking for data on maximum distance from source that the signal > can be picked up and/or transmitted from; > > How far away can you be and listen in > AND > How far away can you be and connect? *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2377 From: Dragos Ruiu Date: Thu Jan 25, 2001 6:29am Subject: Re: Signal capturing for Wireless LAN protocol 802.11b On Thu, 25 Jan 2001, William Knowles wrote: > If this is an area of continuing interest for you and your > organization, You might want to jump on a few of the wireless mailing > lists, One I highly recommend is the one site run by Brewster Kahle. > Its an absolute goldmine of information on IEEE 802.11 networks. > http://www.sflan.com The original question was how far away you have to be to connect. As related to me by others who have done the testing in urban environments rather than my own first hand measurements, the physical distance is highly dependent on the signal reflective surfaces and local environment. Walk around with your laptop and play with its orientation, by receiving the appropriate multipath reflected signal you can achieve connections that would otherwise not seem feasible. The snide answer to the original distance question: Your mileage may vary. Some good 802.11 sites are also: http://www.palowireless.com/i802_11/ http://www.wireless-nets.com/whitepaper_overview_80211.htm url: http://www.niksula.cs.hut.fi/~mkomu/docs/wirelesslansec.html http://isds.bus.lsu.edu/fall98/7520/WirelessLANs/audit.htm http://www.tml.hut.fi/Studies/Tik-110.300/1999/Wireless/vulnerability_4.html cheers, --dr P.s. I've heard it said that in many city cores you can get some to some pretty interesting things just by walking around with a laptop and a Wavelan card. :-) -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net Email dr@k... for info about CanSecWest/core01 March 28-30, Vancouver B.C. Speakers: Renaud Deraison/Nessus Attack Scanner, Martin Roesch/Snort//Advanced IDS, Ron Gula/Enterasys/IDS Evasion, Dug Song/Arbor Networks/Monkey in the Middle, RFP/Whisker2.0 and other fun, Mixter/2XS/Distributed Apps, Theo DeRaadt/OpenBSD, K2/w00w00/ADMutate, HD Moore/Digital Defense/Making NT Bleed, Frank Heidt/@Stake, Matthew Franz/Cisco/Trinux/Security Models, Fyodor/insecure.org/Network Mapping, Lance Spitzner/Sun/Honeynet Fun, Robert Graham/NetworkICE/IDS Technology Demo, Kurt Seifried/SecurityPortal/Crypto: 2-Edged Sword, Dave Dittrich/UW/Forensics, Sebastien Lacoste-Seris/COLT Telecom AG/securite.org/Kerberized SSH Deployment, Jay Beale/MandrakeSoft/Bastille-Linux/Securing Linux 2378 From: Paolo Sfriso Date: Thu Jan 25, 2001 2:17am Subject: NLJD Use in EOD Dear Collegues. I'm looking for material and opinions in the use of a NLJD in EOD inspections. Basically, what are the possibilities that the transmitted signial could trigger the device ? Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 (0)335 5257308 paulsfriso@t... www.grupposit.com [Non-text portions of this message have been removed] 2379 From: Dawn Star Date: Thu Jan 25, 2001 10:10am Subject: LoJack System The fastest way to find one is to TDR the antenna (I use a 1502 with an impedance matching network), or use a SA connected to the vehicle antenna and look for IF/RF bleed. -jma They only transmit when activated so there would be no emission in its normal sleeping status right? Roger [Non-text portions of this message have been removed] 2380 From: Rob Muessel Date: Thu Jan 25, 2001 10:09am Subject: Re: NLJD Use in EOD Dear Paolo, et al: I'm not aware of any published data on using an NLJD for EOD or IED activities, but I spent many years with Information Security Associates (ISA), the manufacturers of the Boomerang model and have some first-hand experience. There has been a fair amount of interest in using NLJDs for this type of activity. One of the US military branches that does lots of research into EOD evaluated ISA's NJD-5 and found it to be very effective. Various agencies within the government of India have also evaluated the product and found it to be very satisfactory for both EOD and IED use. Your question regarding the transmitted is one of the great concerns of any EOD technician. Most NLJDs on the market today have too much power, according to the evaluations. Audiotel's SuperBroom Plus has 3 watts. REI's Orion has at least 1 watt (besides not being rugged enough for this type of application), and several made in Russia have up to 25 watts. All triggered devices during testing. ISA's NJD-5 has 500 milliwatts (maximum). This power level was found to be low enough to not cause triggering. In evaluating NLJDs for this application, the critical specification is not the power output, but the sensitivity of the receiver. Unfortunately, it is the hardest specification to define and to verify. With IED detection, the detected device might be a timer circuit or a radio receiver for remote activation. With EOD, the target is likely to be the triggering mechanism itself. In either case, the stronger the transmitted signal, the more likely it is that the IED's receiver could become saturated and trigger or enough current could be induced in the trigger to cause it to fire. The EOD evaluations showed that the ISA NJD-5 with the lowest power output had the greatest detection distance. I don't mean this to be a sales pitch, I'm only relating what the test results show. Do not rely on published specifications. Field testing is the only way to conclusively determine which products work best. Good luck with your project. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2381 From: James M. Atkinson, Comm-Eng Date: Thu Jan 25, 2001 11:35am Subject: Re: NLJD Use in EOD At 11:09 AM -0500 1/25/01, Rob Muessel wrote: >Dear Paolo, et al: > >I'm not aware of any published data on using an NLJD for EOD or IED >activities, but I spent many years with Information Security Associates >(ISA), the manufacturers of the Boomerang model and have some first-hand >experience. I understand that ATF has done a great deal of research on the matter, and has several advisories/techniques on the matter. Also, the NATO humanitarian folks (de-mining folks) have published several items regarding finding "plastic mines" using the Superscout, Locator and ORION. The biggest problem to-date is that NLJD were designed to be used in officer environment, and not taken out into the field. Somebody needs to come out with a more rugged design. >There has been a fair amount of interest in using NLJDs for this type of >activity. One of the US military branches that does lots of research >into EOD evaluated ISA's NJD-5 and found it to be very effective. >Various agencies within the government of India have also evaluated the >product and found it to be very satisfactory for both EOD and IED use. I know of several dozen government agencies worldwide who have been grabbing up NLJD's over the past couple of years just for EOD, IED, and mine location. >Your question regarding the transmitted is one of the great concerns of >any EOD technician. Most NLJDs on the market today have too much power, >according to the evaluations. Audiotel's SuperBroom Plus has 3 watts. >REI's Orion has at least 1 watt (besides not being rugged enough for >this type of application), and several made in Russia have up to 25 >watts. All triggered devices during testing. I have personally seen, handled, and examined a Chinese unit that applied over 300 watts to the head, and Soviet unit that applied over 100 watts to the head. I did some experiments a few years back where I exposed unshielded electrical matches with an un-terminated 12 inch or less pigtail to various levels of RF energy used by the more popular NLJD's. The results were most illuminating (no pun intended) when the pigtail was trimmed for resonance relative to the NLJD illumination frequency (a loud noise was created). Once you generate anything more then a few hundred milli-watts off the head you highly risk detonating the suspect device. The only problems I have had with the ORION was with the *&*## contacts oxidizing, but I prefer it over the other units I own or have used. The ORION is OK due to the adjustable power levels, but I would wants to push anything higher then the 14mW setting when check for devices (of course in TSCM you would normally start at the lowest settings and work your way up with over lapping coverage). >ISA's NJD-5 has 500 milliwatts (maximum). This power level was found to >be low enough to not cause triggering. Er... OK, but only if the blasting cap is shielded...Since most improvised explosive devices lack shielding (as in low metal content amatuer devices) they would be very vulnerable to detonation (or deflagration if a high order explosive was not used) > >In evaluating NLJDs for this application, the critical specification is >not the power output, but the sensitivity of the receiver. >Unfortunately, it is the hardest specification to define and to verify. >With IED detection, the detected device might be a timer circuit or a >radio receiver for remote activation. With EOD, the target is likely to >be the triggering mechanism itself. In either case, the stronger the >transmitted signal, the more likely it is that the IED's receiver could >become saturated and trigger or enough current could be induced in the >trigger to cause it to fire. Which is why is is very beneficial for an EOD team to have a spectrum analyser, several wave-guides, and some close field probes (and a good LNA). If the bomb has some electronic content (ie: a timing mechanism) you should be able to pickup on the electrical and magnetic fields it emits once you or the robot gets close to the device.. You right on target about the secret being in the receiver circuits, and that power levels must be a secondary priority. > The EOD evaluations showed that the ISA NJD-5 with the lowest power >output had the greatest detection distance. I don't mean this to be a >sales pitch, I'm only relating what the test results show. Do not rely >on published specifications. Field testing is the only way to >conclusively determine which products work best. I agree, the ISA NJD-5 is a good unit, and that field testing is the best way to go. >Good luck with your project. > >-- >Rob Muessel, Director email: rmuessel@t... >TSCM Technical Services Phone: 203-354-9040 >11 Bayberry Lane Fax: 203-354-9041 >Norwalk, CT 06851 >USA -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2382 From: James M. Atkinson, Comm-Eng Date: Thu Jan 25, 2001 11:44am Subject: Re: LoJack System At 8:10 AM -0800 1/25/01, Dawn Star wrote: >The fastest way to find one is to TDR the antenna (I use a 1502 with >an impedance matching network), or use a SA connected to the vehicle >antenna and look for IF/RF bleed. > >-jma > >They only transmit when activated so there would be no emission in >its normal sleeping status right? Roger No, you are poking around looking for the connection into the antenna wiring. Also, even if the unit is "sleeping" there will be a small amount of detectable emissions. The secret to finding a Lo-Jack beacon is knowing WHERE to physically look in the vehicle, what frequencies to watch, and the electrical anomalies it creates in the vehicle wiring. But then of course we are in the business of finding bugs, not pinching cars. The beacons tend to be installed into three major "zones" in the vehicle, and any TSCM project will turn up these little puppies with no problem as these 'zones" are always checked in detail during any vehicle sweep. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2383 From: Kohlenberg, Toby Date: Thu Jan 25, 2001 10:03am Subject: RE: Signal capturing for Wireless LAN protocol 802.11b Thanks all for the responses. I am thinking more in terms of using non-standard equipment to take advantage of poor signal control and listen in or connect from a long distance. I figure the people doing this will not be using standard WLAN cards. t > -----Original Message----- > From: Dragos Ruiu [mailto:dr@k...] > Sent: Thursday, January 25, 2001 4:29 AM > To: William Knowles; Kohlenberg, Toby > Cc: TSCM-L@egroups.com > Subject: Re: [TSCM-L] Signal capturing for Wireless LAN > protocol 802.11b > > > On Thu, 25 Jan 2001, William Knowles wrote: > > If this is an area of continuing interest for you and your > > organization, You might want to jump on a few of the > wireless mailing > > lists, One I highly recommend is the one site run by Brewster Kahle. > > Its an absolute goldmine of information on IEEE 802.11 networks. > > http://www.sflan.com > > > The original question was how far away you have to be to connect. > As related to me by others who have done the testing in urban > environments > rather than my own first hand measurements, the physical > distance is highly > dependent on the signal reflective surfaces and local environment. > > Walk around with your laptop and play with its orientation, > by receiving the > appropriate multipath reflected signal you can achieve > connections that > would otherwise not seem feasible. The snide answer to the > original distance > question: Your mileage may vary. > > Some good 802.11 sites are also: > > http://www.palowireless.com/i802_11/ > > http://www.wireless-nets.com/whitepaper_overview_80211.htm > > url: http://www.niksula.cs.hut.fi/~mkomu/docs/wirelesslansec.html > > http://isds.bus.lsu.edu/fall98/7520/WirelessLANs/audit.htm > > http://www.tml.hut.fi/Studies/Tik-110.300/1999/Wireless/vulner ability_4.html cheers, --dr P.s. I've heard it said that in many city cores you can get some to some pretty interesting things just by walking around with a laptop and a Wavelan card. :-) -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net Email dr@k... for info about CanSecWest/core01 March 28-30, Vancouver B.C. Speakers: Renaud Deraison/Nessus Attack Scanner, Martin Roesch/Snort//Advanced IDS, Ron Gula/Enterasys/IDS Evasion, Dug Song/Arbor Networks/Monkey in the Middle, RFP/Whisker2.0 and other fun, Mixter/2XS/Distributed Apps, Theo DeRaadt/OpenBSD, K2/w00w00/ADMutate, HD Moore/Digital Defense/Making NT Bleed, Frank Heidt/@Stake, Matthew Franz/Cisco/Trinux/Security Models, Fyodor/insecure.org/Network Mapping, Lance Spitzner/Sun/Honeynet Fun, Robert Graham/NetworkICE/IDS Technology Demo, Kurt Seifried/SecurityPortal/Crypto: 2-Edged Sword, Dave Dittrich/UW/Forensics, Sebastien Lacoste-Seris/COLT Telecom AG/securite.org/Kerberized SSH Deplonet Jay Beale/MandrakeSoft/Bastille-Linux/Securing Linux 2384 From: Thomas H. Jones Date: Thu Jan 25, 2001 5:30pm Subject: RE: Digest Number 492 Dear Rob Muessel, I know that this is not the place for marketing and I will appologize up front. But I feel the need to respond when our equipment is slandered. >Your question regarding the transmitted is one of the great concerns of >any EOD technician. Most NLJDs on the market today have too much power, >according to the evaluations. Audiotel's SuperBroom Plus has 3 watts. >REI's Orion has at least 1 watt (besides not being rugged enough for >this type of application), and several made in Russia have up to 25 >watts. All triggered devices during testing. We are not aware of any testing that has ever been done inwhich the ORION has caused a detonation. The Government of India did some testing last October, and the rumor is that the Audiotel unit caused an explosion, but I only heard this from our agent in India. The documented results of this test are considered classified by the government of India, and I have no documented results. But, I do know that the ORION was not part of the testing, but the Russian unit (NR-900 at 150 watts) was included. I am very curious as to where Rob Meusal got his data. Also, it should be noted that building equipment to look like it was manufactured in the 50's does not necessarily make it more rugged. Other then the slip ring contacts mentioned below and adding a plastic cover on the antenna head for people that like to "sand" the wall, we have not had the need to make any further modifications for ruggedness. But we have had many customers tell us how effective their sweeps have become because they were able to use their NLJD for longer than 15 minutes without becoming exhausted. Another important issue that should be considered is the ERP peak and the ERP average. Except for the ORION and the Russian units, most NLJD's are CW in nature providing continuous power. The ORION is a pulsed unit with a very low duty cycle so that the average power is much less than the ISA Boomerang average power and below the FCC legal limit. This is why the ORION is so much smaller then the Boomarang. Also, the ORION output power is fully adjustable from 14mwatts to 1.4 watts peak power. Our friends in India tell us that this is a very positive aspect of the design when using a unit for EOD. Furthermore, the ORION has a more sensitive receiver and has a built-in DSP function to increase sensitivity beyond the technology of the receiver. >The only problems I have had with the ORION was with the *&*## >contacts oxidizing, but I prefer it over the other units I own or >have used. I am sorry for your oxidizing problem. We have made a modification on the contact and slip-ring assembly. If you are still having any problem, please send us the unit and we will upgrade it free of charge. Regards, Tom Jones REI General Manager 2385 From: James M. Atkinson, Comm-Eng Date: Thu Jan 25, 2001 9:12pm Subject: RE: Digest Number 492 - NLJD Issues At 5:30 PM -0600 1/25/01, Thomas H. Jones wrote: >Dear Rob Muessel, > >I know that this is not the place for marketing and I will appologize up >front. But I feel the need to respond when our equipment is slandered. [Moderator Steps Up on His Soapbox] If the subject involves TSCM equipment, TSCM methods, TSCM issues and related subjects that it is completely appropriate for this forum. I found the materials posted by both Rob and Tom to be quite appropriate, and wish more list members would post similar materials. Occasional marketing is ok, and occasional product announcements are encouraged but temper it with good judgement and lets keep it technical. -jma [Moderator Shuts Up] -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2386 From: Rob Muessel Date: Fri Jan 26, 2001 8:29am Subject: Re: Digest Number 492 - NLJD Issues Ah, the voice of reason. Jim, you are entirely correct. I was responding as one who had been involved with assisting in the evaluation of NJDs for this application. Having been present at some of the testing and evaluation overseas and in Maryland, I was detailing what I had seen and what results had been communicated to me. Let me state that I have no connection to or relationship with any equipment manufacturer, so I don't need to need to push anyone's product. I'm only relating professional experience. If there is any offense created, it is unintentional and I do apologize for it. In closing, regardless of which NJD might be used for EOD applications, there is no way I'd want to be the guy who is holding onto the antenna. At least not without my earplugs. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2387 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 9:32am Subject: Fire authorities in California.... Fire authorities in California found a corpse in a burned out section of forest while assessing the damage done by a forest fire..The deceased male was dressed in a full wet suit, complete with SCUBA tanks on his back, flippers, and face mask. A post-mortem revealed that the person died not from burns, but from massive internal injuries. Dental records provided a positive identification. Investigators then set about to determine how a fully clad diver ended up in the middle of a forest fire.. It was revealed that, on the day of the fire, the person went for a diving trip off the coast some 20 miles away from the forest. The firefighters, seeking to control the fire as quickly as possible, called in a fleet of helicopters with very large dip buckets. Water was dipped from the ocean then flown to the forest fire and emptied..You guessed it. One minute our diver was making like Flipper in the Pacific, the next he was doing the breast stroke in a fire dip bucket 300 feet in the air. Apparently he extinguished exactly 5'-10" of the fire. Some days it just doesn't pay to get out of bed! This article was taken from the California Examiner, March 20, 1998 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2388 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 9:44am Subject: In-Flight Safety Lecture Occasionally, airline attendants make an effort to make the "in-flight safety lecture" and their other announcements a bit more entertaining. Here are some real examples that have been heard or reported: After landing: "Thank you for flying Delta Business Express. We hope you enjoyed giving us the business as much as we enjoyed taking you for a ride." As the plane landed and was coming to a stop at Washington National, a lone voice came over the loudspeaker: "Whoa, big fella. WHOA!" In the event of a sudden loss of cabin pressure, margarine cups will descend from the ceiling. Stop screaming, grab the mask, and pull it over your face. If you have a small child traveling with you, secure your mask before assisting with theirs. If you are traveling with more than one small child ...pick your favorite. Weather at our destination is 50 degrees with some broken clouds, but we'll try to have them fixed before we arrive. Thank you, and remember, nobody loves you, or your money, more than Southwest Airlines." "Your seat cushions can be used for flotation, and in the event of an emergency water landing, please paddle to shore and take them with our compliments." "As you exit the plane, make sure to gather all of your belongings. Anything left behind will be distributed evenly among the flight attendants. Please do not leave children or spouses." Another flight attendant's comment on a less than perfect landing: "We ask you to please remain seated as Captain Kangaroo bounces us to the terminal." Part of a flight attendant's arrival announcement: "We'd like to thank you folks for flying with us today. And, the next time you get the urge to go blasting through the skies in a pressurized metal tube, we hope you'll think of us here at US Airways." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2389 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 10:07am Subject: REAL MASTER SERGEANTS: REAL MASTER SERGEANTS: 1. Can cuss for ten minutes without ever repeating a word. 2. Have a spine. 3. Can play a cherry Lieutenant like a finely tuned instrument. 4. Can see in the Dark. 5. Have eyes in the back of their heads. 6. Still don't trust the Russians or Germans 7. Still hate the French. 8. Don't know or care how to be politically correct. 9. Don't give a damn about being politically correct. 10. Think that "politically correct" should fall under S### in the UCMJ. 11. Love deployments because there is less paperwork and more"real work." 12. Can run 5 miles with a hangover. 13. Do not fear women in the military. 14. Would like to date G. I. Jane. 15. Still know how to use a floor buffer. 16. Can tell you anything you want to know about an M1911A1 although they are no longer in the inventory. 17. Believe that they do have a rendezvous with destiny. 18. Believe that " Nuts" wasn't all that Brigadier General McAuliffe said to the Germans at Bastogne. 19. Don't know how to use a "stress card". 20. Idolize John Wayne. 21. Don't believe that AAFES really needs a"commander". 22. Would have paid money to see Custer getting his clock cleaned. 24. Know how to properly construct a field latrine. 25. Might admire the Germans, but still realize they got their butts kicked. Twice. 26. Aren't afraid of the Chinese, who probably don't have enough rowboats to invade Taiwan. 27. Would rather be OPFOR than MOPP 4. 28. Don't believe a darn thing the Iraqis say. 29. Don't need a GPS to find themselves. 30. Have enough BDU's in their closet to start a surplus store. 31. Think that MRE's taste good (with a little hot sauce). 32. Are convinced that "wall-to-wall"counseling really works. 33. Have more time on the front-line than most others have in the chow line. 34. Know how to make coffee when the measuring scoop goes missing. 35. Know that it's not good coffee when you can see through it. 36. Don't blame poor marksmanship on their M-16. 37. Know that inept leaders will always say they have inept soldiers. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2390 From: Andre Holmes <1ach@g...> Date: Fri Jan 26, 2001 0:02pm Subject: Fw: History of a SPY ----- Original Message ----- From: Andre Holmes To: TSCM-L@egroups Sent: Friday, January 26, 2001 12:59 PM Subject: History of a SPY Greetings I found this web site http://www.Tomlinson.ru while surfing the latest news from around the world. The book is banned in several countries including the USA. [Non-text portions of this message have been removed] 2391 From: Kevin D. Murray Date: Fri Jan 26, 2001 0:19pm Subject: Re: Fw: History of a SPY $30 at Amazon http://www.amazon.com/exec/obidos/ASIN/0970554788/counterespionage Andre Holmes wrote: > ----- Original Message ----- > From: Andre Holmes > To: TSCM-L@egroups > Sent: Friday, January 26, 2001 12:59 PM > Subject: History of a SPY > > Greetings > > I found this web site http://www.Tomlinson.ru while surfing the > latest news from around the world. > > The book is banned in several countries including the USA. 2392 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 2:29pm Subject: DARWIN AWARDS DARWIN AWARDS HONOR THE REMAINS of those who gave their lives in a single-minded effort to improve our gene pool. This month we have a few short Darwins and a bundle of Honorable Mentions and Personal Accounts. Enjoy! "A 27-year-old FBI agent fell to his death when he accidentally piloted a powerful speedboat over 165-foot high dam in Arkansas. "A woman chasing a rat with a lit roll of paper set her bed ablaze and narrowly escaped from her smoke-filled apartment with her life at the Royal Beechnut Apartments in Houston." ABC13 and KTRK, Texas "An off-duty Los Angeles police officer accidentally shot himself while cleaning his gun, and was treated for a groin injury at a nearby hospital." "People injured or killed in the Michigan firearms deer season include a Bay City man shot in the leg while trying to photograph his dog holding a rifle, which accidentally went off." 28 November 2000, Michigan Live WEST VIRGINIA ALIBI -- Honorable Mention Confirmed True A Charleston bank robber's alibi for the crime placed him in hot water when he claimed to be buying heroin in another state at the time of the robbery. He gave them a hotel receipt and police searched the room to find 84 packets of heroin. Police decline to comment on Donald's fate. MEDIEVAL STORY -- 2001 Urban Legend As related by Tamas Polgar, who says, "During the late medieval years in Hungary, one of the oldest legends in our country took place. It may even be true." The city Paks (pronounced pa:ksh) was a little village in the 1600s and today is a small city boasting Hungary's single nuclear plant. In the past, the village had trouble with a neighboring village. They kept sending their cows to graze on Paks land, and vice-versa, knowing my ancestors. Once a foreigner attacked the Paks herdsman, beat him badly, and confiscated his cows. But this was not just any herdsman, it was the son of the mayor! The people of Paks took up arms - or rather, work tools they could wield as arms. The result was a small battle between the two villages, in which dozens of peasants bit the dust. The brave Paks army retreated in defeat. The mayor of Paks, undaunted, ordered his men to fabricate a cannon to blast the enemy to smithereens. It was easier to order it than to do so, as they did not have the necessary tools and materials to build a cannon. "No matter," said the wise mayor, "Chop a tree down, and create the cannon from its trunk!" During the night the people of Paks created the first wooden cannon in history, ready for deployment. They towed it up a nearby hill, and the entire village gathered around to watch the victory. The Gunmaster loaded the cannon with gunpowder, put a large rock projectile in the barrel, pointed the weapon towards the enemy village and fired it... KABOOMM!! Twenty people near the cannon died, and many others were seriously wounded. However the mayor survived, and immediately issued a victory message for his people, saying: "If we have so many dead, how many can there be of the enemy?" -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2393 From: Robert G. Ferrell Date: Fri Jan 26, 2001 3:19pm Subject: Have Ion Trail, Will Bounce This phenomenon used to irritate me when I was doing radio wave propagation stuff for science fairs in junior high school. I had no idea it was so commercial... ;-) http://www.starcomwireless.com/technology/articlereader.asp?tf=StarCom_Technology.txt Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2394 From: Miguel Puchol Date: Fri Jan 26, 2001 4:06pm Subject: RE: DARWIN AWARDS Is there a web site for the Darwin Awards? > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: viernes, 26 de enero de 2001 21:30 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] DARWIN AWARDS > 2395 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 4:12pm Subject: RE: DARWIN AWARDS At 11:06 PM +0100 1/26/01, Miguel Puchol wrote: >Is there a web site for the Darwin Awards? yes.... http://www.nipc.gov/ -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2396 From: Miguel Puchol Date: Fri Jan 26, 2001 4:19pm Subject: RE: Fire authorities in California.... That's no joke! A few years back, we had a similar case, but involving a seaplane, more exactly a Canadair CL-215, operated then by the Spanish AF, now by a private company. They have to pick up water on the move, by lowering a scoop into the sea or lake while flying about 2-3 feet above it, loading some 3.000 liters (about 750 gallons, don't ask wether US or UK) each go, and in one of the passes over the coastline, an extra diver. This one also had full SCUBA gear on. This fire was close to home, so I was involved with the local FD in the effort to control the fire, and we heard the report over the radio when they found the guy. I would also propose the theory that SCUBA divers are a rather poor way to extinguish forest fires, based on these two examples. Never mind, try with lawyers (sorry, couldn't help it!) Cheers, Mike > -----Mensaje original----- > De: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] > Enviado el: viernes, 26 de enero de 2001 16:33 > Para: TSCM-L Mailing List > Asunto: [TSCM-L] Fire authorities in California.... > > > > Fire authorities in California found a corpse in a burned out section of > forest while assessing the damage done by a forest fire..The deceased male > was dressed in a full wet suit, complete with SCUBA tanks on his back, > flippers, and face mask. A post-mortem revealed that the person died not > from burns, but from massive internal injuries. Dental records provided a > positive identification. Investigators then set about to determine how a > fully clad diver ended up in the middle of a forest fire.. > It was revealed that, on the day of the fire, the person went for a diving > trip off the coast some 20 miles away from the forest. The firefighters, > seeking to control the fire as quickly as possible, called in a fleet of > helicopters with very large dip buckets. > Water was dipped from the ocean then flown to the forest fire and > emptied..You guessed it. One minute our diver was making like Flipper in > the Pacific, the next he was doing the breast stroke in a fire dip bucket > 300 feet in the air. Apparently he extinguished exactly 5'-10" > of the fire. > Some days it just doesn't pay to get out of bed! > > This article was taken from the California Examiner, March 20, 1998 > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2397 From: Steve Whitehead Date: Fri Jan 26, 2001 11:51am Subject: TSCM Practitioners in Ohio Hi A Captain Bruce Contos from Jerusalem Ohio is retiring soon from Law Enforcement and is considering starting a debugging business. He asked for advice and we gave him some pros and cons, recommending that he get to know the professional TSCM service providers in OHIO. His e-mail address is (dustybrandy@1...) TSCM practitioners in that part of the US can mail him with their details. Best Regards Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2398 From: Shawn Hughes Date: Fri Jan 26, 2001 3:36pm Subject: EOD uses for NLJD I've been reading the posts on this subject with great interest. As a practicing bomb technician here in the US, I try to keep abreast of anything that might be of use to us. I recall some testing done by Sandia and NAVSCHOLEOD at Indian Head on the NLJD, but I believe that the consensus was that the price per unit versus actual applicability made them a poor choice. I know some Fed PSBT units that have them, but what they do with their end-of-FY money's their business! The problem is twofold: the search for bombs strongly parallels the search for surveillance devices. The chief difference lies in that while both use similar searching techniques and manpower, a bomb search always is time - constrained. Having been attached to two VIPPSA's, even though it appears there are a multitude of personnel, the truth is that the Secret Service runs light. This means that precious time might be squandered on the NLJD, which will not detect the majority of IED's which are of the MT (mechanical timed) variety. This is also why very little TSCM gear is used. A lot of high - end units carry near - field receivers and wide - spectrum jammers, but that's about the extent. The other problem is that the majority of ET devices use timers similar to a digital watch. This means that it would take very little radiated RF to potentially cause a premature functioning of the device. Which is good, because you accomplish your mission ( no dead VIP), but it's also bad ( you're dead). Mr. Atkinson is dead on about RF and blasting caps. However, caps are usually more sensitive to RF than matches, making them that much more susceptible. ( A good try - it - yourself test is to substitute a grain of wheat lamp for the cap. Even a child's walkie talkie can illuminate the lamp with correctly tuned leg wires!) However, using TSCM on a robot really doesn't work. The units I have used (REMOTEC, Wheelbarrows) emit too much spurious RF from the control box and motors to allow the receiver to catch anything. If you have that kind of money to invest, I suggest something like the EGIS, or the ICAM. However, apparently they are making leaps and bounds with zero field nuclear magnetic resonance imaging, as a hand held unit is scheduled to arrive in four years. If you need more info, I can sanitize some stuff I have and send it to you. Good luck! Meanwhile, it's still pretty much a flashlight and screwdriver world........... Shawn Hughes 2399 From: James M. Atkinson, Comm-Eng Date: Fri Jan 26, 2001 5:40pm Subject: Re: EOD uses for NLJD At 1:36 PM -0800 1/26/01, Shawn Hughes wrote: >I've been reading the posts on this subject with great interest. As a >practicing bomb technician here in the US, I try to keep abreast of >anything that might be of use to us. I recall some testing done by Sandia >and NAVSCHOLEOD at Indian Head on the NLJD, but I believe that the >consensus was that the price per unit versus actual applicability made them >a poor choice. I know some Fed PSBT units that have them, but what they do >with their end-of-FY money's their business! > [snip] >Mr. Atkinson is dead on about RF and blasting caps. However, caps are >usually more sensitive to RF than matches, making them that much more >susceptible. ( A good try - it - yourself test is to substitute a grain of >wheat lamp for the cap. Even a child's walkie talkie can illuminate the >lamp with correctly tuned leg wires!) However, using TSCM on a robot really [snip] Cut the match leads to be resonant to the NLJD illumination signal and most of the time you will hear a loud noise when you pass the NLJD over the leads. Since caps normally tend to be jacketed the effect isn't as easy to demonstrate (with caps), but then again it is most unwise to touch off a blasting cap at a close distance (personally I don't like using tweezers to pick little bits of cap shrapnel out of my skin). If I remember the tech manual correctly the minimum safe distance between an electric blasting cap (or wiring involving a blasting cap) for a 1 - 5 watt ERP RF device below 1 GHz is 10 feet. There is also the "155 foot away from power lines" rule from twenty years back. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2400 From: James M. Atkinson, Comm-Eng Date: Sat Jan 27, 2001 0:20pm Subject: Doctor Hid Camera in Nurses Bathroom SATURDAY JANUARY 27 2001 Doctor Hid Camera in Nurses Bathroom http://www.thetimes.co.uk/article/0,,2-74728,00.html BY DAVID CHARTER, HEALTH CORRESPONDENT A HOSPITAL doctor was under suspension last night after nurses found a camera hidden in a shampoo bottle overlooking their bath. Michael Shiew, a senior house officer, is now the subject of a hospital and police inquiry into the incident in the nursesí shared bathroom at Brighton General Hospital. Dr Shiew, 27, was arrested after a nurse found a miniature recording device concealed in a large bottle of Head & Shoulders overlooking a bath tub. The container was left in the bathroom used by a dozen mostly female nurses who live on the same corridor of an accommodation block at the hospital. One of the nurses picked it up before stepping into the bath and found that it contained a camera and transmitter. Police later removed a bag of videotapes and technical equipment from a room in the block. One of the female nurses living there said: "When I saw this device in the bottle, my first reaction was that this was a joke. Then we figured out it was a camera with an antenna which sends out a signal and I realized this was much more serious. Dr Shiew, who was attending a three-day course at the Brighton hospital, was suspended from his job as a senior house officer in the anaesthetics department of St George's Hospital in Tooting, southwest London, pending an investigation. Police said that a car and a house had been searched and that they had removed a number of videotapes and computer disks for analysis. They were called to the first floor of the nurses' quarters late last Thursday after alarmed residents summoned hospital security guards. The device was found by Joe Cidoni, a male nurse at Brighton's accident and emergency department, after his Norwegian wife had run him a bath. The couple live in a room a short walk down the corridor from the shared bathroom. Mr Cidoni, 40, said: "It was a really big bottle and when I first saw it, I admit I thought Great, free shampoo so I picked it up. But it just didn't feel right and then it clicked. "Shampoo doesn't normally click, so I gave the top a pull to see if it would come off. To my disbelief, I found it was full of wiring. In the side of the top of the bottle was a pinhole. I thought someone was playing a trick or that I had stumbled into a police investigation. A female nurse who did not want to be named said: "There is a lock on the bathroom door and a lock on the outer door of the corridor. You think you are secure here. I could not believe this would happen to me in a place like this. Mr Cidoni, an American who joined Brighton General Hospital this month, added: "My wife is extremely upset about what happened. I came here to learn things I could not learn in my previous post but I never expected to be embroiled in something like this. Brighton police confirmed that a 27-year-old man had been arrested at the hospital last Thursday night. A spokeswoman said: "He was arrested on suspicion of taking indecent photos and the equipment recovered was a covert video camera concealed in a shampoo bottle and other digital equipment and videos. Apparently unsure of the grounds on which to make an arrest they fear that the recording device may have captured images of the children of nursesí guests who also use the communal bathroom. The police spokeswoman added: "We searched the man's car and his house. Videotape and computer disks were removed from the address and the car. A spokesman for Brighton General Hospital said: "An arrest was made of a doctor who was accused of spying on staff in the nursesí accommodation. He was not an employee of this trust. He was here because our postgraduate medical centre runs courses for medical staff throughout the country and he was here for three days. "This has obviously been upsetting for the staff who live there and we have given them assurances that we have checked for any untoward devices. He added: "There are single males, single females and couples who live there. We have a very limited amount of accommodation which we offer not just to nurses but to doctors and there is no policy to segregate between the sexes. St George's Healthcare NHS Trust has promised a full inquiry. A spokesman said: "The trust is continuing with its investigation into allegations that recording equipment had been discovered there (Brighton General Hospital). Dr Shiew, who has not been charged with any offence but remains on police bail, refused to comment last night on the allegations. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2401 From: Chris Childs Date: Sat Jan 27, 2001 0:25pm Subject: Re: Fire authorities in California.... This sounds like an urban legend to me. First off, I couldn't find a paper called the "California Examiner". Second I found this web site: http://www.urbanlegends.com/death/scuba_forest_fire.html James M. Atkinson, Comm-Eng" wrote, > > >Fire authorities in California found a corpse in a burned out section of >forest while assessing the damage done by a forest fire..The deceased male >was dressed in a full wet suit, complete with SCUBA tanks on his back, >flippers, and face mask. A post-mortem revealed that the person died not >from burns, but from massive internal injuries. Dental records provided a >positive identification. Investigators then set about to determine how a >fully clad diver ended up in the middle of a forest fire.. >It was revealed that, on the day of the fire, the person went for a diving >trip off the coast some 20 miles away from the forest. The firefighters, >seeking to control the fire as quickly as possible, called in a fleet of >helicopters with very large dip buckets. >Water was dipped from the ocean then flown to the forest fire and >emptied..You guessed it. One minute our diver was making like Flipper in >the Pacific, the next he was doing the breast stroke in a fire dip bucket >300 feet in the air. Apparently he extinguished exactly 5'-10" of the >fire. >Some days it just doesn't pay to get out of bed! > >This article was taken from the California Examiner, March 20, 1998 >-- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > _________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. From: Shawn Hughes Date: Thu Jan 24, 2002 0:12pm Subject: Ames' computer Ok, Thanks to everyone who replied on and off board. So, the results seem to be that a tech guy has to initially manipulate the computer and install something (extra card, WLAN, dongle, etc.) in order for this exploit to work. I was afraid there was some kinda backdoor weakness in all computers that allowed them to be woken up (a'la the wake key) by a signal superimposed on the mains. I feel better now. And I agree on Ames. What really burns me is that as sloppy as he apparently was, you still have to jump through all the PRP hoops that you do. It's all a joke. I guess it would cost too much to revamp, though. Thanks again, guys!! Shawn 4624 From: A Grudko Date: Thu Jan 24, 2002 11:18am Subject: Re: China plane bugs Sloppy U.S. spying or untrue? - Quote - > The experts expressed skepticism that American spies had a hand in > what newspaper reports said were more than two dozen bugs found inside a > plane to be used by Chinese President Jiang Zemin, including in the bathroom > and the headboard of the bed. Perhaps his wife planted them? ;-) Andy G - Jo'burg 4625 From: James M. Atkinson Date: Thu Jan 24, 2002 8:39pm Subject: WANTED: 900 New FBI Special Agents http://www.pittsburghfirst.com/rc/news/docs/1740845l.htm Posted: 05:31 PM EST Wednesday, January 23, 2002. WANTED: 900 New FBI Special Agents WASHINGTON (Reuters) - The FBI has a new ``most wanted'' list -- 900 new special agents. The FBI said on Wednesday it is launching one of its most aggressive hiring campaigns in recent years as it seeks to hire about 900 people over the next eight months to become special agents. ``The events on, and subsequent to, Sept. 11, 2001, have resulted in a realignment of the FBI's resources to enhance its ability to address terrorism and homeland security,'' the statement said. As a result, the FBI plans to focus on identifying candidates with certain skills to become special agents. People who have a background in computer sciences, engineering and physical sciences are needed, as are candidates who know languages like Arabic, Farsi, Urdu, Chinese or Japanese. Other skills of interest include foreign counter-intelligence and counter-terrorism work, and people who have a background in military intelligence or a fixed-wing pilot's license. The FBI said applicants must be U.S. citizens between the ages of 23 and 36, be available for assignment anywhere within the FBI's jurisdiction and possess a valid driver's license. A spokesman said the bureau hires substantially fewer than 900 special agents during a typical year, and added that as of Dec. 1 there were just over 11,000 special agents on the force. Copyright © 2002 Reuters Limited. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4626 From: Hawkspirit Date: Thu Jan 24, 2002 9:48pm Subject: Books on terrorism these books may be of interest to anyone is the anti-terrorist field. http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=1504288978 4627 From: James M. Atkinson Date: Thu Jan 24, 2002 9:45pm Subject: A spy's remorse - students should think twice about joining 'The Agency' http://www.woza.co.za/jan02/cia24.htm A spy's remorse - students should think twice about joining 'The Agency' by Bob Beyers, Pacific News Service As thousands of American college students rush to join the Central Intelligence Agency, they might listen to a few cold warriors' tales before signing on the dotted line. One comes from a man we'll call Fred. We met in a cancer clinic, where my wife was a patient. Fred was terminal, and knew it. But he didn't look that way at all. Part of the Greatest Generation, he had good color, walked briskly, sat down with ease and waited for his drugs. "Are you retired?" I asked. "Yes." "What did you do?" "Worked for the government." "What area?" "Can't say..." "Oh, the Agency," I guessed. "Can't say." I told Fred I had been supported financially by the CIA in the 1950s, but didn't know about it until much later. At the U.S. National Student Association, I'd been among a handful of staffers whose leaders successfully challenged the communist-influenced International Union of Students. All the challengers did was say that student groups should be run by people in their 20s, not by old Party hacks. As staffers, we were told that any international expenses should be charged to the Foundation for Youth and Student Affairs. "It was a front funded by the CIA," I explained. Fred relaxed a little. "A lot of bright young people were attracted to government back then," he said. "I still remember my interview (at the Agency). Very hush-hush. I was pledged to secrecy." He didn't even tell his family his true profession. Years ago, I told Fred, a friend who had served with the Office of Strategic Services (the CIA's predecessor) in Vienna confirmed that the United States had forced about 2 million anti-communist Russian refugees back into the Soviet Union. Stalin had them slaughtered or sent back to Siberia. A Soviet double agent in the CIA was key to FDR's complicity. "I worked in Europe. I'm ashamed about a lot that happened," Fred said. Fred regretted much of the Agency's domestic work, too. He knew that the CIA helped introduce LSD to the United States, hoping to use it as a truth serum. Two of my colleagues, I told him, were involved in private experiments secretly funded by the CIA in the early 1960s. One later blew his brains out. "The Summer of Love in San Francisco (in 1967) was a social experiment gone wild..." Fred volunteered. "It turns out my shrink sees several others with severe remorse about what happened, what they did." And with that, he received his ration of drugs and left. In his book "The Secret History of the CIA," journalist Joseph J. Trento interviews the CIA's legendary James Angleton, a smoker with terminal lung cancer "dying in total emotional isolation." "You know how I got to be in charge of counter-intelligence (for the Agency)?" Angleton asks. "I agreed not to polygraph or require detailed background checks on (CIA Director) Allen Dulles and 60 of his closest friends. "They were afraid that their own business dealings with Hitler's pals would come out. They were too arrogant to believe that the Russians would discover it all." Which the Russians did. The real problem, Angleton told Trento, was that "there was no accountability. And without real accountability everything turned to s---." "You know, the CIA got tens of thousands of brave people killed," Angleton said. "We played with lives as if we owned them. We gave false hope. We -- I -- so misjudged what happened." While Soviet agents penetrated both the CIA and FBI at extraordinarily high levels, their regime eventually crumbled in the face of more open, dynamic democracies. Now, in the wake of Sept. 11, a new generation of would-be recruits flocks to the Agency. Politicians scramble to provide it sweeping new domestic investigating authority. Legal and financial constraints are swept away. It's a great time to grab power and cloak it in secrecy. Who cares about old spies' remorse? Those in Congress who dare seek accountability for past intelligence failures are portrayed as aiding the terrorists. Beat the crowd. Sign up now. from Misanet/PNS info@w... © WOZA Internet (Pty) Ltd -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4628 From: James M. Atkinson Date: Thu Jan 24, 2002 10:04pm Subject: Which number applies to you? 1. There's always a lot to be thankful for if you take time to look for it. For example, I am sitting here thinking how nice it is that wrinkles don't hurt. 2. When I'm feeling down, I like to whistle. It makes the neighbor's dog that barks all the time run to the end of his chain and gag himself. 3. If you can't be kind, at least have the decency to be vague. 4. A penny saved is a government oversight. 5. The older you get, the tougher it is to lose weight, because by then your body and your fat are really good friends. 6. The easiest way to find something lost around the house is to buy a replacement. 7. He who hesitates is probably right. 8. If you can smile when things go wrong, you have someone in mind to blame. 9. The sole purpose of a child's middle name is so he can tell when he's really in trouble. 10. How long a minute is depends on what side of the bathroom door you're on. 11. If ignorance is bliss, why aren't more people happy? 12. Most of us go to our grave with our music still inside of us. 13. If Wal-Mart is lowering prices every day, how come nothing is free yet? 14. You may be only one person in the world, but you may also be the world to one person. 15. Some mistakes are too much fun to only make once. 16. Don't cry because it's over: smile because it happened. 17. We could learn a lot from crayons: some are sharp, some are pretty, some are dull, some have weird names, and all are different colors.. but they all have to learn to live in the same box. 18. Everything should be made as simple as possible, but no simpler. 19. A truly happy person is one who can enjoy the scenery on a detour. 20. Happiness comes through doors you didn't even know you left open. 21. Once over the hill, you pick up speed. 22. I love cooking with wine. Sometimes I even put it in the food. 23. If not for STRESS I'd have no energy at all. 24. Whatever hits the fan will not be evenly distributed. 25. Everyone has a photographic memory. Some just don't have film. 26. I know God won't give me more than I can handle. I just wish He didn't trust me so much. 27. You don't stop laughing because you grow old. You grow old because you stop laughing. 28. Dogs have owners. Cats have staff. 29. We cannot change the direction of the wind... but we can adjust our sails. 30. If the shoe fits......buy it in every color. 31. Have an awesome day, and know that someone has thought about you -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4629 From: James M. Atkinson Date: Thu Jan 24, 2002 10:34pm Subject: re: computer question David, Feel free to post information related the TSCM, but try to stay on topic. I would also point out that "secured" machine will also have their microphones and web cams deactivated and removed as well. -jma At 4:47 PM +0000 1/24/02, David Alexander wrote: >This is my area of expertise. I'm a computer security/Information Warfare >geek, not a 'bug-hunter' (no offence intended or implied). > >I'll give you the short answer: > >Yes, there is a system that allows LAN awakening and control of a PC. >This system normally depends on a special cable from the Network card to a >connector on the motherboard that awakens the PC. > >Any self-respecting company removes this cable to disable the facility as >the very first thing they do when the PC arrives as it is a massive security >hole and should never, ever be allowed to be active. Half of me wants to say >that any company that does not deserves everything they get, but that is >counter to the philosophy of this group. If your outfit has these cables in >place, get them removed ASAP, they are a hackers dream. > >On Windows 2000 and Windows XP (TM acknowledged) there is another way of >taking over a PC through the Netmeeting utility. Great for remote support >and software installations. The remote install function via network wake-up >is not needed due to something called Remote Install Server. I won't bore >you with the details here. > >If anyone has more questions I'd be happy to take them offline direct to my >e-mail address unless JMA thinks the info is of interest to all (your call) > >regards > >_____________________________ >David Alexander M.INSTIS >Global Client-Server, Communications >& Infrastructure Director > >Bookham Technology plc >Tel: +44 (0) 1235 837823 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1235 837201 >http://www.bookham.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4630 From: Paul Timmins Date: Thu Jan 24, 2002 11:31am Subject: Re: computer question parts 2 Last I knew, you needed line of sight to do this. So people don't notice suspicious vehicles (i.e. vans with no logos and no windows, not belonging to a neighbor) parked across the street in their neighborhoods? Plus last I knew, this was not something that is very trivial to do... -Paul At 11:52 AM 1/24/2002, you wrote: >Fibre-glass bodied van with aerial inside and you can sit some distance away >and see what's happening without entering premises and leaving a bug to be >found or anything to recover afterwards. > >Any surveillance team could do this...if they are not putz's (with >acknowledgement to the previous poster) 4631 From: enemyatthegate007 Date: Thu Jan 24, 2002 10:51pm Subject: not to knowledable what does wakening of the pc mean?im sory im sure its very basic but im trying to get my feet wet.this field is huge in knowledge and my hat is off to the operators in this field.im an executive protection specialist(bodyguard) and i stay keyed in a lot of areas(anti/counter terrorism)especially.but this field is very impressive.so once again if you here a lot of basic questions from me sorry trying to learn a little. james jones EPS chief of operations www.bodyguardinc.com 4632 From: James M. Atkinson Date: Thu Jan 24, 2002 11:04pm Subject: Re: computer question parts 2 Ah David, No offense, and I really hate to have to tell you tell this this, but let's just say that you may be experiencing a moment of dental distress caused by elements of your own footwear being lodged therein. Given the dimensions of a Yagi needed to efficiently intercept a baseband rasterized signal coming off a monitor the eavesdroppers would have be be less then 12 feet away, or use an antenna about 68 feet wide and 84 feet long. Also, while a Yagi is less directional then a small loop is does give use a more favorable usable angle but is wider band. The biggest problem with using a Yagi for something like this is the size and the relatively low frequencies involved, which you bet best handled by an equiangular antenna. It is a rather academic question: What frequencies does the monitor normally emit for radiated signals, and what is their wavelength... given this, consider the antenna parameters just to squeeze 20-24 dB over an isotropic out of the Yagi. Sure, we can stack Yagi's, but your going to have to use at least four units to make a appreciable difference. If you work out the timing signals from a monitor you will see that the majority of the raster is fairly limited and that a free space interception is tough unless you use a secondary carrier. Attempting to exploit the radiated emissions of a monitor, computer, laser printer, or other kind of digital device would strictly be used as a last result. It is far more effective to simply break in to the subjects home, plant some device which uses the power lines for the backdoor, and exit to a nearby listening post. You might want to visit the following link and brush up of some TEMPEST info: http://www.tscm.com/TSCM101tempest.html Only a surveillance team consisting of putz's would attempt an interception of this nature, but then DOJ is not well known for their ability to design and launch rockets. -jma At 4:52 PM +0000 1/24/02, David Alexander wrote: >There is a much simpler way that Ames could have been monitored - TEMPEST >emissions > >In case some of you are unaware, with a decent yagi and some software you >can see what someone's' PC is doing real-time while they are doing it. > >Fibre-glass bodied van with aerial inside and you can sit some distance away >and see what's happening without entering premises and leaving a bug to be >found or anything to recover afterwards. > >Any surveillance team could do this...if they are not putz's (with >acknowledgement to the previous poster) > >_____________________________ >David Alexander M.INSTIS >Global Client-Server, Communications >& Infrastructure Director > >Bookham Technology plc >Tel: +44 (0) 1235 837823 >Mobile: +44 (0) 7799 881284 >Fax: +44 (0) 1235 837201 >http://www.bookham.com -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4633 From: enemyatthegate007 Date: Thu Jan 24, 2002 11:15pm Subject: CIA remorse how does the cia find agents?i have read and seen documents but are they true?i know its a hush hush agency and i know they employ engineers,chemist,bio etc..and have a huge web site but what about other agents like espionage or other agents that just do spying.just wondering. james jones EPS www.bodyguardinc.com 4634 From: Ray Van Staden Date: Fri Jan 25, 2002 0:23am Subject: City's surveillance given international thumbs-up http://www.cbn.co.za/issue/1240202.htm City's surveillance given international thumbs-up CAPE TOWN's Strategic Surveillance Unit, which provides the closed-circuit TV monitors in the City centre and other locations, has been granted ISO 9001 accreditation by the International Standards Organisation in Switzerland. The Unit becomes the first law enforcement agency in South Africa to receive ISO 9001 accreditation, which gives global recognition of achievement of international standard. The Strategic Surveillance Unit is owned by the City of Cape Town and run and managed by City traffic and law enforcement officers. ISO 9001 accreditation is granted in recognition of the service rendered by the Unit having complied with internal standards both in the documentation of its procedures and in the observance and implementation of these, based on audits conducted by officials of the South African Bureau of Standards which is the accredited agent of ISO in the Republic. The presentation of ISO 9001 certification to the City will be made by Mr Tom Gash, Western Cape regional director of the SABS. The recipient, on behalf of the City, will be Councillor Ian Neilson, the City Council's Executive Committee member for Health and Safety. Councillor Neilson said today that the CCTV multiple camera system in Cape Town's central business district had proved its worth in the detection of crime-in-progress and had led to many arrests and prosecutions and a marked reduction in crime. The system had been expanded to camera surveillance of public places and roads in high-crime areas of the Cape Flats. More recently the Vanguard Drive surveillance system of Sun West had become incorporated in the system. The ISO 9001 accreditation came at a time when the City was changing the focus of camera surveillance from traditional crime-prevention pursuits, to the broader usage of the monitoring systems for the benefit of communities. The network provided visual information for use by the Council traffic and road branches in freeway management and the detection of traffic offenders. The cameras also provided information on informal traders, protest marches , advertising billboards and fire hazards. The City was constantly developing partnerships in this regard and the new status of the Strategic Surveillance Unit in terms of its ISO 9001 ranking would augur well for development in this regard and indirectly contribute to the process of developing Cape Town as a model city in global terms. --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 (0)31 916-1262 Fax: +27 (0)31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 4635 From: A Grudko Date: Fri Jan 25, 2002 1:35am Subject: Siemens equip Sweeping a private residence yesterday I came across something new to me involving 2 Siemens Gigaset 1000s and one Gigaset 3000 Comfort cordless phones. I'd appreciate a private chat with anyone who is familiar with this equipment's normal operation. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4636 From: Brad Hayes Date: Fri Jan 25, 2002 7:02am Subject: Un-identified problem Dear Group, This is not a TSCM question per se but, with having a panel of electronic,electrical experts on this list I though some one may have an answer to this particular situation. Here goes. I have a client who beleives she may have a former employee stalking her, following her or conducting surveillance on her home. Prior to moving a couple of months ago, someone was ringing her doorbell early in the morning on a fairly consistent basis. She moves to the opposite side of town and the very next morning, her doorbell rings, again early in the morning.(6:00 a.m) I install two coverts cameras for her, one that has a commanding view covering the front of the home and the second that is disguised as a peephole so I can obtain video of the front door. A couple of days ago,she contacts me and says her doorbell rang on Sunday morning (8:00 a.m.) but nobody is at the door. Upon reviewing the tape, I see a vehicle pull up in front of her house at 5:00 a.m. and another vehicle enter the cul-de-sac around 8:00 a.m. Both vehicles stay momentarily and leave. My question is this. Is there any possible way that electrical or RF interference could trigger this doorbell? I examined both the doorbell and the unit mounted on the wall inside the condo. Being a condo, her neighbor is on the opposite end and therefor I want to rule out the neighbors doorbell reverberating thru the walls. Am I missing something here? This gal lives alone and was visibly spooked by the car in front of her house at 5:00 a.m. By the way, upon reviewing both tapes, no one gets out of the car and/or approaches the door. Thank you in advance for any insight on this matter. Brad American Investigation Group (317) 823-2677 ===== Brad Hayes American Investigation Group Investigations/Executive Protection Indianapolis, Indiana (317) 823-2677 __________________________________________________ Do You Yahoo!? Great stuff seeking new owners in Yahoo! Auctions! http://auctions.yahoo.com 4637 From: Hawkspirit Date: Fri Jan 25, 2002 9:09am Subject: Evaluation Form http://www.sci.ky/evalu.html 4638 From: James M. Atkinson Date: Fri Jan 25, 2002 9:03am Subject: Re: Un-identified problem I take it that her doorbell system is a wireless variety that is rather cheap in quality? If so, then it is likely that the front end of the receiver was simply being overloaded by strong RF fields operating on frequencies near that used by the door bell. Installing a hardwired doorbell sysetm may clear up the problem, but also make sure that the wiring for it is twisted pair. -jma At 5:02 AM -0800 1/25/02, Brad Hayes wrote: >Dear Group, >This is not a TSCM question per se but, with having a >panel of electronic,electrical experts on this list I >though some one may have an answer to this particular >situation. Here goes. I have a client who beleives she >may have a former employee stalking her, following her >or conducting surveillance on her home. Prior to >moving a couple of months ago, someone was ringing her >doorbell early in the morning on a fairly consistent >basis. She moves to the opposite side of town and the >very next morning, her doorbell rings, again early in >the morning.(6:00 a.m) I install two coverts cameras >for her, one that has a commanding view covering the >front of the home and the second that is disguised as >a peephole so I can obtain video of the front door. A >couple of days ago,she contacts me and says her >doorbell rang on Sunday morning (8:00 a.m.) but nobody >is at the door. Upon reviewing the tape, I see a >vehicle pull up in front of her house at 5:00 a.m. and >another vehicle enter the cul-de-sac around 8:00 a.m. >Both vehicles stay momentarily and leave. My question >is this. Is there any possible way that electrical or >RF interference could trigger this doorbell? I >examined both the doorbell and the unit mounted on the >wall inside the condo. Being a condo, her neighbor is >on the opposite end and therefor I want to rule out >the neighbors doorbell reverberating thru the walls. >Am I missing something here? This gal lives alone and >was visibly spooked by the car in front of her house >at 5:00 a.m. By the way, upon reviewing both tapes, no >one gets out of the car and/or approaches the door. >Thank you in advance for any insight on this matter. >Brad >American Investigation Group >(317) 823-2677 > > >===== >Brad Hayes >American Investigation Group >Investigations/Executive Protection >Indianapolis, Indiana >(317) 823-2677 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4639 From: Hawkspirit Date: Fri Jan 25, 2002 9:45am Subject: Masking products Any one have experience with these masking products? Roger http://www.streetsavvywares.com/BD_acoustic_generators.htm 4640 From: Hawkspirit Date: Fri Jan 25, 2002 10:00am Subject: Lets get educated! http://www.ipg-protect.com/doc021.htm Technical Security Specialist (TSS) - Advanced Level * (Tuition $1,575.00) TSCM Professional Services TSCM Documentation Counter Intelligence Survey TSCM Antenna Management Device Detection / Identification / Location PC Based Detection / Monitoring / Analysis / Documentation Panoramic RF Spectrum Analysis Broadband RF Near Field Receivers Very Low Frequency (VLF) Infrared (IR) / Laser Detection Non-Linear Junction Detectors Telephone Network / Equipment Inspection Computer Network Analysis Acoustical Leakage Inspection Time Domain Reflectometer (TDR) Radio Direction Finding Found Device Protocol Reports and Evidence Documentation * Topics and sub-topics are subject to on-going amendment and continued program development. Some topics and sub-topics are not indicated in the above outline. 4641 From: Hawkspirit Date: Fri Jan 25, 2002 10:05am Subject: Statistics http://www.ipg-protect.com/doc094.htm Our TSCM statistics last updated - October 2001 In 19% of these investigations, one or more actual functioning electronic devices were discovered and removed by our technicians, or we were able to verify a non-electronic compromise of confidential proprietary information. Of these investigations, 6% were of a domestic nature, and 12% were related to business interests or corporate affairs, and 1% were related to vehicle tracking technology or Emergency Locator Transmitters (ELT) and Emergency Position Indicating Radio Beacon (EPIRB). ∑ In 22% of the investigations, positive proof was discovered to indicate a device was present or had been removed prior to the investigation, or strong evidence suggested that a real compromise had indeed taken place. ∑ In 23% of the investigations the loss of information appeared real, however no specific evidence was discovered to confirm that a compromise had actually taken place. In 5% of these cases the client indicated making the call to our office from a area of compromise or discussing his / her suspicions with others. ∑ In 22% of the investigations conducted, no compromise could be proven and no evidence was discovered to confirm any compromise had taken place, however, in 16% of these inspections, the investigation was initiated by the client as a preventative measure, usually without any specific reason for initiating the investigation. ∑ In 14% of all investigations conducted, it appeared that the client's suspicions were unfounded, or as the result of a paranoid mind. In our best estimation, it would also appear that in approximately 65% of the TSCM services preformed by our technical personnel, the client was not totally forthcoming as to the real reason for contracting our services, and therefore the actual risk could not be established. Covert surveillance may be electronic in nature or by a wide range of intelligence gathering techniques. In fact, both of these methods are widely used in domestic spying, stalking incidents, gaining a business competitive advantage, labour disputes, or dissatisfied or disgruntled employees hoping to gain an edge within the work place environment. It is strongly recommended that all business environments regardless of size or perceived risk, consider an annual TSCM inspection and sweep as part of a long term due diligence with respect to the identification of technical security concerns. In fact, when proprietary information or research and development is a factor, various insurance policies require such inspections to be conducted in order to remain in force. 4642 From: Greg H. Walker, Attorney At Law Date: Fri Jan 25, 2002 9:58am Subject: Damage To Electronic Equipment I apologize if this has been posted before, however, I received this info today from a Project Manager at NASA who is a friend. Subject: Be careful shipping electronic parts through the mail At the JEDEC meeting it was mentioned several times that at least one company had lost functionality of some populated printed circuit boards sent through the U.S. mail. It seems that the post office is now E-beam irradiating all mail sent through area codes that feed mail into Washington DC to kill any potential "nasty bugs". That process can/will destroy active electronic devices. The word is: BUYER BEWARE WHEN SHIPPING ELECTRONIC PARTS THROUGH THE U.S. MAIL. Rather use Federal Express or another similar shipper. The JEDEC web page (www.jedec.org) provides more detail and in fact names a number of items that may be subject to damage. GREG -- Greg H. Walker Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 WARNING NOTICE BY GHW: Greg H. Walker's comments are not intended to be and should absolutely not be taken as legal advice. Unless you have entered into a specific written agreement with him for legal services, signed by both you and him, and paid him a retainer in good funds, then he is not your Attorney, does not intend to be your Attorney and you should not act nor refrain from acting based, in whole or in part, on his comments. 4643 From: Dr. Pepper Date: Fri Jan 25, 2002 10:04am Subject: RE: Un-identified problem jma, you are making unsubstantiated assumptions. And then taking off in that direction. A TDR would tell you about the door bell wiring. If it actually IS a wireless doorbell, then jma may be correct. Even if it is a hard wired bell, it could STILL be actuated by a ham radio or CB, however it is unlikely. The tip about checking the neighbors doorbell wiring might shed some light on the subject. -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ======================================== -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Friday, January 25, 2002 7:04 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Un-identified problem I take it that her doorbell system is a wireless variety that is rather cheap in quality? If so, then it is likely that the front end of the receiver was simply being overloaded by strong RF fields operating on frequencies near that used by the door bell. Installing a hardwired doorbell sysetm may clear up the problem, but also make sure that the wiring for it is twisted pair. -jma At 5:02 AM -0800 1/25/02, Brad Hayes wrote: >Dear Group, >This is not a TSCM question per se but, with having a >panel of electronic,electrical experts on this list I >though some one may have an answer to this particular >situation. Here goes. I have a client who beleives she >may have a former employee stalking her, following her >or conducting surveillance on her home. Prior to >moving a couple of months ago, someone was ringing her >doorbell early in the morning on a fairly consistent >basis. She moves to the opposite side of town and the >very next morning, her doorbell rings, again early in >the morning.(6:00 a.m) I install two coverts cameras >for her, one that has a commanding view covering the >front of the home and the second that is disguised as >a peephole so I can obtain video of the front door. A >couple of days ago,she contacts me and says her >doorbell rang on Sunday morning (8:00 a.m.) but nobody >is at the door. Upon reviewing the tape, I see a >vehicle pull up in front of her house at 5:00 a.m. and >another vehicle enter the cul-de-sac around 8:00 a.m. >Both vehicles stay momentarily and leave. My question >is this. Is there any possible way that electrical or >RF interference could trigger this doorbell? I >examined both the doorbell and the unit mounted on the >wall inside the condo. Being a condo, her neighbor is >on the opposite end and therefor I want to rule out >the neighbors doorbell reverberating thru the walls. >Am I missing something here? This gal lives alone and >was visibly spooked by the car in front of her house >at 5:00 a.m. By the way, upon reviewing both tapes, no >one gets out of the car and/or approaches the door. >Thank you in advance for any insight on this matter. >Brad >American Investigation Group >(317) 823-2677 > > >===== >Brad Hayes >American Investigation Group >Investigations/Executive Protection >Indianapolis, Indiana >(317) 823-2677 -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4644 From: Hawkspirit Date: Fri Jan 25, 2002 10:15am Subject: Back in the USSR http://www.tradeport.org/ts/countries/russia/isa/isar0025.html 4645 From: Bryan Date: Fri Jan 25, 2002 8:32am Subject: Re: computer question - Dangling the Dongle On Wed, 23 Jan 2002, James M. Atkinson wrote: > Shawn, > > It's really no big mystery. > > Most computers have a specific key on the keyboard (or motherboard) > that when pressed allows the computer to wake up and go through a > boot. > > This function can be remotely controlled by installing a "remote boot > dongle" inside the keyboard, or inside the computer so an > eavesdropper can turn the computer on or off remotely. > > The dongle either turns the machine on/off at a preset time, waits > until a certain period of non usage has occurred, or wakes up in > response to a remote command. The remote activation command can come > in via any variety of conductors (phone line, power line, Cable TV, > LAN, etc) or though a wireless connection. A few novice questions about this: How is this device reached? What protocols does it use? With standard internet communication I understand that any machine(device) on the network must be bound by an IP address. That is how deviceA knows how to get to deviceB. If this device uses the computers power souce, would it not require the PC to alredy be on? Unless of course it had it's own power supply, but that would mean a much larger device, yes? > > Once the computer is up and booted the eavesdropper can then access > the OS remotely, and depending on which software they are using they > perform any number of tasks. OK, so we have a device that can power up the box....we still need an account on the box or the username/passwd. So given we installed a keylogger on the device, wait, no, we couldn't do that until we actually had access to the already booted and logged in machine/account. So far, to me, it seems we would have to gain physical access to the box while it is already running and with the user we want to monitor already logged in...or a root/admin account...which seems rather unlikely. Especially if they are hiding something or even just *slightly* security concious. Depending on the mission, it may be easier to just take a disk imager to the location and image the drive. Take it back to the lab and break it down there and perform forensics, etc... As you can see, I am a virgin to the TSCM world, so know very little about what is available and what can/cannot be done. But I am very curious! I apologize for the juvenile questions that probably could have been answered by doing a bit more research on my own. Thanks, Bryan > > Occasionally, you will come across such goodies on larger corporate > sweeps, and most often on servers, remote machines, or problem > children where the sys admin doesn't want to keep running to remote > parts of the campus to tweak software. Such a system allows the sys > admin to remotely wake-up or boot the machine in question and "do > those things which admins do so well". Usually on the corporate > sweeps the 'wake up" signal goes out though the LAN as a wake-up > packet addressed to the dongle, and more recently though a 802.11 > network. > > If the bug the FBI used on Ames utilized the power lines, then the > listening post would have to be fairly close to the Ames home as you > lose quite a bit of your signal at the distribution transformer. In > all probability they where camped out in a home nearby and simply > brought up the OS, and then issued basic DOS commands (from their > end) to browse through the hard drive and suck down files. After they > where done it would have been quite simple to shut the machine down. > > > -jma > > > PS: Ames was a putz, and didn't follow good tradecraft > > Technical Counterintelligence Rule #374 > Agent shall always turn of his/her computer when not in immediate > use, and shall remove the power cord from the wall and/or disengaged > the breaker on the individual UPS when the machine will not be in use > for more then two hours. In the event the agent does not have a > positive 7/24 security force in place the computer will also be > powered down and locked into an approved security container (such as > a safe) and physically disconnected from both the telephone circuits, > LAN circuits, and all other conductive or radiated paths. > > > > > > > At 12:32 AM -0500 1/23/02, Shawn Hughes wrote: > >I'm sitting here watching a show on cable ( I know). They are discussing > >the encroachment of surveillance by the gov against citizens. > > > >One detail they gave was on the Ames case. They stated that the FBI was > >remotely powering on Ames home computer, then subsequently removed data > >from, and powered it back down via the residential power lines. > > > >I am a little skeptical, unless they put a black box inside his pc. For > >instance, what kept ALL pc's on that transformer circuit from waking up? > > > >But, I am low on the knowledge base totem pole. What say ye, experts? > > > >Thanks! > > > >Shawn > > -- ------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell ------------------------------------------------------------------------- 4646 From: Date: Fri Jan 25, 2002 6:20am Subject: Re: Statistics In a message dated 1/25/02 8:02:50 AM Pacific Standard Time, hawkspirit@e... writes: << http://www.ipg-protect.com/doc094.htm Our TSCM statistics last updated - October 2001 In 19% of these investigations, one or more actual functioning electronic devices were discovered and removed by our technicians, or we were able to verify a non-electronic compromise of confidential proprietary information. >> Interesting statistics. 4647 From: Aimee Farr Date: Fri Jan 25, 2002 0:00pm Subject: RE: A spy's remorse - students should think twice about joining 'The Agency' > http://www.woza.co.za/jan02/cia24.htm > > A spy's remorse - students should think twice about joining 'The Agency' Anti-intelligence propaganda seems to be a hot item lately. Recent juror poll on surveillance and faith/trust in institutions: "Some 67 percent of those polled say they favor increased wiretap and Internet surveillance powers. Support on the issue broke down by age group, with 54 percent of potential jurors older than 65 supporting broader powers as compared to only 24 percent support among jurors between the ages of 18 and 24." FYI, in 1965, 61 percent of the American people approved Vietnam and only 24 percent were opposed. (The domestic scene went to Hell shortly thereafter.) At age 10, 60s radicals were watching the Mouseketeers. At age 10, the youth cohort mentioned above was playing a game called "Mortal Kombat." Polling on faith in federal institutions: http://pollingreport.com/institut.htm#Federal The unpredictability of our environment makes these statistics somewhat concerning. ~Aimee "You never beat us on the battlefield." "That may be so. But it's also irrelevant." 4648 From: Steve Uhrig Date: Fri Jan 25, 2002 1:13pm Subject: Re: Un-identified problem Once upon a midnight dreary, Brad Hayes pondered, weak and weary: > Prior to moving a couple of months ago, someone was ringing > her doorbell early in the morning on a fairly consistent > basis. She moves to the opposite side of town and the very > next morning, her doorbell rings, again early in the > morning.(6:00 a.m). A couple of days ago,she contacts me and > says her doorbell rang on Sunday morning (8:00 a.m.) but > nobody is at the door. Since it is unlikely she would move her doorbell from one house to the other, it seems highly unlikely any technical problems relating to the doorbell hardware would be the cause. Falsing a doorbell is extremely unlikely to start with. For it to happen in two different locations is practically beyond statistical probability. And since your video did not reveal anyone pushing the doorbell, this would indicate the problem is between her ears. Has anyone other than your client heard the doorbell ring at both locations at these weird hours? Almost certainly the answer is no. If you wanted to pursue it, you could put a min/max recording DVM (recent Fluke 87-III with time/date stamp) across the doorbell to see if any power is applied when it allegedly rang. The only possibility I can see is if the woman lives with someone hostile who is causing the bell to ring from inside the house, or possibly from outside with a short range radio link. Even though she moved and the very next morning heard the bell ring, how long might someone (son, husband) have had access to the new place before she moved in, to wire it. There was one instance of something vaguely related where the son wanted to have the mother committed for some reason or another. But situations like this are extremely rare, where mysterious phenomenon actually are manmade occurrences. Far more often, the problem is not physical in nature, but psychological. Many of us have had this sort of call, and beyond a certain point, that point being when signs point to the problem being in the client's head, you have to question whether you are acting ethically in continuing to work on the case and, especially, taking money for doing so. If you can calm her fears and give her the warm fuzzies in a kind manner, this likely is the best course of action. In any case, it probably would be wise to discontinue any involvement. People like this can be real energy soaks, and that is not the way to earn a living. Also, keep in mind, lunatics many times eventually get the attention of the authorities by wearing them down until they assign someone to research the matter so they can justify closing the case. You do not want to develop the local reputation with authorities of taking advantage of the lunatic by accepting money from him/her/it when signs seem pretty clear the person is a nut case. When I do mercy sweeps (one where the client is insisting on spending money, so I do the work just to make sure they get the real thing and are not totally ripped off), I charge a token amount. If I would do it for free, I would not be respected. If I charge a token amount, my conscience as well as my legal exposure is clear. When the lunatic goes to the authorities and mentions you swept them, you don't want the authorities asking you why you took advantage of the obvious lunatic by taking their money. It has happened to me, more than once. My reply is: Look. here are some recent (sanitized) invoices for the identical work showing I charge X thousands of dollars for similar work. I charged Miss Lunatic 5% of that amount. Is that taking advantage? Cover your six, always, in matters like this. Once I was accused of murder for not finding a bug which the lunatic was certain was there, therefore the stress created by being bugged which caused the father of Miss Lunatic to have a stroke was my fault. I was obviously incompetent because I didn't find the bug, so I get sued. Good thing I was able to demonstrate I was competent in TSCM and charged only a token amount, or I could have wasted a ton of money fighting crap like this. My contract now covers things like this without directly mentioning lunatics. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4649 From: Steve Uhrig Date: Fri Jan 25, 2002 3:12pm Subject: Excellent Frequency Allocation Chart Hi all, Here: http://www.ntia.doc.gov/osmhome/allochrt.pdf is an excellent, color, frequency allocation chart. Extremely detailed. A product of our tax dollars. If you have a color printer, it would be most useful. I am not sure how it would look printed in B&W. It would be a good thing to print and keep in one of the accessory pouches in one of your pieces of sweep gear. Or if you carry a laptop on sweeps, you could merely save the file to your local drive and call it up on the screen when needed. The chart likely would have some small (or large) differences in countries other than the U.S. It is in Adobe, so you will need that reader installed to open the file. i encourage anyone with earlier versions of Adobe Acrobat reader used for viewing PDF files ( versions prior to V5.00) to upgrade. The latest version of the free reader includes some nice features not available in earlier versions. www.adobe.com. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4650 From: Guy Urbina Date: Fri Jan 25, 2002 0:23pm Subject: Re: Un-identified problem Hi Brad, What type of doorbell system does the young woman have? Some wireless units can be falsely triggered. I had an idea that you could possibly gather some data by triggering your cameras whenever the doorbell rings. Or time stamp the doorbell and look for the event on video. Another idea, if you have the equipment, is to capture an event by monitoring the spectrum when the doorbell rings and look for spikes. Of course, this is to determine whether the actual culprit is the stalker and not some transient RF anomaly. best regards, -Guy 4651 From: enemyatthegate007 Date: Thu Jan 24, 2002 10:32pm Subject: hello my name is james jones an im new to the group.id like to say thanxs to the host for allowing me to be here.im so impressed by the survalliance field.its huge in knowledge and education.my hats off a thousand times to the operators in this field.im trying to get my feet wet but i cant fathom the education of it(huge).im an executive protection specialist(bodyguard) and i try to stay knowledgable in a lot of fields.if anyone has any tips please let me know. sincerely, james jones EPS www.bodyguardinc.com 4652 From: Steve Uhrig Date: Fri Jan 25, 2002 10:27pm Subject: Re: Damage To Electronic Equipment Once upon a midnight dreary, Greg H. Walker, Attorney At Law pondered, weak and weary: > I apologize if this has been posted before, however, I received > this info today from a Project Manager at NASA who is a friend. > Subject: Be careful shipping electronic parts through the mail Here is info sent to contractors of the FBI: ====================== The U.S. Postal Service (USPS) advised that certain types of incoming U.S. Government mail in zip code range 202-205 will continue to be for the foreseeable future irradiated in Lima, Ohio. As you are aware, FBIHQ's Zip Code is 20535, which falls in the category of mail being targeted for irradiation. The USPS advised that mail being irradiated include letters, flats, express and priority mail with stamps for postage, as well as other packages with stamps for postage. Mail from known mailers is not being irradiated, which includes USPS Express mail with meter strips or corporate accounts, priority mail with meter strips or permit indicia, all registered mail and bulk quantity mail such as catalogs and magazines. Because of the effects of irradiation, the USPS recommends that the following items should not be irradiated: Magnetic media (credit card, floppy disk, CD-ROM, etc); Plastics sensitive to heat and radiation warping that is a component of a device or instrument; Bacterial growth media for research and industry; Chemical and biochemical compounds for research and for industrial use; Electronics (to be evaluated); Organic clothing: silk, cotton, wool (need further analysis); Prescription or non-prescription pharmaceuticals; Vitamins; Baby formula; Photographic film (exposed and unexposed); Photosensitive film and paper; Consumer electronics; Clinical laboratory samples (biomedical) for analysis; Forensic evidence for analysis; Germinative matter (seeds, cuttings); Heat sensitive materials to include colorimetric heat tabs; Legitimate bacterial, viral, yeast (baking industry) and other cultures for medical, research and industrial use; Living matter, either plant or animal; Luminous material; Medical diagnostic kits and reagents; and Urine samples for drug analysis. Should you need to send correspondence or other items to U.S. Government facilities located in the above zip codes, you are to seek another method of shipment. Alternatives include USPS express mail with meter strips or corporate accounts, priority mail with meter strips or permit indicia, registered mail or private shipping companies such as FedEx, UPS, DHL, and Airborne. Significant backlogs are occurring at the USPS as a result of the irradiation process. These backlogs will continue for the foreseeable future until an additional irradiation facility is tested and opened in Bridgeport, New Jersey. =============== Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: SEAL Date: Fri Jan 25, 2002 5:48pm Subject: CIA enemyatthegate007 wrote: >how does the cia find agents?i have read and seen documents but are >they true?i know its a hush hush agency and i know they employ >engineers,chemist,bio etc..and have a huge web site but what about >other agents like espionage or other agents that just do spying.just >wondering. > > james jones > EPS www.bodyguardinc.com On the same path I am also curious regarding employment of Assets. I have always wanted to work for the Company as an agent but my Filipino citizenship forbids me. As I have no interest in p.i. work and law enforcement and operations in counterterrorism, drugtrade and criminal investigation/apprehension so my options are quite limited. However the CIA's sacrificial attitude in the use of assets is also a great cause of concern. Any thoughts on how to get into the "espionage" biz? What other intelligence services could be more "foreigner-friendly"? Another track I could take is to get a greencard by marriage and take up an intelligence related course or any course for that matter in a U.S. university then apply at the CIA. I am now 25 and working on my MBA thesis but I doubt if my Philippine Undergrad/Graduate degree would be given credit, hence the need to acquire a US degree which is required of all clandestine services applicants(?) Given the fact that I still have 10 years (35) to execute my plans, I am still looking for alternatives which I hope are "simpler" --------------------------------- Do You Yahoo!? Yahoo! Auctions Great stuff seeking new owners! Bid now! [Non-text portions of this message have been removed] 4654 From: Steve Uhrig Date: Fri Jan 25, 2002 10:43pm Subject: Re: CIA Once upon a midnight dreary, SEAL pondered, weak and weary: > On the same path I am also curious regarding employment of > Assets. I have always wanted to work for the Company as an agent > but my Filipino citizenship forbids me. If you have a skill or some sort of capability they need, they will find a way to put you on. Criminal records, drug addiction, questionable loyalty and a lot of other things don't get in the way of them employing someone who has something they want. You may not go on the official payroll with a full slate of formal bennies, but they can do it if they want to. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4655 From: William Knowles Date: Fri Jan 25, 2002 8:45pm Subject: Re: CIA remorse On Fri, 25 Jan 2002, Men in black helicopters forced enemyatthegate007 to write: > how does the cia find agents?i have read and seen documents but > are they true?i know its a hush hush agency and i know they employ > engineers,chemist,bio etc..and have a huge web site but what about > other agents like espionage or other agents that just do > spying.just wondering. The CIA agent John Spann that was killed was a U.S.M.C. Captain before becoming a field operative. Try CIA the website... http://www.odci.gov/cia/employment/ciaeindex.htm While you're at it, you can try some of the rest of the U.S. intelligence community. National Security Agency http://www.nsa.gov/programs/employ/ Defense Intelligence Agency http://www.dia.mil/Careers/index.html Federal Bureau of Investigation http://www.fbijobs.com National Imagery and Mapping Agency http://www.nima.mil/poc/employ.html U.S. Department of State http://www.state.gov/employment/ - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4656 From: Matthew Paulsen Date: Sat Jan 26, 2002 0:50am Subject: RE: Re: CIA [Steve Uhrig] You may not go on the official payroll with a full slate of formal bennies, but they can do it if they want to. [Matthew Paulsen] Sometimes this is as easy as being employed by a corp that is contracted with another corp that is contracted with them. I've had this exposure more than once to various agencies at various levels - eg: OSDOC, state, DISA/DITCO & DSS mil (under DoD). Still the same work, you just don't get the shiny tin star but there are less tangible benefits to this sort of employment and you tend to make really good money really fast since the budgets are extraordinarily high with very little accountability for what you're doing. Example - One place blew $125,000+ on 2 compaq 6000 servers for 7 developers (+ dev time, my team, infrastructure, transportation, etc.). Total waste of cash for what they were doing, but at $960/hr, I'm hard pressed to make a complaint with the accountant about the purchasing practices of the government. 4657 From: Dr. Pepper Date: Sat Jan 26, 2002 9:46am Subject: RE: Re: CIA In another life, , , , , , , , , , , In 1961, I was returning to the States from the Panama Canal Zone, and on a stopover at Guatemala City, I met an American guy at the Airport bar, and during the conversation, I mentioned that I had recently got out of the USAF, He asked me what my specialty was, and when I told him that I was a crew chief and flight engineer on B-26 aircraft, he offered me a job right on the spot. The Pay was $1000 per month, and since that was BiiiiiG money back then, and I was unemployed, I took him up on it. I spent a month living in tents in the bush at a mud airfield, living with snakes and very big spiders. I rapidly tired of this life, and took the supply truck back to G city on the next payday, and gave it up. The following day, The Guardia Nationale raided the camp and put everyone in jail. I missed that by a day. I didn't find out till much later that this was a CIA operation supporting the Bay of Pigs raid. I got my thousand bucks, but that's all. Oh well, such is life, , , , , , , Ron C. ====================================== -----Original Message----- From: Matthew Paulsen [mailto:mpaulsen6@a...] Sent: Friday, January 25, 2002 10:50 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Re: CIA [Steve Uhrig] You may not go on the official payroll with a full slate of formal bennies, but they can do it if they want to. [Matthew Paulsen] Sometimes this is as easy as being employed by a corp that is contracted with another corp that is contracted with them. I've had this exposure more than once to various agencies at various levels - eg: OSDOC, state, DISA/DITCO & DSS mil (under DoD). Still the same work, you just don't get the shiny tin star but there are less tangible benefits to this sort of employment and you tend to make really good money really fast since the budgets are extraordinarily high with very little accountability for what you're doing. Example - One place blew $125,000+ on 2 compaq 6000 servers for 7 developers (+ dev time, my team, infrastructure, transportation, etc.). Total waste of cash for what they were doing, but at $960/hr, I'm hard pressed to make a complaint with the accountant about the purchasing practices of the government. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4658 From: Hawkspirit Date: Sat Jan 26, 2002 11:12am Subject: Re: Un-identified problem From: "Steve Uhrig" Subject: Re: Un-identified problem Once upon a midnight dreary, Brad Hayes pondered, weak and weary: > Prior to moving a couple of months ago, someone was ringing > her doorbell early in the morning on a fairly consistent > basis. She moves to the opposite side of town and the very > next morning, her doorbell rings, again early in the > morning.(6:00 a.m). A couple of days ago,she contacts me and > says her doorbell rang on Sunday morning (8:00 a.m.) but > nobody is at the door. Since it is unlikely she would move her doorbell from one house to the other, it seems highly unlikely any technical problems relating to the doorbell hardware would be the cause. Since you are already running video tape in association with the video cameras, also run a microphone to the vicinity of the doorbell so the ring, if it happens gets on the audio. You may not want to tell the client and just do it. Then when you get the ring report and it is not on the audio track the gig is up. An in between the ear maintenance check is next. Roger 4659 From: ki4je Date: Sat Jan 26, 2002 6:50am Subject: Re: Un-identified problem Could either car have been a news paper delivery? Chucking the paper out of the window or just dropping a heavy Sunday paper in the driveway? 4660 From: Date: Sat Jan 26, 2002 1:35pm Subject: Re; Unidentified problem Once my aunts,who lived alone, apartment manager was sneaking into her residence at 5am in the morning and stealing things. He would look through the mail slot in the front door for an all clear ,while my aunt slept in the back room. All the relatives thought she was imagining things, or just misplacing items, "Poor Aunt Emma is losing it!". That is,until i happened to sleep overnite at her place , while she was in the hospital, to keep an eye on things and give her moral support. Sure enough, a little after 5 the mail slot opened and so did my eyes ,as i was sleeping on the couch. The manager denied everything, but after a short chase , the mystery was solved and my aunt was given a clean bill of healthy mind! Moral ; If they pay the fee, give the complainer,the benefit of the doubt,for free ! Either that or make them a nice aluminum foil conical hat ,to stop mind control radio waves! :>) HAVE A GREAT DAY !!! Please Note: No trees were destroyed in the sending of this contaminant free message We do concede, a significant number of electrons may have been inconvenienced. : >) 4661 From: Aimee Farr Date: Sat Jan 26, 2002 3:22pm Subject: RE: Re: CIA > living with snakes and very big > spiders. Fears The Harris Poll. July 15-20, 1999. N=1,015 adults nationwide. MoE ± 3 (total sample). THESE RESPONSES INDICATE PEOPLE THAT ARE VERY AFRAID (ALL Men Women) snakes 36 22 49 looking down from a great height 23 13 32 flying on an airplane 14 7 20 being alone in a forest 13 4 22 spiders and insects 12 4 19 mice 10 2 18 thunder and lightning 5 2 7 being alone in your home at night 3 1 5 being alone in an elevator 3 1 5 being in a big crowd of people 3 2 3 dogs 2 1 4 going out of your home at night 2 1 3 This why the snake is a good metaphor for treason, and why it's in those NCIX posters. No. 1-2 in most polls is the fear of public speaking, which is a fear with relevance to the recent loon discussions. You deal with people that seem "paranoid." This is a fear of normalcy. It's the technological equivalent of the fear of public speaking -- the fear of exposure, working off shame (the most powerful human emotion). _People are monitored_ at their worksites and everywhere they go. It's a sensitizing experience. Securing your services can be a sign of mental health, because these people are actually willing to take risk to address their fears. Also, the power of human perception is great. It could be that something is wrong somewhere, and they picking up signals in their environment, and translating it into a fear of surreptitious surveillance. They just need you to help them look in the right place. People use these metaphors in sales pitches to frame emotion, and as embedded commands to affect decision-making. If you give somebody the impression they are crawling with vipers, 36% of people will pay any amount to have you take care of the problem. Same thing with public speaking, which triggers fears of exposure. "They hide in the grass." (snake sublim) "Let's step back, and take a long look down at the problem." (fear of heights) "We certainly don't want your desk turned into a podium for a daily public address, do we?" (exposure) I realize this is snarky and ill-framed. But you get my point. Fear sales tactics are dangerous. Most of you come from tech-sci backgrounds, so you're very logical. Logic never got anybody to do a damn thing. People misperceive risk. "Showing" the risk, does not work. Logic does not overcome resistance, it enhances it. The immediate reaction of people to an argument or pressure is to prepare counterarguments. The more time they have to prepare, the more resistance you face. (This is one reason some reception rooms have distraction ploys.) Security practitioners that can use these tactics can better effect change and influence decision-makers. ~Aimee Embedded: "deal with people," "need to look," "take care of the problem," "you're very logical," "you face high resistance," ...."effect change and influence decision-makers." 4662 From: Agent Lovato Date: Sat Jan 26, 2002 1:33pm Subject: RE: computer question As far as remotely powering on/off a computer in anyones house it is a relatively simple task by default. By default, for years now computers have been shipping from the manufacturer with the bios set to, "wake on ring". So, if this were the case with the Ames computer all one needs to know is the phone # of the jack the computers modem is plugged in. Then just hack away to gain entrance. The other computers in the house were most likely not networked at the time and he most likely used this computer to telecommute and email etc.. It may have been more complicated but I doubt it. Although, the technology mentioned by Matthew Paulsen does exist and has been being worked on since at least the 1960's that I am aware of. Transmission of data over a carrier wave is not much different than the concept of shortwave radio with its side band frequencies. anyway, thats me 3cents. Matthew Paulsen wrote: The Ames case goes back to February, 1994 with Aldrich Ames, a counterintelligence officer with the CIA. In February, 1997 Ames plead guilt to committing espionage for Russia. From what I've been exposed to, various government and private groups have been developing alternative measure to pass information through alternate methods such as power lines and water, such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and subcontractors), etc. Power line theory for transmission of information for intercommunication between generating stations, substations and control rooms holds that this sort of espionage is feasible at lower levels down to the receiving devices - such as remote espionage of consumer television sets, etc. Further, this could be used for non-compliant networks which are operating antiquated systems - C64, Altos, TSR 80's, etc. Remote power switches are available commerically, so it is conceivable that one was used, but it would have to be planted and integrated into a LAN/WAN connection or remote dialup/LAN connection to work, or chips / circuits (ie: a board is installed in the PC, station, remote manager, etc). Baud rates vary depending on who you talk to as well as data transmission distances - I've seen 300bps to 1gb/s at distances of a few hundred yards to worldwide, and phy being water, fiber, cable, PL, etc. Outside this range, there are microchip capable devices that are available with no power supply source that are attachable, injected, injested, that can be worn, carried, etc, but this would not provide the scope of services that you are describing, and they are only for intermittent use, but are capable of being interfaced via RF and then to LAN/WAN for public transmission through PPTP / HTTP, etc over IP, IPX, whatever, for global communication. I've worked on some systems that have provided PL monitoring from centralize base stations for power utilities for automated billing and other services - downtimes, line failures, etc, which can be automated to interoperate with MRP/ERP systems and other systems, so it's not a hard feat to take that integration and migrate it from consumer/commerical applications to industrial and government espionage services. Minature digital transceivers based on these technologies are under development, and in use by some organizations, federal and otherwise. Normally though, it's easier to plant a trojan to access the system and manage remote booting, kslogging, etc, microphones, and any cameras if present. Guess it comes down to... It's easier, cheaper, and more reliable - "engineers viewpoint - It's not broken, so lets add more to it, vs 'normal' person viewpoint - it's not broken, so don't fix it" being a reasonable assumption. But, in the world of unlimited budgets without justification for expenses... who knows. Probably not much of an answer, but it's a start. If anyone else has other information, I'd be happy to find out what others have used/seen beyond what I have. -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: Tuesday, January 22, 2002 9:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] computer question I'm sitting here watching a show on cable ( I know). They are discussing the encroachment of surveillance by the gov against citizens. One detail they gave was on the Ames case. They stated that the FBI was remotely powering on Ames home computer, then subsequently removed data from, and powered it back down via the residential power lines. I am a little skeptical, unless they put a black box inside his pc. For instance, what kept ALL pc's on that transformer circuit from waking up? But, I am low on the knowledge base totem pole. What say ye, experts? Thanks! Shawn Yahoo! Groups Sponsor ADVERTISEMENT --------------------------------- Do You Yahoo!? Yahoo! Auctions Great stuff seeking new owners! Bid now! [Non-text portions of this message have been removed] 4663 From: James M. Atkinson Date: Sat Jan 26, 2002 4:46pm Subject: A spy thriller may be unfolding in New Jersey. http://www.nypost.com/business/38198.htm FBI RAIDS N.J. HIGH-TECH FIRM By CHRISTOPHER BYRON January 26, 2002 -- EXCLUSIVE A spy thriller may be unfolding in New Jersey. In a startling pre-dawn sweep of homes and offices yesterday morning, agents of the FBI fanned out through South Plainfield and surrounding towns to serve grand jury subpoenas on an estimated 20 different employees and officials of a Chinese-linked high-tech company named Multiplex, Inc. The subpoenas are thought to be related to a civil suit filed last August against Multiplex, Inc. by Agere Systems, Inc., the chip-making giant that is now in the process of being spun off from Lucent Technologies, Inc. Agere charged in the suit that Multiplex, Inc. had stolen various chips and related property from it as well as infringed on four of its patents. Several phone calls seeking comment from Multiplex, Inc. were not returned. But sources at the company said Multiplex has grown rapidly in the last year, and at least one of the company's top-selling items - something known as an EML Laser - is based on chips and technology that may have been improperly obtained from Agere. The devices are said to be manufactured at a sprawling 261,000 square foot complex of buildings in South Plainfield, the newest of which was opened only late in 2001. The Multiplex source said that one of the company's biggest customers was, until recently, JDS Uniphase, the once-high-flying fiber optics company. The source said Multiplex also has a contract with the U.S. Government. One subpoena summoned the recipient to appear before a federal grand jury in Newark, N.J. in the second week of February. Multiplex, Inc. was founded in 1997 by a former official at Bell Labs named Won T. Tsang, who had headed Bell's Semiconductor Photonics Department. Bell Labs, a unit of AT&T, was divested by the phone giant as part of its 1996 spin-off of Lucent Technologies. Lucent, in turn, is now spinning off its semiconductor operations under the Agere name. Multiplex's co-founder, Tawee Tanbun-Ek, hails from Thailand and Japan, and also was previous employed by Bell Labs and thereafter, Lucent. Other top officials at Multiplex include Liang Tzeng, another Bell Labs veteran. The company maintains an "office of new business development" in Xian Dai City, Beijing, China, but it is unclear exactly what business is conducted through that office. The company's board of directors include individuals from the Philippines and Taiwan. Multiplex, Inc. appears to have had very limited sources of identifiable funding prior to May of 2001. In May, however, the company raised $105 million in capital via Credit Suisse First Boston Co. and several investment funds. The company currently lists an individual named Bruce Bartlett, who manages several investment portfolios for the Oppenheimer Funds, Inc., as being a member of Multiplex's board of directors. Bartlett would not return calls regarding Multiplex, Inc., and an Oppenheimer spokesman answered "no comment" as to whether Bartlett had received a grand jury subpoena. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4664 From: Agent Lovato Date: Sat Jan 26, 2002 2:13pm Subject: RE: computer question As far as remotely powering on/off a computer in anyones house it is a relatively simple task by default. By default, for years now computers have been shipping from the manufacturer with the bios set to, "wake on ring". So, if this were the case with the Ames computer all one needs to know is the phone # of the jack the computers modem is plugged in. Then just hack away to gain entrance. The other computers in the house were most likely not networked at the time and he most likely used this computer to telecommute and email etc.. It may have been more complicated but I doubt it. Although, the technology mentioned by Matthew Paulsen does exist and has been being worked on since at least the 1960's that I am aware of. Transmission of data over a carrier wave is not much different than the concept of shortwave radio with its side band frequencies. anyway, thats me 3cents. Matthew Paulsen wrote: The Ames case goes back to February, 1994 with Aldrich Ames, a counterintelligence officer with the CIA. In February, 1997 Ames plead guilt to committing espionage for Russia. From what I've been exposed to, various government and private groups have been developing alternative measure to pass information through alternate methods such as power lines and water, such as IC/SS PLC/SS circuits. IE:Intel, Itron, National Semi, Rockwell, Motorola, Cyplex, Daewoo, Now defunct Enron (and subsidiaries and subcontractors), etc. Power line theory for transmission of information for intercommunication between generating stations, substations and control rooms holds that this sort of espionage is feasible at lower levels down to the receiving devices - such as remote espionage of consumer television sets, etc. Further, this could be used for non-compliant networks which are operating antiquated systems - C64, Altos, TSR 80's, etc. Remote power switches are available commerically, so it is conceivable that one was used, but it would have to be planted and integrated into a LAN/WAN connection or remote dialup/LAN connection to work, or chips / circuits (ie: a board is installed in the PC, station, remote manager, etc). Baud rates vary depending on who you talk to as well as data transmission distances - I've seen 300bps to 1gb/s at distances of a few hundred yards to worldwide, and phy being water, fiber, cable, PL, etc. Outside this range, there are microchip capable devices that are available with no power supply source that are attachable, injected, injested, that can be worn, carried, etc, but this would not provide the scope of services that you are describing, and they are only for intermittent use, but are capable of being interfaced via RF and then to LAN/WAN for public transmission through PPTP / HTTP, etc over IP, IPX, whatever, for global communication. I've worked on some systems that have provided PL monitoring from centralize base stations for power utilities for automated billing and other services - downtimes, line failures, etc, which can be automated to interoperate with MRP/ERP systems and other systems, so it's not a hard feat to take that integration and migrate it from consumer/commerical applications to industrial and government espionage services. Minature digital transceivers based on these technologies are under development, and in use by some organizations, federal and otherwise. Normally though, it's easier to plant a trojan to access the system and manage remote booting, kslogging, etc, microphones, and any cameras if present. Guess it comes down to... It's easier, cheaper, and more reliable - "engineers viewpoint - It's not broken, so lets add more to it, vs 'normal' person viewpoint - it's not broken, so don't fix it" being a reasonable assumption. But, in the world of unlimited budgets without justification for expenses... who knows. Probably not much of an answer, but it's a start. If anyone else has other information, I'd be happy to find out what others have used/seen beyond what I have. -----Original Message----- From: Shawn Hughes [mailto:srh@e...] Sent: Tuesday, January 22, 2002 9:32 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] computer question I'm sitting here watching a show on cable ( I know). They are discussing the encroachment of surveillance by the gov against citizens. One detail they gave was on the Ames case. They stated that the FBI was remotely powering on Ames home computer, then subsequently removed data from, and powered it back down via the residential power lines. I am a little skeptical, unless they put a black box inside his pc. For instance, what kept ALL pc's on that transformer circuit from waking up? But, I am low on the knowledge base totem pole. What say ye, experts? Thanks! Shawn Yahoo! Groups Sponsor ADVERTISEMENT --------------------------------- Do You Yahoo!? Yahoo! Auctions Great stuff seeking new owners! Bid now! [Non-text portions of this message have been removed] 4665 From: James M. Atkinson Date: Sat Jan 26, 2002 5:06pm Subject: Re: Masking products At 7:45 AM -0800 1/25/02, Hawkspirit wrote: >Any one have experience with these masking products? Roger > >http://www.streetsavvywares.com/BD_acoustic_generators.htm > The equipment is blatantly and grossly misrepresented, and there is good reason to belive they are thieves, con artists, and liars. Just for the record, the fools actually tried to steal from me, so beware. They appear to be able to toss around various buzzwords, but seem clueless about what is really going on. Really just another a disreputable Spy shop run by more money grabbing dirtbags in New York. Any other questions? -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4666 From: Shawn Hughes Date: Sat Jan 26, 2002 5:52pm Subject: ghost rings I still haven't heard if the lady's doorbell was wireless or not. If so, I would definately blame the doorbell. I think Steve hit a point when he said that the odds of it randomly happening in two places were remote. Well, I have used wireless doorbells on several temporary facilities, and had 'ghost rings'. Turned out a piece of equipment was putting out RF at a harmonic of the 'bells frequency, and would agitate the bell when it went through the warm or cooling off cycle. Did you ever check out the stalking ex employee angle? Shawn 4667 From: Date: Sat Jan 26, 2002 5:25pm Subject: Fwd: ghost rings A possible source, but less probable than the expert type opinions given concerning the noise, is that she could have moved the noise with her - that it is coming from an object other than doorbell but is being misintrepreted as doorbell - such as an alarm clock, a watch with an alarm, an appliance with timer or something like that? Al Reed [Non-text portions of this message have been removed] 4668 From: zack <10-33@c...> Date: Sat Jan 26, 2002 11:10pm Subject: Re: Doorbell I must be missing something. You of course have sound capacities on the cameras and have heard the doorbell ring ?? And the device is not wireless ??? Do you have motion sensors in addition........... if you have heard the doorbell, of course. At 07:19 AM 1/26/2002 +0000, you wrote: >Prior to > >moving a couple of months ago, someone was ringing her > >doorbell early in the morning on a fairly consistent > >basis. She moves to the opposite side of town and the > >very next morning, her doorbell rings, again early in > >the morning.(6:00 a.m) I install two coverts cameras > >for her, one that has a commanding view covering the > >front of the home and the second that is disguised as > >a peephole so I can obtain video of the front door. A > >couple of days ago,she contacts me and says her > >doorbell rang on Sunday morning (8:00 a.m.) but nobody visit http://www.copscops.com Washington DC Police Department http://mpdc.dc.gov/main.shtm "Unity... Resolve... Freedom. These are the hallmarks of the American spirit." George W Bush President of the United States of America God Bless The USA .. NEVER forget 9-11-01 http://www.copscops.com/blessusa.htm [Non-text portions of this message have been removed] 4669 From: Steve Uhrig Date: Sun Jan 27, 2002 9:16am Subject: Latest on Nigerian Scams Hi all, The latest twist on the Nigerian scams is targeting security companies. Just like CCS, these clowns target the naive hopeful wanting to get involved in international affairs without paying their dues. Use your DELETE key if you get something like the following: ====================== Dear Sir, Our company, Pro-Development Konsult, handles consultancy services for private individuals, corporate organisations and government agencies, in Nigeria - where we are based - and from other parts of the African continent. The Attorney-General and Minister of Justice of Nigeria, Chief Bola Ige, was murdered in his bedroom in the night of December 23, 2001 -visit www.nigeria.com. The assassinated federal law officer who fought for the enthronement of democracy in Nigeria is one of the best politicians that Nigeria has ever produced since her independence in 1960. In order to forestall this dastardly act, the government has decided to improve the security within the homes and offices of all the members of the lower and upper houses of parliament, as well as in the homes and offices of other senior government functionaries. Our company has therefore been nominated, along with other consulting and brokerage firms, to invite tenders from experts on security and surveillance matters. Such experts and suppliers will be required: ======================= They will string you along, pump your ego, claim to want to wire you a retainer, and request your bank information. Then things slide into the regular M.O. of these scams from there on. The above message, or anything like it, is completely phony and should be disregarded. Headers are forged, which in itself should raise red flags. The above originated from outblaze.com. If it sounds too good to be true, it is. Obviously enough people don't realize this or these Nigeriam scams would have died fifteen years ago when they started. Instead, with the advent of email, they're able to hit more and more people cheaper and quicker. A few years ago, I had a legitimate order from the Nigerian government. I put the poor guy through the wringer so many times and in 19 different directions, but he patiently cooperated because he knew the reputation which preceded him. We ended up being friends, and when I apologized months later for giving him the Spanish Inquisition, he said he understood and was embarrassed so many of his countrymen were involved in these scams. But most of them are scams, and the likelihood of running into a genuine requirement and an honest deal are practically nonexistent. If you think a rare opportunity to make easy money has found you, you're probably wrong. Even God says it in the Bible, 'By the sweat of thy brow thy shall earn thy bread'. Remember that when any of these get rich quick schemes come along. That applies to lottery tickets too, BTW. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4670 From: James M. Atkinson Date: Sun Jan 27, 2002 9:51am Subject: CIA helps museum open door on spying http://www.portal.telegraph.co.uk/news/main.jhtml?xml=/news/2002/01/27/wspy27.xml&sSheet=/portal/2002/01/27/por_right.html CIA helps museum open door on spying By David Wastell in Washington (Filed: 27/01/2002) THE long shadows of some of the world's most notorious spies and double-agents, from Anthony Blunt to Aldrich Ames, will be cast over Washington in June with the opening of the world's largest museum dedicated to the history of espionage. Former members of the KGB and CIA have been recruited to give advice on exhibits ranging from special "escape boots" designed for British pilots in the Second World War to a concealed camera used to monitor East German hotel bedrooms. In a city that has seen more than its fair share of spies and is still, presumably, home to hundreds of them, the museum will acknowledge the work done by the world's secret agents and by America's much-maligned L21 billion-a-year intelligence effort. "Intelligence officers do not usually want or seek banner headlines," said Peter Earnest, a former career CIA officer who spent 20 years running clandestine networks behind the Iron Curtain. "The Cold War was an intelligence war, and it was intelligence that stopped it from becoming a hot war, but there were no parades of intelligence officers at the end of it. "People often talk about intelligence failures but they don't hear about many of the successes - embassies that have not been bombed, airports that have not been attacked - and one of our aims is to get people thinking about the role that intelligence has played in history." Officially, the CIA has no view on the museum, which will be housed in a group of 100-year-old buildings in what was once the bustling heart of Washington. Unofficially, the agency, whose headquarters are a few miles up the Potomac River in Langley, Virginia, has been encouraging it. As well as Mr Earnest, who is the museum's executive director, members of its advisory board include Judge William Webster, the former director of the FBI and CIA, Antonio Mendez, who was the CIA's chief of disguise, and a string of other intelligence experts. For balance, there is one Briton, Christopher Andrew, the spy historian, and a Russian who defected: Oleg Kalugin, a former KGB major-general who ran the Soviets' counter-intelligence wing. The museum is being financed by Milton Maltz, a wealthy broadcasting executive and businessman of Cleveland, Ohio, who once worked in America's National Security Agency. Many more spies and former spies, including some still in prison, have been interviewed on video to provide realistic accounts of their operations. The museum will acknowledge British and American traitors, including Blunt, who was stripped of his knighthood when revealed as a double-agent, and Ames, regarded as the most damaging CIA turncoat for his betrayal to the Russians of dozens of American agents, many of whom were executed. It will also examine the spycraft of the traitor Robert Hanssen, who overlooked the site of the new museum from his fourth-floor office at FBI headquarters until he was arrested, last February, for selling secrets to Moscow for 15 years. Hanssen used what Mr Earnest described as "classic techniques" to pass information to his KGB contacts, such as secret "dead drops" for leaving documents in parks and public places in the Washington area. Artefacts on display will include a "Kiss of Death" KGB lipstick tube, designed to fire a single bullet when twisted, an Enigma code-breaking machine and a range of fake warts used to smuggle microdots of secret information. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4671 From: Brad Hayes Date: Sun Jan 27, 2002 8:48am Subject: Doorbell rings Dear Group, I wanted to take a moment to thank you for all of the expert input on my recent "doorbell" situation. I received many good suggestions. Just for the record, this is a hardwired doorbell. I didn't think this situation was plausible, but then again, I had to eliminate any chance of a remotely triggered device. I am now thinking there may be "other" possibilites to take under consideration. Second, I've noticed that Riser-Bond produces a couple of small portable TDR's cased in a vinyl pouch. Are these acceptable for TSCM or would you reccommend one of their larger units? I used the larger unit in a Texas A&M telephone class and was impressed with its accuracy. Having sold my gear acouple of years ago, I am reconsidering putting a basic package together as the funds become available. Also interested in which model of fluke multimeter the guys in the field are using. Thank you all again for your expertise. With respect, Brad Hayes ===== Brad Hayes American Investigation Group Investigations/Executive Protection Indianapolis, Indiana (317) 823-2677 __________________________________________________ Do You Yahoo!? Great stuff seeking new owners in Yahoo! Auctions! http://auctions.yahoo.com 4672 From: John Savage Date: Sun Jan 27, 2002 1:52pm Subject: MLPIA Swap Meet PRESS RELEASE: MLPIA 2002 GENERAL MEETING & P.I. SWAP MEET The Maine Licensed Private Investigators Association (MLPIA), Maine's premiere association of private investigation professionals, wishes to announce their first annual, never before, really big, huge and overblown. MLPIA 2002 P.I. SWAP MEET TO BE HELD ON FRIDAY, FEBRUARY 8, 2002 BEGINNING AT 5:00 TIL 8:??pm AT THE ELKS CLUB OUTBOUND CIVIC CENTER DRIVE AUGUSTA, MAINE RSVP: MLPIA@A... OR MLPIA, PO BOX 1645, PORTLAND, MAINE 04104-1645 Get your old "stuff" outta the back room and trade, swap, donate or whatever that piece of equipment, book, camera, cassette, phone system, etc., etc., etc. There will be more goodies then you ever thought possible and, for only a nominal service charge of $10.50, all this can be yours including a buffet, product demos, door prizes, raffles and much, much, more. Our membership drive will be kicked of by this monumental event, so you can't miss this one! Meet new friends, say hello to friends you haven't seen for a while and, most importantly, find that something you really want. (or get rid of it) BUY IT SELL IT, TRADE IT, DONATE IT OR AUCTION IT OFF FOR A GOOD CAUSE! PUSH IT, TOW IT OR JUST BRING IT. PS- ANY REAL OR IMAGINED REFERENCE TO JOLLY JOHN IS PURELY FICTIONAL! --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.317 / Virus Database: 176 - Release Date: 1/21/02 4673 From: Date: Sun Jan 27, 2002 7:01am Subject: TEL "RING" QUESTION During any given 24 hr period...the following occurs: --incoming phone call--caller ID always blocked--phone answered--NOT a sound. This occurs approx 12 plus times w/the majority of "incoming" during the 0700-1700 hr period. Rarely 1700-0700. BUT, it does occur during those hours as well. --*68 nothing --phone co security can't(?) ID the prob..or answer the why? question --different issue--random faxes coming in on "home" line--(prob solicitation)--immediately fwd to fax line with no capture-receive. Initially, we thought that the telco was doing some routine line cks..but this has been going on for several YEARS! Any thoughts or fixes? Bill Schneid, Ph.D. Criminologist Director of Special Operations GLOBAL PROJECTS, LTD. Investigative Research Analysts "tempus omnia revelat" Marina del Rey, California http://globalprojectsltd.com 4674 From: James M. Atkinson Date: Sun Jan 27, 2002 2:40pm Subject: I wish you enough I was not the author of the following, but it is my honor to post it to this list. -jma I WISH YOU ENOUGH At an airport I overheard a father and daughter in their last moments together. They had announced her plane's departure and standing near the security gate, they hugged and he said, "I love you. I wish you enough." She said, "Daddy, our life together has been more than enough. Your love is all I ever needed. I wish you enough, too, Daddy." They kissed good-bye and she left. He walked over toward the window where I was seated. Standing there I could see he wanted and needed to cry. I tried not to intrude on his privacy, but he welcomed me in by asking, "Did you ever say good-bye to someone knowing it would be forever?" "Yes, I have," I replied. Saying that brought back memories I had of expressing my love and appreciation for all my Dad had done for me. Recognizing that his days were limited, I took the time to tell him face to face how much he meant to me. So I knew what this man was experiencing. "Forgive me for asking, but why is this a forever good- bye?" I asked. "I am old and she lives much too far away. I have challenges ahead and the reality is, her next trip back will be for my funeral, " he said. "When you were saying good-bye I heard you say, 'I wish you enough." May I ask what that means?" He began to smile. "That's a wish that has been handed down from other generations. My parents used to say it to everyone." He paused for a moment and looking up as if trying to remember it in detail, he smiled even more. "When we said 'I wish you enough,' we were wanting the other person to have a life filled with enough good things to sustain them," he continued and then turning toward me he shared the following as if he were reciting it from memory. "I wish you enough sun to keep your attitude bright. I wish you enough rain to appreciate the sun more. I wish you enough happiness to keep your spirit alive. I wish you enough pain so that the smallest joys in life appear much bigger. I wish you enough gain to satisfy your wanting. I wish you enough loss to appreciate all that you possess. I wish enough "Hello's" to get you through the final "Good-bye." He then began to sob and walked away. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4675 From: Date: Sun Jan 27, 2002 11:00am Subject: Re: TEL "RING" QUESTION In a message dated 1/27/02 12:34:52 PM Pacific Standard Time, sleuthone@a... writes: << During any given 24 hr period...the following occurs: >> What's the name of the Telco? M. 4676 From: Steve Uhrig Date: Sun Jan 27, 2002 10:27pm Subject: Re: TDRs available to the list Once upon a midnight dreary, Brad Hayes pondered, weak and weary: > Second, I've noticed that Riser-Bond produces a couple of > small portable TDR's cased in a vinyl pouch. Are these > acceptable for TSCM or would you reccommend one of their > larger units? The vinyl pouch ones are not suitable. The 2401B+ (padded case) is an adequate ping box for simple TSCM. The fancier Riser Bond with the integral display are nicer, but more expensive. The major difference is you can set different pulse rates, different impedances, and can store traces digitally and dump them into a computer or print them later back at the office. I have plenty of all models of Riser Bond TDRs used in excellent condition if anyone is interested in a decent TDR. All have new or recent batteries, have passed calibration, have manuals and usually cable sets, and guarantees. Contact me for info. I take credit cards. > I used the larger unit in a Texas A&M telephone class and was > impressed with its accuracy. Even the little ones are accurate and adequate for most TSCM. The larger ones are nicer if you can afford them, but many thousands of sweeps have been done properly with the small 2401B. > Also interested in which model of fluke multimeter the guys in > the field are using. The Fluke 87-IV is the industry standard. Actually, any of the Fluke 87s are OK, but the newer ones have time/date stamping of min/max, a better warranty and wider ranges. If you can find any Fluke 87 used, of any iteration, it will serve you well. To continue the commercial message, I also have two Fluke 87 original models available, one well used but perfect, other practically unused, both with manuals, leads and pouches. Have one CPM-700 practically new with accessories not listed on the page. Also have unblocked ICOM R100 and R8500 receivers (meaning they cover the 800-900 megacycle range where cellular lives which is blocked in most receivers). Other used TSCM and related equipment is on my used equipment page: http://www.swssec.com/used.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4677 From: David Miller Date: Mon Jan 28, 2002 0:21am Subject: (off topic) you are in.... You're on the West Coast when . . . You make over $250,000 and still can't afford to buy your own house. The high school quarterback calls a time-out to answer his cell phone. The fastest part of your commute is going down your driveway. You know how to eat an artichoke. You drive to your neighborhood block party. ================================ You're in New York when . . . You say "the city" and expect everyone to know you mean Manhattan. You have never been to the Statue of Liberty or the Empire State Building. You can get into a four-hour argument about how to get from Columbus Circle to Battery Park, but can't find Wisconsin on a map. You think Central Park is "nature." You believe that being able to swear at people in their own language makes you multi-lingual. You've ever worn out a car horn. You think eye contact is an act of aggression. ================================= You're in Alaska when . . . You only have four spices: salt, pepper, ketchup and Tabasco. Halloween costumes fit over parkas. You have more than one recipe for moose. Sexy lingerie is anything flannel with less than eight buttons. The four seasons are: almost winter, winter, still winter, and construction. ================================= You're in the South when . . . You get a movie and bait in the same store. "Y'all" is singular and "all y'all" is plural. After a year you still hear, "You ain't from 'round here, are ya?" "he needed killin' " is a valid defense. ================================ You're in Colorado when . . . You carry your $3,000 mountain bike atop your $500 car. You tell your husband to pick up Granola on his way home and he stops at the day care. A pass does not involve a football or dating. The top of your head is bald, but you still have a ponytail. Your bridal registry is at REI. =============================== You're in the Midwest when . . . You've never met any celebrities, but the mayor knows your name. Your idea of a traffic jam is ten cars waiting to pass a tractor. You have had to switch from "heat" to "A/C" on the same day. You end sentences with a preposition: "Where's my coat at?" or "If you go to the mall, I wanna go with.." Your first job was detasseling. When asked how your trip was to any exotic place, you say, "It was different." 4678 From: James M. Atkinson Date: Mon Jan 28, 2002 6:45am Subject: Telephone tapping and mail-opening figures 1937-2000 (Compiled by Statewatch) http://www.statewatch.org/news/DOCS/Teltap1.htm Telephone tapping and mail-opening figures 1937-2000 (Compiled by Statewatch) ------------------------------------------------------------------------ The total figure for warrants issued for telephone tapping and mail-opening in the year 2000 for England and Wales was 1,608. This represents a slight drop on the previous year (1,734) but the 2000 figures are the third highest total in peacetime. In Scotland the total figure was 292 warrants, the highest ever.(Source: Regulation of Investigatory Powers Act 2000, Report of the Interception of Communications Commissioner, October 2001, Cm 5296) The chart below gives the figures for the number of warrants issued for telephone tapping and mail-opening issued by the Home Secretary for the period 1937-2000 in England and Wales; the warrants issued by the Secretary of State for Scotland between 1967-2000; and the number issued by the Foreign Secretary between 1980-1984. Some general observations can be made: 1) 1955 was the first year that the number of warrants issued for telephone-tapping was greater than those for mail-opening; 2) The record number of warrants issued in 1940 a total of 1,682 was exceeded for the first time in 1998 with 1,763 warrants being issued; 3) The high number of warrants between 1939-1941 is clearly attributable to the beginning of the Second World War; the rise in 1948 to the beginning of the Cold War and strikes, the post-war low point of 238 total warrants was in 1958 with the rise between 1971-1975 being due to industrial action combined with Cold War paranoia. 4) The total number of warrants was pretty steady in the 400's from 1976 until 1991. Thereafter the number of warrants has risen significantly. ENGLAND & WALES: YearTelephone tapping warrantsMail opening warrantsTotal 193717556573 193820710730 1939299731,002 19401251,5571,682 19411808621,042 1942164514678 1943126329455 1944102213315 19455690146 194673139212 1947110190300 1948103870973 1949133641774 1950179356535 1951177486663 1952173462635 1953202459661 1954222227449 1955241205446 1956159183342 1957n/an/an/a 1958129109238 1959159101260 1960195110305 196118375258 196224296338 1963270128398 1964253120373 196529993392 [1] 1966318139457 196730792399 196833383416 196937793470 1970395104499 197141886504 197241395508 197342473497 197443693529 197546893561 197641062472 197740784491 197842844472 197941152463 198041439453 [2] 198140246448 198237954433 198337253415 198435239391 198540340443 198657395668 [3] 198743834472 198841248460 198942731458 199047342515 199167062732 1992756118874 1993893105998 199487176947 199591087997 19961,073691,142 19971.391651,456 19981,6461171,763 19991,645891,734 20001,559491,608 [1] This figure is wrongly given as 382 in Cmnd. 7873 [2] Cmnd 9438 states in the figures between 1980-1984 excludes warrants issued under the 1920 Official Secrets Act. [3] The Report of the Commissioner for 1998 states in para.6 that the high figure for this year "is explained by the need to replace all the outstanding non-statutory warrants when the new Act came into force". SCOTLAND: Year Telephone tapping warrants Mail-opening warrants Total warrants issued for the year 19673-3 196810-10 19698-8 197014-14 197110212 197215-15 197320-20 197433538 197541-41 197641-41 197752355 197842-42 197956-56 198050-50 198149-49 198279281 198353154 198471475 198559968 198684488 [1] 198754357 198854559 198963164 199066266 199181182 199287592 199311210122 19949010100 19951371138 19962280228 19972560256 19982671268 1999288-288 2000292-292 [1] The Report of the Commissioner for 1998 states in para.6 that the high figure for this year "is explained by the need to replace all the outstanding non-statutory warrants when the new Act came into force". [2] It is noticeable that several of the rises in Scotland, especially for warrants to open letters, occurs during years when strikes played an important role, e.g. 1971, 1974, 1977, 1984 and 1985. It is also apparent that the overall figures for Scotland rose significantly during the 1980s (over the 1970s). Foreign Secretary:Year [1][2]Telephone tapping warrants Mail-opening warrantsTotal 1980136-136 1981101-101 198292-92 1983109-109 1984115-115 [1] Figures for warrants issued by the Foreign Secretary have not been issued since 1984. [2] The Report of the Commissioner for 1990 it states that it would be against the public interest to publish the number of warrants issued by the Foreign Secretary and the Secretary of State for Northern Ireland. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4679 From: James M. Atkinson Date: Mon Jan 28, 2002 6:57am Subject: China swept jet for bugs while in San Antonio, Texas [I would point out that the plane was likely bugged while on the ground in the US, but that the "traveling" Chinese TSCM folks are unable to find anything but the most primitive bugs and would not be able to properly sweep the plane until it got back to China. This is a good example as to why bug sweeps should be left to competent TSCM professionals. ] http://news.mysanantonio.com/story.cfm?xla=saen&xlc=585284 China swept jet for bugs while in S.A. By Sig Christenson EN Military Writer Web Posted : 01/21/2002 12:00 AM © 2002 San Antonio Express-News Chinese security experts armed with debugging equipment swept a Boeing 767-300ER three times before it left San Antonio for Beijing, where it was to be used by President Jiang Zemin, the San Antonio Express-News has learned. Security crews entered the plane each time it landed at San Antonio International Airport following shakedown flights last August, said Andy Kidd, who led a Dee Howard maintenance crew that helped put the plane back in the air after 10 months in an Alamo City hangar. During one sweep, Kidd took a call from a telephone outside the airplane and was later questioned about it by a Chinese agent who insinuated the conversation had been picked up. "I was totally shocked," Kidd, a senior aircraft mechanic with 20 years in the business, said Sunday. "I mean, it was an invasion of my privacy." Revelations that the plane was debugged while in San Antonio marked a new twist in the story and confirmed a recent report, made by a project insider, that electronics experts had gone over the jet before it was delivered to Beijing in mid-August. But Kidd's comments deepened the mystery of how, when or even if electronic listening devices were put on the wide-bodied jet, and who might have been behind the action. It raised more questions, too, about the arrests of 23 people - 21 of them from China's air force - in the wake of the reported bugging. "It's not out of the question that those listening devices could have been planted in China," said former Tennessee senator and U.S. Ambassador to China James Sasser. "But that doesn't necessarily mean they would have been planted by Chinese, he said, explaining that the Russians put transmitters on Beijing's planes years ago. "It could have been other groups doing it." Dee Howard and Gore Design Completions modified the jet at San Antonio International Airport last year. It was flown to an airfield near Beijing, where Chinese communications experts found 27 high-tech listening devices on board last October, the Washington Post reported last week. Those devices included transmitters in the presidential bathroom, the Post said, and in the headboard of Jiang's bed. Beijing has not protested to Washington or to officials with Gore Design and Dee Howard. The Chinese Embassy in Washington did not comment Sunday, and the White House failed to return a phone call. Two top administration officials, Secretary of State Colin Powell and Defense Secretary Donald Rumsfeld, said they knew nothing of U.S. involvement but didn't elaborate. Powell, appearing on ABC's "This Week," said the subject had "never been raised" in talks he's had with Chinese officials in recent months. Kidd, a 38-year-old father of two young girls, said he contacted the Express-News because he was tired of seeing Dee Howard "get bashed" in the media. "There's 400 people left there in that place that are trying to hang on for their jobs," he said. Dee Howard's Phil O'Connor, who has been designated by the firm to talk with the media, was ill and could not be reached. Gore Design President Jerry Gore said he was unaware of the debugging effort, but conceded it could have occurred. He also said transmitters might have been installed by the Chinese, and noted there were times when Chinese army troops were the only ones around the presidential plane. "There are competing factions within the Chinese military and government. It is very possible that they could have been the ones who did this," Gore said. "Theoretically it's possible that U.S. intelligence recruited people within the Chinese government to help," speculated James Bamford, author of two best sellers on the secretive National Security Agency. "That's what the CIA's job is to do." Kidd, a senior aircraft mechanic, saw the debugging crews at the end of a monthlong restoration of the plane he led. As he and two others got the plane ready to fly after nearly a year in storage, Kidd said he was under constant Chinese scrutiny. "Without a doubt I felt like (I was) being watched," Kidd said. "Any panel or door or anything we opened on the aircraft, any operational checks I performed on the aircraft, I had a PLA official over my shoulder." Security was a top priority. A 6-foot tall chain-link fence was erected around the jet the day it arrived in San Antonio - July 5, 2000. Kidd said that was the first time in his four years with Dee Howard that the company had put up a fence around such an aircraft. Chinese troops flew with the plane after it left a Boeing plant in Everett, Wash., for South Texas, and remained until it left here Aug. 10. About 25 Chinese troops wearing civilian clothes were posted to the hangar on an around-the-clock basis. Those working on the plane wore color-coded badges. Anyone entering or leaving the jet had to sign a logbook at a security checkpoint. Dee Howard security guards worked elsewhere at the facility while airport police patrolled the area outside. Workers signing the logbook had to check off a "yes/no" box indicating if they were taking tools on board, Kidd said. Visitors to the hangar had to be cleared by Dee Howard security and the Chinese, and workers were not allowed to take cameras, radios or tape players into the airplane. The Chinese were "worried about possible sabotage acts," Kidd said, adding that he and other workers were cautioned "to maintain a professional attitude, basically make no terroristic comments, so to speak." Kidd said he was part of a ground crew that tested the plane before its first flight out of the hangar. Three test flights ran from Aug. 6-10, with the Boeing 767 returning to San Antonio International each time. Once the plane was down, he continued, three to five Chinese men in plain clothes would board it, taking a briefcase-sized black box with them. They finished 20 to 30 minutes later. Echoing his bosses and Gore Design executives, Kidd said there was no way the plane could have been bugged while in San Antonio - unless the Chinese themselves were doing it. "I don't think it was an American agency that did it," he said. "If anyone had more access to the aircraft, it was the Chinese. I would point my finger at the PLA people that were involved in the project." sigc@e... 01/21/2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4680 From: Date: Mon Jan 28, 2002 5:51pm Subject: 900 - 2.6 Yagi I may be behind the curve on this one, but it may be of interest to someone. I picked up a small Yagi log periodic antenna (on a circuit board) over the net. Cut for 900-2.6. Thing's about 8" square. I put a rubber pistol grip (for SLR camera) on it and connected it to my Tek 492. Put a small 9v 2.4 Ghz transmitter on the other side of the house and tried it out. Had to attenuate the signal down quite a lot, but finally got good, usable signal. Was amazed at the sensitivity. Was like moving a compass around true north. I literally could draw a straight line from the tip of the antenna to the transmitter. The slightest movement away from the transmitter would effect the amplitude, whether left, right, up or down. Like aiming a pistol. Very impressed (of course I'm still impressed with hard drives over 20 meg's). Don't want to make this a commercial message, but anyone interested in the page cite, let me know. Cost a princely $40. Martin Brown Brown & Sikes, Inc. Dallas 4681 From: Paolo Sfriso Date: Tue Jan 29, 2002 3:18am Subject: Bug Photos Wanted Dear Colleagues. I am developing a website www.microspia.org (microspia is the Italian word for bug, literally micro-spy) where I would like to place a photographic display of found bugs of any sort: from the radio-shack viarity to the more esoteric kind. I would be extremely gratefull if fellow listmembers could send me a couple of JPEG photos of traced or experimental bugs with a brief description. The site will be in Italian and proper credit will be given to all contributors. Thanks. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... 4682 From: Steve Uhrig Date: Tue Jan 29, 2002 7:39am Subject: Re: Bug Photos Wanted Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > I am developing a website www.microspia.org (microspia is the > Italian word for bug, literally micro-spy) where I would like to > place a photographic display of found bugs of any sort: from the > radio-shack viarity to the more esoteric kind. > I would be extremely gratefull if fellow listmembers could send > me a couple of JPEG photos of traced or experimental bugs with a > brief description. Hi Paul, Since mere possession of audio and certain other types of surveillance devices in the U.S. is a felony, you're obviously asking for these inputs from our members outside the U.S. No one in the US. would want to admit to committing a felony by acknowledging possession of sensitive devices. 18USC 2511 and 2512 (Title 18 is the Criminal Code in the U.S., and section 2511 and 2512 specifically discusses possession, advertising of, use by, etc. surveillance devices by other than government agencies or persons directly under contract to supply these devices to the government) is the applicable section of code. Practically anyone involved in TSCM or surveillance in the U.S. knows this section of code by heart, since we live and quite literally can rot in jail by it. Jim Atkinson, the owner and operator of this list, maintains a copy of this information on his website here: http://www.tscm.com/USC18_119.html Perhaps list members from countries where the law is not so restrictive can assist you. You also may be able, with permission, to copy certain photos from various websites showing pictures of these devices. Be aware, however, that I have never seen a photo on a website of a truly professional surveillance device. They all are low end, homemade type devices, or the mass produced garbage from the Pacific Rim. Any images shown on U.S. websites either are illegal or are of deactivated devices (usually mockups). Good luck with your site. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* From: The Price's Date: Tue Jan 25, 2005 9:36pm Subject: RE: Marty Kaiser I sent a email to Marty Kaiser about a week ago and so far no response, I would like to make a purchase of one of the items he indicates he still manufactures a 2050CA and a 1059 countermeasures amp. Does anyone have any info on Marty, should I try giving him a phone call. Also I am interested in purchasing a second CPM-700 REI unit only, I have all the probes, two of most and want to purchase just the receiver, if someone has a used unit let me know. John 10769 From: Mildred Young Date: Tue Jan 25, 2005 9:44pm Subject: Re: RFID Rev Dr Michael Ellner, Please tell me more of the Bush plan to screen the whole US population for mental illness. I have not heard anything about that! MY ----- Original Message ----- From: "J.A. Terranson" To: Sent: Tuesday, January 25, 2005 10:32 AM Subject: Re: [TSCM-L] RFID > > > > On Tue, 25 Jan 2005, Gerald wrote: > >> I have noted the reduced number of kidnappings in Iraq. >> Could RFID beused to trace victims if imbedded in their skin, or >> wouldn't it have the range? > > AFAIK, depending on the specific RFID technology used, range goes as far > as ~30 feet today, using COTS or near COTS equipment. I have heard > theoretical discussions which insist that 100feet *may* be feasible soon, > but it is unclear if "feasible" would necessarily equate to "available" in > a reasonable time frame. Besides, I doubt a 100foot range would prove to > be of much use. > > -- > Yours, > > J.A. Terranson > sysadmin@m... > 0xBD4A95BF > > Civilization is in a tailspin - everything is backwards, everything is > upside down- doctors destroy health, psychiatrists destroy minds, lawyers > destroy justice, the major media destroy information, governments destroy > freedom and religions destroy spirituality - yet it is claimed to be > healthy, just, informed, free and spiritual. We live in a social system > whose community, wealth, love and life is derived from alienation, > poverty, self-hate and medical murder - yet we tell ourselves that it is > biologically and ecologically sustainable. > > The Bush plan to screen whole US population for mental illness clearly > indicates that mental illness starts at the top. > > Rev Dr Michael Ellner > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10770 From: dj Date: Tue Jan 25, 2005 11:02pm Subject: Need equipment In need of a Sony 8mm deck/ mini or possibly a sharp 8mm deck/mini vcr with screen Anyone have one for sale under 100.00? --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10771 From: James M. Atkinson Date: Wed Jan 26, 2005 1:42am Subject: Fire closes New York subway line Does anybody else on the list find it ironic that a homeless guy with a shopping cart was able to accidently take out a chunk of the infrastructure of New York? If they are not capable of stopping something as simple as a shopping cart how are they going to stop an actual terrorist attack. -jma http://www.cnn.com/2005/US/01/25/train.fire.ap/index.html Fire closes New York subway line Should be running again in 3-6 months, agency says NEW YORK (AP) -- A subway line shut down by a tunnel fire that authorities believe was set by a homeless person should be running again within three to six months, not the five years previously feared, the New York City Transit agency said Tuesday. The Sunday fire, which began in a shopping cart stuffed with clothing and wood, ignited overhead cables near the Chambers Street station in lower Manhattan. The blaze spread to a room of switching and signal equipment critical to operating the C line, said NYC Transit's parent agency, the Metropolitan Transportation Authority. No suspect in the fire had been arrested. The C line, which carries some 110,000 daily riders in Manhattan and Brooklyn, was suspended indefinitely. The MTA also cut back service on the A line, which runs parallel to the C for part of its route, carrying some 470,000 passengers a day. Before Tuesday's announcement that service could be resumed within six months, NYC Transit President Lawrence Reuter had said it could take "several millions of dollars and several years" to rebuild the equipment. He also had said the fire caused the most serious damage to the subway's infrastructure since the September 11, 2001, terrorist attacks, which destroyed tracks and stations underneath the World Trade Center. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10772 From: James M. Atkinson Date: Wed Jan 26, 2005 1:50am Subject: Government Admits Terrorist Threat Warning was Bogus (again) Once again, DHS falls flat on their face, and whips up hysteria about a bogus terror threat which just conveniently coincided with the inauguration. -jma Authorities debate whether to make terror threats public By Associated Press Tuesday, January 25, 2005 BOSTON - A call from an anonymous tipster that 16 people were planning a terror attack on Boston prompted officials to warn the public and step up security. Patrols were increased at Logan International Airport and on the city's transit system. Vehicles were searched in underground parking garages. Gov. Mitt Romney [related, bio] skipped President George W. Bush's inauguration in Washington to return to Boston. All this for what authorities now say may have been an act of revenge by a human smuggler trying to get back at people who failed to pay him. The tipster has since been detained and was being questioned by authorities trying to get to the bottom of his motivation. The idea of reporting people to the government to exact revenge is nothing new. But with the heightened fear of terrorism, authorities have to decide when to warn the public and when to investigate quietly without making the threat public. ``Every day there comes to the various agencies within the U.S. government hundreds - thousands - of reports of everything from Martians having landed in Nevada to someone who just had a conversation with Elvis to terrorists coming with a nuclear bomb to Boston,'' said Graham T. Allison, an assistant defense secretary in the first Clinton administration. ``It's one of those situations where you're kind of damned if you do and damned if you don't,'' said Allison, now a professor of government at the John F. Kennedy School of Government at Harvard University. Most recently, a tipster called into the California Highway Patrol on Jan. 17, claiming that four Chinese nationals - two men and two women - and two Iraqi nationals entered the United States from Mexico and were awaiting a shipment of nuclear material that would follow them to Boston. The implication was that the group was plotting to detonate a radioactive ``dirty bomb'' that spews hazardous material and can sicken or kill people. The list of possible terror suspects later grew to 16, and authorities have said they are investigating whether the tip was a false one by a caller with a grudge after smuggling them across the border. U.S. Attorney Michael Sullivan said that the vast majority of anonymous tips received by authorities are not made public in an attempt to prevent panic. But authorities sometimes go public with a threat, he said, out of a concern for public safety or if they believe the public could help in the investigation. Sullivan told The Associated Press that authorities still have found no evidence of terror motives and nothing to corroborate the tipster's claims. He said the investigation is still ongoing and the smuggling scenario ``is within the range of possibilities.'' Matthew Evangelista, a professor of international relations at Cornell University, said the idea of turning people in as suspects out of revenge goes back to long before terrorism became a major concern. He said warning the public about a threat before it is thoroughly investigated can cause undue panic and may even cause people to be desensitized about the threat of terrorism. ``I think it breeds a kind of cynicism on the part of the public. ... People become maybe less willing to believe the threats when they are actually real,'' Evangelista said. ``The other risk it creates is a climate of suspicion, especially if people are identified by racial or ethnic characteristics. I think that's a danger officials need to think about when they issue these kinds of alerts.'' In the alleged terror threat against Boston, federal authorities went public after state and local law enforcement agencies took steps to increase security, and reports about the threat were leaked to the media. The FBI released the photographs of the four Chinese nationals and later released the names, some passport numbers and possible birth dates for nine other Chinese and one Hispanic man they said were wanted for questioning. No information has been released about the two Iraqis who were said to have been involved. ``It became apparent that the information was already in the public domain and there was significant risk that without making some kind of public statement, there was considerable risk of this being blown out of proportion and causing panic,'' Sullivan said. This past weekend, the FBI said one of the 16 people sought for questioning has been in U.S. custody for more than two months and has no terrorist connection. Sullivan noted that authorities emphasized from the beginning that they had been unable to corroborate the claims of the tipster. ``It's a constant challenge of the part of law enforcement because they have to respond as if each of these are potential real threats even though you recognize that the vast majority of them are going to be washed out,'' he said. ``The biggest fear you have if you didn't address it as a real threat is that you're going to miss an opportunity to prevent (something) from happening.'' ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10773 From: Agent Geiger Date: Wed Jan 26, 2005 8:50am Subject: Re: RFID Here are some articles: http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=39078 http://www.whitehouse.gov/infocus/newfreedom/toc-2004.html --- Mildred Young wrote: > > Rev Dr Michael Ellner, > Please tell me more of the Bush plan to screen > the whole US population > for mental illness. I have not heard anything about > that! > MY > ----- Original Message ----- > From: "J.A. Terranson" > To: > Sent: Tuesday, January 25, 2005 10:32 AM > Subject: Re: [TSCM-L] RFID > > > > > > > > > > On Tue, 25 Jan 2005, Gerald wrote: > > > >> I have noted the reduced number of kidnappings in > Iraq. > >> Could RFID beused to trace victims if imbedded in > their skin, or > >> wouldn't it have the range? > > > > AFAIK, depending on the specific RFID technology > used, range goes as far > > as ~30 feet today, using COTS or near COTS > equipment. I have heard > > theoretical discussions which insist that 100feet > *may* be feasible soon, > > but it is unclear if "feasible" would necessarily > equate to "available" in > > a reasonable time frame. Besides, I doubt a > 100foot range would prove to > > be of much use. > > > > -- > > Yours, > > > > J.A. Terranson > > sysadmin@m... > > 0xBD4A95BF > > > > Civilization is in a tailspin - everything is > backwards, everything is > > upside down- doctors destroy health, psychiatrists > destroy minds, lawyers > > destroy justice, the major media destroy > information, governments destroy > > freedom and religions destroy spirituality - yet > it is claimed to be > > healthy, just, informed, free and spiritual. We > live in a social system > > whose community, wealth, love and life is derived > from alienation, > > poverty, self-hate and medical murder - yet we > tell ourselves that it is > > biologically and ecologically sustainable. > > > > The Bush plan to screen whole US population for > mental illness clearly > > indicates that mental illness starts at the top. > > > > Rev Dr Michael Ellner > > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10774 From: kondrak Date: Wed Jan 26, 2005 11:17am Subject: Re: RFID Think it has more to do with our troops wiping out over 1200 of hard-core Jihadi's in Faluja. The best RFID implants ive seen are good for less than 100'. At 12:32 1/25/2005, you wrote: >On Tue, 25 Jan 2005, Gerald wrote: > > > I have noted the reduced number of kidnappings in Iraq. > > Could RFID beused to trace victims if imbedded in their skin, or > > wouldn't it have the range? > >AFAIK, depending on the specific RFID technology used, range goes as far >as ~30 feet today, using COTS or near COTS equipment. I have heard >theoretical discussions which insist that 100feet *may* be feasible soon, >but it is unclear if "feasible" would necessarily equate to "available" in >a reasonable time frame. Besides, I doubt a 100foot range would prove to >be of much use. > >-- >Yours, > >J.A. Terranson >sysadmin@m... >0xBD4A95BF > > Civilization is in a tailspin - everything is backwards, everything is >upside down- doctors destroy health, psychiatrists destroy minds, lawyers >destroy justice, the major media destroy information, governments destroy >freedom and religions destroy spirituality - yet it is claimed to be >healthy, just, informed, free and spiritual. We live in a social system >whose community, wealth, love and life is derived from alienation, >poverty, self-hate and medical murder - yet we tell ourselves that it is >biologically and ecologically sustainable. > >The Bush plan to screen whole US population for mental illness clearly >indicates that mental illness starts at the top. > >Rev Dr Michael Ellner > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10775 From: kondrak Date: Wed Jan 26, 2005 11:26am Subject: Re: Fire closes New York subway line Yes and no. Yes, in that the NYC subway is SO badly maintained, and in need of repairs that a small fire could easily spread and cause that level of damage. Also security is so poor that anyone, anytime could have access to critical infrastructure. ..and No, the tramps down there prob just wanted to stay warm, and with the amount of grease, debris and other flammables, (I cant envision one hauling a shopping cart of wood in, undiscovered) available due to lack of maintenance, I can see this being an accident waiting to happen. What "I" find amazing is the horrendous amount of time they speced for repairs. Of course, the mob, thug, union people don't work until they are paid off to do so, (with overtime, and bribes to their thug hierarchy) so three years might be realistic. this is typical for NYC and other places where the mob's are in control. I could buy 3-6 months....not three years....there will be heads rolling if 800,000 commuters are put out three years.... At 02:42 1/26/2005, you wrote: >Does anybody else on the list find it ironic that a homeless guy with a >shopping cart was able to accidently take out a chunk of the infrastructure >of New York? > >If they are not capable of stopping something as simple as a shopping cart >how are they going to stop an actual terrorist attack. > >-jma > > > > > >http://www.cnn.com/2005/US/01/25/train.fire.ap/index.html > > >Fire closes New York subway line >Should be running again in 3-6 months, agency says > >NEW YORK (AP) -- A subway line shut down by a tunnel fire that authorities >believe was set by a homeless person should be running again within three >to six months, not the five years previously feared, the New York City >Transit agency said Tuesday. > >The Sunday fire, which began in a shopping cart stuffed with clothing and >wood, ignited overhead cables near the Chambers Street station in lower >Manhattan. The blaze spread to a room of switching and signal equipment >critical to operating the C line, said NYC Transit's parent agency, the >Metropolitan Transportation Authority. > >No suspect in the fire had been arrested. > >The C line, which carries some 110,000 daily riders in Manhattan and >Brooklyn, was suspended indefinitely. The MTA also cut back service on the >A line, which runs parallel to the C for part of its route, carrying some >470,000 passengers a day. > >Before Tuesday's announcement that service could be resumed within six >months, NYC Transit President Lawrence Reuter had said it could take >"several millions of dollars and several years" to rebuild the equipment. > >He also had said the fire caused the most serious damage to the subway's >infrastructure since the September 11, 2001, terrorist attacks, which >destroyed tracks and stations underneath the World Trade Center. > > > > >---------------------------------------------------------------------------------------------------- >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >---------------------------------------------------------------------------------------------------- > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10776 From: J.A. Terranson Date: Wed Jan 26, 2005 2:02am Subject: [OFF TOPIC] Re: RFID On Tue, 25 Jan 2005, Mildred Young wrote: > Rev Dr Michael Ellner, > Please tell me more of the Bush plan to screen the whole US population > for mental illness. I have not heard anything about that! > MY "Rev. Ellner" was the source of the quote, not of the email it was acting as a .sig for. Nevertheless, below is a reprint of the article from which it came. I know Jeanne Lenzer, and this is no "supermarket rag story": check double and triple checks her work. Note that this originally appeared in the British Medical Journal (IIRC). -------------------------------------------------------------------------- http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=39078 Bush plans to screen whole U.S. population for mental illness Sweeping initiative links diagnoses to treatment with specific drugs Posted: June 21, 2004 5:00 p.m. Eastern By Jeanne Lenzer 2004 Jeanne Lenzer A sweeping mental health initiative will be unveiled by President George W Bush in July. The plan promises to integrate mentally ill patients fully into the community by providing "services in the community, rather than institutions," according to a March 2004 progress report entitled New Freedom Initiative (www.whitehouse.gov/infocus/newfreedom/toc-2004.html). While some praise the plan's goals, others say it protects the profits of drug companies at the expense of the public. Bush established the New Freedom Commission on Mental Health in April 2002 to conduct a "comprehensive study of the United States mental health service delivery system." The commission issued its recommendations in July 2003. Bush instructed more than 25 federal agencies to develop an implementation plan based on those recommendations. The president's commission found that "despite their prevalence, mental disorders often go undiagnosed" and recommended comprehensive mental health screening for "consumers of all ages," including preschool children. According to the commission, "Each year, young children are expelled from preschools and childcare facilities for severely disruptive behaviours and emotional disorders." Schools, wrote the commission, are in a "key position" to screen the 52 million students and 6 million adults who work at the schools. The commission also recommended "Linkage [of screening] with treatment and supports" including "state-of-the-art treatments" using "specific medications for specific conditions." The commission commended the Texas Medication Algorithm Project (TMAP) as a "model" medication treatment plan that "illustrates an evidence-based practice that results in better consumer outcomes." Dr Darrel Regier, director of research at the American Psychiatric Association (APA), lauded the president's initiative and the Texas project model saying, "What's nice about TMAP is that this is a logical plan based on efficacy data from clinical trials." He said the association has called for increased funding for implementation of the overall plan. But the Texas project, which promotes the use of newer, more expensive antidepressants and antipsychotic drugs, sparked off controversy when Allen Jones, an employee of the Pennsylvania Office of the Inspector General, revealed that key officials with influence over the medication plan in his state received money and perks from drug companies with a stake in the medication algorithm (15 May, p1153). He was sacked this week for speaking to the BMJ and the New York Times. The Texas project started in 1995 as an alliance of individuals from the pharmaceutical industry, the University of Texas, and the mental health and corrections systems of Texas. The project was funded by a Robert Wood Johnson grant . and by several drug companies. Mr Jones told the BMJ that the same "political/pharmaceutical alliance" that generated the Texas project was behind the recommendations of the New Freedom Commission, which, according to his whistleblower report, were "poised to consolidate the TMAP effort into a comprehensive national policy to treat mental illness with expensive, patented medications of questionable benefit and deadly side effects, and to force private insurers to pick up more of the tab" (http://psychrights.org/Drugs/ AllenJonesTMAPJanuary20.pdf). Larry D Sasich, research associate with Public Citizen in Washington, DC, told the BMJ that studies in both the United States and Great Britain suggest that "using the older drugs first makes sense. There's nothing in the labeling of the newer atypical antipsychotic drugs that suggests they are superior in efficacy to haloperidol [an older "typical" antipsychotic]. There has to be an enormous amount of unnecessary expenditures for the newer drugs." Olanzapine (trade name Zyprexa), one of the atypical antipsychotic drugs recommended as a first line drug in the Texas algorithm, grossed $4.28bn (2.35bn) worldwide in 2003 and is Eli Lilly's top selling drug. A 2003 New York Times article by Gardiner Harris reported that 70 percent of olanzapine sales are paid for by government agencies, such as Medicare and Medicaid. Eli Lilly, manufacturer of olanzapine, has multiple ties to the Bush administration. George Bush Sr. was a member of Lilly's board of directors and Bush Jr. appointed Lilly's chief executive officer, Sidney Taurel, to a seat on the Homeland Security Council. Lilly made $1.6m in political contributions in 2000 . 82 percent of which went to Bush and the Republican Party. Jones points out that the companies that helped to start up the Texas project have been, and still are, big contributors to the election funds of George W Bush. In addition, some members of the New Freedom Commission have served on advisory boards for these same companies, while others have direct ties to the Texas Medication Algorithm Project. Bush was the governor of Texas during the development of the Texas project, and, during his 2000 presidential campaign, he boasted of his support for the project and the fact that the legislation he passed expanded Medicaid coverage of psychotropic drugs. Bush is the clear front runner when it comes to drug company contributions. According to the Center for Responsive Politics (CRP), manufacturers of drugs and health products have contributed $764 274 to the 2004 Bush campaign through their political action committees and employees . far outstripping the $149 400 given to his chief rival, John Kerry, by 26 April. Drug companies have fared exceedingly well under the Bush administration, according to the centre's spokesperson, Steven Weiss. The commission's recommendation for increased screening has also been questioned. Robert Whitaker, journalist and author of Mad in America, says that while increased screening "may seem defensible," it could also be seen as "fishing for customers," and that exorbitant spending on new drugs "robs from other forms of care such as job training and shelter programmes." But Dr Graham Emslie, who helped develop the Texas project, defends screening: "There are good data showing that if you identify kids at an earlier age who are aggressive, you can intervene... and change their trajectory." First published by the BMJ Publishing Group Ltd in the BMJ -- volume 328, 19 June 2004, page 1458. 10777 From: J. Oquendo Date: Wed Jan 26, 2005 2:07am Subject: Re: Fire closes New York subway line > If they are not capable of stopping something as simple as a shopping > cart how are they going to stop an actual terrorist attack. The answer to this is simple. The United States simply needs another neatly acronymed agency to carry out the dangerous, perilous, devious duties of stopping Homeless Persons of Mass Destruction. It would be in the interest of everyone to stop these evil tunnel dwellers hell-bent on taking over civil liberties and freedoms from us Patriotic citizens. I hereby vote to establish "People Of Real Koncern Battling Against Really Radical Enemy Losers" or PORK BARREL for short. If only the government would allocate say two percent of social security programs, and other non necessary programs like Medicaid (we all know old people don't really need meds anyway), we could stop another attack on our good old nation's infrastructure. Where is Kerik when we needed him most out here? How dare he run around doing the hanky panky. He has hisself some tErrorists to stop. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D sil @ politrix . org http://www.politrix.org sil @ infiltrated . net http://www.infiltrated.net "How a man plays the game shows something of his character - how he loses shows all" - Mr. Luckey 10778 From: E. Charles Sterling Date: Wed Jan 26, 2005 11:42am Subject: RE: [tscm] Government Admits Terrorist Threat Warning was Bogus (again) Clearly this is not on target with TSCM business yet it has been global business for a week or so there is additional data and hopefully also the end of a bad rumor. As "a proud member of the InfraGard" the nature of this type of bogus report (one for revenge) is one that is too common and one that plays directly into the hands of actual terrorists. There are too many issues with false or customized reports getting into the mainstream press w/o something as vain as revenge fueling the situation. This issue was started by ONE individual and at every step of the way has been identified as not having facts associated to this group of Chinese nationals much less anything to do with terrorism. One thing to keep in mind, regarding the nature of feeding such propaganda, this is how the terrorist will, can and have caused the world great grief and expense - the simple spreading of rumor. Due to today's internet technology this situation can span the globe in minutes and take weeks to bring to some closure. I've been watching the text on this issue all week and I'm glad to say that it now seems to be reaching an end. From my view point, the person that started this issue should be spending time in the Cross Bars Motel (feed by the FBI) for enacting such public deceit. cheers, charles sterling -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, January 26, 2005 1:51 AM To: TSCM-L Subject: [tscm] [TSCM-L] Government Admits Terrorist Threat Warning was Bogus (again) Once again, DHS falls flat on their face, and whips up hysteria about a bogus terror threat which just conveniently coincided with the inauguration. -jma Authorities debate whether to make terror threats public By Associated Press Tuesday, January 25, 2005 BOSTON - A call from an anonymous tipster that 16 people were planning a terror attack on Boston prompted officials to warn the public and step up security. Patrols were increased at Logan International Airport and on the city's transit system. Vehicles were searched in underground parking garages. Gov. Mitt Romney [related, bio] skipped President George W. Bush's inauguration in Washington to return to Boston. All this for what authorities now say may have been an act of revenge by a human smuggler trying to get back at people who failed to pay him. The tipster has since been detained and was being questioned by authorities trying to get to the bottom of his motivation. The idea of reporting people to the government to exact revenge is nothing new. But with the heightened fear of terrorism, authorities have to decide when to warn the public and when to investigate quietly without making the threat public. ``Every day there comes to the various agencies within the U.S. government hundreds - thousands - of reports of everything from Martians having landed in Nevada to someone who just had a conversation with Elvis to terrorists coming with a nuclear bomb to Boston,'' said Graham T. Allison, an assistant defense secretary in the first Clinton administration. ``It's one of those situations where you're kind of damned if you do and damned if you don't,'' said Allison, now a professor of government at the John F. Kennedy School of Government at Harvard University. Most recently, a tipster called into the California Highway Patrol on Jan. 17, claiming that four Chinese nationals - two men and two women - and two Iraqi nationals entered the United States from Mexico and were awaiting a shipment of nuclear material that would follow them to Boston. The implication was that the group was plotting to detonate a radioactive ``dirty bomb'' that spews hazardous material and can sicken or kill people. The list of possible terror suspects later grew to 16, and authorities have said they are investigating whether the tip was a false one by a caller with a grudge after smuggling them across the border. U.S. Attorney Michael Sullivan said that the vast majority of anonymous tips received by authorities are not made public in an attempt to prevent panic. But authorities sometimes go public with a threat, he said, out of a concern for public safety or if they believe the public could help in the investigation. Sullivan told The Associated Press that authorities still have found no evidence of terror motives and nothing to corroborate the tipster's claims. He said the investigation is still ongoing and the smuggling scenario ``is within the range of possibilities.'' Matthew Evangelista, a professor of international relations at Cornell University, said the idea of turning people in as suspects out of revenge goes back to long before terrorism became a major concern. He said warning the public about a threat before it is thoroughly investigated can cause undue panic and may even cause people to be desensitized about the threat of terrorism. ``I think it breeds a kind of cynicism on the part of the public. ... People become maybe less willing to believe the threats when they are actually real,'' Evangelista said. ``The other risk it creates is a climate of suspicion, especially if people are identified by racial or ethnic characteristics. I think that's a danger officials need to think about when they issue these kinds of alerts.'' In the alleged terror threat against Boston, federal authorities went public after state and local law enforcement agencies took steps to increase security, and reports about the threat were leaked to the media. The FBI released the photographs of the four Chinese nationals and later released the names, some passport numbers and possible birth dates for nine other Chinese and one Hispanic man they said were wanted for questioning. No information has been released about the two Iraqis who were said to have been involved. ``It became apparent that the information was already in the public domain and there was significant risk that without making some kind of public statement, there was considerable risk of this being blown out of proportion and causing panic,'' Sullivan said. This past weekend, the FBI said one of the 16 people sought for questioning has been in U.S. custody for more than two months and has no terrorist connection. Sullivan noted that authorities emphasized from the beginning that they had been unable to corroborate the claims of the tipster. ``It's a constant challenge of the part of law enforcement because they have to respond as if each of these are potential real threats even though you recognize that the vast majority of them are going to be washed out,'' he said. ``The biggest fear you have if you didn't address it as a real threat is that you're going to miss an opportunity to prevent (something) from happening.'' -------------------------------------------------------------------------- -------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- -------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- -------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- -------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10779 From: kondrak Date: Wed Jan 26, 2005 3:41pm Subject: Re: Re: Fire closes New York subway line Dont forget all the lavish $500,000 parties the DHS (or whatever obscure acronym agency this will be called) people can scam off all that cash flowing by....and of course, the Carlyles and Haliburton's will be so much better off allow bigger bribes. At 03:07 1/26/2005, you wrote: > > If they are not capable of stopping something as simple as a shopping > > cart how are they going to stop an actual terrorist attack. > > >The answer to this is simple. The United States simply needs another >neatly acronymed agency to carry out the dangerous, perilous, devious >duties of stopping Homeless Persons of Mass Destruction. > >It would be in the interest of everyone to stop these evil tunnel dwellers >hell-bent on taking over civil liberties and freedoms from us Patriotic >citizens. I hereby vote to establish "People Of Real Koncern Battling >Against Really Radical Enemy Losers" or PORK BARREL for short. If only the >government would allocate say two percent of social security programs, and >other non necessary programs like Medicaid (we all know old people don't >really need meds anyway), we could stop another attack on our good old >nation's infrastructure. > >Where is Kerik when we needed him most out here? How dare he run around >doing the hanky panky. He has hisself some tErrorists to stop. > > >=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ >J. Oquendo >GPG Key ID 0x51F9D78D >Fingerprint 2A48 BA18 1851 4C99 > >CA22 0619 DB63 F2F7 51F9 D78D >http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D > >sil @ politrix . org http://www.politrix.org >sil @ infiltrated . net http://www.infiltrated.net > >"How a man plays the game shows something of his >character - how he loses shows all" - Mr. Luckey > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10780 From: kondrak Date: Wed Jan 26, 2005 3:43pm Subject: RE: [tscm] Government Admits Terrorist Threat Warning was Bogus (again) problem IS, realistically, each and every single threat of this type MUST be analyzed. Them wascally terrorists don't bother to file their plans beforehand, so some times you actually gotta leave the office and go on a road trip. At 12:42 1/26/2005, you wrote: >Clearly this is not on target with TSCM business yet it has been global >business for a week or so there is additional data and hopefully also the >end of a bad rumor. > > >As "a proud member of the InfraGard" the nature of this type of bogus report >(one for revenge) is one that is too common and one that plays directly into >the hands of actual terrorists. > >There are too many issues with false or customized reports getting into the >mainstream press w/o something as vain as revenge fueling the situation. >This issue was started by ONE individual and at every step of the way has >been identified as not having facts associated to this group of Chinese >nationals much less anything to do with terrorism. > >One thing to keep in mind, regarding the nature of feeding such propaganda, >this is how the terrorist will, can and have caused the world great grief >and expense - the simple spreading of rumor. > >Due to today's internet technology this situation can span the globe in >minutes and take weeks to bring to some closure. I've been watching the >text on this issue all week and I'm glad to say that it now seems to be >reaching an end. > > From my view point, the person that started this issue should be spending >time in the Cross Bars Motel (feed by the FBI) for enacting such public >deceit. > >cheers, >charles sterling > > > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > Sent: Wednesday, January 26, 2005 1:51 AM > To: TSCM-L > Subject: [tscm] [TSCM-L] Government Admits Terrorist Threat Warning was >Bogus (again) > > > > Once again, DHS falls flat on their face, and whips up hysteria about a > bogus terror threat which just conveniently coincided with the >inauguration. > > -jma > > > > Authorities debate whether to make terror threats public > By Associated Press > Tuesday, January 25, 2005 > > BOSTON - A call from an anonymous tipster that 16 people were planning a > terror attack on Boston prompted officials to warn the public and step up > security. > > Patrols were increased at Logan International Airport and on the > city's transit system. Vehicles were searched in underground parking > garages. Gov. Mitt Romney [related, bio] skipped President George W. >Bush's > inauguration in Washington to return to Boston. > > All this for what authorities now say may have been an act of > revenge by a human smuggler trying to get back at people who failed to pay > him. The tipster has since been detained and was being questioned by > authorities trying to get to the bottom of his motivation. > > The idea of reporting people to the government to exact revenge is > nothing new. But with the heightened fear of terrorism, authorities have >to > decide when to warn the public and when to investigate quietly without > making the threat public. > > ``Every day there comes to the various agencies within the U.S. > government hundreds - thousands - of reports of everything from Martians > having landed in Nevada to someone who just had a conversation with Elvis > to terrorists coming with a nuclear bomb to Boston,'' said Graham T. > Allison, an assistant defense secretary in the first Clinton >administration. > > ``It's one of those situations where you're kind of damned if you >do > and damned if you don't,'' said Allison, now a professor of government at > the John F. Kennedy School of Government at Harvard University. > > Most recently, a tipster called into the California Highway Patrol > on Jan. 17, claiming that four Chinese nationals - two men and two women - > and two Iraqi nationals entered the United States from Mexico and were > awaiting a shipment of nuclear material that would follow them to Boston. > The implication was that the group was plotting to detonate a radioactive > ``dirty bomb'' that spews hazardous material and can sicken or kill >people. > > The list of possible terror suspects later grew to 16, and > authorities have said they are investigating whether the tip was a false > one by a caller with a grudge after smuggling them across the border. > > U.S. Attorney Michael Sullivan said that the vast majority of > anonymous tips received by authorities are not made public in an attempt >to > prevent panic. But authorities sometimes go public with a threat, he said, > out of a concern for public safety or if they believe the public could >help > in the investigation. > > Sullivan told The Associated Press that authorities still have >found > no evidence of terror motives and nothing to corroborate the tipster's > claims. He said the investigation is still ongoing and the smuggling > scenario ``is within the range of possibilities.'' > > Matthew Evangelista, a professor of international relations at > Cornell University, said the idea of turning people in as suspects out of > revenge goes back to long before terrorism became a major concern. He said > warning the public about a threat before it is thoroughly investigated can > cause undue panic and may even cause people to be desensitized about the > threat of terrorism. > > ``I think it breeds a kind of cynicism on the part of the public. > ... People become maybe less willing to believe the threats when they are > actually real,'' Evangelista said. ``The other risk it creates is a >climate > of suspicion, especially if people are identified by racial or ethnic > characteristics. I think that's a danger officials need to think about >when > they issue these kinds of alerts.'' > > In the alleged terror threat against Boston, federal authorities > went public after state and local law enforcement agencies took steps to > increase security, and reports about the threat were leaked to the media. > > The FBI released the photographs of the four Chinese nationals and > later released the names, some passport numbers and possible birth dates > for nine other Chinese and one Hispanic man they said were wanted for > questioning. No information has been released about the two Iraqis who >were > said to have been involved. > > ``It became apparent that the information was already in the public > domain and there was significant risk that without making some kind of > public statement, there was considerable risk of this being blown out of > proportion and causing panic,'' Sullivan said. > > This past weekend, the FBI said one of the 16 people sought for > questioning has been in U.S. custody for more than two months and has no > terrorist connection. > > Sullivan noted that authorities emphasized from the beginning that > they had been unable to corroborate the claims of the tipster. > > ``It's a constant challenge of the part of law enforcement because > they have to respond as if each of these are potential real threats even > though you recognize that the vast majority of them are going to be washed > out,'' he said. > > ``The biggest fear you have if you didn't address it as a real > threat is that you're going to miss an opportunity to prevent (something) > from happening.'' > > > > > > -------------------------------------------------------------------------- >-------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------- >-------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: >http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------- >-------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------- >-------------------------- > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > >---------------------------------------------------------------------------- >-- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10781 From: kondrak Date: Wed Jan 26, 2005 3:47pm Subject: Hellova way to run a railroad... Has anyone else drawn the dots between the not so subtile warnings of attacks on the rail infrastructure, a bum burning down the NYC subway, a botched suicide derailing commuter trains in Ca. to the tune of 10 dead? Whats next? greyhounds driving off bridges? Or should I have sold my stock in the Reading railroad and Short Line sooner? 10782 From: A Grudko Date: Wed Jan 26, 2005 4:26pm Subject: RE: Fire closes New York subway line -----Original Message----- From: kondrak [mailto:kondrak@s...] > Of course, the mob, thug, union people don't work until they are paid off to do so, (with overtime, and bribes to their thug hierarchy) so three years might be realistic. this is typical for NYC and other places where the mob's are in control. How about when the Marines get back from Iraq they implement regime change in NYC and other places where the mob are in control by wiping out the hard-core union people. -----Original Message----- From: kondrak [mailto:kondrak@s...] > Think it has more to do with our troops wiping out over 1200 of hard-core Jihadi's in Faluja. You know of course that all the homeless people received a coded warning signal to clear the subway just before the fire. And that the guy that they suspect started it was 'fired' from the CIA just after 9/11 and that his family were secretly flown out of there to a secret underground soup kitchen in Florida. Transit police recovered a singed map of the NY subway system and a partially burned trench coat of the type seen in spy movies, which according to a highly paid former general now consulting for the city 'could be used to hide things under'. Andy G ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10783 From: Tim Johnson Date: Wed Jan 26, 2005 3:24pm Subject: New to the list I wish to say hello and introduce myself to the list. I am Tim Johnson, located in the Atlanta, GA area and have just finished my fifth TSCM sweep. I think I'm now considered an expert. Let me know if i can help in any way. tim Actually, I've been around TSCM since 1972. -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10784 From: A Grudko Date: Wed Jan 26, 2005 5:22pm Subject: Humour Re: Fire closes New York subway line -----Original Message----- From: J. Oquendo [mailto:sil@p...] > The answer to this is simple. The United States simply needs another neatly acronymed agency to carry out the dangerous, perilous, devious duties of stopping Homeless Persons of Mass Destruction. After an all-night session at Crawford Ranch President Bush has announced the establishment of a new agency to fight crime and terror on US subways. The Federal Underground Constabulary will follow the template of the FBI from the administrative top down to specially trained paramilitary officers who will be on stand-by to storm trains, tunnel and stations, equipped with HKMP5 submachine guns, Glock pistols and black body armour emblazoned with the letters FUC. In the event of accidents they will be supported by FUC Emergency Rescue Specialists. The President said that the motto of the new agency is yet to be decided on but 'Don't mess with us' was an early suggestion by Condi Rice. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10785 From: James M. Atkinson Date: Wed Jan 26, 2005 5:45pm Subject: Prince Nawaf Fingered as CIA Asset in Saudi The story is just developing, but it looks like Prince Nawaf was fingered this week as a major CIA asset in Saudi Arabia much to the chagrin of the Saudi Royal Family. He was immediately removed from his position pending results of the internal investigation and stripped of all of his access, and it does not look good for him. If initial reports are The House of Saud is recalling a ton of diplomatic folks from the New York and Washington area, and a number of "cousins" studying abroad have taken missing in the past few days. Sixteen feet of blue plastic will be laid down as a result and heads will be rolling in the public square or car park next Friday. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10786 From: satcommunitfive Date: Wed Jan 26, 2005 6:45pm Subject: Re: Police probe Nicole Kidman 'bug' great a FM bug listening to worms in the grass -and probably wind real useful ! and they said hi tech on the telly ! --- In TSCM-L@yahoogroups.com, James Greenwold wrote: > Imagine probing Nicole Kidman > > > From: "James M. Atkinson" > > Reply-To: TSCM-L@yahoogroups.com > > Date: Tue, 25 Jan 2005 13:50:32 -0500 > > To: TSCM-L > > Subject: [TSCM-L] Police probe Nicole Kidman 'bug' > > > > > > > > http://www.cnn.com/2005/WORLD/asiapcf/01/25/aus.kidman.reut/index.htm l > > > > Police probe Nicole Kidman 'bug' > > > > SYDNEY, Australia (Reuters) -- Police were investigating a possible bugging > > attempt on Australian actress Nicole Kidman after a listening device was > > found across the road from her Sydney harborside home. > > > > "At the time this device was found there were media paparazzi, if I may use > > that term, in the street," police inspector Grant Taylor told reporters > > Tuesday. > > > > Police had notified the Oscar-winning Hollywood star of the discovery of > > the device, Taylor said. > > > > "She is undoubtedly concerned in regards to why this device may have been > > placed there and if she is the potential target of this device," he said. > > > > The Daily Telegraph newspaper reported that security footage shot from > > Kidman's home showed a man planting the listening device on Sunday, shortly > > after she returned home to prepare for a new film, "Eucalyptus," based on > > an Australian novel of that name. > > > > "We have conclusive evidence that it was planted and this has been captured > > on video," Noel McMaster, director of Kidman's personal security agency, > > told the newspaper. > > > > "There is no doubt that any information that we were transmitting would > > have been heard," he said. > > > > Police said the listening device was commonly available in electronics > > stores and was being examined by police. > > > > It was not the first time Kidman has been at the center of a bugging scandal. > > > > In 1999, a freelance journalist was convicted in the United States of > > illegally taping an intercepted telephone call from Kidman to her then > > husband, actor Tom Cruise, and selling the tape to a tabloid newspaper. > > > > The tabloid newspaper said a woman's voice on the tape could be heard > > telling a man that their marriage was "hanging by a thread." The couple's > > 10-year marriage ended in 2001. > > > > > > > > > > > > > > > > ----------------------------------------------------------------- ------------- > > ---------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > > ----------------------------------------------------------------- ------------- > > ---------------------- > > James M. Atkinson Phone: (978) 546- 3803 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > > ----------------------------------------------------------------- ------------- > > ---------------------- > > World Class, Professional, Ethical, and Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > > ----------------------------------------------------------------- ------------- > > ---------------------- > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > 10787 From: contranl Date: Wed Jan 26, 2005 8:57pm Subject: Adaptive beamforming demo ( electronic directional mic ) . Here is another demo of "adaptive beamforming" used to electronically steer a microphone's direction In radio this is called "phased array" http://www.plansys.com/Content/ContentGroups/Products1/Sensors1/HAB1/ HAB_Audio_Demonstration.htm Others make specialised units that use up to 99 mics these units could be used in "covert investigations" One of them is called "Spotmic" By the way the above company also produces the so called "Gunshot-Detector" wich is hooked up to a (wireless)network and processed at a control-center where the location of shootings can be calculated using what they call "time of arrival techniques" After thinking very hard of how they do that...i realise that this is not really "Time Of Arrival" as we know it in radio... but instead every unit sends a timestamp with the signal i guess that must be derived from a GPS receiver. They also come hidden in traffic lights. Those traffic lights also contain a steerable video-camera The traffic-lights are made with LED's and the light beam can be electronically steered also ! (again with adaptive beamforming...i did'nt know you could do that with light also !) Very sophisticated stuff with a combination of different techniques ...imagine that they need a lot of them to make it work. They can also be used as car-accident-sound-detectors ...is what they say...they don't work as "Big Brother mics" :) :) ... :( :( ? Tetrascanner www.tetrascanner.com 10788 From: kondrak Date: Wed Jan 26, 2005 9:16pm Subject: Re: New to the list Welcome to the list Tim... At 16:24 1/26/2005, you wrote: >I wish to say hello and introduce myself to the list. > >I am Tim Johnson, located in the Atlanta, GA area and have just >finished my fifth TSCM sweep. I think I'm now considered an expert. > > >Let me know if i can help in any way. > >tim >Actually, I've been around TSCM since 1972. >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell > >What you say in private is your business. Keeping it private is ours. > >Georgia License # PDC 002074 Technical Security Consultants Inc. >Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations >Special Agents-Technical Agent >http://www.dbugman.com > >This e-mail is intended for the use of the addressee(s) only and may >contain privileged confidential, or proprietary information that is >exempt from disclosure under law. If you have received this message >in error, please inform us promptly by reply e-mail, then delete the >e-mail and destroy any printed copy. > >Neither this information block, the typed name of the sender, or >anything else in this message is intended to constitute an electronic >signature for purposes of the Uniform Electronic Transactions Act or >the Electronic Signatures in Global and National Commerce Act >(E-Sign) unless a specific statement to the contrary is included in >this message. > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10789 From: kondrak Date: Wed Jan 26, 2005 9:22pm Subject: RE: Fire closes New York subway line Well, as long as the Republicans are still in power, that stands a chance. However, the mobsters will in all likelyhood be replaced with people from foreign lands who dont bathe and smell like patchouli oil, for they will work for 1/10th what Americans will work for. Never mind the trains wind up on the bottom of the East river due to their incompetence, look at all the money we are saving. At 17:26 1/26/2005, you wrote: > -----Original Message----- > From: kondrak [mailto:kondrak@s...] > > > Of course, the mob, thug, union people don't work until they are > paid off to do so, (with overtime, and bribes to their thug hierarchy) so > three years might be realistic. this is typical for NYC and other places > where the mob's are in control. > > How about when the Marines get back from Iraq they implement regime change >in NYC and other places where the mob are in control by wiping out the >hard-core union people. 10790 From: contranl Date: Wed Jan 26, 2005 10:07pm Subject: "Sound of Voices" ?????? . Here's the manufacturer of previous traffic-cams with "gunshot-detectors" talking in this video: http://www.optisoftinc.com/wmv11.asx ??? Do i hear what i hear ???? Is the man saying " THE SOUND OF VOICES " what voices...who's voices ? storing ? Now you probably say "he's saying the SOUND of" ...wich is not the contents...in other words not what actually is being said. I like to know what that is for ...why you want to "detect" voices in the middle of a roadcrossing? In other reports they said it can't (wont ?) be used for that ... why the man says that now ? not very clever if you don't want to raise suspect. Tetrascanner 10791 From: wiggyyy2000 Date: Thu Jan 27, 2005 7:23am Subject: Re: New to the list welcome and have a great time --- In TSCM-L@yahoogroups.com, Tim Johnson wrote: > > I wish to say hello and introduce myself to the list. > > I am Tim Johnson, located in the Atlanta, GA area and have just > finished my fifth TSCM sweep. I think I'm now considered an expert. > > > Let me know if i can help in any way. > > tim > Actually, I've been around TSCM since 1972. > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may > contain privileged confidential, or proprietary information that is > exempt from disclosure under law. If you have received this message > in error, please inform us promptly by reply e-mail, then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of the sender, or > anything else in this message is intended to constitute an electronic > signature for purposes of the Uniform Electronic Transactions Act or > the Electronic Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in > this message. 10792 From: Nalesnik, Matthew Date: Thu Jan 27, 2005 7:53am Subject: RE: Fire closes New York subway line Getting rid of useless, socialist unions!! -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Wednesday, January 26, 2005 5:27 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Fire closes New York subway line -----Original Message----- From: kondrak [mailto:kondrak@s...] > Of course, the mob, thug, union people don't work until they are paid off to do so, (with overtime, and bribes to their thug hierarchy) so three years might be realistic. this is typical for NYC and other places where the mob's are in control. How about when the Marines get back from Iraq they implement regime change in NYC and other places where the mob are in control by wiping out the hard-core union people. -----Original Message----- From: kondrak [mailto:kondrak@s...] > Think it has more to do with our troops wiping out over 1200 of hard-core Jihadi's in Faluja. You know of course that all the homeless people received a coded warning signal to clear the subway just before the fire. And that the guy that they suspect started it was 'fired' from the CIA just after 9/11 and that his family were secretly flown out of there to a secret underground soup kitchen in Florida. Transit police recovered a singed map of the NY subway system and a partially burned trench coat of the type seen in spy movies, which according to a highly paid former general now consulting for the city 'could be used to hide things under'. Andy G ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10793 From: Nalesnik, Matthew Date: Thu Jan 27, 2005 8:29am Subject: RE: Humour Re: Fire closes New York subway line Isn't it typical of us Americans to be so cynical sometimes, and whine like a bunch of little toddler girls instead of ever doing anything to actually make a change for the better? It's even better when it's not an American doing it, but that's a whole 'nother topic, I suppose... You're just jealous cuz our country's better than yours. Thank God above for the First Amendment, for without it, we'd never know some of the exemplary ideas that exist to make our country even better, and safer, and more efficient - at least, according to our opine, anyway. And dare anyone try and seize that right to Free Speech from us? Well, we'll just whine you to death! "Take that... 'Tis but a flesh wound... I've had worse!" (to paraphrase...) In lieu of the following short article, have we hit apathy yet? - - - BEGIN - - - In 1787 when our original 13 colonies were still part of England, Professor Alexander Tyler (a Scottish history professor at the University of Edinburgh) wrote about the fall of the Athenian republic over 2,000 years prior. "A democracy cannot exist as a permanent form of government. It can only exist until the voters discover that they can vote themselves money from the public treasure. From that moment on the majority always votes for the candidates promising the most money from the public treasury, with the result that a democracy always collapses over loose fiscal policy followed by a dictatorship. The average age of the world's great civilizations has been 200 years. These nations have progressed through the following sequence: From bondage to spiritual faith; from spiritual faith to great courage; from courage to liberty; from liberty to abundance; from abundance to selfishness; from selfishness to complacency; from complacency to apathy; from apathy to dependence; from dependence back into bondage. - - - END - - - No, we're not technically a "Democracy", we're a Constitutional Republic, but the preceding text still holds true. And it will see itself self-evident as long as we have more whiners than doers. If it's broke, then fix it - you as an American citizen actually do have that power. And fortunately for most, you also have the power to whine just enough to not really be heard, but at least you can piss off the people who don't agree with you. God Bless. -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Wednesday, January 26, 2005 6:22 PM -----Original Message----- From: J. Oquendo [mailto:sil@p...] > The answer to this is simple. The United States simply needs another neatly acronymed agency to carry out the dangerous, perilous, devious duties of stopping Homeless Persons of Mass Destruction. After an all-night session at Crawford Ranch President Bush has announced the establishment of a new agency to fight crime and terror on US subways. The Federal Underground Constabulary will follow the template of the FBI from the administrative top down to specially trained paramilitary officers who will be on stand-by to storm trains, tunnel and stations, equipped with HKMP5 submachine guns, Glock pistols and black body armour emblazoned with the letters FUC. In the event of accidents they will be supported by FUC Emergency Rescue Specialists. The President said that the motto of the new agency is yet to be decided on but 'Don't mess with us' was an early suggestion by Condi Rice. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- [Non-text portions of this message have been removed] 10794 From: Loy Chapman Date: Thu Jan 27, 2005 8:40am Subject: Re: "Sound of Voices" ?????? We cannot smoke in the USA and now one cannot smoke in in the pubs in Ireland. As personal freedoms slowly go away it is only a matter of time before we have no rights to privacy. The manufacturer is getting prepared for that day when the government can and will follow a citizen's every move. Orwell's "1984" just took a little longer. LDC --- contranl wrote: > > . > > > Here's the manufacturer of previous traffic-cams > with > "gunshot-detectors" talking in this video: > > > http://www.optisoftinc.com/wmv11.asx > > > ??? Do i hear what i hear ???? > > Is the man saying " THE SOUND OF VOICES " > > what voices...who's voices ? > storing ? > > > Now you probably say "he's saying the SOUND of" > ...wich is not the > contents...in other words not what actually is being > said. > > I like to know what that is for ...why you want to > "detect" voices > in the middle of a roadcrossing? > > In other reports they said it can't (wont ?) be used > for that ... > why the man says that now ? not very clever if you > don't want to > raise suspect. > > Tetrascanner > > > > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10795 From: Mildred Young Date: Thu Jan 27, 2005 10:05am Subject: Counter-Surveillance? I have video surveillance cameras installed, however it seems that I am still being vandalized without capturing it on my Lorex system....any suggestions? The police think I am nuts, I need help! I don't want to continue to be a victim in Phoenix, AZ Thanks [Non-text portions of this message have been removed] 10796 From: G P Date: Thu Jan 27, 2005 10:20am Subject: Re: "Sound of Voices" ?????? Speaking of traffic control devices in Ireland, it's interesting how they've outfitted each of the walk signs with auditory cues as well (that loud "hurry up and walk across the street" sound). Seems that the Irish were a bit harder to colonialize than most. With the FBI's recent move to decommission Carnivore/DCS-1000, it's very apparent what's happening - corporations are now empowered with surveillance capabilities, and are being encouraged by the feds to collect and disseminate information on their customers - state sponsored corporatism. --- Loy Chapman wrote: > We cannot smoke in the USA and now one cannot smoke > in > in the pubs in Ireland. As personal freedoms slowly > go away it is only a matter of time before we have > no > rights to privacy. The manufacturer is getting > prepared for that day when the government can and > will > follow a citizen's every move. Orwell's "1984" just > took a little longer. > > LDC > --- contranl wrote: > > > > > . > > > > > > Here's the manufacturer of previous traffic-cams > > with > > "gunshot-detectors" talking in this video: > > > > > > http://www.optisoftinc.com/wmv11.asx > > > > > > ??? Do i hear what i hear ???? > > > > Is the man saying " THE SOUND OF VOICES " > > > > what voices...who's voices ? > > storing ? > > > > > > Now you probably say "he's saying the SOUND of" > > ...wich is not the > > contents...in other words not what actually is > being > > said. > > > > I like to know what that is for ...why you want to > > "detect" voices > > in the middle of a roadcrossing? > > > > In other reports they said it can't (wont ?) be > used > > for that ... > > why the man says that now ? not very clever if > you > > don't want to > > raise suspect. > > > > Tetrascanner > > > > > > > > > > > > > > > > > > > __________________________________ > Do you Yahoo!? > The all-new My Yahoo! - What will yours do? > http://my.yahoo.com > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > In low income neighborhoods, 84% do not own > computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10797 From: taylortscm@y... Date: Thu Jan 27, 2005 11:05am Subject: RE: Marty Kaiser john if you will look at marty's site you will see he no longer sells any equipment. if your interested I have a 2050ca w/frequency extender and antenna (2050log) good to 20+ ghz that I will part with for $2500.00 in like new condition. dan taylor group The Price's wrote: I sent a email to Marty Kaiser about a week ago and so far no response, I would like to make a purchase of one of the items he indicates he still manufactures a 2050CA and a 1059 countermeasures amp. Does anyone have any info on Marty, should I try giving him a phone call. Also I am interested in purchasing a second CPM-700 REI unit only, I have all the probes, two of most and want to purchase just the receiver, if someone has a used unit let me know. John ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. From: Miguel Puchol Date: Sat Jan 27, 2001 2:46pm Subject: RE: Fire authorities in California.... We had a case here in Spain, to which I was testimony. I think though that it's more possible that something like this happen with a seaplane, than with a helicopter. Choppers pick up about 1.000 liters of water, with a standard scoop, and usually sound a horn when near the surface to warn possible bystanders. In this case, the diver should have been in shallow water, a bit deaf, and not very agile, as he could have grabbed onto the basket to avoid getting dropped onto the fire... Cheers, Mike > -----Mensaje original----- > De: Chris Childs [mailto:childschris@h...] > Enviado el: sabado, 27 de enero de 2001 19:26 > Para: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Fire authorities in California.... > > > This sounds like an urban legend to me. First off, I couldn't > find a paper > called the "California Examiner". Second I found this web site: > > http://www.urbanlegends.com/death/scuba_forest_fire.html > > James M. Atkinson, Comm-Eng" wrote, > > > > > > >Fire authorities in California found a corpse in a burned out section of > >forest while assessing the damage done by a forest fire..The > deceased male > >was dressed in a full wet suit, complete with SCUBA tanks on his back, > >flippers, and face mask. A post-mortem revealed that the person died not > >from burns, but from massive internal injuries. Dental records > provided a > >positive identification. Investigators then set about to determine how a > >fully clad diver ended up in the middle of a forest fire.. > >It was revealed that, on the day of the fire, the person went > for a diving > >trip off the coast some 20 miles away from the forest. The firefighters, > >seeking to control the fire as quickly as possible, called in a fleet of > >helicopters with very large dip buckets. > >Water was dipped from the ocean then flown to the forest fire and > >emptied..You guessed it. One minute our diver was making like Flipper in > >the Pacific, the next he was doing the breast stroke in a fire dip bucket > >300 feet in the air. Apparently he extinguished exactly 5'-10" of the > >fire. > >Some days it just doesn't pay to get out of bed! > > > >This article was taken from the California Examiner, March 20, 1998 > >-- > > > > > ======================================================================= > > Sed quis custodiet ipsos Custodes? > > "In a time of universal deceit, telling the > > truth is a revolutionary act" - George Orwell > > > ======================================================================= > > James M. Atkinson Phone: (978) 381-9111 > > Granite Island Group Fax: > > 127 Eastern Avenue #291 http://www.tscm.com/ > > Gloucester, MA 01931-8008 jmatk@tscm.com > > > ======================================================================= > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > > Technical Security, and Counterintelligence Site on the Internet. > > > ======================================================================= > > > > _________________________________________________________________________ > Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2403 From: James M. Atkinson, Comm-Eng Date: Mon Jan 29, 2001 5:06am Subject: Nurses' spy camera fears Nurses' spy camera fears http://www.thisisbrighton.co.uk/brighton__hove/news/NEWS0.html by David Wells A nurse is demanding to know whether she was filmed naked by a camera found hidden in a shampoo bottle in a shared bathroom. She and her colleagues have not been told if images of them undressing for a bath were recorded by the camera, discovered in nurses' lodgings at Brighton General Hospital. Their greatest fear is that intimate pictures could be passed on to others or even put on the internet. A doctor employed by another hospital, who was staying in Brighton while attending a conference, is under police investigation after a device was found hidden in a large bottle of Head and Shoulders in a bathroom shared by up to 22 male and female nurses. Accident and emergency nurse Joe Cidoni, 40, discovered the device when he tried to use some of the shampoo and heard the bottle give a clicking noise. He spotted a pinhole in a side of the bottle and inside found a wireless miniature camera. Police searched the block, owned by Brighton Health Care NHS Trust, and found videotapes and technical equipment in a nearby room. One of Mr Cidoni's colleagues, who also lives in the hospital block in Elm Grove, Brighton, yesterday complained neither Brighton Healthcare NHS Trust nor the police had told them what was captured on the film. The 23-year-old, who did not wish to be named, said she was sickened by the thought someone could have spied on her as she undressed. She and many other nurses of both sexes in the housing block were demanding to know what was on the film and who had access to it. She said: "There has been no communication from the trust or the police. No one has come back to us to tell us what is going on or what has been filmed, if anything. "We got letters pushed through our doors the day after from occupational health offering us counselling but we just wanted to know what was going on. Everyone is feeling unnerved and paranoid. We all talking about what the camera might have filmed and what happened after that. "Was there any access to the internet? Could it have been sent round the world? "You just worry that you are going to appear in some porn film or something like that. You just keep thinking 'Was the bottle in there when I was in there?' "We all recall seeing a Head and Shoulders bottle, but maybe that is just because once the idea is in your head you convince yourself you have seen it. "Everybody is still checking the bathrooms for bottles. If anybody leaves anything in there now like shampoo it just gets thrown away." A spokesman for the trust said: "The thought that people have been into the bathroom and filmed whilst naked, something quite understandably private, is very upsetting for them. "This is particularly upsetting if you come from a different culture - there are all kinds of religious issues. "Some are young and perhaps away from home for the first time. It is offensive to them. "We are offering access to counselling. They have all been sent an individual letter." He said security at the hospital was repeatedly reviewed but no amount of security would be able to prevent someone taking their own camera into the block. No officers dealing with the investigation were available for comment but Detective Sergeant Baz Bazyluk, at Brighton police, said: "We always try to keep victims up to date as a matter of policy. Of course we will inform them of any developments in due course." Sussex Police have launched an investigation into the incident. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2404 From: Robert G. Ferrell Date: Mon Jan 29, 2001 7:36am Subject: RE: DARWIN AWARDS >Is there a web site for the Darwin Awards? >http://www.nipc.gov/ Heh. You might also take a look at http://www.darwinawards.com and http://www.officialdarwinawards.com Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2405 From: Thomas H. Jones Date: Mon Jan 29, 2001 9:33am Subject: NLJD and EOD > Date: Fri, 26 Jan 2001 09:29:52 -0500 > From: Rob Muessel >Subject: Re: Digest Number 492 - NLJD Issues >In closing, regardless of which NJD might be used for EOD applications, >there is no way I'd want to be the guy who is holding onto the antenna. >att least not without my earplugs. I greatly appreciate your comments and agree. About two years ago, Dean La Vey from the UK wrote an article in the magazine INTERSEC about using NLJD's for EOD. He basically said this is not a good idea, and this is the only published article I have ever seen on the subject. Having no experience in EOD, we tend to have the same opinion regarding EOD. Whereas most NLJD manufacturers advertise their NLJD for EOD, you will never find any advertising material from REI suggesting that the ORION be used for EOD. We, of course believe that our unit is the best in the world, but I don't have access to all types of landmines and if I did, we still would not be conducting the tests. I don't know how other small manufacturers can make these claims in advertising without documented tests results. My product liability insurance is already expensive enough. Have you ever tried to explain to an insurance company what an NLJD is? Nontheless, I do know that some countries use NLJD technology just for EOD, and they have been doing it for years with success. NLJD's are also used for inspecing parcels and as a quick means of deciding whether or not to X-ray. My only hope is that the countries that use NLJD's for EOD will conduct extensive testing prior to using the device, and that they will thoroughly understand all the technical aspects and risks. My experience and fear is that they will not. Regards, Tom 2406 From: Date: Mon Jan 29, 2001 10:47am Subject: Re: Digest Number 493 Manufacturers involved in Government NLJD trials are bound by a Confidentiality Clause, I suppose those who fail to pre-qualify have nothing to lose by spreading false rumours. Unwarranted criticism of competitors equipment, by any manufacturer, does little to convince potential users that your kit is any good! I can confirm that the only explosion caused by Superbroom was a massive surge in Audiotel's order book. All NLJDs, particularly pulsed systems, will potentially activate certain types of target, as will mobile phones, transceivers etc. Adrian Hickey Audiotel International Ltd 2407 From: Bill Hensley Date: Mon Jan 29, 2001 1:18pm Subject: RE: Fire authorities in California.... This is a hoary urban legend. See the URL below for discussion. http://www.snopes.com/horrors/freakish/scuba.htm Cheers, Bill Bill.Hensley@t... 405.869.6170 (vox) 405.737.2043 (fax) ----------------------------------------------- >Fire authorities in California found a corpse in a burned out section of >forest while assessing the damage done by a forest fire..The deceased male >was dressed in a full wet suit, complete with SCUBA tanks on his back, [...rest removed} 2408 From: Rick Hofmann - MICROSEARCH Date: Mon Jan 29, 2001 4:57pm Subject: Icom IC-R3 The February, 2001 edition of QST magazine has a review of the Icom IC-R3 hand held receiver. It sounds like a decent piece of amateur radio equipment. My question to the groups is, has anyone tried to use the IC-R3 to view any 2.4 GHz video? Additionally, I am curious to see if anyone has any intel on the future of the IC-R3 (ie, upgrades). Very truly yours, R.C.Hofmann, CCO, CPP MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 PI16998 [Non-text portions of this message have been removed] 2409 From: James M. Atkinson, Comm-Eng Date: Mon Jan 29, 2001 5:23pm Subject: Re: Icom IC-R3 At 2:57 PM -0800 1/29/01, Rick Hofmann - MICROSEARCH wrote: >The February, 2001 edition of QST magazine has a review of the Icom IC-R3 >hand held receiver. It sounds like a decent piece of amateur radio >equipment. My question to the groups is, has anyone tried to use the IC-R3 >to view any 2.4 GHz video? Additionally, I am curious to see if anyone has >any intel on the future of the IC-R3 (ie, upgrades). > >Very truly yours, > >R.C.Hofmann, CCO, CPP >MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage >Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: >714-209-0037 >PI16998 Rick, I personally own and use several R-3's but would suggest that you use a VBA-2400 as the sensitivity is fairly bad above 1.1 GHz on the R-3 (too much conversion loss, and not enough preamp). Using the VBA I can reliable lock onto a 30-50 mW Wavecom transmitter concealed inside a building (assuming of course that your within about 10 MHz of the channel). I also like the fact the you can invert the video signal and move the subcarriers around depending on your needs. The R-3 also does a great job of 433 and 900 MHz covert video as well. I like the fact that it presents the modulated audio and video to a connector for external display/recording. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2410 From: Gordon Mitchell Date: Mon Jan 29, 2001 5:39pm Subject: Re: Icom IC-R3 Don't count on too much from the R3. You can use it across the room from a Wavecom -- really poor sensitivity. Also, it only covers half of the 2.4 TV band. In case you thought you could beat this by hooking it to your spectrum analyzer IF output... they have disabled the FM TV function at that frequency. It is really not worth buying. Rick Hofmann - MICROSEARCH wrote: > > The February, 2001 edition of QST magazine has a review of the Icom IC-R3 > hand held receiver. It sounds like a decent piece of amateur radio > equipment. My question to the groups is, has anyone tried to use the IC-R3 > to view any 2.4 GHz video? Additionally, I am curious to see if anyone has > any intel on the future of the IC-R3 (ie, upgrades). > > Very truly yours, > > R.C.Hofmann, CCO, CPP > MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage > Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: > 714-209-0037 > PI16998 > > [Non-text portions of this message have been removed] > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 2411 From: James M. Atkinson, Comm-Eng Date: Mon Jan 29, 2001 6:07pm Subject: Re: Icom IC-R3 I still prefer hunting for and viewing 2.4 GHz signals with a spectrum analyzer (and a SPECTRE), but you can conceal the R-3 in your briefcase, and spin the dial though the high threat bands for a quick check before you bring out the heavy iron (ie: a 50+ pound spectrum analyzer with all the trimmings). The R3 is for a "quick and dirty" check... nothing more... nothing less... I have also found the R3 to have really bad sensitivity unless you use an amplified and highly directional antenna. -jma At 3:39 PM -0800 1/29/01, Gordon Mitchell wrote: >Don't count on too much from the R3. You can use it across the room >from a Wavecom -- really poor sensitivity. Also, it only covers >half of the 2.4 TV band. In case you thought you could beat this by >hooking it to your spectrum analyzer IF output... they have disabled >the FM TV function at that frequency. > >It is really not worth buying. > >Rick Hofmann - MICROSEARCH wrote: >> >> The February, 2001 edition of QST magazine has a review of the Icom IC-R3 >> hand held receiver. It sounds like a decent piece of amateur radio >> equipment. My question to the groups is, has anyone tried to use the IC-R3 >> to view any 2.4 GHz video? Additionally, I am curious to see if anyone has >> any intel on the future of the IC-R3 (ie, upgrades). >> >> Very truly yours, >> >> R.C.Hofmann, CCO, CPP >> MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage >> Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: >> 714-209-0037 > > PI16998 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2412 From: Steve Uhrig Date: Mon Jan 29, 2001 9:05pm Subject: Re: Icom IC-R3 Once upon a midnight dreary, Rick Hofmann - MICROSEARCH pondered, weak and weary: > My question to the groups is, has anyone tried to use the > IC-R3 to view any 2.4 GHz video? Additionally, I am curious > to see if anyone has any intel on the future of the IC-R3 (ie, > upgrades). Having sold several thousand ICOM receivers in almost 17 years of being a (former) ICOM dealer, I will mention it generally is not a good idea to get a low serial number anything from ICOM. Every single receiver they have introduced, without exception, has been significantly redesigned after the first 5000 or so guinea pig buyers beta tested the things for them. And ICOM has a well known history of not making good on design defects. The R7100 is a good example. It has so many problems they just dropped it from the line. It would be best to wait 9-12 months after any new ICOM anything hits the street before buying. The best time to buy is in March. ICOM's fiscal year ends the end of March and their most aggressive sales and dealer promotions are during the latter part of Feb and all of March. Come April 1st, that's it, all deals expire. I had an early production R3 here. It stunk. The front end overloaded easily from adjacent channel signals a substantial distance away. Much of the UHF land mobile band was corrupted by the fifteen or so 460 county repeaters six miles airline from my place. In Baltimore City in the truck, whenever a VHF paging system keyed up the receiver would lose sensitivity. I don't know where the paging system was since I didn't have a spectrum analyzer, but I expect in the low 150s, and I was trying to listen to some amateur channels in 146-147. Even watching AM broadcast video on VHF when I was almost literally in sight of the antenna in Baltimore City would show an intermittent herringbone when some other unknown signal keyed up. I was probably putting many millivolts of proper freq RF down the throat of the R3 and the AGC should have been pumped way up. Something still was killing it. You sacrifice a lot of performance for the small package. Sensitivity is cheap, and that is the only spec most people (not you Rick of course) know how to compare. Selectivity is much more important and few know how to interpret those specs. Selectivity means filters, and filters means real estate on the circuit board. There just plain isn't room for decent filtering in these tiny receivers, so they suffer severely from adjacent channel interference. I live in a remote country area and I could tell the performance was miserable. Some people confuse an overloaded receiver and adjacent channel interference pumping up the AGC with poor receiver sensitivity or a weak signal and insist on hanging larger antennas on the poor thing. This only crams more signal down the throat of the receiver and makes the problem worse. More people would be served better by attenuators than preamps. ICOM's R10, another handheld receiver with wide freq coverage, had practically nonexistent HF performance. ICOM's service bulletin advised users to connect an external HF antenna to the thing if they wanted to listen to low frequencies. Anyone able to do that would not choose a shirt pocket receiver to listen to HF, of course. A toy AM broadcast radio worked better at AM broadcast than the expensive R10. That doesn't answer the question. The R3 is a poor performer at 2.4. Antennas are a big factor up here. A 1/4 wave unity stick antenna, or some multiband wide coverage coil loaded abortion like the stock factory rubber antenna, is not effective at 2.4. Remember up here gain antennas are used to get any realistic performance, and gain antennas must by nature be directional. If you are not in the path, you will not hear well with anything. Even Wavecoms and that inexpensive class of mass produced systems have a typically 2-3 dB patch antenna. Some systems are circularly polarized which is another complicated issue. There is significant loss going from circular polarized to linear polarized. All the 2.4 systems we manufacture use circular polarized antennas, more to let me isolate separate systems by mixing right hand and left hand than for any other reason. Linear receives neither well. I do not know offhand the loss. Gordon certainly would. If you wanted to sniff 2.4, an effective cheap way is with the repackaged Wavecom using a 6dB patch antenna mounted on a pingpong paddle as I have written up and demonstrated. The good sensitivity (cheap) coupled with the poor selectivity of the Wavecom receivers (expensive) means that on one of the four channels you will see anything within the band and quite a distance outside either edge. Rich Wells has an excellent website reviewing many types of receivers. I believe he is at www.strongsignals.net. He is honest and competent. The R3 also eats batteries by the way. Impractical to use it on batteries with the video active. You will carry a lot of spare batteries and become intimate with either your charger or your battery salesman. Long answer to a short question. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2413 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 7:26am Subject: Re: Icom IC-R3 At 10:05 PM -0500 1/29/01, Steve Uhrig wrote: >Once upon a midnight dreary, Rick Hofmann - MICROSEARCH pondered, >weak and weary: > >> My question to the groups is, has anyone tried to use the >> IC-R3 to view any 2.4 GHz video? Additionally, I am curious >> to see if anyone has any intel on the future of the IC-R3 (ie, >> upgrades). > >Having sold several thousand ICOM receivers in almost 17 years >of being a (former) ICOM dealer, I will mention it generally is >not a good idea to get a low serial number anything from ICOM. >Every single receiver they have introduced, without exception, >has been significantly redesigned after the first 5000 or so >guinea pig buyers beta tested the things for them. And ICOM has >a well known history of not making good on design defects. The >R7100 is a good example. It has so many problems they just >dropped it from the line. Same problem with the R-9000, even after 10 years in production it is STILL screwed up. Since Icom sells only a limited number of them they simply will not fix several design issues. >It would be best to wait 9-12 months after any new ICOM anything >hits the street before buying. Ah, but that is good advice for just about any piece of equipment. But with TSCM we have to stay on the bleeding edge of technology and (IMHO) grab any tool or pieces of equipment that will assist in achieving our goal of finding bugs and wiretaps. >The best time to buy is in March. ICOM's fiscal year ends the >end of March and their most aggressive sales and dealer >promotions are during the latter part of Feb and all of March. >Come April 1st, that's it, all deals expire. > >I had an early production R3 here. It stunk. The front end >overloaded easily from adjacent channel signals a substantial >distance away. Much of the UHF land mobile band was corrupted by >the fifteen or so 460 county repeaters six miles airline from my >place. In Baltimore City in the truck, whenever a VHF paging >system keyed up the receiver would lose sensitivity. I don't >know where the paging system was since I didn't have a spectrum >analyzer, but I expect in the low 150s, and I was trying to >listen to some amateur channels in 146-147. The current production units are just as bad. I have several R-3's including one of the very first ones, and several fairly recent ones and all of them have poor selectivity. >Even watching AM broadcast video on VHF when I was almost >literally in sight of the antenna in Baltimore City would show >an intermittent herringbone when some other unknown signal keyed >up. I was probably putting many millivolts of proper freq RF >down the throat of the R3 and the AGC should have been pumped >way up. Something still was killing it. > >You sacrifice a lot of performance for the small package. >Sensitivity is cheap, and that is the only spec most people (not >you Rick of course) know how to compare. Selectivity is much >more important and few know how to interpret those specs. > >Selectivity means filters, and filters means real estate on the >circuit board. There just plain isn't room for decent filtering >in these tiny receivers, so they suffer severely from adjacent >channel interference. I live in a remote country area and I >could tell the performance was miserable. The R-3 uses a large number of really small surface mount filters each of which just barely larger then a grain of wheat which hardly does the job. IMHO, selectivity is of primary concern to an eavesdropping concern, and unsaturated sensitivity is of primary concern to a bug detection concern. >Some people confuse an overloaded receiver and adjacent channel >interference pumping up the AGC with poor receiver sensitivity >or a weak signal and insist on hanging larger antennas on the >poor thing. This only crams more signal down the throat of the >receiver and makes the problem worse. More people would be >served better by attenuators than preamps. ... or a pre-selected directional antenna and THEN an amplifier (which is what the VBA-2400 does for us). >ICOM's R10, another handheld receiver with wide freq coverage, >had practically nonexistent HF performance. ICOM's service >bulletin advised users to connect an external HF antenna to the >thing if they wanted to listen to low frequencies. Anyone able >to do that would not choose a shirt pocket receiver to listen to >HF, of course. A toy AM broadcast radio worked better at AM >broadcast than the expensive R10. Bah... ICOM has to cobble things together to make the HF in most of their wide-band receivers work. If you want to tune in HF, then us an HF radio, if you want VHF/UHF then use a higher band unit. Look at the HF performance of the R-8500 (wide-band) versus the R-75 (dedicated HF). >That doesn't answer the question. > >The R3 is a poor performer at 2.4. Antennas are a big factor up >here. A 1/4 wave unity stick antenna, or some multiband wide >coverage coil loaded abortion like the stock factory rubber >antenna, is not effective at 2.4. Remember up here gain antennas >are used to get any realistic performance, and gain antennas >must by nature be directional. If you are not in the path, you >will not hear well with anything. Even Wavecoms and that >inexpensive class of mass produced systems have a typically 2-3 >dB patch antenna. Some systems are circularly polarized which is >another complicated issue. There is significant loss going from >circular polarized to linear polarized. All the 2.4 systems we >manufacture use circular polarized antennas, more to let me >isolate separate systems by mixing right hand and left hand than >for any other reason. Linear receives neither well. I do not >know offhand the loss. Gordon certainly would. I have found that once we get over 900 MHz it becomes critical to use a very highly directional antenna to reliably hunt down bugs or low power tranmsitter. >If you wanted to sniff 2.4, an effective cheap way is with the >repackaged Wavecom using a 6dB patch antenna mounted on a >pingpong paddle as I have written up and demonstrated. The good >sensitivity (cheap) coupled with the poor selectivity of the >Wavecom receivers (expensive) means that on one of the four >channels you will see anything within the band and quite a >distance outside either edge. Ah, but the secret to the Wavecoms are the cascaded AGC blocks they use on the IF, the multiple band-pass filters, and preselection just before the INA microwave amplifier on the front end. IMHO, the VBA work better then a patch antenna, but your right on target about the Wavcoms being really helpful. Just add a polarity switch so you can invert the video, and a pot so you can shift the black level. An unmodified Wavecom tends to perform very poorly when the signal is above 2.45 GHz or below 2.3 GHz, and some simple mods to the VCO will help expand the coverage. >Rich Wells has an excellent website reviewing many types of >receivers. I believe he is at www.strongsignals.net. He is >honest and competent. > >The R3 also eats batteries by the way. Impractical to use it on >batteries with the video active. You will carry a lot of spare >batteries and become intimate with either your charger or your >battery salesman. I have had good luck with the using several of the rechargeable battery packs as then are easy to change (I usually run 2-3 rechargeable per radio, plus a wall wart, a charger, and a vehicle adapter) >Long answer to a short question. > >Steve -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2414 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 8:24am Subject: MI5 foils plot to bug Prince William MI5 foils plot to bug Prince William http://www.excite.co.uk/news/story/UKOnlineReportTopNews/IIMFFH37839_2001-01-30_01-36-29_B522220 PRINCE WILLIAM BUGGING PLOT FOILED http://www1.sky.com/news/uk/story13.htm ================================== MI5 foils plot to bug Prince William http://www.excite.co.uk/news/story/UKOnlineReportTopNews/IIMFFH37839_2001-01-30_01-36-29_B522220 30/01/01 01:36 LONDON (Reuters) - Intelligence officers have uncovered a plot to bug Prince William at his Scottish university, newspapers reported. MI5 officers discovered electronic surveillance equipment during sweeps in the university town of St Andrews, the papers said. Unnamed intelligence sources were quoted as saying the equipment was set to tap into the prince's telephone calls and e-mails. It was programmed with word recognition triggers which would be activated when the prince was using the telephone or computer. Buckingham Palace has not commented on the bugging report. William, eldest son of Prince Charles and the late Princess Diana, will begin a four-year art history degree at St Andrews University in September. The principal of St Andrews University has warned students and staff of severe consequences if they leak stories about Prince William to the media. Both of William's parents have fallen victim to bugging devices and suffered the embarrassment of having their most private phone conversations made public. Prince Charles was taped having an intimate conversation with his mistress, Camilla Parker Bowles while the tapes of Diana's conversations with friend James Gilbey became known as "Squidgygate". William is currently enjoying a year off from studying after leaving Eton College, west of London, last summer. He recently took part in a Raleigh International character-building mission to Chile where he taught English to local school children, cleaned lavatories and cooked for his fellow volunteers. ================================== PRINCE WILLIAM BUGGING PLOT FOILED http://www1.sky.com/news/uk/story13.htm MI5 has reportedly seized electronic bugging equipment intended to monitor Prince William when he attends university this autumn. The claim comes amid growing concern over his security and privacy during his studies at St Andrews. The prince, who will be studying History of Art, was believed to have been targeted by devices that would have allowed snoopers to monitor his phone calls, e-mails and internet use. It is not yet known where the equipment was concealed but it was believed to have been found just before Christmas, according to the Daily Express. Warned Meanwhile it has emerged students who sell stories about Prince Williamís university life could be expelled. The principal of St Andrews has warned students if they try to cash in on the universityís most famous recent addition they may have to find themselves a new college. William is due to begin a four-year art history degree at the Scottish university in October. But there are fears hard-up students may be lured into taking snatch photographs of the Prince in the university bar or of revealing all about Williamís private life to the newspapers. Police state Dr Brian Lang told the university newspaper The Saint students would be given their marching orders if the Princeís privacy was infringed. And staff would be disciplined if details of Williamís academic performance were revealed. He said: "I would take a very dim view of information of an inappropriate nature about any member of the university being passed on. "At worst, a perpetrator might find him or herself having to find another university." The Studentsí Association stressed to Sky News Online those who pass on "tittle tattle" to journalists at the union bar were unlikely to be ordered out. Only "extreme" examples where students go out of their way to sell stories ñ or academic records ñ would lead to expulsion. "This is not a police state," said president Marcus Booth. "Everyoneís got a right to freedom of speech and comment but not to profit from selling details. If a journalist gets a few students drunk at the bar and they talk about student life and they say ëheís a great guyí then thatís fair game," "But if someone smuggles in a member of the European paparazzi and they take a photograph of William changing, thatís different." Strong feelings Mr Booth said most students accepted the universityís line. "The students Ií ve spoken to feel very strongly about this, as do the staff,î he said. University spokesman Claire Grainger said the rules were no different to those applied to other students. Applications to the university soared by 44 per cent last week ñ a rise put down to the "William factor". Dr Lang, a former chief executive of the British Library, has agreed to give up his official residence to allow the history of art department to be housed under one roof. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2415 From: A Grudko Date: Tue Jan 30, 2001 8:52am Subject: Re: Icom IC-R3 Quote- > I personally own and use several R-3's but would suggest that you use > a VBA-2400 as the sensitivity is fairly bad above 1.1 GHz on the R-3 > (too much conversion loss, and not enough preamp). JMA, who makes the VBA? I'm not familiar with it. Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2416 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 11:36am Subject: Re: Icom IC-R3 At 4:52 PM +0200 1/30/01, A Grudko wrote: >Quote- >> I personally own and use several R-3's but would suggest that you use >> a VBA-2400 as the sensitivity is fairly bad above 1.1 GHz on the R-3 >> (too much conversion loss, and not enough preamp). > >JMA, who makes the VBA? I'm not familiar with it. > Research Electronics makes it, and we would be happy to provide it to you. The cost $ 495.00 USD, and it consists of a high gain, highly directional log periodic antenna with a built in low noise amplifier. It is powered by an 9 volt battery, but has a power jack for use with an appropriate wall-wart or external power supply. Also included is a small tripod suitable to setting it up on a table top. Personally, I have found it helpful to epoxy a laser pointer to the bottom of the antenna just below the amplifier module. If you are a list member, and ask nicely when you place your order with us; we will pay all the shipping charges via Federal Express (anywhere in the world) for your order. On a side note.... if any list member is interested in OSCOR's. ORIONS, CPM-700, VBA, Kaiser, EMCO antennas, AVCOM, WJ/Condor, Rockwell, Riser Bond, Lucent, Macom, or any other TSCM related equipment let me know as we provide real world, highly sophisticated equipment at very attractive pricing, and with very favorable conditions..... We provide good solid equipment, at a very fair price, with no games, and no bullshit. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2417 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 11:41am Subject: Re: Digest Number 493 At 4:47 PM +0000 1/29/01, Adrian@a... wrote: >Manufacturers involved in Government NLJD trials are bound by a >Confidentiality Clause, I suppose those who fail to pre-qualify have >nothing to lose by spreading false rumours. Unwarranted criticism of >competitors equipment, by any manufacturer, does little to convince >potential users that your kit is any good! > >I can confirm that the only explosion caused by Superbroom was a massive >surge in Audiotel's order book. > >All NLJDs, particularly pulsed systems, will potentially activate certain >types of target, as will mobile phones, transceivers etc. > >Adrian Hickey >Audiotel International Ltd That's funny because I have personally been able to touch off an electric match (from a blasting cap) with an Audiotel Broom, a Locator, a Superscout, an ORION, and several other NLJD's. I don't think it's an issue of whose equipment is better, more of a case of why you should not bring ANY RF transmitter close to a electric match, blasting cap, or electrically controlled or detonated device. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2418 From: JANVIER SEBASTIEN Date: Tue Jan 30, 2001 8:26am Subject: INTELLIGENCE INTELLIGENCE ISSN 1245-2122 N. 378, 22 January 2001 Every Two to Three Weeks Next Issue on 5 February 2001 Publishing since 1980 Editor Olivier Schmidt (email adi@u...; web http://www.blythe.org/Intelligence; tel/fax 33 1 40 51 85 19; post ADI, 16 rue des Ecoles, 75005 Paris, France) SÈbastien JANVIER (intelligence6@y...) web www.dgse.org post 3 square FranÁis Carco 78190 Trappes tel: 06.08.31.21.18 Copyright ADI 2001, reproduction in any form forbidden without explicit authorization from the ADI. A one year subscription (18 issues with full index) is US $315. TABLE OF CONTENTS, N. 378, 22 January 2001 FRONT PAGE WORLD-WIDE - CIA 2015 & THE COMING REAL WORLD p.1 TECHNOLOGY AND TECHNIQUES US NIJ SNIFFER GUIDE & BRITISH DEVICE p.2 THE FINE ART OF GARBAGEOLOGY p.3 DERA'S DEDICATED "THERMOBARIC" GRENADE p.4 GARBLED INPUT FOR BRIT CRIMINAL RECORDS p.5 COMPUTERS - Saddam's Explosive PlayStation. p.6 PEOPLE GREAT BRITAIN - SIR MICHAEL HANLEY p.7 NORTHERN IRELAND - NEIL MULHOLLAND p.8 RUSSIA - VIKTOR MAKAROV p.9 AGENDA COMING EVENTS THROUGH 1 MARCH 2001 p.10 INTELLIGENCE AROUND THE WORLD USA - OIL & BRITS POOR MIX ON WEST COAST p.11 - CIA'S OVERBEARING SECRECY GETS IT IN TROUBLE p.12 - Holiday Season at the CIA. p.13 - FBI & CIA GET A NEW JOINT CI-21 p.14 - FBI GOING AFTER LEE & CUBANS p.15 - FBI's Disaster Squad. p.16 - New Books on the FBI. p.17 - Pope Affair Leaves Canada Holding the Bag. p.18 GREAT BRITAIN - NEW CHINOOK CRASH THEORY, SAME OLD COVER-UP p.19 - MAXIMUM EMBARRASSMENT FOR MI6 p.20 - NEW YEAR HONOURS ROLE FOR SPIES p.21 - THE "HARD REALITY" OF POLICE CORRUPTION p.22 - EX-SPOOK TACKLES DOLE SCROUNGERS p.23 FRANCE - COMPARATIVE INTERNAL SECURITY & OTHER BOOKS p.24 GERMANY - FALSE "SPY FLAP" WITH BELGIUM p.25 ITALY - THE BRUTAL DEATH OF ROBERTO CALVI p.26 CYPRUS/SINGAPORE - BRITAIN'S SECRET NUCLEAR ARMS SITES p.27 BALKANS - Poor Depeleted Uranium "Takes the Rap". p.28 RUSSIA - OBUKHOV VERDICT OVERTURNED p.29 ZIMBABWE - WHO'S AFRAID OF THE CIO? p.30 SOUTHERN AFRICA - INTELLIGENCE SHAKEDOWNS & MIX UPS p.31 MIDDLE EAST - BIN LADEN AS A LOUSY EMPLOYER p.32 NEW ZEALAND - "SOLDIER FIVE" PUBLICATION POSTPONED p.33 --------------------------------------------- FRONT PAGE Intelligence, N. 378, 22 January 2001, p. 1 WORLD-WIDE THE CIA'S 2015 & THE COMING REAL WORLD The CIA recently released its "Global Trends 2015 - A Dialogue About the Future With Nongovernment Experts" (NIC 2000-02, December 2000; http://www.odci.gov/cia/publications/ globaltrends2015/), stating that: "This paper was approved for publication by the National Foreign Intelligence Board under the authority of the Director of Central Intelligence. Prepared under the direction of the National Intelligence Council. Its table of contents is the following: Contents; Note on Process; Overview; The Drivers and Trends; Key Uncertainties - Technology Will Alter Outcomes; Key Challenges to Governance - People Will Decide; Discussion; Population Trends (Divergent Aging Patterns, Movement of People, Health, Natural Resources and Environment, Food, Water, Energy, Environment); Science and Technology (Information Technology, Biotechnology, Other Technologies); The Global Economy (Dynamism and Growth, Unequal Growth Prospects and Distribution, Economic Crises and Resilience); National and International Governance (Nonstate Actors, Criminal Organizations and Networks, Changing Communal Identities and Networks, Overall Impacts on States, International Cooperation); Future Conflict (Internal Conflicts, Transnational Terrorism, Interstate Conflicts, Reacting to US Military Superiority); Major Regions (East and Southeast Asia, South Asia, Russia and Eurasia, Middle East and North Africa, Sub-Saharan Africa, Europe, Canada, Latin America); Appendix; Four Alternative Global Futures. The "Note on Process" provides a good description of the publication: "In undertaking this comprehensive analysis, the NIC worked actively with a range of nongovernmental institutions and experts. We began the analysis with two workshops focusing on drivers and alternative futures, as the appendix describes. Subsequently, numerous specialists from academia and the private sector contributed to every aspect of the study, from demographics to developments in science and technology, from the global arms market to implications for the United States. Many of the judgments in this paper derive from our efforts to distill the diverse views expressed at these conferences or related workshops." "Major conferences cosponsored by the NIC with other government and private centers in support of Global Trends 2015 included: Foreign Reactions to the Revolution in Military Affairs (Georgetown University); Evolution of the Nation-State (University of Maryland); Trends in Democratization (CIA and academic experts); American Economic Power (Industry & Trade Strategies, San Francisco, CA); Transformation of Defense Industries (International Institute for Strategic Studies, London, UK); Alternative Futures in War and Conflict (Defense Intelligence Agency and Naval War College, Newport, RI, and CIA); Out of the Box and Into the Future - A Dialogue Between Warfighters and Scientists on Far Future Warfare (Potomac Institute, Arlington, VA); Future Threat Technologies Symposium (MITRE Corporation, McLean, VA); The Global Course of the Information Revolution - Technological Trends (RAND Corporation, Santa Monica, CA); The Global Course of the Information Revolution - Political, Economic, and Social Consequences (RAND Corporation, Santa Monica, CA); The Middle East - The Media, Information Technology, and the Internet (The National Defense University, Fort McNair, Washington, DC); Global Migration Trends and Their Implications for the United States (Carnegie Endowment for International Peace, Washington, DC); Alternative Global Futures - 2000-2015 (Department of State/Bureau of Intelligence and Research and CIA's Global Futures Project)." "In October 2000, the draft report was discussed with outside experts, including Richard Cooper and Joseph Nye (Harvard University), Richard Haass (Brookings Institution), James Steinberg (Markle Foundation), and Jessica Mathews (Carnegie Endowment for International Peace). Their comments and suggestions are incorporated in the report. Daniel Yergin (Cambridge Energy Research Associates) reviewed and commented on the final draft." Below, we reprint the "Overview" and the "Appendix - Four Alternative Global Futures". "Overview - Global Trends 2015: A Dialogue About the Future With Nongovernment Experts Over the past 15 months, the National Intelligence Council (NIC), in close collaboration with US Government specialists and a wide range of experts outside the government, has worked to identify major drivers and trends that will shape the world of 2015. The key drivers identified are: (l) Demographics; (2) Natural resources and environment; (3) Science and technology; (4) The global economy and globalization; (5) National and international governance; (6) Future conflict; (7) The role of the United States." "In examining these drivers, several points should be kept in mind: No single driver or trend will dominate the global future in 2015. Each driver will have varying impacts in different regions and countries. The drivers are not necessarily mutually reinforcing; in some cases, they will work at cross-purposes. Taken together, these drivers and trends intersect to create an integrated picture of the world of 2015, about which we can make projections with varying degrees of confidence and identify some troubling uncertainties of strategic importance to the United States." "The Methodology - Global Trends 2015 provides a flexible framework to discuss and debate the future. The methodology is useful for our purposes, although admittedly inexact for the social scientist. Our purpose is to rise above short-term, tactical considerations and provide a longer-term, strategic perspective. Judgments about demographic and natural resource trends are based primarily on informed extrapolation of existing trends. In contrast, many judgments about science and technology, economic growth, globalization, governance, and the nature of conflict represent a distillation of views of experts inside and outside the United States Government. The former are projections about natural phenomena, about which we can have fairly high confidence; the latter are more speculative because they are contingent upon the decisions that societies and governments will make." "The drivers we emphasize will have staying power. Some of the trends will persist; others will be less enduring and may change course over the time frame we consider. The major contribution of the National Intelligence Council (NIC), assisted by experts from the Intelligence Community, has been to harness US Government and nongovernmental specialists to identify drivers, to determine which ones matter most, to highlight key uncertainties, and to integrate analysis of these trends into a national security context. The result identifies issues for more rigorous analysis and quantification." "Revisiting Global Trends 2010: How Our Assessments Have Changed Over the past four years. We have tested the judgments made in the predecessor, 'Global Trends 2010', published in 1997. 'Global Trends 2010' was the centerpiece of numerous briefings, conferences, and public addresses. Various audiences were energetic in challenging, modifying or confirming our judgments. The lively debate that ensued has expanded our treatment of drivers, altered some projections we made in 1997, and matured our thinking overall -- which was the essential purpose of this exercise." "'Global Trends 2015' amplifies several drivers identified previously, and links them more closely to the trends we now project over the next 15 years. Some of the key changes include: Globalization has emerged as a more powerful driver. GT 2015 sees international economic dynamics -- including developments in the World Trade Organization -- and the spread of information technology as having much greater influence than portrayed in GT 2010. GT 2015 assigns more significance to the importance of governance, notably the ability of states to deal with nonstate actors, both good and bad. GT 2015 pays attention both to the opportunities for cooperation between governments and private organizations and to the growing reach of international criminal and terrorist networks. GT 2015 includes a more careful examination of the likely role of science and technology as a driver of global developments. In addition to the growing significance of information technology, biotechnology and other technologies carry much more weight in the present assessment." "The effect of the United States as the preponderant power is introduced in GT 2015. The US role as a global driver has emerged more clearly over the past four years, particularly as many countries debate the impact of 'US hegemony' on their domestic and foreign policies. GT 2015 provides a more complete discussion of natural resources including food, water, energy, and the environment. It discusses, for example, the over three billion individuals who will be living in water-stressed regions from North China to Africa and the implications for conflict. The linkage between energy availability, price, and distribution is more thoroughly explored. GT 2015 emphasizes interactions among the drivers. For example, we discuss the relationship between S&T, military developments, and the potential for conflict." "In the regional sections, GT 2015 makes projections about the impact of the spread of information, the growing power of China, and the declining power of Russia. Events and trends in key states and regions over the last four years have led us to revise some projections substantially in GT 2015. GT 2010 did not foresee the global financial crisis of 1997-98; GT 2015 takes account of obstacles to economic development in East Asia, though the overall projections remain fairly optimistic. As described in GT 2010, there is still substantial uncertainty regarding whether China can cope with internal political and economic trends. GT 2015 highlights even greater uncertainty over the direction of Beijing's regional policies." "Many of the global trends continue to remain negative for the societies and regimes in the Middle East. GT 2015 projects at best a 'cold peace' between Israel and its adversaries and sees prospects for potentially destabilizing social changes due to adverse effects of globalization and insufficient attention to reform. The spike in oil revenues reinforces the assessment of GT 2010 about the rising demand for OPEC oil; these revenues are not likely to be directed primarily at core human resources and social needs. Projections for Sub-Saharan Africa are even more dire than in GT 2010 because of the spread of AIDS and the continuing prospects for humanitarian crises, political instability, and military conflicts." ... "Appendix - Four Alternative Global Futures. In September- October 1999, the NIC initiated work on 'Global Trends 2015' by cosponsoring with Department of State/INR and CIA's Global Futures Project two unclassified workshops on Alternative Global Futures: 2000-2015. The workshops brought together several dozen government and nongovernment specialists in a wide range of fields. The first workshop identified major factors and events that would drive global change through 2015. It focused on demography, natural resources, science and technology, the global economy, governance, social/cultural identities, and conflict and identified main trends and regional variations. These analyses became the basis for subsequent elaboration in Global Trends 2015. The second workshop developed four alternative global futures in which these drivers would interact in different ways through 2015. Each scenario was intended to construct a plausible, policy- relevant story of how this future might evolve: highlighting key uncertainties, discontinuities, and unlikely or 'wild card' events, and identifying important policy and intelligence challenges." "Scenario One - Inclusive Globalization: A virtuous circle develops among technology, economic growth, demographic factors, and effective governance, which enables a majority of the world's people to benefit from globalization. Technological development and diffusion -- in some cases triggered by severe environmental or health crises -- are utilized to grapple effectively with some problems of the developing world. Robust global economic growth -- spurred by a strong policy consensus on economic liberalization -- diffuses wealth widely and mitigates many demographic and resource problems. Governance is effective at both the national and international levels. In many countries, the state's role shrinks, as its functions are privatized or performed by public-private partnerships, while global cooperation intensifies on many issues through a variety of international arrangements. Conflict is minimal within and among states benefiting from globalization. A minority of the world's people -- in Sub-Saharan Africa, the Middle East, Central and South Asia, and the Andean region -- do not benefit from these positive changes, and internal conflicts persist in and around those countries left behind." "Scenario Two - Pernicious Globalization: Global elites thrive, but the majority of the world's population fails to benefit from globalization. Population growth and resource scarcities place heavy burdens on many developing countries, and migration becomes a major source of interstate tension. Technologies not only fail to address the problems of developing countries but also are exploited by negative and illicit networks and incorporated into destabilizing weapons. The global economy splits into three: growth continues in developed countries; many developing countries experience low or negative per capita growth, resulting in a growing gap with the developed world; and the illicit economy grows dramatically. Governance and political leadership are weak at both the national and international levels. Internal conflicts increase, fueled by frustrated expectations, inequities, and heightened communal tensions; WMD proliferate and are used in at least one internal conflict." "Scenario Three - Regional Competition: Regional identities sharpen in Europe, Asia, and the Americas, driven by growing political resistance in Europe and East Asia to US global preponderance and US-driven globalization and each region's increasing preoccupation with its own economic and political priorities. There is an uneven diffusion of technologies, reflecting differing regional concepts of intellectual property and attitudes towards biotechnology. Regional economic integration in trade and finance increases, resulting in both fairly high levels of economic growth and rising regional competition. Both the state and institutions of regional governance thrive in major developed and emerging market countries, as governments recognize the need to resolve pressing regional problems and shift responsibilities from global to regional institutions. Given the preoccupation of the three major regions with their own concerns, countries outside these regions in Sub-Saharan Africa, the Middle East, and Central and South Asia have few places to turn for resources or political support. Military conflict among and within the three major regions does not materialize, but internal conflicts increase in and around other countries left behind." "Scenario Four - Post-Polar World: US domestic preoccupation increases as the US economy slows, then stagnates. Economic and political tensions with Europe grow, the US-European alliance deteriorates as the United States withdraws its troops, and Europe turns inward, relying on its own regional institutions. At the same time, national governance crises create instability in Latin America, particularly in Colombia, Cuba, Mexico, and Panama, forcing the United States to concentrate on the region. Indonesia also faces internal crisis and risks disintegration, prompting China to provide the bulk of an ad hoc peacekeeping force. Otherwise, Asia is generally prosperous and stable, permitting the United States to focus elsewhere. Korea's normalization and de facto unification proceed, China and Japan provide the bulk of external financial support for Korean unification, and the United States begins withdrawing its troops from Korea and Japan. Over time, these geostrategic shifts ignite longstanding national rivalries among the Asian powers, triggering increased military preparations and hitherto dormant or covert WMD programs. Regional and global institutions prove irrelevant to the evolving conflict situation in Asia, as China issues an ultimatum to Japan to dismantle its nuclear program and Japan -- invoking its bilateral treaty with the US -- calls for US reengagement in Asia under adverse circumstances at the brink of a major war. Given the priorities of Asia, the Americas, and Europe, countries outside these regions are marginalized, with virtually no sources of political or financial support." "Generalizations Across the Scenarios: The four scenarios can be grouped in two pairs: the first pair contrasting the 'positive' and 'negative' effects of globalization; the second pair contrasting intensely competitive but not conflictual regionalism and the descent into regional military conflict. In all but the first scenario, globalization does not create widespread global cooperation. Rather, in the second scenario, globalization's negative effects promote extensive dislocation and conflict, while in the third and fourth, they spur regionalism. In all four scenarios, countries negatively affected by population growth, resource scarcities and bad governance, fail to benefit from globalization, are prone to internal conflicts, and risk state failure. In all four scenarios, the effectiveness of national, regional, and international governance and at least moderate but steady economic growth are crucial. In all four scenarios, US global influence wanes." COMMENT -- It should be noted that the CIA study is very heavily based on the concept of "globalization" which is still lacking a universally accepted definition. One social scientist studying the term has stated that "globalization" has simply replaced the over-used term, "development", which, in turn, replaced the worn-out term, "progress". It would be helpful to replace all occurrences of "globalization" in the CIA report with an unknown value, "X", that has to be defined each time it is used. Although the report tends to recognize that "US global influence wanes", it does not seem to take into account that "domestic" developments in the US -- the Jewish lobby, the Old China crowd, the Christian fundamentalists, Black Americans, Mexican Americans -- are not going to "ride out events" in any rational or neutral manner. The current right-wing fanatic reaction against China and the scandalous treatment of US nuclear scientist, Wen Ho Lee, provide a clear example of how "domestic" events can easily influence -- even determine -- international developments, a process the report conveniently sidelines. The "domestic" political backing of the US alliance with Israel is another example of a major conflict whose evolution is not being determined on the international scene but inside the United States. Not factoring in "domestic" US developments and only looking abroad is the chief weakness of the CIA report. Indeed, many foreign specialists see one of the near future's major problems and source of conflict as the increasing gap between rich and poor in the US and other "domestic" US instabilities. But then, that's the FBI's problem and not the CIA's. This lack of perspective is also manifest in the use of terms such as "forcing the United States to concentrate on the region". The US has been "concentrating" on China, Israel- Palestine, Colombia, Indonesia, and things aren't getting any better. Other "drivers" that certain specialists feel should be given more emphasis are Russia (the CIA missed predicting its collapse and may now miss its renaissance), the increasing role of joint international (military) intervention in the internal affairs of other countries (some suggest that the UN monitor the next US presidential election), and the bipolar world the euro and the dollar are creating. Those outside intelligence tend to forget that French francs cover most of Western Africa and Deutsch marks are used all the way from Poland to the Caucasues, while the US dollar is now the official money of several Latin American countries. It looks like countries are going to have to choose between the "American way of life" (death penalties and ghettos included) and "old Europe" (slow, inefficient but humane). There are plenty of unanticipated conflicts the CIA is going to have to deal with, but it should be congratulated for its outstanding effort at laying out its methodology and presenting its results. Now all it has to do is listen to its critics and assimilate their contributions. --------------------------------------------- TECHNOLOGY AND TECHNIQUES Intelligence, N. 378, 22 January 2001, p. 2 US NIJ SNIFFER GUIDE & BRITISH DEVICE The US National Institute of Justice (NIJ) just published a "Guide for the Selection of Drug Detectors for Law Enforcement Applications" (NIJ Guide 601-00) which surveys the field of contraband drug detection methods. It includes background information on the problem of contraband drugs in the United States, the various applications of drug detection, and a discussion of considerations that are important in choosing a drug detection system. It examines four major types of drug detection: trace detection technologies (mechanical "sniffers"), canine detection, bulk detection technologies (e.g., x-ray and other imaging techniques), and manual search techniques. Also included: a list of Web sites for companies making trace and bulk detection systems, basic information on common drugs of abuse, and a glossary of terms. It is available on the NCJRS Web site at http://www.ncjrs.org/pdffiles1/nij/183260.pdf. A new British drug detection device, developed by Middlesex University, will begin "field tests" next month, and should help "stem the illicit trade" of drug trafficking in the UK, according to the British government's drug czar, Keith Hellawell, in a speech to academics and teachers at an International Conference for the Association of Science Education, held at Sussex University on 3 January. The equipment sniffs the air for particles of Class A drugs such as heroin and cocaine, similar to the hand-held carbon dioxide detection devices used by UK Customs and Excise and cross- channel ferry companies to examine vehicles suspected of illegal immigration trafficking. Apart from the introduction of new technology, Mr. Hellawell told delegates that experts from UK police forces and the National Criminal Intelligence Service (NCIS) had been seconded to Turkey, and to eastern European countries, to help target and identify traffickers. However, his speech was not without controversy and he was criticized for referring specifically to the British Turk community as a "key link" in the heroin trade, claiming the system worked through Turkish families and associates with legitimate businesses in Britain "which facilitate money laundering in London and other major cities". He qualified his remarks by stating "we don't want to tarnish all Turkish people, or people from eastern Europe as potential criminals ... but these linkages are something that we look at". --------------------------------------------- Intelligence, N. 378, 22 January 2001, p. 3 THE FINE ART OF GARBAGEOLOGY On 26 November, the "Sunday Times" published a leaked memo written by Jonathan Powell, British Prime Minister Tony Blair's top aide -- effectively his "chief of staff" -- containing a series of more-or-less decipherable jottings on a variety of subjects. The emergence of the memo, claimed the "Sunday Times", was indicative of a high-level "mole" inside Downing Street -- something widely touted in the media during the last few months. This disingenuous story belied what the "Sunday Times" knew very well: that the memo had -- with cat food and nappy contents thoughtfully scraped off -- been recovered from Powell's domestic rubbish. "Garbageology", also known in the US as "dumpster diving", is a traditional pursuit of intelligence services throughout the world. In the UK, there is also a small but thriving private sector which operates a lucrative practice selling the contents of office and household rubbish to newspapers. It is also a speciality of the computer hacking fraternity. The doyen of professional rubbish collectors in the British private sector is Benjamin Pell -- known as "Benji the Binman" -- who makes a decent living from raiding the rubbish of the rich and famous and, equally importantly, their lawyers and accountants. His most recent major coup was to supply the "Sunday Times" with documents showing that the millionaire Labour Party fundraiser and heavyweight fixer, Lord Levy, had only paid oe35,000 in income tax during 1998/99. The source was rubbish thrown out by Levy's accountants. On that occasion, Pell had been "commissioned" by the "Sunday Times" to acquire any material on Levy or another senior Blair adviser, Philip Gould. Murdoch-owned papers make regular use of the Binman's services: a number of invoices recovered by police during a search of his house in November 1999 revealed that over the previous six months he had been paid nearly oe36,000 for material concerning Jonathan Aitken, James Hewitt (sometime paramour of Princess Diana), and a case of alleged corruption in local government. Musicians Elton John, Mick Jagger and Paul McCartney, comedian Rik Mayall, "Spice Girl" Geri Halliwell and tycoon Mohammed al-Fayed have also been subject to his particular attentions. Invoices from the Mirror group, publishers of the tabloid "Daily Mirror" and "Sunday Mirror", were also found by police. The Binman's career was thought to have been brought to an end in November last year when he was successfully prosecuted and convicted of five counts of "stealing documentary waste" from a law firm (whose clients included Aitken and Hewitt). The police, who had searched his home, found 200,000 documents in a garden shed. In mitigation, Benji explained that he suffers from an "obsessive compulsive disorder", a psychiatric condition which takes the form of a collection mania. Though convicted, he avoided a jail sentence. Unfortunately, his notoriety is now such that he is invariably blamed whenever compromising material is recovered from somebody's rubbish. MI5 is not shy of doing its own bin-raiding on occasion but tend to be more discreet. Some evidence of their modus operandi comes from the diaries of Tony Benn, the veteran left-wing Labour MP. He recounts an occasion when -- suspecting that he was under MI5 surveillance -- he arranged for a wire 2419 From: Steve Uhrig Date: Tue Jan 30, 2001 3:00pm Subject: Sniffing video at 2.4 -- Hints & Kinks Once upon a midnight dreary, Rick Hofmann - MICROSEARCH pondered, weak and weary: > The Avcom video demodulator I've been using would probably > work better with a different antenna. It's all in the antennas. > I'm using a discone most of the time, and the best I seem to > be able to get is a rolling image. Once you get above about a gig you need specialty antennas. And don't forget feedline losses at 2.4. Only a few feet of low loss coax is best. Forget the 25 and 50 foot jumpers. They are open circuits at 2.4. The rolling is due to sync compression in nonlinear PA stages in the transmitter. Most amplifier stages used in video transmitters, especially bastardized Wavecoms and add on/outboard amps, are not linear and compress the sync. Under the best of conditions many wireless video systems barely sync up. Some receivers, yours maybe, needs a louder sync than a purpose-built video receiver. Better grade transmitters like the ones we manufacture incorporate a sync stretcher circuit to essentially pre-emphasize the sync, so when it gets squashed in the power output stages there is enough left to lock up the monitor. Here is a tip to solve the problem for next to no cost. You can compensate for rolling/weak sync by going into your monitor and wrapping a few turns of wire around the flyback transformer in your monitor (CRT types only of course). Ground one side of the winding and run the other through maybe a 50K pot. Grab the wiper of the pot and apply that to the AGC stage of the receiver. The receiver can be part of the monitor or a separate unit. What this will do is grab the pulse off the flyback about when the receiver/monitor is expecting the sync pulse, and drive the AGC gain way up only for that sync period. When the compressed sync pulse arrives in the receiver, the gain is cranked way up and it amplifies the sync pulse back to normal levels, but only when the receiver is expecting sync. Tune the pot for the proper level applied to the AGC for best lock. The most you might have to do is make sure your pulse is driving the AGC gain up, not down, at the proper time. A scope will show you the pulse you pick up off the flyback which will match the timing of the incoming sync pulse. Above concept and implementation (c) Steve circa 1985! > One thing that does work is to put a flashing strobe light in > view of the camera. If nothing else, you can see the flash. Cheaper is an inexpensive hardware store bimetal flasher you put in series with whatever table or desk lamp you can borrow. No wiring required as the flasher goes between the plug and the wall outlet. Thank Marty for this one, which works beautifully. If you see a flash on your monitor, you start sweeping the walls with a flashlight to find the camera. Most practically sized antennas will not be directional enough to where aiming is that critical. If you can hold and transport the thing, it is not going to have enough gain to where the pattern is that sharp. The 6dB patch antenna I use is plenty adequate. Fits on a pingpong paddle and has about a 60 degree beamwidth. Even the high gain antennas will still be something like 20 degrees horizontal (to the 3 dB down point). Not critical. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2420 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 6:10pm Subject: Re: Sniffing video at 2.4 -- Hints & Kinks At 4:00 PM -0500 1/30/01, Steve Uhrig wrote: >Once upon a midnight dreary, Rick Hofmann - MICROSEARCH pondered, >weak and weary: > >> The Avcom video demodulator I've been using would probably >> work better with a different antenna. > >It's all in the antennas. > >> I'm using a discone most of the time, and the best I seem to >> be able to get is a rolling image. > >Once you get above about a gig you need specialty antennas. And >don't forget feedline losses at 2.4. Only a few feet of low loss >coax is best. Forget the 25 and 50 foot jumpers. They are open >circuits at 2.4. > >The rolling is due to sync compression in nonlinear PA stages in >the transmitter. Most amplifier stages used in video >transmitters, especially bastardized Wavecoms and add >on/outboard amps, are not linear and compress the sync. Under >the best of conditions many wireless video systems barely sync >up. Some receivers, yours maybe, needs a louder sync than a >purpose-built video receiver. Better grade transmitters like the >ones we manufacture incorporate a sync stretcher circuit to >essentially pre-emphasize the sync, so when it gets squashed in >the power output stages there is enough left to lock up the >monitor. [snip] [cough-cough] if I might be so bold.... The "rolling" or tearing is also caused by an ***inverted*** sync pulse which is common on the X10 units, and various non-Wavecom versions. Also rolling/tearing is also an indication of a 15 kHz horizontal PAL/SECAM signal instead of a 15.734 NTSC kHz signal. I have personal knowledge of specific U.S. eavesdroppers using PAL/SECAM video in the US, and specific spy shops in the US selling PAL/SECAM covert video equipment. What better way to throw off a U.S. based TSCM person then to use a non US video signal. I have also examined video transmission equipment (for ENG and surveillance usage) where the equipment did not emit any kind of sync pulse or similar signal but was instead locked onto a timing standard broadcast from the listening post/studio (which provided genlock to the remote cameras). Also, most normal cables and connectors (ie: Radio Shack Grade RG58) are fairly worthless above 1 GHz, and as a result you have to keep your cables as short as possible ***AND*** use ultra-high grade cables and connectors. Personally, I prefer RG-214 cables and N Type connectors for the microwave lower frequencies, and SMA with RG-400 at higher frequencies (mm signals are an entirely different thing). -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2421 From: Steve Uhrig Date: Tue Jan 30, 2001 7:19pm Subject: Mangled sync? Once upon a midnight dreary, James M. Atkinson, Comm-Eng pondered, weak and weary: > The "rolling" or tearing is also caused by an ***inverted*** sync > pulse which is common on the X10 units, and various non-Wavecom > versions. Also rolling/tearing is also an indication of a 15 kHz > horizontal PAL/SECAM signal instead of a 15.734 NTSC kHz signal. I personally have never seen "inverted" sync pulses and I have been around video some. I have seen, many many times, low sync levels, particularly on wireless video. > I have personal knowledge of specific U.S. eavesdroppers using > PAL/SECAM video in the US, and specific spy shops in the US > selling PAL/SECAM covert video equipment. What better way to > throw off a U.S. based TSCM person then to use a non US video > signal. PAL into an NTSC monitor generally is easily readable, but with a large black band across the bottom of the screen. It's not pretty but perfectly copyable. I have a fair amount of PAL gear here. The differences are not all that much. You won't get broadcast quality but you will get a usable image. I would presume anyone experiencing rolling would first try to stop it with the vertical adjustment, which changes the frequency and/or level of the sync. If that doesn't stop it, my suggestion will work. I have done it, several times. in several countries. I also manufacture NTSC to PAL converters so I have a pretty fair idea of the differences in the formats. The chances of seeing compressed sync in the field are far greater than seeing the wrong format. Transmitting PAL in an attempt to prevent interception would not be effective and a complete waste of time and money. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2422 From: James M. Atkinson, Comm-Eng Date: Tue Jan 30, 2001 8:19pm Subject: REI VBA-2400 (2.4 GHz Video Booster Antenna) Here is some additional information on the VBA... The units I have examined have had a center frequency of 2.380 GHz, with a bandwidth of roughly 200 MHz. The internal preselection filter frequency coverage is roughly 2.33 to 2.53 GHz, (between the -3 dB drop points, as actually measured by myself on a several production units). On the lower skirt the filter drops to -12 dB at 2.30 GHz, and the upper skirt drops down to -12 dB at 2.575 GHz. The unit uses a preamplifier circuit with roughly 22 dB of gain, but after we take into account the insertion loss of the preselection filters, and nF (noise factor) of the VBA the effective actual gain is about 15 dB (as measured on a production unit with a microwave network analyzer). The actual geometry of the log periodic antenna provides a gain of about 8-12 dB (but Tom feel free to correct me on this). The end result is that the signal is punched up about 22-28 dB which is one heck of a boost over a 3 to 6 dB patch antennas. If your using a broadband discone with RG-58 coax or rubber ducky antenna currently, you will be stunned at the massive difference the VBA makes. The VBA is roughly 8 inches long, 3 inches wide, and three quarters inch thick (not including the sturdy fold-up antenna that is provided). The only thing I don't like about it is that I feel the bandwidth should be wider, and cover 2.00 to 2.700 GHz (700 MHz bandwidth), the ripple is a little too high on the lower skirt. (cough-cough) I hope Tom and Bruce see this, perhaps they could come out with a Wide band version (cough-cough) If you would like something small like the VBA-2400 (under a grand) and don't mind using PayPal you can buy and pay for the VBA though the following link. The total price is $495.00 (494.99 + .01 S&H) as PayPal insists that I charge something for shipping): https://secure.paypal.com/xclick/business=jmatk%40tscm.com&undefined_quantity=1&item_name=2.4+GHz+Video+Booster+Antenna&item_number=VBA-2400&amount=494.99&shipping=.01&return=http%3A//www.tscm.com/ PayPal will let you write an eCheck and pull the funds directly out of your checking account, or charge the purchase against all major credit cards. Alternately you an just send a company check, money order, etc. but I only accept plastic though PayPal. As a courtesy we ship via Federal Express, and pay the shipping charges for you (so you get free courier shipping) -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2423 From: A Grudko Date: Wed Jan 31, 2001 6:01am Subject: Re: Sniffing video at 2.4 -- Hints & Kinks Jeepers, this switch to yahoogroops has caused some headaches - anyway.... ----- Original Message ----- Snipped--------- > Once you get above about a gig you need specialty antennas. I have a 'corner' antenna, made by a local company, which works great although it's big and heavy (I thought things gor smaller as frequency went up!). It is said to be 10db gain at 1 gig, 16 db at 3 gigs. I link it to my receiver/SA with less than a metre of Belden 9114 coax. The reflector is made from powder coated 1.6 mm steel plate (in 2 pieces which bolt together to facilitate transporting) about 14" high and a bit wider, forming a 90 degree 'wing'. Mounted at the focus is a triangular, horizontally polarised element, about 3" at the base and 4" long It works well and is very directional - I'd guess 20 degrees or better. > The rolling is due to sync compression in nonlinear PA stages in > the transmitter. I have a portable sync generator built by a ham buddy which I put in line and it works great - if anyone needs one let me know privatly and I'll get the circuit diagram out of him!! Andy Grudko. D.P.M., Grad I.S, (S.A.) CEO - Grudko Wilson Associates (SA) (Pty) Ltd - Crime investigation & intelligence Johannesburg - Cape Town - Durban - Pretoria - UK - US - Canada - Australia - Israel - Bosnia. Agents in 41 countries - www.grudko.com - (+27 11) 465 9673 - 465 1487 (Fax) - Est. 1981 GIN (Charter), SACI (Pres), WAD, CALI, SASFed, SASA, SAMLF, SCIP (SA Chairman), UKPIN, AFIO (OS), IWWA, PRETrust, IPA, AmChamCom "When you need it done right - first time" 2424 From: Date: Wed Jan 31, 2001 4:17am Subject: This is not why I get the big bucks.... In a message dated 1/31/01 5:57:58 AM Pacific Standard Time, agrudko@i... writes: << Jeepers, this switch to yahoogroops has caused some headaches - anyway.... >> http://au.egroups.com/mygroups It's the same good old systems of eGroups. And it works great for us Yanks. You won't be disappointed. You'll have the same id and password. Also, you can try these. Ausralia http://au.egroups.com/mygroups Canada http://www.egroups.ca/ UK http://www.egroups.co.uk/ China http://cn.egroups.com/ HK http://www.egroups.com.hk/ India http://in.egroups.com/ Japan: http://www.egroups.co.jp/ Korea http://kr.egroups.com/ Taiwan http://tw.egroups.com/ Fra nce http://www.egroups.fr/ Germany http://www.egroups.de/ Italy http://it.egroups.com/ 2425 From: Date: Wed Jan 31, 2001 5:03am Subject: Survivor - humor Plans are already in the making for a third "Survivor" show. It will be staged in Texas, which is obviously larger than Australia. 10 people will each drive from San Antonio to Amarillo in a Volkswagen bus painted with peace signs and a huge banner that reads: I AM A QUEER, DEMOCRAT, VEGETARIAN AND I AM COMING TO TAKE AWAY YOUR GUNS! Whoever survives will be the winner...... 2426 From: Robert G. Ferrell Date: Wed Jan 31, 2001 10:41am Subject: Re: Survivor - humor >Plans are already in the making for a third "Survivor" show. It will be >staged in Texas, which is obviously larger than Australia. > >10 people will each drive from San Antonio to Amarillo in a Volkswagen bus >painted with peace signs and a huge banner that reads: > >I AM A QUEER, DEMOCRAT, VEGETARIAN AND I AM COMING TO TAKE AWAY YOUR GUNS! > >Whoever survives will be the winner...... This is a really cool example of the evolution of an Internet story. This joke originated several years ago without the "Survivor" reference. I added the "Volkswagen Bus" part to it about a year ago and sent it on. Now someone's made it topical by linking it to "Survivor." Fascinating, Captain... RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2427 From: Date: Wed Jan 31, 2001 3:08pm Subject: Fingerprints for food Technology allows some students to leave lunch money at home Students at Welsh Valley Middle School, in Penn Valley, Pa., are part of a fingerprinting program that lets pupils pay for tater-tots and other cafeteria delicacies without ever carrying cash. ASSOCIATED PRESS PENN VALLEY, Pa., Jan. 24 ≠ The tiny ridges on a student's index finger could soon make school lunch money and lunch-line bullies a thing of the past. A fingerprint identification program used in three Pennsylvania school districts allows pupils to pay for chicken nuggets, sloppy Joes, pizza and other cafeteria delicacies without ever carrying cash. Food Service Solutions Penn Cambria School District Sagem Morpho "IT'S CERTAINLY a lot faster," said Linda Kelly, cafeteria manager at Welsh Valley Middle School in this Philadelphia suburb. Students place their index fingers on small scanners, and a template matches them with their electronic print. The program plots 27 points on a grid that correspond with the fingerprint's ridges. The fingerprint image is discarded, and the points are assigned numbers. According to the system's manufacturers, only the numbers are retained and those cannot be reinterpreted into a fingerprint image. "Both parents and students can rest assured that the fingerprint images cannot be used by law enforcement for identification purposes," says the Web site of Food Service Solutions Inc., the Altoona company that installed the system. "Only a mathematical algorithm remains in the system after registration ≠ not fingerprint images." But the American Civil Liberties Union fears the technology ≠ known as biometrics ≠ could hasten the end of privacy rights. Biometrics uses unalterable physical characteristics to verify a person's identity. On the Frontier ï Intel introduces energy-saving chipsï How to up radio signal data capacityï Too cool! Shrinking portable devicesï IBM building Linux supercomputerï Honey, I shrunk the scientistï Voice recognition improves "It's a sign of things to come," said Barry Steinhardt, associate director of the ACLU. "We will be able to be identified with biometrics in virtually every situation. The use of the digital fingerprint is just one example of that." Biometric devices that identify people by physical characteristics ≠ such as eye patterns, voice tones and handprints ≠ have been the stuff of cinema for decades. Until recently, costs had restricted their use mainly to government offices and military bases. A WAY AROUND SLOW LINES Welsh Valley, about 10 miles west of Philadelphia, began testing the program in the fall to deal with slow lunch lines. "You don't have to bring lunch money. So, somebody can't take it," said Tawanda Worthy, 13. Only a few of Welsh Valley's 700 children have declined to be fingerprinted. "They think the FBI's going to get them or something," said Kelly, the cafeteria manager. The corporation that supplies Food Service Solutions with the system ≠ Sagem Morpho Inc. of Tacoma, Wash. ≠ lists as its clients more than two dozen law enforcement groups in 13 states, as well as the FBI and Secret Service. "We are on the cusp of a surveillance society," said Steinhardt, of the ACLU. Officials at Food Service Solutions, Sagem Morpho and the ACLU said they didn't know of any other state where fingerprints were being used in lunch lines. NO MORE LOST CARDS Penn Cambria School District, about 75 miles east of Pittsburgh, began the program in August 1999 at its high school and plans to use it in all five of its schools by next year. Technology and Society ï Using cell phones to stop smokingï McDonald's offers interactive kiosksï NAPOLI: Super Bowl is dot-com Super Bustï Digital gender gapï High-tech inaugural protestsï NAPOLI: Don't blame Internet for adoption brouhaha "The other benefits? One, no lost cards. Two, no one can access another person's account with a lost PIN number. Three, it's good for the parents. The money is in the account and they know that the money is only being spent on school lunches," said Milton Miller, Penn Cambria's director of food services. Also, those who receive free and reduced-price lunches aren't embarrassed by having their names checked off a list. "That's one of the biggest benefits," said David Magill, superintendent of the Lower Merion School District, which includes Welsh Valley. "They won't be stigmatized." Mitch Johns, president of Food Service Solutions, said the program will cost between $4,000 and $5,000 per lunch lane. It was developed to help schools comply with federal law that prohibits schools from overtly identifying those receiving free and reduced price lunches, he said. Because the program is in the testing phase, the Lower Merion district is not paying for it. The Penn Cambria district is getting the system free because it was the first to test it. The Tussy Mountain School District in central Pennsylvania is paying. Tools and Toys ï Is Dreamcast finally dead?ï Nortel unveils tracking technologyï Sega announces new gaming systemï Movies, video games seen mergingï RealNetworks to offer NBA contentï Microsoft to help convert Javaï Gaming industry gets good gradesï AMD finds backers for mobile chip Within the next year, mobile phones and personal computers will have fingerprint scanners as optional equipment, providing convenience as well as increased security. Government benefits such as welfare payments are increasingly being secured with biometrics. The Immigration and Naturalization Service relies on handprint scans to help some 45,000 frequent international travelers re-enter the country without a passport check. "Right now you have databases full of information that can be hacked," said Richard Norton, executive director of the International Biometrics Association in Washington, D.C. "You can't take a look at a biometric, which is a string of ones and zeros, and figure out who somebody is." © 2001 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. IBM backs Linux software system Nortel unveils tracking software Sega kills Dreamcast to focus on software KRAKOW: Microportable video projectors Qualcomm aims for wireless standard MSNBC Cover Page HAVE A GREAT DAY !!! ---------- http://www.msnbc.com/news/521005.asp [Non-text portions of this message have been removed] 2428 From: Thomas H. Jones Date: Wed Jan 31, 2001 2:30pm Subject: RE: Digest Number 495 >Manufacturers involved in Government NLJD trials are bound by a >Confidentiality Clause, I suppose those who fail to pre-qualify have >nothing to lose by spreading false rumors. Unwarranted criticism of >competitors equipment, by any manufacturer, does little to convince >potential users that your kit is any good! >All NLJDs, particularly pulsed systems, will potentially activate certain >types of target, as will mobile phones, transceivers etc. >Adrian Hickey >Audiotel International Ltd Ouch! I certainly have no intention of propagating any false rumors and you can be assured that false rumors would never be generated by anyone at REI. The only intent was to clarify the operation of the ORION. I apologize and should not have included the information that I passed from agents in India without first verification. Thank you for your succinct clarification. The ORION was not included in the India government trials for EOD because we refused to market and recommend the product for EOD because of the unknown risk. But, to further clarify and to my knowledge, the ORION is the only NLJD that has multiple modes of operation and can operate in a CW mode or in a pulsed mode. As previously stated, we do not pretend to be EOD experts, but if you are, please tell me the best approach. If you believe pulsing to be a bad idea, put the ORION in the CW mode with low output power and use the DSP to achieve superior sensitivity. If you believe CW power to be a bad idea, put the ORION in the pulsing mode to have a very low average power and use the DSP to also have superior sensitivity. I am hoping that some experts will clarify the best approach. I will comment no further to this list regarding NLJD and EOD because I believe the thread to be exhausted. But, I do feel that the comment from Adrian Hickey about "Unwarranted criticism" seems a bit ironic. Tom Jones REI General Manager 2429 From: Charles P Date: Wed Jan 31, 2001 5:32pm Subject: Re: Fingerprints for food >"That's one of the biggest benefits," said David Magill, >superintendent of the Lower Merion School District Hey, my alma mater ! (always on the cutting edge... at least that's what they told us back in '73) charles ----- Original Message ----- From: To: Sent: Wednesday, January 31, 2001 4:08 PM Subject: [TSCM-L] Fingerprints for food > Technology allows some students to leave lunch money at home Students > at Welsh Valley Middle School, in Penn Valley, Pa., are part of a > fingerprinting program that lets pupils pay for tater-tots and other > cafeteria delicacies without ever carrying cash. > ASSOCIATED PRESS > PENN VALLEY, Pa., Jan. 24 - The tiny ridges on a student's index > finger could soon make school lunch money and lunch-line bullies a thing > of the past. A fingerprint identification program used in three > Pennsylvania school districts allows pupils to pay for chicken nuggets, > sloppy Joes, pizza and other cafeteria delicacies without ever carrying > cash. > > > Food Service Solutions > Penn Cambria School District > Sagem Morpho > > > "IT'S CERTAINLY a lot faster," said Linda Kelly, > cafeteria manager at Welsh Valley Middle School in this Philadelphia > suburb. > Students place their index fingers on small scanners, and > a template matches them with their electronic print. The program plots > 27 points on a grid that correspond with the fingerprint's ridges. > The fingerprint image is discarded, and the points are > assigned numbers. According to the system's manufacturers, only the > numbers are retained and those cannot be reinterpreted into a > fingerprint image. > "Both parents and students can rest assured that the > fingerprint images cannot be used by law enforcement for identification > purposes," says the Web site of Food Service Solutions Inc., the Altoona > company that installed the system. "Only a mathematical algorithm > remains in the system after registration - not fingerprint images." > But the American Civil Liberties Union fears the > technology - known as biometrics - could hasten the end of privacy > rights. Biometrics uses unalterable physical characteristics to verify a > person's identity. > On the Frontier > . Intel introduces energy-saving chips. How to up radio signal > data capacity. Too cool! Shrinking portable devices. IBM > building Linux supercomputer. Honey, I shrunk the > scientist. Voice recognition improves > "It's a sign of things to come," said Barry Steinhardt, > associate director of the ACLU. "We will be able to be identified with > biometrics in virtually every situation. The use of the digital > fingerprint is just one example of that." > Biometric devices that identify people by physical > characteristics - such as eye patterns, voice tones and handprints - > have been the stuff of cinema for decades. Until recently, costs had > restricted their use mainly to government offices and military bases. > > A WAY AROUND SLOW LINES > Welsh Valley, about 10 miles west of Philadelphia, began > testing the program in the fall to deal with slow lunch lines. > "You don't have to bring lunch money. So, somebody can't > take it," said Tawanda Worthy, 13. > Only a few of Welsh Valley's 700 children have declined > to be fingerprinted. "They think the FBI's going to get them or > something," said Kelly, the cafeteria manager. > The corporation that supplies Food Service Solutions with > the system - Sagem Morpho Inc. of Tacoma, Wash. - lists as its > clients more than two dozen law enforcement groups in 13 states, as well > as the FBI and Secret Service. > "We are on the cusp of a surveillance society," said > Steinhardt, of the ACLU. > Officials at Food Service Solutions, Sagem Morpho and the > ACLU said they didn't know of any other state where fingerprints were > being used in lunch lines. > > NO MORE LOST CARDS > Penn Cambria School District, about 75 miles east of > Pittsburgh, began the program in August 1999 at its high school and > plans to use it in all five of its schools by next year. > Technology and Society > . Using cell phones to stop smoking. McDonald's offers > interactive kiosks. NAPOLI: Super Bowl is dot-com Super > Bust. Digital gender gap. High-tech inaugural > protests. NAPOLI: Don't blame Internet for adoption brouhaha > "The other benefits? One, no lost cards. Two, no one can > access another person's account with a lost PIN number. Three, it's good > for the parents. The money is in the account and they know that the > money is only being spent on school lunches," said Milton Miller, Penn > Cambria's director of food services. > Also, those who receive free and reduced-price lunches > aren't embarrassed by having their names checked off a list. > "That's one of the biggest benefits," said David Magill, > superintendent of the Lower Merion School District, which includes Welsh > Valley. "They won't be stigmatized." > Mitch Johns, president of Food Service Solutions, said > the program will cost between $4,000 and $5,000 per lunch lane. It was > developed to help schools comply with federal law that prohibits schools > from overtly identifying those receiving free and reduced price lunches, > he said. > Because the program is in the testing phase, the Lower > Merion district is not paying for it. The Penn Cambria district is > getting the system free because it was the first to test it. The Tussy > Mountain School District in central Pennsylvania is paying. > Tools and Toys > . Is Dreamcast finally dead?. Nortel unveils tracking > technology. Sega announces new gaming system. Movies, video > games seen merging. RealNetworks to offer NBA content. Microsoft > to help convert Java. Gaming industry gets good grades. AMD > finds backers for mobile chip > Within the next year, mobile phones and personal > computers will have fingerprint scanners as optional equipment, > providing convenience as well as increased security. > Government benefits such as welfare payments are > increasingly being secured with biometrics. The Immigration and > Naturalization Service relies on handprint scans to help some 45,000 > frequent international travelers re-enter the country without a passport > check. > "Right now you have databases full of information that > can be hacked," said Richard Norton, executive director of the > International Biometrics Association in Washington, D.C. "You can't take > a look at a biometric, which is a string of ones and zeros, and figure > out who somebody is." > > © 2001 Associated Press. All rights reserved. This > material may not be published, broadcast, rewritten or redistributed. > > > IBM backs Linux software system Nortel unveils tracking > software Sega kills Dreamcast to focus on software KRAKOW: > Microportable video projectors Qualcomm aims for wireless > standard MSNBC Cover Page > > > > > > > > > > HAVE A GREAT DAY !!! > > > > > > > > > > > > > > > ---------- > > http://www.msnbc.com/news/521005.asp > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2430 From: Charles P Date: Wed Jan 31, 2001 5:36pm Subject: Darwin-ian last words I suppose this could be added to the list of famous last words: "Sure, I've use my NLJD for EOD many times!" :) 2431 From: James M. Atkinson, Comm-Eng Date: Wed Jan 31, 2001 6:12pm Subject: Re: Darwin-ian last words At 6:36 PM -0500 1/31/01, Charles P wrote: >I suppose this could be added to the list of famous last words: > >"Sure, I've use my NLJD for EOD many times!" > >:) My offer has always been that if a salesman for a NLJD manufacture will hold a live blasting cap in his teeth I would be happy to pass a live NLJD over it several times. It's funny that U.S. Army TM 5-25, page 2-7 mandates a 30 meter "minimum safe distance" from any RF transmitter antenna (more if the RF is over 3 watts), and yet a NLJD is a transmitter that people will foolishly pass over a land mine or improvised explosive device. Using a NLJD for EOD work is like looking for a gas leak with a lit match. If you have thousands of "disposable" bomb techs (like India, Pakistan, and a few other countries) then the loss of a person here in there is just a minor annoyance to their governments. If you really, really feel the need to use a fairly strong RF transmitter to test bombs, then at least wear a full bomb suit, and use a proverbial 10 foot stick. Just to make myself clear: I do not in any way advocate the use of a NLJD in EOD or bomb disposal applications, nor will I encourage others to create an RF field in the presence of or within the stand-off zone at or around an explosive device. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Hawkspirit Date: Thu Jan 27, 2005 0:25pm Subject: Sweep Needed Still need someone to handle the Wheeling WV. Residential Sweep. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com 760-329-4404 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 1/25/2005 [Non-text portions of this message have been removed] 10799 From: contranl Date: Thu Jan 27, 2005 0:36pm Subject: Re: "Sound of Voices" ?????? . I have played that video over and over again...and the man is clearly suggesting that it can detect the sound of voices. Now this does not mean that they actuallly have implemented that but chances are that some have or will...since the manufacturer obviously offers that feature he might say to his customers: "The price is 3450 US $ do you want the voice detection option also? that will cost you only 400 US $ extra when purchased now" The customer ( using available homeland security funds) will probably say "i want the full package" Even if they are in doubt and don't purchase that feature right now they could always add that on later...probably this is just a little piece of added software for the integrated DSP chips,chances are that this software can be remotely uploaded ...wich means that it won't take less then 15 minutes to add such a big brother feature for a whole city. Also what is there to filter if you want to detect all if this : gunshots + car-accidents + human voices that covers the whole audio-range ! all of that under non-ideal circumstances (traffic-noise) Still i don't get what they want the voice detection for..and actually i don't believe it...in my vision when the man says voice detection he actually means "switching on the mic" to hear whatever is going on. Probably that can't be done with the standalone "gunshot-detectors" since they only send data-packets containing only information about when and where a gunshot was detected..but the traffic-lights is different since they already have a direct video + data connection to a control-center it would be a piece of cake to add audio. I don't think there are much interesting conversations to listen to on roadcrossings, but a practical example could be recording every sound close to such a traffic-light and use such a recording later on in for example the reconstruction of an accident where analysys of the sound could clear up things...in practice that means that every sound is pre-recorded and stored all the time ! That it's the beginning of the end..the government using 4000 remote controlled microphones in every city ! They probably also hook it up to the "Total Awareness Program" Worst of all is that the public is obviously so influenced by the government convincing them that they are in danger...that they don't even care anymore...where are the protests ? Your(state-controlled) TV-stations broadcast these things like they are normal part of life ...without any concerns or comments. One more 9/11 kind of happening will be enough for the population to allow video-cameras in their bedrooms...so all that will be left of their privacy are their dreams. All of this as part of the "New World Order" as wanted by George Doubleyou and his sponsors. Don't worry it's not only America but everywhere in the world like for example my country The Netherlands where they have since the beginning of this month a new law that tells you to have identification on you at all times...what bullshit ! when just around every corner you can buy your mariuana and hashish in any quantity you like...having everybody smoking pot on a daily basis does not contribute to a sucessfull society ... but it helps getting funds for controlling the population...Whe have had 15 Mafia-style murders over the last few years...NOT ONE has been solved ! Recently a Politician (Pim Fortuyn)who had different ideas and would have made it as president of our country was killed by some animal-rights activist, turns out now the politician was already bugged in his house and car...by the secret service. I could go on for hours ...but i am getting off-topic here. Surveillance.Radio and Electronics are a big part of my life. but they way things are going now make me sick. Tetrascanner 10800 From: Hawkspirit Date: Thu Jan 27, 2005 1:01pm Subject: Star Sweeping Hey donít laugh too hard at this, I have made serious money over the years sweeping homes of movie and rock stars that have paparazzi fears. Excellent clients. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Date: Thu, 27 Jan 2005 00:45:03 -0000 From: "satcommunitfive" Subject: Re: Police probe Nicole Kidman 'bug' great a FM bug listening to worms in the grass -and probably wind real useful ! and they said hi tech on the telly ! -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10801 From: James M. Atkinson Date: Thu Jan 27, 2005 1:10pm Subject: Free-speech suit filed against Japan http://smh.com.au/articles/2005/01/27/1106415700622.html Free-speech suit filed against Japan Tokyo January 27, 2005 - 10:20AM A US computer consultant says he has sued the Japanese government for the cancellation of his speech after he uncovered flaws in a controversial database of Japanese citizens' personal data. An official admitted the government had "concerns" about the speech by Ejovi Nuwere, a Boston-based consultant, which was scheduled at an international security symposium in Tokyo last November. Nuwere filed a civil case alleging violation of freedom of expression. He accused the internal affairs ministry of pressuring conference organisers to cancel his speech. "It was my impression that they felt if I said 'This is how we can improve the system', that means that the system needs to be improved. And they refused to admit that," Nuwere told a press conference. Nuwere was due to speak about Juki-Net, a computer network launched in 2002 in which municipalities assign identification codes to residents to let government agencies track people by name, gender, address and date of birth. said he had discovered "several fundamental flaws" in the system but had not planned to detail them in his speech. He had been under contract to work with the central prefecture of Nagano, which opposed Juki-Net. Many mayors, computer experts and privacy activists wanted to stop Juki-Net, saying personal data could be leaked due to technical glitches or computer illiteracy by local officials. The internal affairs ministry runs the project and was an official supporter of the symposium. "There were concerns that the planned speech would lead to disclosure of particular vulnerabilities of particular systems, like talking about how to open locks on certain doors," a ministry official in charge of information security said. He said the ministry spoke to symposium leaders but denied that it tried to suppress freedom of speech. "We welcome all sorts of opinions being expressed about Juki-Net. That's not a problem. But a person who penetrated certain systems was going to talk about his experience at the symposium. We had concerns," he said. AFP ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10802 From: Tech Sec Lab Date: Thu Jan 27, 2005 2:17pm Subject: Cryptome Well, it seems the DHS got their way in the end. Cryptome has been closed down. For the moment anyway. http://www.homelandsecurityus.com/jan05.asp Shame. 10803 From: contranl Date: Thu Jan 27, 2005 2:28pm Subject: Dutch police catch shoplifters using RFID-jammers . Dutch police have catched East-European shoplifters who were using RFID jammers to avoid the triggering of the shops RF-tag alarm sytems. A shop security officer saw them leaving with expensive parfums without having payed for them. When police arrived they discovered small boxes with electronics to defeat the tag alarm system Police say the shoplifters had choosen parfums because they are small and expensive. The Dutch newspaper "De Telegaaf" of today shows a picture of such a unit wich consist of 2 small boxes about the size of a pack of cigarettes...nicely packed in what looks like a little leather bag with a hook to easely clip them somewhere under their clothes. source: http://www.telegraaf.nl/ Funny that i predicted 2 months ago that the first they where going to catch with this would probably be East Europeans. Interesting how East Europeans are always the first(in Europe) to use electronics for low-level crime. A few of these typical East-European tricks: Copying magnetic bank/creditcards at tellermachines including video transmitters to see the pin-codes Emptying parking payment posts (drilling holes close to the locks and jamming their wireless alarms) RFID jammers Tetrascanner 10804 From: Michael Dever Date: Thu Jan 27, 2005 2:36pm Subject: Re: Dutch police catch shoplifters using RFID-jammers Is there an English language reference for this? Regards Mike On 28 Jan 2005, at 07:28, contranl wrote: > Dutch police have catched East-European shoplifters > who were using RFID jammers to avoid the triggering > of the shops RF-tag alarm sytems. > > A shop security officer saw them leaving with expensive parfums > without having payed for them. > > When police arrived they discovered small boxes with electronics > to defeat the tag alarm system > > Police say the shoplifters had choosen parfums because they are small > and expensive. > > The Dutch newspaper "De Telegaaf" of today shows a picture of > such a unit wich consist of 2 small boxes about the size of a > pack of cigarettes...nicely packed in what looks like a little > leather bag with a hook to easely clip them somewhere under their > clothes. > > source: http://www.telegraaf.nl/ > > Funny that i predicted 2 months ago that the first they where > going to catch with this would probably be East Europeans. > > Interesting how East Europeans are always the first(in Europe) > to use electronics for low-level crime. > > A few of these typical East-European tricks: > > > Copying magnetic bank/creditcards at tellermachines > including video transmitters to see the pin-codes > > Emptying parking payment posts (drilling holes close to the locks > and jamming their wireless alarms) > > RFID jammers > > Tetrascanner Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Voice: (02) 6254 5337 Email: dca@b... This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10805 From: contranl Date: Thu Jan 27, 2005 2:47pm Subject: Re: Dutch police catch shoplifters using RFID-jammers I dont know Mike, I guess that my translation tells it all I could'nt find it on the newspapers internet version (wich differs from the printed) If you insist i could scan the original article with picture but that could take a while since i do'nt have a scanner myself the picture does not reveal anything. Lets wait till tomorrow to see if other internet sources have picked up the story...i'll let you know. Greets Tetrascanner 10806 From: G P Date: Thu Jan 27, 2005 2:52pm Subject: Re: Re: "Sound of Voices" ?????? Hmm, maybe not even dreams, especially when entering into deep REM. I bet the boys over at SKUNKWORKS have been dabbling in that type of technology, remote EEG sampling in conjunction with DSP correlation. Those wild and crazy LMCO SKUNKWORKS fellows, spooky spookersons indeed! --- contranl wrote: > ...so all that > will be left of > their privacy are their dreams. 10807 From: G P Date: Thu Jan 27, 2005 2:57pm Subject: 6 GHz Anyone ever run across a 6 Ghz signal in TSCM sweeps, specifically 6.11 Ghz? 10808 From: Michael Dever Date: Thu Jan 27, 2005 3:06pm Subject: Re: Re: Dutch police catch shoplifters using RFID-jammers Thanks! No need to scan at this stage. Maybe some other news services will pick this story up. We will wait. Regards Mike On 28 Jan 2005, at 07:47, contranl wrote: > > I dont know Mike, > > I guess that my translation tells it all > I could'nt find it on the newspapers internet version > (wich differs from the printed) > > If you insist i could scan the original article with picture > but that could take a while since i do'nt have a scanner myself > the picture does not reveal anything. > > Lets wait till tomorrow to see if other internet sources > have picked up the story...i'll let you know. > > Greets > > Tetrascanner > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10809 From: Michael Dever Date: Thu Jan 27, 2005 3:28pm Subject: Re: a good spectrum analyzer between 2 and 6ghz Jim What brand/model of preamplifier(s) would you suggest for the R&S hand held SA. Regards Mike On 25 Jan 2005, at 04:20, James M. Atkinson wrote: > > You might want to consider the R&S hand-held units. > > The units are easy to use, very inexpensive, but you will need to use > an > external pre-amplifier. > > -jma > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10810 From: contranl Date: Thu Jan 27, 2005 3:57pm Subject: Re: Dutch police catch shoplifters using RFID-jammers I found the original story (a litle less then than the newspaper one) it's here: http://www.telegraaf.nl/binnenland/article17585881.ece if you need it copy it cause they might remove it tomorrow to translate that go to babelfish: http://babelfish.altavista.com/babelfish/tr and select translate a website page frome Dutch to English then you get a fairly redicioulous translation but you get the point :) In addition to what i said before it turns out that all police- districts were warned and that this is not a single case but the whole country is overflown with East-European gangs exersizing this trick. Let me describe the box again...it is not 2 but just 1 cigarette- pack-size white colored plastic box ,with 1 switch and an earplug type connector that holds a plug with a piece of wire (antenna) There is a small blue-colored pouch made of soft material with a strap/belt to hang it around your neck or waist...i'm not shure but it looks like the strap is also part of the antenna. In that case i estimate the total length of the antenna around 1 meter. They say they are already working on a way to counter it. Tetrascanner 10811 From: Tim Johnson Date: Thu Jan 27, 2005 11:13am Subject: Re: "Sound of Voices" ?????? I've only been on the list a day or so, but so far nothing has been posted relating to TSCM. I have a problem relating smoking bans to TSCM. Then again, I'm a former smoker and don't miss the smell when I'm eating, walking up to a building or actually in an office. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10812 From: L. F. Elia Date: Thu Jan 27, 2005 1:25pm Subject: Re: Fire closes New York subway line Kinda sad if you ask me. Just like in information assurance, where most of the threat comes from ineptitude rather than malice. --- "James M. Atkinson" wrote: > > Does anybody else on the list find it ironic that a > homeless guy with a > shopping cart was able to accidently take out a > chunk of the infrastructure > of New York? ===== Solaris/LINUX/Windows administration Internet consulting & Web site design ------------------------------------- lfelia@y..., Virginia Beach VA, 23462 __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10813 From: Robert G. Ferrell Date: Thu Jan 27, 2005 2:20pm Subject: Re: Cryptome At 02:17 PM 1/27/2005, Tech Sec Lab wrote: >Well, it seems the DHS got their way in the end. > >Cryptome has been closed down. For the moment anyway. > >http://www.homelandsecurityus.com/jan05.asp No, it hasn't. Go look for yourself. RGF 10814 From: Tim Johnson Date: Thu Jan 27, 2005 1:02pm Subject: Re: Star Sweeping Roger, Sometimes those who laugh haven't listened to what you can actually get from the el cheapo FM wireless mics. tj -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10815 From: Thomas Kellar Date: Thu Jan 27, 2005 2:38pm Subject: Re: Cryptome Did you go to the site to confirm this? I get to http://cryptome.org just fine. On Thu, 27 Jan 2005, Tech Sec Lab wrote: > Well, it seems the DHS got their way in the end. > > Cryptome has been closed down. For the moment anyway. > > http://www.homelandsecurityus.com/jan05.asp > > Shame. > 10816 From: Thomas Kellar Date: Thu Jan 27, 2005 2:09pm Subject: Re: Star Sweeping This is probably priledged knowledge but I will ask anyway: What if you sweep a client and declare them to be free of bugs or other similar covert surveillance devices but it turns out your client's enemies (paparzzzi?) are bouncing laser beams off your clients windows and are listening in that way. Consequently the enemy gains some knowledge that they use. Can your client come back and sue you for malfeasence? I.e., what if 1. There is a bug you did not find 2. The bad guys are using means you do not check for I suppose that the client would have to prove that the knowledge was gained due to your alleged negligence and that probably would be difficult. I frequently am asked to check friends and relative's computers for spyware and viruses and when I am done, I always declare that to the best of my knowledge they are free of such but I never claim absolutely that they are. Is there a similarity there? Thanks for your time, Thomas On Thu, 27 Jan 2005, Hawkspirit wrote: > Hey donít laugh too hard at this, I have made serious money over the years > sweeping homes of movie and rock stars that have paparazzi fears. Excellent > clients. > Roger Tolces > > HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > Date: Thu, 27 Jan 2005 00:45:03 -0000 > > From: "satcommunitfive" > > Subject: Re: Police probe Nicole Kidman 'bug' > great a FM bug listening to worms in the grass -and probably wind > > real useful ! > and they said hi tech on the telly ! -- w8twk Freelance Systems Programming http://www.fsp.com 10817 From: J.A. Terranson Date: Thu Jan 27, 2005 2:39pm Subject: Re: Cryptome On Thu, 27 Jan 2005, Tech Sec Lab wrote: > Well, it seems the DHS got their way in the end. > > Cryptome has been closed down. For the moment anyway. Wrong: reread, and then go to John's site, http://www.cryptome.org. Still very much alive. > http://www.homelandsecurityus.com/jan05.asp > > Shame. Don't belive everything you read. -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner 10818 From: Gregory Hicks Date: Thu Jan 27, 2005 2:43pm Subject: Re: Cryptome > To: > From: "Tech Sec Lab" > Date: Thu, 27 Jan 2005 20:17:17 -0000 > Subject: [TSCM-L] Cryptome > > > Well, it seems the DHS got their way in the end. > > Cryptome has been closed down. For the moment anyway. > > http://www.homelandsecurityus.com/jan05.asp Seems to be back up. I just went to www.cryptome.org and got a nice page that looks like it was recently updated... Regards, Gregory Hicks ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10819 From: L. F. Elia Date: Thu Jan 27, 2005 2:47pm Subject: Re: Cryptome Um no not as far as I can tell and I was just on it. --- Tech Sec Lab wrote: > Well, it seems the DHS got their way in the end. > > Cryptome has been closed down. For the moment > anyway. > > http://www.homelandsecurityus.com/jan05.asp > > Shame. > > ===== Solaris/LINUX/Windows administration Internet consulting & Web site design ------------------------------------- lfelia@y..., Virginia Beach VA, 23462 __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10820 From: John Young Date: Thu Jan 27, 2005 7:32pm Subject: Re: Cryptome Cryptome was not closed. The report author misunderstood the NPR account which said a DoE site had been closed apparently because it had offered some of the DHS Morning Briefs published on Cryptome. The mistaken author has since posted a correction stating that unnamed Cryptome was not closed. Closing the DoE site for sharing public information is a shame. It is likely DoE saw nothing worth withholding in the briefs. (Recall that Tom Ridge recently said that there was not really any danger behind the threats DHS warned about just prior to the presidential election.) Still, an opportunistic contractor who runs intelligence conferences is claiming the release of the morning briefs was a grave security breach which warrants heavy attendance at an upcoming conference, sign up now! http://biz.yahoo.com/prne ws/050126/law016_1.html Press Release [Begin excerpt] On Friday, January 21, there was a major security flaw in a large Federal Government Agency's computers which leaked five months of classified documents issued by the DHS. The leak involved dozens of "Morning Briefs," documents which are circulated by the DHS Operations Center to the White House, CIA, FBI and other federal and state law enforcement officials. This is just the type of problem that will be on the minds of attendees at the National Intelligence Conference next month in Arlington, Virginia. The Conference, known as INTELCON (www.INTELCON.US), is a major national security event aimed at helping the American intelligence community work together. [End excerpt] 10821 From: contranl Date: Thu Jan 27, 2005 4:51pm Subject: Re: Dutch police catch shoplifters ( PICTURE ! ) . It's fun to try find something difficult and even better when you finally find it !... a good picture of the RFID-jammer http://www.politie.nl/haaglanden/nieuws/landelijk_26_04_detectiepoort jes_worden_uitgeschakeld.asp At the police website in The Hague,Netherlands The text is about the same ...with one addition wich is that police say they have tried the box lots of times and every time it worked and effectively disabled de tag alarm sytem. Tetrascanner 10822 From: Hawkspirit Date: Thu Jan 27, 2005 6:32pm Subject: 6 GhZ Cordless phone base stations at 5.8GHZ Message: 17 Date: Thu, 27 Jan 2005 12:57:49 -0800 (PST) From: G P Subject: 6 GHz Anyone ever run across a 6 Ghz signal in TSCM sweeps, specifically 6.11 Ghz? -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10823 From: J.A. Terranson Date: Thu Jan 27, 2005 4:35pm Subject: Re: Star Sweeping On Thu, 27 Jan 2005, Thomas Kellar wrote: > What if you sweep a client and declare them to be free of > bugs or other similar covert surveillance devices but > it turns out your client's enemies (paparzzzi?) are > bouncing laser beams off your clients windows and are > listening in that way. Consequently the enemy gains > some knowledge that they use. Can your client come > back and sue you for malfeasence? Two points: (1) Bouncing laser beams off windows is a LOT harder than you might think, and works a lot worse than you've heard. Been there, tried that (in a lab environment no less), fed up with it :-) (2) I think you are confusing the term "malfeasence" with "error". They are not the same, nor even related. > I.e., what if > > 1. There is a bug you did not find > 2. The bad guys are using means you do not check for > > I suppose that the client would have to prove that the > knowledge was gained due to your alleged negligence and > that probably would be difficult. You are describing an "Errors and Omissions" issue. If you are doing work which may result in E&O liability (TSCM certainly falls into this classification), you better be carrying E&O insurance. Everyone I know carries at least a million in E&O, many carry a lot more (ten is not uncommon, but *wow* is it expensive!). > I frequently am asked to check friends and relative's > computers for spyware and viruses and when I am done, I > always declare that to the best of my knowledge they > are free of such but I never claim absolutely that they > are. Is there a similarity there? I would make this assertion in writing, and have them sign a copy for *your* records, just to be safe. Still, this antivirus thing is a *long* way from a TSCM sweep: discussing them in the same context makes the discussion a non-seqitor. > Thanks for your time, > > Thomas All the best, -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner 10824 From: wiggyyy2000 Date: Thu Jan 27, 2005 5:30pm Subject: Re: 6 GHz yes but the one i saw was at about 6.02Ghz approx.... --- In TSCM-L@yahoogroups.com, G P wrote: > Anyone ever run across a 6 Ghz signal in TSCM sweeps, > specifically 6.11 Ghz? 10825 From: joe joe Date: Thu Jan 27, 2005 6:31pm Subject: Re: 6 GhZ ya sometimes they go into the 5.9 to very close to 6Ghz --- Hawkspirit wrote: > > > Cordless phone base stations at 5.8GHZ > > > > > > > > Message: 17 > > Date: Thu, 27 Jan 2005 12:57:49 -0800 (PST) > > From: G P > > Subject: 6 GHz > > > > Anyone ever run across a 6 Ghz signal in TSCM > sweeps, > > specifically 6.11 Ghz? > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.1 - Release > Date: 1/27/2005 > > > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10826 From: Tim Johnson Date: Thu Jan 27, 2005 6:26pm Subject: Re: Star Sweeping My reports contains the following information as something of a protection for myself and my company. tim OPINION The technical surveillance countermeasures examination was conducted consistent with the standards and practices of technical surveillance countermeasures examinations. In the course of our examination, no devices were discovered in the designated area that were either installed or modified for the express purpose of listening to private conversations, telephonically or otherwise. Further, there was no physical evidence observed during the examination which would indicate that any electronic eavesdropping devices were installed and removed prior to our inspection; however, we cannot definitely preclude that possibility. LIMITATIONS AND OPINIONS The technical surveillance countermeasures examination performed was intended to draw conclusions only pertaining to the services performed and cannot be relied upon to disclose procedural irregularities or illegal acts committed by persons authorized or having access to the serviced areas. The overall effectiveness of the examinations performed may be impacted by the existing technical limitations imposed by the equipment, time constraints and the degree of confidentiality afforded by you. WARNING Electronic Countermeasures examinations of the type conducted indicates the status of the area at the conclusion of the examination. The high degree of security achieved by this examination may be compromised by any of the following: (1) entry of unauthorized persons to the examined area, (2) failure to maintain continuous effective control of the examined areas, (3) allowing repairs or alterations within the examined areas without the supervision of security or management personnel, or (4) the introduction of new furnishings and electronic equipment into the examined areas. -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10827 From: Michael Dever Date: Thu Jan 27, 2005 8:02pm Subject: Re: Star Sweeping Tim On 28 Jan 2005, at 11:26, Tim Johnson wrote: > > > My reports contains the following information as something of a > protection for myself and my company. > > tim > > > OPINION > > The technical surveillance countermeasures examination was conducted > consistent with the standards and practices of technical surveillance > countermeasures examinations. Whose standards? We always include a copy of our 'standards' with our proposals so that the client knows exactly what service we are performing. > In the course of our examination, no > devices were discovered in the designated area that were either > installed or modified for the express purpose of listening to private > conversations, telephonically or otherwise. Further, there was no > physical evidence observed during the examination which would > indicate that any electronic eavesdropping devices were installed and > removed prior to our inspection; however, we cannot definitely > preclude that possibility. > > LIMITATIONS AND OPINIONS > > The technical surveillance countermeasures examination performed was > intended to draw conclusions only pertaining to the services > performed and cannot be relied upon to disclose procedural > irregularities or illegal acts committed by persons authorized or > having access to the serviced areas. The overall effectiveness of > the examinations performed may be impacted by the existing technical > limitations imposed by the equipment, time constraints and the degree > of confidentiality afforded by you. > > WARNING > > Electronic Countermeasures examinations of the type conducted > indicates the status of the area at the conclusion of the > examination. The high degree of security achieved by this examination > may be compromised by any of the following: (1) entry of > unauthorized persons to the examined area, (2) failure to maintain > continuous effective control of the examined areas, (3) allowing > repairs or alterations within the examined areas without the > supervision of security or management personnel, or (4) the > introduction of new furnishings and electronic equipment into the > examined areas. > > -- > > Tim Johnson Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] From: Paul Curtis Date: Thu Jan 27, 2005 10:38pm Subject: RE: Fire closes New York subway line Just remember, There is no possibility on the face of the earth that all of the robbers, murderers, rapists, muggers and burglars could ever hope to do as much damage as the incompetent people we encounter every day! Paul Curtis _____ From: L. F. Elia [mailto:lfelia@y...] Sent: Thursday, January 27, 2005 11:26 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Fire closes New York subway line Kinda sad if you ask me. Just like in information assurance, where most of the threat comes from ineptitude rather than malice. --- "James M. Atkinson" wrote: > > Does anybody else on the list find it ironic that a > homeless guy with a > shopping cart was able to accidently take out a > chunk of the infrastructure > of New York? ===== Solaris/LINUX/Windows administration Internet consulting & Web site design ------------------------------------- lfelia@y..., Virginia Beach VA, 23462 __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10829 From: Paul Curtis Date: Thu Jan 27, 2005 11:18pm Subject: RE: Star Sweeping One more thing to consider. When you make your assertion that the place is bug free it is only bug free at the exact point in time when you made the sweep. Further, if there are quiet devices or there is no active system in operation at the time you make the sweep, you can hardly be expected to have discovered such, particularly if it was off premises. I second the comments regarding laser beams as listening devices - 80 percent fantasy - 20 percent reality (if that much). Paul Curtis _____ From: J.A. Terranson [mailto:measl@m...] Sent: Thursday, January 27, 2005 14:36 To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Star Sweeping On Thu, 27 Jan 2005, Thomas Kellar wrote: > What if you sweep a client and declare them to be free of > bugs or other similar covert surveillance devices but > it turns out your client's enemies (paparzzzi?) are > bouncing laser beams off your clients windows and are > listening in that way. Consequently the enemy gains > some knowledge that they use. Can your client come > back and sue you for malfeasence? Two points: (1) Bouncing laser beams off windows is a LOT harder than you might think, and works a lot worse than you've heard. Been there, tried that (in a lab environment no less), fed up with it :-) (2) I think you are confusing the term "malfeasence" with "error". They are not the same, nor even related. > I.e., what if > > 1. There is a bug you did not find > 2. The bad guys are using means you do not check for > > I suppose that the client would have to prove that the > knowledge was gained due to your alleged negligence and > that probably would be difficult. You are describing an "Errors and Omissions" issue. If you are doing work which may result in E&O liability (TSCM certainly falls into this classification), you better be carrying E&O insurance. Everyone I know carries at least a million in E&O, many carry a lot more (ten is not uncommon, but *wow* is it expensive!). > I frequently am asked to check friends and relative's > computers for spyware and viruses and when I am done, I > always declare that to the best of my knowledge they > are free of such but I never claim absolutely that they > are. Is there a similarity there? I would make this assertion in writing, and have them sign a copy for *your* records, just to be safe. Still, this antivirus thing is a *long* way from a TSCM sweep: discussing them in the same context makes the discussion a non-seqitor. > Thanks for your time, > > Thomas All the best, -- Yours, J.A. Terranson sysadmin@m... 0xBD4A95BF Civilization is in a tailspin - everything is backwards, everything is upside down- doctors destroy health, psychiatrists destroy minds, lawyers destroy justice, the major media destroy information, governments destroy freedom and religions destroy spirituality - yet it is claimed to be healthy, just, informed, free and spiritual. We live in a social system whose community, wealth, love and life is derived from alienation, poverty, self-hate and medical murder - yet we tell ourselves that it is biologically and ecologically sustainable. The Bush plan to screen whole US population for mental illness clearly indicates that mental illness starts at the top. Rev Dr Michael Ellner ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10830 From: Charles Patterson Date: Thu Jan 27, 2005 11:40pm Subject: Re: Star Sweeping > > What if you sweep a client and declare them to be free of > bugs or other similar covert surveillance devices but Declaring someone to be completely free of surveillance devices seems to be a pretty big assumption. I will state that we did not find any working devices in the areas specified... and some things like Tim says. And we will tell them many of the other ways that surveillance could be taking place- employees, documents, trash, air ducts, poor physical security, etc. Also we state that our results are for the time period of the sweep. If there was a device removed before we got there, or placed after we left (such as if they don't follow security recommendations) we have no control over that. You do need to word your contracts and reports carefully. Charles > it turns out your client's enemies (paparzzzi?) are > bouncing laser beams off your clients windows and are > listening in that way. Consequently the enemy gains > some knowledge that they use. Can your client come > back and sue you for malfeasence? > > I.e., what if > > 1. There is a bug you did not find > 2. The bad guys are using means you do not check for > > I suppose that the client would have to prove that the > knowledge was gained due to your alleged negligence and > that probably would be difficult. > > I frequently am asked to check friends and relative's > computers for spyware and viruses and when I am done, I > always declare that to the best of my knowledge they > are free of such but I never claim absolutely that they > are. Is there a similarity there? > > Thanks for your time, > > Thomas > > > On Thu, 27 Jan 2005, Hawkspirit wrote: >> Hey donít laugh too hard at this, I have made serious money over the >> years >> sweeping homes of movie and rock stars that have paparazzi fears. >> Excellent >> clients. >> Roger Tolces >> >> HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com >> Date: Thu, 27 Jan 2005 00:45:03 -0000 >> >> From: "satcommunitfive" >> >> Subject: Re: Police probe Nicole Kidman 'bug' >> great a FM bug listening to worms in the grass -and probably wind >> >> real useful ! >> and they said hi tech on the telly ! > > > -- > w8twk Freelance Systems Programming http://www.fsp.com > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10831 From: A Grudko Date: Fri Jan 28, 2005 3:05am Subject: RE: Kidman/Star Sweeping >Date: Thu, 27 Jan 2005 00:45:03 -0000 >From: "satcommunitfive" >Subject: Re: Police probe Nicole Kidman 'bug' >great a FM bug listening to worms in the grass -and probably wind >real useful ! An old PI trick is to place a cheap FM bug next to an observant subject's gate or garage door, then sit out of sight with the car radio tuned into the worms and wind. When the PI hears the gate/door opening he slowly cruises into the road so that as the subject emerges the PI vehicle looks mike just another motorist. > and they said hi tech on the telly ! We can to some degree excuse the journos for getting technical details wrong (also they may have been given disinformation), but Noel McMaster (director of Kidman's personal security agency) really told the newspaper. "There is no doubt that any information that we were transmitting would have been heard,", then it might not have been a simple FM bug. One has to wonder what kind of "information" Ms Kidman might have been "transmitting" and how? Perhaps what they mean is that there was a low power room/phone bug in her apartment and the device found outside was either a receiver/recorder or a repeater. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links -- No virus found in this incoming message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 10832 From: A Grudko Date: Fri Jan 28, 2005 4:41am Subject: RE: 6 GHz -----Original Message----- From: G P [mailto:telos888@y...] > Anyone ever run across a 6 Ghz signal in TSCM sweeps, specifically 6.11 Ghz? On a sweep within a few Km of Johannesburg's main airport I once detected a continuous carrier over a 2 hour period on about 6.13 GHz. The signal strength was almost constant throughout the building, indicating it was not coming from that location and it DF'd towards the airport. There was no modulation on it that I could detect. I suspected it was some kind of RF link and probably not any threat to the client. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10833 From: J. Coote Date: Thu Jan 27, 2005 10:24pm Subject: RE: Star Sweeping Thomas, This is not legal advice, but a good report is a part of the service provided by a professional sweeper. The report may describe the site while protecting client information and will include what was done, what it was done with, how it was done, when the sweep began, when the sweep ended.... And if nothing was found, a report might say that during the date and time of the sweep, XX:xx to XX:xx hours, using the equipment and practices outlined in the report, no nasties were found. Some uninformed clients may get nudgy and try and pin you down; using jargon learned from TV such as "Is it CLEAN or not?" The sweeper has to be clear and concise in their client education before the sweep, and afterward in their report writing. Jay Los Angeles -----Original Message----- From: Thomas Kellar [mailto:tkellar@f...] Sent: Thursday, January 27, 2005 12:09 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Star Sweeping This is probably priledged knowledge but I will ask anyway: What if you sweep a client and declare them to be free of bugs or other similar covert surveillance devices but it turns out your client's enemies (paparzzzi?) are bouncing laser beams off your clients windows and are listening in that way. Consequently the enemy gains some knowledge that they use. Can your client come back and sue you for malfeasence? I.e., what if 1. There is a bug you did not find 2. The bad guys are using means you do not check for I suppose that the client would have to prove that the knowledge was gained due to your alleged negligence and that probably would be difficult. I frequently am asked to check friends and relative's computers for spyware and viruses and when I am done, I always declare that to the best of my knowledge they are free of such but I never claim absolutely that they are. Is there a similarity there? Thanks for your time, Thomas 10834 From: Riskbiz Date: Fri Jan 28, 2005 3:23am Subject: RE: "Sound of Voices" ?????? Tim, Get used to it. The list is apparently populated to a large degree by people who wear cranial tin foil most of the time. You'll see a real TSCM related piece on about a 1:20 ratio (that's what it has been in my short time on the list). But it's still a great place to hear extreme views on everything from smoking to big brother to politics...and get a laugh a couple of times a day. DK -----Original Message----- From: Tim Johnson [mailto:dbugman@d...] Sent: Thursday, January 27, 2005 7:14 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] "Sound of Voices" ?????? I've only been on the list a day or so, but so far nothing has been posted relating to TSCM. I have a problem relating smoking bans to TSCM. Then again, I'm a former smoker and don't miss the smell when I'm eating, walking up to a building or actually in an office. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> In low income neighborhoods, 84% do not own computers. At Network for Good, help bridge the Digital Divide! http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10835 From: Tim Johnson Date: Thu Jan 27, 2005 10:58pm Subject: Re: Star Sweeping Michael wrote: Whose standards? We always include a copy of our 'standards' with our proposals so that the client knows exactly what service we are performing. To get the rest of what is contained in my report, you're going to have to hire me. But the report also includes a description of the area(s) examined, RF analysis, Telephone analysis and Physical Examination, as well as a findings and recommendations page(s). Tim (Personal to Michael......Scott and Julian, down in your part of the world, know me if you want to check with them. You'll have to wait for Julian: he and Shirley are vacationing in HK, England and France at the moment (He is supposed to hook up with Alain-Pierre once AP gets back from the States on Sunday). And Scott is probably busy with his boats. ) -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10836 From: contranl Date: Fri Jan 28, 2005 6:57am Subject: Re: 6 GHz . It would help if you describe the signal a little more then just it's frequency. How wide was it ? Was it analog or digital ? Any typical type of modulation ? (AM/FM/PULSE) What did it sound or look like ? What was it's power ? (range/receivable distance) Duration or period of the signal ? Did you receive it on just one piece of equipment and what equipment was that ? If you include those things you might get a better answer instead of many guesses. It could have been: A wireless phone. A video camera. A datalink. Some piece of malfunctioning equipment. Or even something that is not on that frequency at all but an harmonic or mix from another frequency. In the worse case it could have been from a source inside your used equipment itself. When you ask for help in identifying signals you should include as much information as possible Mentioning all these details is a good exercise and it forces you to analyse and eliminate ...wich might eventually give you the wanted answers...like this i have many times found some answers myself even while i was writing down the question. Tetrascanner 10837 From: kondrak Date: Fri Jan 28, 2005 10:33am Subject: RE: 6 GHz That of course, could also indicate it wasn't sending anything as well, like the audio was off, no activity in the area, etc. IE: the motion detector shut the audio stages down, either to conserve battery, or to thwart it's purpose if somone listened to it. I always try to hunt the emitter down as precise if possible. At 05:41 1/28/2005, you wrote: > -----Original Message----- > From: G P [mailto:telos888@y...] > > > Anyone ever run across a 6 Ghz signal in TSCM sweeps, > specifically 6.11 Ghz? > > On a sweep within a few Km of Johannesburg's main airport I once detected >a continuous carrier over a 2 hour period on about 6.13 GHz. The signal >strength was almost constant throughout the building, indicating it was not >coming from that location and it DF'd towards the airport. There was no >modulation on it that I could detect. > > I suspected it was some kind of RF link and probably not any threat to the >client. > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > > > ---------- > >No virus found in this outgoing message. >Checked by AVG Anti-Virus. >Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10838 From: kondrak Date: Fri Jan 28, 2005 10:38am Subject: Re: Cryptome Just worked for me too....I would say if and when it goes down, expect the worst. At 15:47 1/27/2005, you wrote: >Um no >not as far as I can tell and I was just on it. > > >--- Tech Sec Lab wrote: > > > Well, it seems the DHS got their way in the end. > > > > Cryptome has been closed down. For the moment > > anyway. > > > > http://www.homelandsecurityus.com/jan05.asp > > > > Shame. > > > > > > >===== >Solaris/LINUX/Windows administration >Internet consulting & Web site design >------------------------------------- >lfelia@y..., Virginia Beach VA, 23462 > > > >__________________________________ >Do you Yahoo!? >Yahoo! Mail - Helps protect you from nasty viruses. >http://promotions.yahoo.com/new_mail > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10839 From: kondrak Date: Fri Jan 28, 2005 10:52am Subject: Re: "Sound of Voices" ?????? Yup! Seig Heil big brother... >We cannot smoke in the USA and now one cannot smoke in >in the pubs in Ireland. As personal freedoms slowly >go away it is only a matter of time before we have no >rights to privacy. The manufacturer is getting >prepared for that day when the government can and will >follow a citizen's every move. Orwell's "1984" just >took a little longer. 10840 From: kondrak Date: Fri Jan 28, 2005 11:00am Subject: Re: "Sound of Voices" ?????? it varies from day to day, we post about a lot of things, both from a technical and a political view. The topics grow broader, but there will be plenty techie stuff as well. Some people just aren't concerned 24/7 with the noise floor of their super-whiz-band-do preamp signal sniffer. We get into computer security, wireless, RFID, gooberment intrusions, and all sorts of stuff. Its worth the ride... At 12:13 1/27/2005, you wrote: >I've only been on the list a day or so, but so far nothing has been >posted relating to TSCM. I have a problem relating smoking bans to >TSCM. Then again, I'm a former smoker and don't miss the smell when >I'm eating, walking up to a building or actually in an office. > >tim >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell > >What you say in private is your business. Keeping it private is ours. > >Georgia License # PDC 002074 Technical Security Consultants Inc. >Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations >Special Agents-Technical Agent >http://www.dbugman.com > >This e-mail is intended for the use of the addressee(s) only and may >contain privileged confidential, or proprietary information that is >exempt from disclosure under law. If you have received this message >in error, please inform us promptly by reply e-mail, then delete the >e-mail and destroy any printed copy. > >Neither this information block, the typed name of the sender, or >anything else in this message is intended to constitute an electronic >signature for purposes of the Uniform Electronic Transactions Act or >the Electronic Signatures in Global and National Commerce Act >(E-Sign) unless a specific statement to the contrary is included in >this message. > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10841 From: kondrak Date: Fri Jan 28, 2005 11:06am Subject: RE: Humour Re: Fire closes New York subway line True, The founders gave us two main tools to effect change in government. We have elections, and we have the second amendment. The election thing is almost worthless to pursue any more, for the process is corrupted and whored. Elections are stolen, the vote is corrupted, and soon, when unverified electronic voting becomes the norm, the outcomes will be known by the corruptors weeks before any election. It will put the criminality of previous notable gangs like "Tammany hall" to shame. At that point, the only remaining choice will be to fight, or sink into the serfdom of a socialist police-state. > >No, we're not technically a "Democracy", we're a Constitutional Republic, >but the preceding text still holds true. And it will see itself >self-evident as long as we have more whiners than doers. If it's broke, >then fix it - you as an American citizen actually do have that power. And >fortunately for most, you also have the power to whine just enough to not >really be heard, but at least you can piss off the people who don't agree >with you. 10842 From: Hawkspirit Date: Fri Jan 28, 2005 11:50am Subject: Sweep Contract What are the terms of agreement in your contract with your client? Roger Date: Thu, 27 Jan 2005 15:09:02 -0500 (EST) From: Thomas Kellar Subject: Re: Star Sweeping This is probably priledged knowledge but I will ask anyway: What if you sweep a client and declare them to be free of bugs or other similar covert surveillance devices but it turns out your client's enemies (paparzzzi?) are bouncing laser beams off your clients windows and are listening in that way. Consequently the enemy gains some knowledge that they use. Can your client come back and sue you for malfeasence? I.e., what if 1. There is a bug you did not find 2. The bad guys are using means you do not check for I suppose that the client would have to prove that the knowledge was gained due to your alleged negligence and that probably would be difficult. I frequently am asked to check friends and relative's computers for spyware and viruses and when I am done, I always declare that to the best of my knowledge they are free of such but I never claim absolutely that they are. Is there a similarity there? Thanks for your time, Thomas -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10843 From: Hawkspirit Date: Fri Jan 28, 2005 11:52am Subject: 6 GHZ On what piece of gear did you make the measurement and when was it last calibrated? Roger From: "wiggyyy2000" Subject: Re: 6 GHz yes but the one i saw was at about 6.02Ghz approx.... --- In TSCM-L@yahoogroups.com, G P wrote: > Anyone ever run across a 6 Ghz signal in TSCM sweeps, > specifically 6.11 Ghz? -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10844 From: Hawkspirit Date: Fri Jan 28, 2005 0:04pm Subject: "Sound of Voices" ?????? It is interesting to note that if you wrap a standard cell phone in good quality aluminum foil and call it will not operate/ring. Roger Date: Fri, 28 Jan 2005 11:23:06 +0200 From: "Riskbiz" Subject: RE: "Sound of Voices" ?????? Tim, Get used to it. The list is apparently populated to a large degree by people who wear cranial tin foil most of the time. You'll see a real TSCM related piece on about a 1:20 ratio (that's what it has been in my short time on the list). But it's still a great place to hear extreme views on everything from smoking to big brother to politics...and get a laugh a couple of times a day. DK -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] 10845 From: contranl Date: Fri Jan 28, 2005 2:01pm Subject: Re: "Sound of Voices" ?????? . Hey....stop spoiling "my" thread :) or i will have to activate the traffic-light in front of your house. I was deadly serious ! Tetrascanner http://www.tetrascanner.com When bored ...check out my groups: http://groups.yahoo.com/group/gsm-scanner http://groups.yahoo.com/group/traffic-cams 10846 From: A Grudko Date: Fri Jan 28, 2005 2:16pm Subject: RE: 6 GHz -----Original Message----- From: kondrak [mailto:kondrak@s...] > That of course, could also indicate it wasn't sending anything as well, like the audio was off, no activity in the area, etc. IE: the motion detector shut the audio stages down, either to conserve battery, or to thwart it's purpose if somone listened to it. I always try to hunt the emitter down as precise if possible. If you suspect the emission comes from the area under examination, sure, but not if it is obviously from a distant external source. I had one like this Thursday. Not on 6 GHz but 6.095 MEGS!!!, at a house I had swept at least 5 times before. The BBC were blasting in on 6.190 Megs, S9 plus all round the suburb, but just around the house was a blank carrier on house 6.095 Megs. No modulation until I put on the Scanlock audio search signal, on that specific RF freq, and turned the volume up high. In 4 rooms it became intermittent, a sign that there was a 'mike' transmitting in the room. The client had recently supplemented the existing (10 year old?) 5 point intercom with a flat screen CCTV system and linked to a Philips iPronto wireless/IR remote control/internet access system. The 6.095 Megs was RF strongest and required the least audio output to become 'microphonic' in the master bedroom. Turned off the iPronto CPU and the 6.095 Megs signal disappeared. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10847 From: Michael Puchol Date: Sat Jan 29, 2005 4:06am Subject: Re: Counter-Surveillance? Maybe point the cameras at the places where damage is actually being done. Make sure the lens cap is off. Make sure the recording device has capacity to capture enough video to cover the period when the damage occurs. Other than that, I cannot think of any particular reason (other than ghosts or vampires, which don't show up on film, maybe). Mildred Young wrote: > > I have video surveillance cameras installed, however it seems that I am still being vandalized without capturing it on my Lorex system....any suggestions? The police think I am nuts, I need help! > I don't want to continue to be a victim in Phoenix, AZ > Thanks > > [Non-text portions of this message have been removed] > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10848 From: contranl Date: Sat Jan 29, 2005 4:50am Subject: Re: Counter-Surveillance? . Mount the cameras on a house on the OTHER SIDE of the street ! on or inside a house of the neighbours that live in front or near you. Your attackers have probably figured out that you are watching them you could use wireless cams to get the signals back to you. Think about if you leave or remove the cams on your own house depending on the situation you could leave them where they are to not alert them ...or to scare-off possible other burglars. If you don't want to trouble the neighbours or if they don't cooperate...put them in a car or van...parked across the street...not exactly in front of your house. Instead of wireless you could also use a videorecorder inside the car To solve "run out of tape problems" you could use a: Time lapse recorder Timer switch Motion-detector Digital recorder (now availbale for less then 800 $ at 40 hours) Another solution could be to use a "infrared fence" 4 posts on every corner around the house. Each of them containing infrared light beams,similar to those used in standard alarm systems...mounted at 60 cm's height to avoid triggering by animals...you would have to hide them inside existing or natural looking objects...such a system you could make with less then 700 $ worth of components. 200 other solutions are available. Tetrascanner http://www.tetrascanner.com http://groups.yahoo.com/group/traffic-cams http://groups.yahoo.com/group/gsm-scanner 10849 From: contranl Date: Sat Jan 29, 2005 8:19am Subject: Police sharing wiretapping files at Kazaa !! . It doesn't get any better then this: A Dutch military police officer has been sharing his files of an important international "humans-smuggling" case with millions of Kazaa users ! Among the files were 1000's of: Phonetap-records, Covert-operations details Cellular short message intercepts Gps tracking operations Adresses,and phonenumbers of suspects All of this during a period of at least 3 months from november till januari...even after the justice-department was alarmed the files where still available for some more time. The Justice-department calls the man a stupid. Just 2 months ago there was another case of ignorance when a Justice department attorny had put his complete PC on the sidewalk to go with garbage...it contained full hardisks with similair (non-erased) information. The department says it's not allowed to take files home. source: most todays Dutch newspapers I have no other words for this...what stupid ignorants :) :) :) Kazaa is a very popular filesharing-program used by at least 30 million,mainly for exchanging music(mp3)files,free of charge. In this fairly simple piece of software (Kazaa-client)you have to mark the files that you want to share. what you share is always visible in a so called "shared-folder-tree" some idiots never look at this and share their complete C,D,E...whole alfabet drives. I have played a lot with Kazaa sometime ago...in a curious mood i told it to look for textfiles containing the word "police" ...if you believe it or not it did return some results coming from computers owned by real police officers. Tetrascanner 10850 From: A Grudko Date: Sat Jan 29, 2005 3:56pm Subject: Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key By JOHN SCHWARTZ January 29, 2005 BALTIMORE - Matthew Green starts his 2005 Ford Escape with a duplicate key he had made at Lowe's. Nothing unusual about that, except that the automobile industry has spent millions of dollars to keep him from being able to do it. Mr. Green, a graduate student at Johns Hopkins University, is part of a team that plans to announce on Jan. 29 that it has cracked the security behind "immobilizer" systems from Texas Instruments Inc. The systems reduce car theft, because vehicles will not start unless the system recognizes a tiny chip in the authorized key. They are used in millions of Fords, Toyotas and Nissans. All that would be required to steal a car, the researchers said, is a moment next to the car owner to extract data from the key, less than an hour of computing, and a few minutes to break in, feed the key code to the car and hot-wire it. An executive with the Texas Instruments division that makes the systems did not dispute that the Hopkins team had cracked its code, but said there was much more to stealing a car than that. The devices, said the executive, Tony Sabetti, "have been fraud-free and are likely to remain fraud-free." The implications of the Hopkins finding go beyond stealing cars. ... http://www.nytimes.com/2005/01/29/national/29key.html?ex=1264741200&en=cc110 4501a87d6d1&ei=5090 ---------- No virus found in this incoming message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10851 From: contranl Date: Sun Jan 30, 2005 8:53am Subject: Declassified document ( FBI on foreign intelligence act ) . For those interested: http://www.epic.org/privacy/terrorism/fisa/fisa-recipe.pdf Tetrascanner 10852 From: G P Date: Sun Jan 30, 2005 4:23pm Subject: Re: Declassified document ( FBI on foreign intelligence act ) That's a great find Tetra, lots of very relevant legal cites and authorities. Thanks. --- contranl wrote: > For those interested: > > http://www.epic.org/privacy/terrorism/fisa/fisa-recipe.pdf > > > Tetrascanner 10853 From: moellerthy <1ach@g...> Date: Sun Jan 30, 2005 9:14pm Subject: Re: Counter-Surveillance? --- In TSCM-L@yahoogroups.com, "Mildred Young" wrote: > Hello Mildred Young I had the same problem with ADT camera's fed into a switcher. I know someone was getting in but the intruder was not on the tape, so I purchased Pelco camer's and 21 inch monitors and 16 channel Multiplexers IR auto iris lens near and far field color and B/W camera's ups systems then I caught the intruder the police have the tapes as I write this turned out to be a neighbor how she got by the security alarm and 4 camera's well a ADT rouge employee had rewired the panel to cancel out two seperate codes so that one code would shut down the whole alarm system still have not figured out how the 4 camera switcher would not record the intruder but in captured me . You can buy some equipment on ebay other wise it will be very costly just to get a Multiplexer. I have back up systems in place just in case one system gets compromised. Buy a pelco Multiplexer should solve the problem. Andre Holmes Neptune Enterprise Security http://www.nes-ets-usa.com 1ach@G... > I have video surveillance cameras installed, however it seems that I am still being vandalized without capturing it on my Lorex system....any suggestions? The police think I am nuts, I need help! > I don't want to continue to be a victim in Phoenix, AZ > Thanks > > [Non-text portions of this message have been removed] 10854 From: Tim Johnson Date: Fri Jan 28, 2005 1:40pm Subject: Re: "Sound of Voices" ?????? No problem. I was just afraid I had signed up for another one of the groups that discusses things totally unrelated to their "charter". I've whittled myself down to about 4 of them now, as the unrelated topics took over the original intent. As for the things you listed. I'm most certainly interested in all of those.....they relate to the work TSCM tech wieners do or are concerned about. tj -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10855 From: Mildred Young Date: Fri Jan 28, 2005 10:28am Subject: Re: "Sound of Voices" ?????? Hey, in my defense of one of those who think they may need "cranial tin foil"....this list has enlighten me of the seriousness of a sick percentage of people who actual create a need for TSCM experts. I am just learning information about an area, that I never thought would be remotely applying to me. I am just an average type who goes about their day in la-la land. I am experiencing something that I shouldn't, so keep educating the innocent and let it be part of your contribution to life. When you do find out you are being bugged, what are the legal rights I would have? Or what do I do next? Thank you for your patience. ----- Original Message ----- From: "Riskbiz" To: Sent: Friday, January 28, 2005 2:23 AM Subject: RE: [TSCM-L] "Sound of Voices" ?????? > > > Tim, > > Get used to it. The list is apparently populated to a large degree by > people who wear cranial tin foil most of the time. > > You'll see a real TSCM related piece on about a 1:20 ratio (that's what it > has been in my short time on the list). > > But it's still a great place to hear extreme views on everything from > smoking to big brother to politics...and get a laugh a couple of times a > day. > > DK > > -----Original Message----- > From: Tim Johnson [mailto:dbugman@d...] > Sent: Thursday, January 27, 2005 7:14 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] "Sound of Voices" ?????? > > > > I've only been on the list a day or so, but so far nothing has been posted > relating to TSCM. I have a problem relating smoking bans to TSCM. Then > again, I'm a former smoker and don't miss the smell when I'm eating, > walking > up to a building or actually in an office. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations Special > Agents-Technical Agent http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may > contain > privileged confidential, or proprietary information that is exempt from > disclosure under law. If you have received this message in error, please > inform us promptly by reply e-mail, then delete the e-mail and destroy any > printed copy. > > Neither this information block, the typed name of the sender, or anything > else in this message is intended to constitute an electronic signature for > purposes of the Uniform Electronic Transactions Act or the Electronic > Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in this > message. > > > [Non-text portions of this message have been removed] > > > > > > > ------------------------ Yahoo! Groups Sponsor --------------------~--> In > low income neighborhoods, 84% do not own computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the hands > acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS Yahoo! Groups > Links > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10856 From: Nalesnik, Matthew Date: Fri Jan 28, 2005 11:22am Subject: RE: Humour Re: Fire closes New York subway line I completely agree. Thank you. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Friday, January 28, 2005 12:06 PM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Humour Re: Fire closes New York subway line True, The founders gave us two main tools to effect change in government. We have elections, and we have the second amendment. The election thing is almost worthless to pursue any more, for the process is corrupted and whored. Elections are stolen, the vote is corrupted, and soon, when unverified electronic voting becomes the norm, the outcomes will be known by the corruptors weeks before any election. It will put the criminality of previous notable gangs like "Tammany hall" to shame. At that point, the only remaining choice will be to fight, or sink into the serfdom of a socialist police-state. > >No, we're not technically a "Democracy", we're a Constitutional Republic, >but the preceding text still holds true. And it will see itself >self-evident as long as we have more whiners than doers. If it's broke, >then fix it - you as an American citizen actually do have that power. And >fortunately for most, you also have the power to whine just enough to not >really be heard, but at least you can piss off the people who don't agree >with you. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10857 From: Tim Johnson Date: Fri Jan 28, 2005 7:07am Subject: RE: "Sound of Voices" ?????? Thanks. I've had a fews good giggles already and even a couple of semi precious stones were sighted. It was just that I was surprised to find so much unrelated info on a professional type site. I'll keep reading and gleaning. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] From: joe joe Date: Fri Jan 28, 2005 6:22pm Subject: Re: 6 GHZ it was with an mdc..dont worry i found out what it was..:) --- Hawkspirit wrote: > > > On what piece of gear did you make the measurement > and when was it last > calibrated? Roger > > > > From: "wiggyyy2000" > > Subject: Re: 6 GHz > > > > > > > > > yes but the one i saw was at about 6.02Ghz > approx.... > > > > --- In TSCM-L@yahoogroups.com, G P > wrote: > > > Anyone ever run across a 6 Ghz signal in TSCM > sweeps, > > > specifically 6.11 Ghz? > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.1 - Release > Date: 1/27/2005 > > > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10859 From: Riskbiz Date: Sat Jan 29, 2005 8:49am Subject: RE: "Sound of Voices" ?????? Should we change this thread title to RF shielding? LOL DK -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Friday, January 28, 2005 8:04 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] "Sound of Voices" ?????? It is interesting to note that if you wrap a standard cell phone in good quality aluminum foil and call it will not operate/ring. Roger Date: Fri, 28 Jan 2005 11:23:06 +0200 From: "Riskbiz" Subject: RE: "Sound of Voices" ?????? Tim, Get used to it. The list is apparently populated to a large degree by people who wear cranial tin foil most of the time. You'll see a real TSCM related piece on about a 1:20 ratio (that's what it has been in my short time on the list). But it's still a great place to hear extreme views on everything from smoking to big brother to politics...and get a laugh a couple of times a day. DK -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.1 - Release Date: 1/27/2005 [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10860 From: Riskbiz Date: Sat Jan 29, 2005 8:52am Subject: RE: Re: Counter-Surveillance? What exactly is being vandalized? I live and work in Phx, and will be back in the country on Monday. Let me know and I'll give you a call. DK -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Saturday, January 29, 2005 12:51 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Counter-Surveillance? . Mount the cameras on a house on the OTHER SIDE of the street ! on or inside a house of the neighbours that live in front or near you. Your attackers have probably figured out that you are watching them you could use wireless cams to get the signals back to you. Think about if you leave or remove the cams on your own house depending on the situation you could leave them where they are to not alert them ...or to scare-off possible other burglars. If you don't want to trouble the neighbours or if they don't cooperate...put them in a car or van...parked across the street...not exactly in front of your house. Instead of wireless you could also use a videorecorder inside the car To solve "run out of tape problems" you could use a: Time lapse recorder Timer switch Motion-detector Digital recorder (now availbale for less then 800 $ at 40 hours) Another solution could be to use a "infrared fence" 4 posts on every corner around the house. Each of them containing infrared light beams,similar to those used in standard alarm systems...mounted at 60 cm's height to avoid triggering by animals...you would have to hide them inside existing or natural looking objects...such a system you could make with less then 700 $ worth of components. 200 other solutions are available. Tetrascanner http://www.tetrascanner.com http://groups.yahoo.com/group/traffic-cams http://groups.yahoo.com/group/gsm-scanner ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10861 From: Thomas Kellar Date: Fri Jan 28, 2005 2:46pm Subject: Re: Sweep Contract Roger, If you are addressing me with this note, I am writing in an amateur capacity with an interest. I interested in others due-diligence efforts being an ISSO (Informations Systems Security Officer) for a medium sized company. Being an employee gives you certain benefits a contractor does not have (Being a contractor for 9 years prior to my present job also enlightens me as to the benefits of being a a contractor) such as protections against being sued. What company is going to sue their own employee? Generally, the worse they can do is fire you. My example was just that - an example. When I do work for friends or relatives, there is no contract - just maybe an assumption that they give me food or let me marry their daughter or such. Thanks Thomas On Fri, 28 Jan 2005, Hawkspirit wrote: > > What are the terms of agreement in your contract with your client? Roger > > Date: Thu, 27 Jan 2005 15:09:02 -0500 (EST) > > From: Thomas Kellar > > Subject: Re: Star Sweeping ... ... 10862 From: Mildred Young Date: Sat Jan 29, 2005 11:28am Subject: Re: Counter-Surveillance? Actually, I have found there is a device to block recording. I am now exploring options. I am dealing with some body much more deviate than I can think. Thank you. ----- Original Message ----- From: "Michael Puchol" To: Sent: Saturday, January 29, 2005 3:06 AM Subject: Re: [TSCM-L] Counter-Surveillance? > > Maybe point the cameras at the places where damage is actually being > done. Make sure the lens cap is off. Make sure the recording device has > capacity to capture enough video to cover the period when the damage > occurs. Other than that, I cannot think of any particular reason (other > than ghosts or vampires, which don't show up on film, maybe). > > > > Mildred Young wrote: >> >> I have video surveillance cameras installed, however it seems that I am >> still being vandalized without capturing it on my Lorex system....any >> suggestions? The police think I am nuts, I need help! >> I don't want to continue to be a victim in Phoenix, AZ >> Thanks >> >> [Non-text portions of this message have been removed] >> >> >> >> >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> Yahoo! Groups Links >> >> >> >> >> >> >> >> >> > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10863 From: Riskbiz Date: Sat Jan 29, 2005 1:37pm Subject: Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key The New York Times January 29, 2005 Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key By JOHN SCHWARTZ BALTIMORE - Matthew Green starts his 2005 Ford Escape with a duplicate key he had made at Lowe's. Nothing unusual about that, except that the automobile industry has spent millions of dollars to keep him from being able to do it. Mr. Green, a graduate student at Johns Hopkins University, is part of a team that plans to announce on Jan. 29 that it has cracked the security behind "immobilizer" systems from Texas Instruments Inc. The systems reduce car theft, because vehicles will not start unless the system recognizes a tiny chip in the authorized key. They are used in millions of Fords, Toyotas and Nissans. All that would be required to steal a car, the researchers said, is a moment next to the car owner to extract data from the key, less than an hour of computing, and a few minutes to break in, feed the key code to the car and hot-wire it. An executive with the Texas Instruments division that makes the systems did not dispute that the Hopkins team had cracked its code, but said there was much more to stealing a car than that. The devices, said the executive, Tony Sabetti, "have been fraud-free and are likely to remain fraud-free." The implications of the Hopkins finding go beyond stealing cars. Variations on the technology used in the chips, known as RFID for radio frequency identification, are widely used. Similar systems deduct highway tolls from drivers' accounts and restrict access to workplaces. Wal-Mart is using the technology to track inventory, the Food and Drug Administration is considering it to foil drug counterfeiting, and the medical school at the University of California, Los Angeles, plans to implant chips in cadavers to curtail unauthorized sale of body parts. The Johns Hopkins researchers say that if other radio frequency ID systems are vulnerable, the new field could offer far less security than its proponents promise. The computer scientists are not doing R.&D. for the Mafia. Aviel D. Rubin, a professor of computer science who led the team, said his three graduate students did what security experts often do: showed the lack of robust security in important devices that people use every day. "What we find time and time again is the security is overlooked and not done right," said Dr. Rubin, who has exposed flaws in electronic voting systems and wireless computer networks. David Wagner, an assistant professor of computer science at the University of California, Berkeley, who reviewed a draft of a paper by the Hopkins team, called it "great research," adding, "I see it as an early warning" for all radio frequency ID systems. The "immobilizer" technology used in the keys has been an enormous success. Texas Instruments alone has its chips in an estimated 150 million keys. Replacing the key on newer cars can cost hundreds of dollars, but the technology is credited with greatly reducing auto theft. - Early versions of in-key chips were relatively easy to clone, but the Texas Instruments chips are considered to be among the best. Still, the amount of computing the chip can do is restricted by the fact that it has no power of its own; it builds a slight charge from an electromagnetic field from the car's transmitter. Cracking the system took the graduate students three months, Dr. Rubin said. "There was a lot of trial and error work with, every once in a while, a little 'Aha!' " The Hopkins researchers got unexpected help from Texas Instruments itself. They were able to buy a tag reader directly from the company, which sells kits for $280 on its Web site. They also found a general diagram on the Internet, from a technical presentation by the company's German division. The researchers wrote in the paper describing their work that the diagram provided "a useful foothold" into the system. (The Hopkins paper, which is online at www.rfidanalysis.org, does not provide information that might allow its work to be duplicated. The researchers discovered a critically important fact: the encryption algorithm used by the chip to scramble the challenge uses a relatively short code, known as a key. The longer the code key, which is measured in bits, the harder it is to crack any encryption system. "If you were to tell a cryptographer that this system uses 40-bit keys, you'd immediately conclude that the system is weak and that you'd be able to break it," said Ari Juels, a scientist with the research arm of RSA Security, which financed the team and collaborated with it. The team wrote software that mimics the system, which works through a pattern of challenge and response. The researchers took each chip they were trying to clone and fed it challenges, and then tried to duplicate the response by testing all 1,099,511,627,776 possible encryption keys. Once they had the right key, they could answer future challenges correctly. Mr. Sabetti of Texas Instruments argues that grabbing the code from a key would be very difficult, because the chips have a very short broadcast range. The greatest distance that his company's engineers have managed in the laboratory is 12 inches, and then only with large antennas that require a power source. Dr. Rubin acknowledged that his team had been able to read the keys just a few inches from a reader, but said many situations could put an attacker and a target in close proximity, including crowded elevators. The researchers used several thousand dollars of off-the-shelf computer equipment to crack the code, and had to fill a back seat of Mr. Green's S.U.V. with computers and other equipment to successfully imitate a key. But the cost of equipment could be brought down to several hundred dollars, Dr. Rubin said, and Adam Stubblefield, one of the Hopkins graduate students, said, "We think the entire attack could be done with a device the size of an iPod." The Texas Instruments chips are also used in millions of the Speedpass tags that drivers use to buy gasoline at ExxonMobil stations without pulling out a credit card, and the researchers have shown that they can buy gas with a cracked code. A spokeswoman for ExxonMobil, Prem Nair, said the company used additional antifraud measures, including restrictions that only allow two gas purchases per day. "We strongly believe that the Speedpass devices and the checks that we have in place are much more secure than those using credit cards with magnetic stripes," she said. The team discussed its research with Texas Instruments before making the paper public. Matthew Buckley, a spokesman for RSA Security, said his company, which offers security consulting services and is developing radio frequency ID tags that resist unauthorized eavesdropping, had offered to work with Texas Instruments free of charge to address the security issues. Dr. Wagner said that what graduate students could do, organized crime could also do. "The white hats don't have a monopoly on cryptographic expertise," he said. Dr. Rubin said that if criminals did eventually duplicate his students' work, people could block eavesdroppers by keeping the key or Speedpass token in a tinfoil sheath when not in use. But Mr. Sabetti, the Texas Instruments executive, said such precautions were unnecessary. "It's a solution to a problem that doesn't exist," he said. Dan Bedore, a spokesman for Ford, said the company had confidence in the technology. "No security device is foolproof," he said, but "it's a very, very effective deterrent" to drive-away theft. "Flatbed trucks are a bigger threat," he said, "and a lot lower tech." 10864 From: clive michaels Date: Sat Jan 29, 2005 1:21pm Subject: Technical Sweeps As a former counter surveillance operative working for a UK corporate investigative company, I have recently been asked to undertake some Technical Sweeps. I am now retired and on a pension. Being a little out of date, and only having somewhat old fashioned equipment - which, however is still usable to over 3 Ghz - I am interested in looking for the possible puchase of some more up to date equipment (in the event I am asked to undertake more work in this field). There are so many products on the market today that it is difficult to decide what to look at, let alone purchase; prices vary from the moderate to the ridiculous - also bugging equipment has come a long way since the 70s. Any assistance you can give would be appreciated Regards Michael Calvert __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com [Non-text portions of this message have been removed] 10865 From: LD C Date: Mon Jan 31, 2005 9:08am Subject: RE: "Sound of Voices" ?????? Smoking bans are an example of civil liberty being taken away. To relate to TSCM and microphones in traffic lights; the following may be of interest. Taken from www.epcglobalinc.com RFID (radio frequency identification) is a technology that has existed for decades. At a simple level, it is a technology that involves tags that emit radio signals and devices called readers that pick up the signal. The Electronic Product Codeô (EPC) is the next generation of product identification. The EPC is a simple, compact ìlicense plateî that uniquely identifies objects (items, cases, pallets, locations, etc.) in the supply chain. The EPC is built around a basic hierarchical idea that can be used to express a wide variety of different, existing numbering systems, like the EAN.UCC System Keys, UID, VIN, and other numbering systems. Like many current numbering schemes used in commerce, the EPC is divided into numbers that identify the manufacturer and product type. But, the EPC uses an extra set of digits, a serial number, to identify unique items. An EPC number contains: 1. Header, which identifies the length, type, structure, version and generation of EPC 2. Manager Number, which identifies the company or company entity 3. Object Class, similar to a stock keeping unit or SKU 4. Serial Number, which is the specific instance of the Object Class being tagged Additional fields may also be used to observe movement. Mate this technology with the "manditory identification that citizens must have with them at all times." So now we have the basic fountation in place. ----- Original Message ----- From: Riskbiz To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] "Sound of Voices" ?????? Date: Fri, 28 Jan 2 005 11:23:06 +0200 > > > Tim, > > Get used to it. The list is apparently populated to a large degree by > people who wear cranial tin foil most of the time. > > You'll see a real TSCM related piece on about a 1:20 ratio (that's what it > has been in my short time on the list). > > But it's still a great place to hear extreme views on everything from > smoking to big brother to politics...and get a laugh a couple of times a > day. > > DK > > -----Original Message----- > From: Tim Johnson [mailto:dbugman@d...] > Sent: Thursday, January 27, 2005 7:14 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] "Sound of Voices" ?????? > > > > I've only been on the list a day or so, but so far nothing has been posted > relating to TSCM. I have a problem relating smoking bans to TSCM. Then > again, I'm a former smoker and don't miss the smell when I'm eating, walking > up to a building or actually in an office. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special Investigations Special > Agents-Technical Agent http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may contain > privileged confidential, or proprietary information that is exempt from > disclosure under law. If you have received this message in error, please > inform us promptly by reply e-mail, then delete the e-mail and destroy any > printed copy. > > Neither this information block, the typed name of the sender, or anything > else in this message is intended to constitute an electronic signature for > purposes of the Uniform Electronic Transactions Act or the Electronic > Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in this > message. > > > [Non-text portions of this message have been removed] > > > > > > > ------------------------ Yahoo! Groups Sponsor --------------------~--> In > low income neighborhoods, 84% do not own computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the hands > acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS Yahoo! Groups Links > > > > -- _______________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10 10868 From: A Grudko Date: Mon Jan 31, 2005 10:59pm Subject: RE: "Sound of Voices" ?????? -----Original Message----- From: LD C [mailto:ldc_esq@l...] > Smoking bans are an example of civil liberty being taken away. They are equally an example of civil abuse being taken away. Additional fields may also be used to observe movement. Mate this technology with the "manditory identification that citizens must have with them at all times." All citizens already carry mandatory identification with them at all times. It's called DNA. Andy G Africa ---------- Internal Virus Database is out-of-date. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10869 From: Date: Tue Feb 1, 2005 6:26am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 10870 From: srhayes3 Date: Tue Feb 1, 2005 11:24am Subject: List mission purpose I have grown weary of the recent climate of the exchanges taking place on the list. We seem to be getting further and further away from discussions of TSCM and technical security and spending more time on bickering and list politics. I had the pleasure of making Jims acquaintance via telephone back in 1996 and I have found him to be a wealth of VERIFIABLE information. I emphasize verifiable because there have been other list members I have spoken to who either wouldnt share info or blew smoke so far up my ass that my breath smells like cigaretts. Jim has been consistent and knowledgable on all fronts and one of the few (and there have been MANY)list members who will share his knowledge unselfishly. If he chooses to ban someone from the list then so be it. Unless that person is a close personal relative or in some way generates income for you then mind your business or at least keep it out of the list. I'm here to learn about TSCM. I could give a frogs flying fat ass who likes who or who thinks what is unfair. If you do not approve of the way the list is moderated go start your own or join another. Samuel R Hayes III 10872 From: James M. Atkinson Date: Tue Feb 1, 2005 0:17pm Subject: Re: List mission purpose Sam, Thank you for your kind comments, they are appreciated. I will do what I can to keep the list focused on the topic of TSCM. -jma At 12:24 PM 2/1/2005, srhayes3 wrote: >I have grown weary of the recent climate of the exchanges taking >place on the list. We seem to be getting further and further away >from discussions of TSCM and technical security and spending more >time on bickering and list politics. I had the pleasure of making >Jims acquaintance via telephone back in 1996 and I have found him to >be a wealth of VERIFIABLE information. I emphasize verifiable >because there have been other list members I have spoken to who >either wouldnt share info or blew smoke so far up my ass that my >breath smells like cigaretts. Jim has been consistent and >knowledgable on all fronts and one of the few (and there have been >MANY)list members who will share his knowledge unselfishly. If he >chooses to ban someone from the list then so be it. Unless that >person is a close personal relative or in some way generates income >for you then mind your business or at least keep it out of the list. >I'm here to learn about TSCM. I could give a frogs flying fat ass >who likes who or who thinks what is unfair. If you do not approve of >the way the list is moderated go start your own or join another. >Samuel R Hayes III ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10873 From: Date: Tue Feb 1, 2005 1:54am Subject: Man convicted of stalking using GPS in CA _USATODAY.com - Californian gets 16 months for stalking by satellite_ (http://www.usatoday.com/tech/news/surveillance/2005-01-29-gps-stalking_x.htm) Thank you, Robert Pac Private Investigator InterTrace Investigations Group Specialist in Surveillance & Computer Spyware Detection PO Box 508 Southampton, MA 01073 Phone (413) 527-6990 www.InterTraceInvestigations.com MA License # P-1029 "CONFIDENTIALITY NOTICE: This e-mail transmission and any document that may be accompanying this e-mail transmission may contain confidential and proprietary information intended only for use by the recipient named and is covered by the Electronic Communications and Privacy Act, 18 USC Sections 2510-2521. If you are not the intended recipient or the employee or agency authorized to deliver this e-mail to the intended recipient, you are hereby notified that any unauthorized disclosure, copying, distribution, or action taken in reliance on this e-mail is strictly prohibited. If you received this e-mail in error, Please delete all copies of this e-mail from your hard drive, all storage devices and destroy all hard copies. Please notify the person named above immediately by e-mail or telephone." [Non-text portions of this message have been removed] 10874 From: ratlater69 Date: Tue Feb 1, 2005 3:11am Subject: "Breaking-In" to technical security So I've been thinking for a while about how one would "break in" to the technical security business, with little or no directly relevant experience. The obvious answer is military service, which is where I suspect a substantial number of people "cut their teeth"; is this consistent with the perception of most people, or do you expect to see new people coming from the private sector? I personally have a fairly strong background in computer & network security and physics, with a decent understanding of basic electronics, and have always been interested in technical security but have never quite been able to push through. I'm under the impression that most people in the techsec sector share at least some of these qualifications, though I'm unsure if that is completely accurate. 10875 From: LD C Date: Tue Feb 1, 2005 7:26am Subject: RE: "Sound of Voices" ?????? Where does one find a remote "DNA Tracker"? ----- Original Message ----- From: "A Grudko" To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] "Sound of Voices" ?????? Date: Tue, 1 Feb 2005 06:59:31 +0200 > > > -----Original Message----- > From: LD C [mailto:ldc_esq@l...] > > Smoking bans are an example of civil liberty being taken away. > > They are equally an example of civil abuse being taken away. > > Additional fields may also be used to observe movement. Mate this > technology with the "manditory identification that citizens must have with > them at all times." > > All citizens already carry mandatory identification with them at all > times. It's called DNA. > > Andy G > Africa > > ---------- > > Internal Virus Database is out-of-date. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 > > > [Non-text portions of this message have been removed] -- _______________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10 10876 From: Date: Tue Feb 1, 2005 8:21am Subject: Re: List mission purpose In a message dated 01/02/2005 18:43:18 GMT Standard Time, jmatk@tscm.com writes: Sam, Thank you for your kind comments, they are appreciated. I will do what I can to keep the list focused on the topic of TSCM. -jma At 12:24 PM 2/1/2005, srhayes3 wrote: >I have grown weary of the recent climate of the exchanges taking >place on the list. We seem to be getting further and further away >from discussions of TSCM and technical security and spending more >time on bickering and list politics. I had the pleasure of making >Jims acquaintance via telephone back in 1996 and I have found him to >be a wealth of VERIFIABLE information. I emphasize verifiable >because there have been other list members I have spoken to who >either wouldnt share info or blew smoke so far up my ass that my >breath smells like cigaretts. Jim has been consistent and >knowledgable on all fronts and one of the few (and there have been >MANY)list members who will share his knowledge unselfishly. If he >chooses to ban someone from the list then so be it. Unless that >person is a close personal relative or in some way generates income >for you then mind your business or at least keep it out of the list. >I'm here to learn about TSCM. I could give a frogs flying fat ass >who likes who or who thinks what is unfair. If you do not approve of >the way the list is moderated go start your own or join another. >Samuel R Hayes III ------------------------------------------------------------------------------ ---------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ------------------------------------------------------------------------------ ---------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ------------------------------------------------------------------------------ ---------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ------------------------------------------------------------------------------ ---------------------- ------------------------ Yahoo! Groups Sponsor --------------------~--> Has someone you know been affected by illness or disease? Network for Good is THE place to support health awareness efforts! _Click Here!_ (http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Sam a very good point but for the benefit of non US members such as myself [English] what does having smoke blown up your ass mean exactly, [a wonderful turn of phrase though] Best Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10877 From: James M. Atkinson Date: Tue Feb 1, 2005 1:23pm Subject: Bug Frequencies One of the lesser known hard core areas of my website is the bug frequency listings (they only get a few thousand "hits" a day.) They list a huge number of frequencies that when copy and pasted into a scanner, spectrum analyzer, or piece of (cough) proper TSCM equipment will let you keep an eye of some of the higher risk chunks of the RF spectrum. In fact most of the frequencies can be monitored with a cheap $ 90 scanner from Radio Shack, a cheap Icom radio, or a very fancy, and very expensive nano/micro/mini Cepter. I would lean towards something like a newer Bearcat scanner where can link banks of channels together to have an more than a few hundred frequencies to look at at once. This is important as many scanner will let you set up a single bank with 50-100 channels in that single bank, but you can not link banks together, which in effect gives you the limitation of only monitoring 100 channels at a time. You can just copy and paste the frequency list into the software package, and then use the software package that comes with the scanner to transfer the frequency list into the scanner where you can run through 1000 channels in 10-20 seconds. I would encourage you to divide the list between multiple scanners, so that each high threat band (ie: 350-425 MHz) has it's own receiver, but also so that when you are doing a larger area you can locate the radios some distance apart (all running the same banks) and significantly increase the probability of catching a bug while it is on the air. I also have a page that discusses the really popular spy shop frequencies, and the percentage and numbers used on what frequencies, that page can be found at: http://www.tscm.com/bugfreq.html Here is the main page of frequencies, use it in good health, and of course... your mileage may vary: http://www.tscm.com/TSCM101bugfreq.html Also, I will post some of my favorite sections in a few posting(s) that follow this one. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10878 From: James M. Atkinson Date: Tue Feb 1, 2005 1:59pm Subject: Bug Frequency Table Download the following frequencies into an inexpensive scanner (cough, radio shack or Bearcat) and you will be extremely surprised what you find of an entomologic nature: The most recent, and complete version of the list can be found at: http://www.tscm.com/tscm101bugfreq.html magnus frater spectat te Happy hunting -jma 49.1520 49.5000 49.8300 - very hostile 49.8400 49.8550 - extremely hostile 49.8600 49.8900 - extremely hostile 49.8920 49.9000 49.9500 135.0000 135.3000 135.4127 136.0000 136.0227 137.0000 138.0000 138.2400 138.2912 139.0000 139.6000 - extremely hostile 139.6023 139.8000 139.9500 140.0000 - extremely hostile 140.8500 - extremely hostile 141.0000 141.3800 141.5520 142.0000 143.0000 143.1818 143.5000 - extremely hostile 143.7696 143.7762 143.7800 144.0000 144.0008 144.0028 144.0047 144.8200 145.0000 145.1520 146.0000 146.3130 146.5350 - extremely hostile 146.5356 - extremely hostile 146.7614 146.9350 146.9400 147.0000 147.4560 148.0000 148.0050 - extremely hostile 149.0000 149.5800 149.9500 149.9900 150.0000 150.3409 150.4500 150.9000 151.0500 151.3500 151.8000 151.8600 152.0000 152.2500 152.5704 152.7000 152.7200 153.0000 153.1500 153.2288 153.6000 153.9205 154.0500 154.3600 154.5000 154.9500 155.0000 155.4000 155.5200 155.8500 156.0000 156.3000 156.7500 156.7800 157.2000 157.2864 157.5000 157.6500 158.1000 158.5500 159.0000 159.6103 159.9500 160.0000 161.0795 161.2800 161.6500 162.0000 162.2016 162.4000 162.4750 162.5000 162.5500 163.8400 164.4625 - red 164.6591 164.8625 - green 165.0000 165.7500 165.8880 166.0000 166.6380 166.6625 - bulldog 1 166.8625 - bulldog 2 167.0000 167.4610 167.7722 168.0000 168.2386 169.0000 169.3300 169.4450 - extremely hostile 169.5050 - extremely hostile 169.9320 169.9500 169.9904 170.0000 170.1000 - violet 170.2400 170.2450 - extremely hostile 170.3000 170.3050 - extremely hostile 170.4875 - lime 170.6000 170.9750 - extremely hostile 171.0450 - extremely hostile 171.0500 171.1050 - extremely hostile 171.1100 171.4500 - bug 1 171.6000 - bug 2 171.8182 171.8250 - bug 3 171.8450 - extremely hostile 171.9000 171.9050 - extremely hostile 172.0000 - bug 4 172.2000 - bug 5 172.8875 - gold 172.8875 - yellow 173.2250 173.2375 173.2450 173.3125 173.3500 - extremely hostile 173.3875 173.4625 173.5375 173.6125 173.6875 173.7625 173.8375 173.9125 173.9875 174.0000 174.0625 174.1375 174.2000 174.2125 174.2875 174.3625 174.6000 175.0000 175.0200 - extremely hostile 175.3977 175.8000 176.0000 176.2800 176.7360 176.9472 177.0000 177.3200 177.3447 177.6000 177.8000 178.0750 178.4000 178.4500 178.9773 179.0000 179.3500 179.4000 179.6480 179.6750 180.0000 180.6000 180.6750 180.8000 181.0000 181.2000 181.5750 181.6000 181.9500 182.5568 182.9000 183.0000 183.3950 183.6000 183.8000 184.3200 184.3718 184.4000 184.8500 - extremely hostile 185.0000 185.2771 185.3750 186.1000 186.1364 186.6000 186.6500 186.6667 187.0000 187.1500 187.8000 188.0380 188.8610 188.8750 189.0000 189.7159 189.8000 190.0000 190.4000 190.6000 - extremely hostile 190.9100 191.3000 191.6928 191.7016 191.7750 192.0000 192.0037 192.0063 192.1000 192.2500 192.6000 193.0500 193.2954 193.5360 195.0000 195.0840 195.2750 195.3808 195.6000 195.8000 196.6000 196.6080 196.6300 196.8750 197.0000 198.0000 198.1000 198.2750 198.6000 198.9500 199.0000 199.0656 199.6000 199.8800 199.9500 200.0000 200.4545 200.5000 201.0400 201.2500 201.6000 201.8000 202.1064 202.2000 202.7520 203.0000 - extremely hostile 203.0932 203.1000 203.6000 204.0341 204.1000 204.6000 204.7950 204.8000 204.8750 205.0000 205.7718 206.3800 206.6771 207.1000 207.3600 207.4000 207.6136 208.0000 208.2000 208.4000 208.4500 208.6000 209.2500 209.7250 210.0000 210.1000 210.3400 210.3800 210.8000 211.0000 211.1932 211.2000 211.5072 211.7250 211.9500 212.0000 212.3280 212.4750 212.5500 212.8137 213.0000 213.2000 213.3333 213.7500 213.8000 214.0000 214.7727 214.7750 215.0000 215.2500 215.3000 215.5000 215.7500 215.9750 216.0000 216.0013 216.1300 216.2500 216.2688 216.5000 216.7500 217.0000 217.2500 217.5000 217.7500 218.0000 218.2500 218.3523 218.5000 218.6850 218.7500 219.0000 219.2500 219.3100 219.5000 219.7500 219.8394 220.0000 220.9093 221.1840 221.5000 - extremely hostile 221.9318 222.0000 222.4400 223.5064 224.0000 224.4000 224.4932 224.5000 - extremely hostile 224.7000 225.0000 225.5114 226.5750 227.5000 228.0032 229.0909 230.0000 231.0000 231.6000 232.0000 232.6705 234.2600 235.0400 235.2000 235.4000 235.9296 236.2500 236.3300 237.5732 238.0000 238.7254 238.8050 239.6160 239.8295 240.0000 240.0850 241.2394 241.9200 242.3093 243.0000 243.4091 243.9500 245.0000 245.2944 245.7600 246.0000 246.1500 246.9886 248.4500 249.0000 249.9500 250.0000 250.4000 250.5682 252.0000 253.0000 253.5000 253.9750 254.0000 254.1477 254.4000 254.5000 254.8980 255.0000 255.3080 255.5904 256.0000 256.0050 256.5415 257.7272 257.7300 258.0000 258.9732 260.0000 260.1120 261.3068 262.1440 264.0000 264.8864 265.0000 265.4208 266.0000 266.6670 268.4659 270.0000 270.2800 271.3750 272.0455 273.0408 274.0000 274.3576 275.0000 275.3750 275.6250 276.0000 276.7080 279.2045 280.0000 281.7500 282.0000 282.7841 283.1040 283.7516 285.0000 285.1250 285.1325 286.0000 286.1500 286.3636 287.9950 288.0000 288.0017 289.9432 290.0000 292.0000 292.5000 292.6260 293.0000 293.1250 293.1750 293.5227 293.6500 294.0000 294.9120 295.0000 296.0000 297.0000 297.1023 297.5000 298.0000 299.0000 299.1000 299.1600 299.5000 299.6000 299.9000 299.9500 299.9750 300.0000 300.1000 300.5000 300.6000 300.6818 300.7000 301.0000 301.1000 301.1800 301.3000 301.4000 301.4600 301.5000 301.6000 301.8000 302.0000 302.1000 302.3000 302.5000 302.7000 302.9000 303.0000 303.2000 303.3250 303.4000 303.5000 303.5200 303.5430 303.5750 303.6150 - confirmed hostile 303.6250 303.7000 303.7500 303.7900 303.8000 303.8150 303.8250 - extremely hostile 303.8400 303.8500 303.8600 303.8700 303.8750 303.8950 303.9000 303.9100 303.9250 303.9500 304.0000 304.2450 - confirmed hostile 304.2614 - confirmed hostile (sim-saw) 304.3000 304.5000 304.6000 304.6600 304.7000 304.8000 305.0000 305.5000 305.7000 305.8250 306.0000 306.4000 307.0000 307.2000 307.3000 307.5700 307.8000 307.8409 307.9000 308.0000 308.2000 308.5000 308.6000 308.7000 308.8000 309.0000 309.1000 309.5000 309.6000 309.6700 309.7000 309.8000 309.9000 310.0000 - extremely hostile 310.2000 310.3000 310.4000 310.4200 310.5000 310.6840 310.7000 310.8000 310.9820 311.0000 311.0630 311.2000 311.2300 311.4000 311.4205 311.5000 311.6000 311.8000 311.9000 312.0000 312.0470 312.2500 312.3300 312.5000 312.8000 313.0000 313.5000 313.8000 314.0000 314.2000 314.3000 314.3500 314.3750 - confirmed hostile 314.4000 314.5000 314.5728 314.5750 314.6000 314.6400 314.7500 314.8000 314.8500 - extremely hostile 314.9000 314.9500 314.9875 315.0000 - extremely hostile 315.0500 315.5000 315.6000 315.6250 315.8000 315.9500 316.0000 316.0250 316.4000 316.5000 316.9000 317.0000 317.2608 317.5000 317.7000 317.7500 317.9000 318.0000 318.0250 318.5000 318.5795 318.6000 319.0000 319.4000 319.5000 319.9000 320.0000 320.3900 321.9850 - confirmed hostile 322.1591 324.0000 325.0000 325.0500 325.7000 325.7386 328.0000 329.0000 329.1000 329.3182 330.0000 332.8977 333.0000 334.0000 335.5443 336.0000 336.4773 337.2800 338.0000 339.5000 339.6000 339.8640 340.0000 340.0568 342.0048 343.6363 344.0000 345.0000 345.7280 346.1500 347.0000 347.2159 347.3000 347.7500 348.0000 348.8000 349.0000 349.7000 349.9500 350.0000 350.7955 352.0000 353.8944 354.0000 354.3750 354.5000 355.0000 355.7000 357.0000 357.9545 359.0000 359.9500 360.0000 361.0000 361.5341 362.2500 362.3400 362.8800 364.0000 365.0000 365.1136 366.0000 368.0000 368.6400 368.6932 369.0000 369.5000 370.0000 372.0000 372.2727 372.5000 374.0000 375.0000 375.8523 377.0000 377.4720 378.0000 379.0000 379.4318 379.5000 379.9500 380.0000 381.0000 381.8000 382.0000 383.0000 383.0114 384.0000 384.0022 384.3000 384.7500 384.7900 385.0000 386.0000 386.5909 388.0000 389.0000 390.0000 390.1680 390.1705 390.3000 391.2050 - extremely hostile 392.0000 392.7280 - extremely hostile 393.0000 393.2160 393.2660 393.3000 393.7500 395.0000 396.0000 397.0000 397.3295 398.0000 398.6050 - extremely hostile 398.7000 399.0000 399.0300 - extremely hostile 399.4550 - extremely hostile 399.9500 400.0000 400.9091 402.0000 402.0800 402.8000 403.0000 403.5500 403.9660 404.0000 404.4886 406.0000 407.0000 407.3000 407.3500 408.0000 408.0682 409.0000 409.5000 409.6000 410.0000 410.7000 411.5000 411.6477 411.6500 411.8000 412.0000 412.6100 413.0000 414.0000 414.5000 414.8000 414.9800 - extremely hostile 415.0000 415.2273 416.0000 416.2500 - extremely hostile 416.8450 - extremely hostile 417.0000 417.5000 417.8000 417.9000 418.0000 - extremely hostile 418.1000 418.4000 418.6500 418.8068 419.0000 420.0000 420.0150 420.5440 - confirmed hostile 421.0000 422.0000 422.3864 422.5000 423.0000 423.0144 423.1250 - hostile 423.2000 423.2200 424.0000 424.9760 425.0000 425.9659 426.0000 427.0000 427.1250 - extremely hostile 427.4750 - extremely hostile 427.8250 - extremely hostile 428.0000 428.6350 - extremely hostile 429.0000 429.2500 429.5050 - extremely hostile 429.5454 429.5455 429.9500 430.0000 432.0000 432.5000 432.9200 433.0000 433.0150 433.1250 433.2000 433.4000 433.4200 433.5000 433.6000 433.7000 433.8000 433.8700 433.9000 433.9200 - extremely hostile 433.9250 433.9500 433.9700 434.0000 434.0100 435.0000 436.0000 436.7045 438.0000 439.2500 - extremely hostile 439.5000 440.0000 440.2841 441.8400 442.2000 442.3680 443.0000 443.8636 445.0000 445.9000 447.0000 447.2250 447.4432 447.7250 448.0000 448.7400 449.0000 449.1200 449.1900 450.0000 451.0000 451.0227 453.0000 453.1520 453.8500 454.6023 455.0000 456.0064 456.7125 457.0000 457.7625 458.1818 458.6500 458.8500 459.0000 459.1500 460.0000 460.6630 460.8000 461.0000 461.1380 461.7614 462.0000 462.5000 462.5600 462.5625 462.5875 462.6125 462.6375 462.6625 462.6875 462.7125 463.0000 464.0000 464.4300 465.0000 465.3409 466.0000 466.6667 466.6670 467.5625 467.5875 467.6125 467.6375 467.6625 467.6875 467.7125 467.7600 467.7750 468.9205 470.0000 471.8300 472.5000 475.0000 476.0795 479.2540 479.5000 479.6591 480.0000 480.0157 480.1750 480.5000 483.2386 483.8400 485.0000 486.0000 486.8182 488.4520 489.0000 490.0000 490.3977 491.5200 492.0000 493.9773 495.0000 497.5568 499.0000 499.9700 - hostile 499.9750 - hostile If you want the full list you will have to download it from: http://www.tscm.com/tscm101bugfreq.html vah! denuone latine loquebar? me ineptum. interdum modo elabitur. 10879 From: A Grudko Date: Tue Feb 1, 2005 2:15pm Subject: RE: Bug Frequencies -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > They list a huge number of frequencies that when copy and pasted into a scanner, spectrum analyzer, or piece of (cough) proper TSCM equipment will let you keep an eye of some of the higher risk chunks of the RF spectrum. One of my standard sweep procedures is to have an ancient hand-held scanner with about 200 locally used bug freqs running unattended as I do my sweeps. Connected to it is a VOX operated mini-recorder and once I complete my sweep I check the recording (there's often innocent noise) to see if in my procedures (picking up phones, switching on lights, flushing urinals) I have triggered any Spy Shop devices. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- Internal Virus Database is out-of-date. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.7.4 - Release Date: 2005/01/25 [Non-text portions of this message have been removed] 10880 From: contranl Date: Tue Feb 1, 2005 5:10pm Subject: Justice Department refuses to stop unlawfull tapping of lawyers . Department of justice refuses to stop unlawfull phonetapping of lawyers (The Netherlands) In a Dutch national tv broadcast today it became clear that the justice department in The Netherlands is unwillingly to stop the unlawful tapping of phonecalls between lawyers and their clients. Dutch Law says you can't tap phonecalls between lawyers and their clients. When asked about that in a previous show a department spo(o)kesman had said: "It is technically not possible to filter those calls coming from or going to lawyers offices" Today a technician who designed the tapping-rooms of the Amsterdam police declares: "It is very well possible and simple to do...all you would have to do is make a database wich contains the numbers that you don't want to be tapped...when there is a call coming or going to such a number you could immidiatly end the tapping-procedure...the system always knows who is calling trough the use of caller-id signals" A spokesman for the lawyers society is furious and says they are being fooled by the department. The department refuses to give any comments on camera but replies in an email: "We don't want to create any black zones where we can't tap any phones" The department now faces a problem wich is that they don't obey there own laws wich will certainly be held against them in the next phonetapping-case that involves lawyers. It is obvious that you can't use any evidence gathered by ilegal means... I estimate that they will solve it like this: The(lawyer-tap)evidence is not used and not presented in a court of law...they will still tap lawyers and use the gathered information to gather other evidence wich in turn they can use...they probably "launder" the origin. Soap-opera to be continued :) Tetrascanner 10881 From: James M. Atkinson Date: Tue Feb 1, 2005 6:28pm Subject: Frequency List Oops, I made a typo on one of the two pages of bug frequency lists, the correct links are as follows: The first link is: http://www.tscm.com/TSCM101bugfreq.html The second is: http://www.tscm.com/bugfreq.html Sorry about the error, my bad... -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10882 From: satcommunitfive Date: Tue Feb 1, 2005 7:55pm Subject: how to stop tempest http://www.serversunderthesun.com/tin/ from >http://zapatopi.net/afdb.html bewell 10883 From: James M. Atkinson Date: Tue Feb 1, 2005 7:48pm Subject: Re: List mission purpose "Blowing Smoke" refers to the old shamanic ritual of lighting tobacco, inhaling it, and then exhaling it over a warrior undergoing a ritual of empowerment before going into battle. In some traditions the Shaman actually blows the smoke into the mouth of the warrior, who in turn inhales it into the lungs as another means of magically protecting themselves. I don't know where who first coined the phrase or used it in reference to the termination point of the colon, but I am sure that it is amusing. To "blow smoke" or to "smoke blow", can also refer to the igniting and inhaling of coca based narcotics such as cocaine, crack, and variations thereof. Further "Blowing Smoke" refers to the lies that a con artist tells his victim to deceive them, or weave an extended falsehood to cheat someone. To "blow smoke up somones ass" to indicate that the person "blowing the smoke" is lying to another person or group of people and more specially it refers to the con man or trickster who weaves a detailed series of lies, falsehoods, and deceptions to build up a long term confidence game. -jma >Sam a very good point but for the benefit of non US members such as myself >[English] what does having smoke blown up your ass mean exactly, >[a wonderful >turn of phrase though] >Best Regards Dave > >David McGauley >TSCM [Technical Surveillance and Countermeasures] >Electronic Surveillance and Sweep Specialist >Electrical/Electronics Engineer ex Police >Demtec House >Ormskirk >Lancs L390HF >UK >01695558544 >07866206112 >demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10884 From: Nalesnik, Matthew Date: Tue Feb 1, 2005 0:46pm Subject: RE: Man convicted of stalking using GPS in CA "Authorities contended that Gabrielyan attached a cell phone to the woman's car on Aug. 16 with a motion switch that turned on when the car moved, transmitting a signal each minute to a satellite. Information was then sent to a Web site that allowed Gabrielyan to monitor the woman's location. " Oh, okay... So it's okay for the cops to do it, but not an illegal immigrant?! What HAS this country come to? Where are this poor illegal alien's rights? Okay, I'm kidding... But seriously, --- OPEN CAN OF WORMS HERE --- If a cop does the same thing, and places a similar device on the car of someone they're tailing, without having to get a court order (which has been the precedent set thus far), isn't THAT an invasion of rights and subject to "stalking" prosecution as well? --- CLOSE CAN OF WORMS --- yes, I know the answer. That's bull$hit. -----Original Message----- From: RPacPI@a... [mailto:RPacPI@a...] Sent: Tuesday, February 01, 2005 7:55 AM _USATODAY.com - Californian gets 16 months for stalking by satellite_ ( http://www.usatoday.com/tech/news/surveillance/2005-01-29-gps-stalking_x.htm) Thank you, Robert Pac Private Investigator InterTrace Investigations Group Specialist in Surveillance & Computer Spyware Detection PO Box 508 Southampton, MA 01073 Phone (413) 527-6990 www.InterTraceInvestigations.com MA License # P-1029 "CONFIDENTIALITY NOTICE: This e-mail transmission and any document that may be accompanying this e-mail transmission may contain confidential and proprietary information intended only for use by the recipient named and is covered by the Electronic Communications and Privacy Act, 18 USC Sections 2510-2521. If you are not the intended recipient or the employee or agency authorized to deliver this e-mail to the intended recipient, you are hereby notified that any unauthorized disclosure, copying, distribution, or action taken in reliance on this e-mail is strictly prohibited. If you received this e-mail in error, Please delete all copies of this e-mail from your hard drive, all storage devices and destroy all hard copies. Please notify the person named above immediately by e-mail or telephone." [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10885 From: Tim Johnson Date: Tue Feb 1, 2005 1:33pm Subject: Re: "Breaking-In" to technical security For the most part, you are correct. Most of the people with the greatest level of experience in the TSCM field did come from the government sector, either military or one of the alphabet agencies. That's not to say that all of them did or that those who did come from the government are any better qualified than many of the PI's doing the work. If you are interested in this area, you should first try to attach yourself with someone who is doing the work in your area....explain to them you are wanting to learn and that you intend taking the appropriate courses as they become available. To determine the good ones, ask around on this group or of others presently doing the service. Plan on a long hard road trying to break into the field unless you have a pretty substantial checkbook that can carry you while you learn and but the appropriate equipment. I'd strongly suggest you wait to buy equipment until you have a bit of experience behind you as what is good for one person may not be the cats meow for another. With that said, good luck in your endeavors. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10886 From: Riskbiz Date: Tue Feb 1, 2005 8:32pm Subject: RE: "Sound of Voices" ?????? You can also find this info on www.IWearTinFoil.com -----Original Message----- From: LD C [mailto:ldc_esq@l...] Sent: Monday, January 31, 2005 8:09 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] "Sound of Voices" ?????? Smoking bans are an example of civil liberty being taken away. To relate to TSCM and microphones in traffic lights; the following may be of interest. Taken from www.epcglobalinc.com RFID (radio frequency identification) is a technology that has existed for decades. At a simple level, it is a technology that involves tags that emit radio signals and devices called readers that pick up the signal. The Electronic Product CodeT (EPC) is the next generation of product identification. The EPC is a simple, compact "license plate" that uniquely identifies objects (items, cases, pallets, locations, etc.) in the supply chain. The EPC is built around a basic hierarchical idea that can be used to express a wide variety of different, existing numbering systems, like the EAN.UCC System Keys, UID, VIN, and other numbering systems. Like many current numbering schemes used in commerce, the EPC is divided into numbers that identify the manufacturer and product type. But, the EPC uses an extra set of digits, a serial number, to identify unique items. An EPC number contains: 1. Header, which identifies the length, type, structure, version and generation of EPC 2. Manager Number, which identifies the company or company entity 3. Object Class, similar to a stock keeping unit or SKU 4. Serial Number, which is the specific instance of the Object Class being tagged Additional fields may also be used to observe movement. Mate this technology with the "manditory identification that citizens must have with them at all times." So now we have the basic fountation in place. ----- Original Message ----- From: Riskbiz To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] "Sound of Voices" ?????? Date: Fri, 28 Jan 2 005 11:23:06 +0200 > > > Tim, > > Get used to it. The list is apparently populated to a large degree by > people who wear cranial tin foil most of the time. > > You'll see a real TSCM related piece on about a 1:20 ratio (that's > what it has been in my short time on the list). > > But it's still a great place to hear extreme views on everything from > smoking to big brother to politics...and get a laugh a couple of times > a day. > > DK > > -----Original Message----- > From: Tim Johnson [mailto:dbugman@d...] > Sent: Thursday, January 27, 2005 7:14 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] "Sound of Voices" ?????? > > > > I've only been on the list a day or so, but so far nothing has been > posted relating to TSCM. I have a problem relating smoking bans to > TSCM. Then again, I'm a former smoker and don't miss the smell when > I'm eating, walking up to a building or actually in an office. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special Investigations Special > Agents-Technical Agent http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may > contain privileged confidential, or proprietary information that is > exempt from disclosure under law. If you have received this message in > error, please inform us promptly by reply e-mail, then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of the sender, or > anything else in this message is intended to constitute an electronic > signature for purposes of the Uniform Electronic Transactions Act or > the Electronic Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in > this message. > > > [Non-text portions of this message have been removed] > > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> In low income neighborhoods, 84% do not own computers. > At Network for Good, help bridge the Digital Divide! > http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~- > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, the > hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS Yahoo! Groups > Links > > > > -- _______________________________________________ Find what you are looking for with the Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp ?SRC=lycos10 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10887 From: delta Date: Wed Feb 2, 2005 2:45am Subject: opto interceptor hello to the group a friend of mine give me an optoelectronics interceptor to play with it during a sweep i was surprise about the possibilities not so bad to have a fast view of the spectrum this device is able to lock on the strongest signal between 30mhz to 2 ghz the audio is very good also but of course it is just a toy , not a professionnal model to sweep david from paris 10888 From: A Grudko Date: Wed Feb 2, 2005 6:21am Subject: RE: "Sound of Voices" ?????? -----Original Message----- From: LD C [mailto:ldc_esq@l...] > Where does one find a remote "DNA Tracker"? I don't think there is such an item yet, except at the top of the 'Technology Wish-List' of all the usual 3 letter agencies A Grudko ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 10889 From: contranl Date: Wed Feb 2, 2005 9:05am Subject: Opto-scout/explorer vs BC246T ( nearfield receivers ) . Nearfield receivers could be of (limited) use in countersurveillance,allthough they do have a lot of shortcomings they are nice toys to play with while on the move. There's a new scanner by Bearcat called BC246T (3 months out now) wich contains a nearfield receiver mode..called "close call" Here's a user with a first impression: http://www.scanmassachusetts.net/misc/bc246t.htm And here's a Yahoogroup for this new scanner http://groups.yahoo.com/group/BC246T/ Tetrascanner 10890 From: joe joe Date: Wed Feb 2, 2005 6:33am Subject: Re: "Breaking-In" to technical security yes Tim while i agree with most of what you wrote I do NOT believe that PI's would be a good place to learn..their business is to investigate things like whos' cheating on who or nanny's which is where most of their business comes from, he should find a person who does tscm and security work or goto a few schools and learn the proper procedures to do a tscm sweep...I say this because as I am sure you know many PI's pretend to do the work(mostly with sub standard equipment) and then place their own bugs to make themselves look better..not a good way to learn the trade.. --- Tim Johnson wrote: > > For the most part, you are correct. Most of the > people with the > greatest level of experience in the TSCM field did > come from the > government sector, either military or one of the > alphabet agencies. > That's not to say that all of them did or that those > who did come > from the government are any better qualified than > many of the PI's > doing the work. > > If you are interested in this area, you should first > try to attach > yourself with someone who is doing the work in your > area....explain > to them you are wanting to learn and that you intend > taking the > appropriate courses as they become available. To > determine the good > ones, ask around on this group or of others > presently doing the > service. > > Plan on a long hard road trying to break into the > field unless you > have a pretty substantial checkbook that can carry > you while you > learn and but the appropriate equipment. I'd > strongly suggest you > wait to buy equipment until you have a bit of > experience behind you > as what is good for one person may not be the cats > meow for another. > > With that said, good luck in your endeavors. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > > > > __________________________________ Do you Yahoo!? Meet the all-new My Yahoo! - Try it today! http://my.yahoo.com From: James M. Atkinson Date: Tue Jan 29, 2002 8:16am Subject: Re: 900 - 2.6 Yagi At 5:51 PM -0600 1/28/02, brnsike@s... wrote: >I may be behind the curve on this one, but it may be of interest to >someone. I picked up a small Yagi log periodic antenna (on a circuit >board) over the net. Cut for 900-2.6. Thing's about 8" square. I put >a rubber pistol grip (for SLR camera) on it and connected it to my Tek >492. Put a small 9v 2.4 Ghz transmitter on the other side of the house >and tried it out. Had to attenuate the signal down quite a lot, but >finally got good, usable signal. Was amazed at the sensitivity. Was >like moving a compass around true north. I literally could draw a >straight line from the tip of the antenna to the transmitter. The >slightest movement away from the transmitter would effect the amplitude, >whether left, right, up or down. Like aiming a pistol. Very impressed >(of course I'm still impressed with hard drives over 20 meg's). Don't >want to make this a commercial message, but anyone interested in the >page cite, let me know. Cost a princely $40. > >Martin Brown >Brown & Sikes, Inc. >Dallas Martin, I suspect that you are referring to the Ramsey antenna, and if so be careful using the thing above about 1.5 GHz.. Ramsey also has a pre-amplified Discone the list may find of interest, but keep in mind it's designed for hobby use. You may find it helpful to remove the BNC connector and cable provided (they are crap), and replace it with a SMA that goes right into an LNA and then into your 492. If you like the performance of the Ramsey unit, try to lay your hands on a equiangular antenna to check out, and a spiral log periodic. Attached a decent LNA (using only SMA connectors) and I promise you will be stunned with the performance. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4684 From: James M. Atkinson Date: Tue Jan 29, 2002 8:50am Subject: Do you have E-mail address? An unemployed man goes to apply for a job with Microsoft as a janitor. The manager there arranges for him to take an aptitude test (Section: Floors, sweeping and cleaning). After the test, the manager says, "You will be employed at minimum wage, $5.15 an hour. Let me have your e-mail address, so that I can send you a form to complete and tell you where to report for work on your first day. Taken aback, the man protests that he has neither a computer nor an e-mail address. To this the MS manager replies, "Well, then, that means that you virtually don't exist and can therefore hardly expect to be employed. Stunned, the man leaves. Not knowing where to turn and having only $10 in his wallet, he decides to buy a 25 LB flat of tomatoes at the supermarket. Within less than 2 hours, he sells all the tomatoes individually at 100% profit. Repeating the process several times more that day, he ends up with almost $100 before going to sleep that night. And thus it dawns on him that he could quite easily make a living selling tomatoes. Getting up early every day and going to bed late, he multiplies his profits quickly. After a short time he acquires a cart to transport several dozen boxes of tomatoes, only to have to trade it in again so that he can buy a pickup truck to support his expanding business. By the end of the second year, he is the owner of a fleet of pickup trucks and manages a staff of a hundred former unemployed people, all selling tomatoes. Planning for the future of his wife and children, he decides to buy some life insurance. Consulting with an insurance adviser, he picks an insurance plan to fit his new circumstances. At the end of the telephone conversation, the adviser asks him for his e-mail address in order to send the final documents electronically. When the man replies that he has no e-mail, the adviser is stunned, "What, you don't have e-mail? How on earth have you managed to amass such wealth without the Internet, e-mail and e-commerce? Just imagine where you would be now, if you had been connected to the Internet from the very start!" After a moment of thought, the tomato millionaire replied, "Why, of course! I would be a floor cleaner at Microsoft!" Moral of this story 1.The Internet, e-mail and e-commerce do not need to rule your life. 2.If you don't have e-mail, but work hard, you can still become a millionaire. 3.Since you got this story via e-mail, you're probably closer to becoming a janitor than you are to becoming a millionaire. 4.If you do have a computer and e-mail, you have already been taken to the cleaners by Microsoft. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4685 From: Matthew Paulsen Date: Tue Jan 29, 2002 10:17am Subject: RE: Re: Bug Photos Wanted Paul you meant schematics / drawings, right? -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Tuesday, January 29, 2002 5:40 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Bug Photos Wanted Once upon a midnight dreary, Paolo Sfriso pondered, weak and weary: > I am developing a website www.microspia.org (microspia is the > Italian word for bug, literally micro-spy) where I would like to > place a photographic display of found bugs of any sort: from the > radio-shack viarity to the more esoteric kind. > I would be extremely gratefull if fellow listmembers could send > me a couple of JPEG photos of traced or experimental bugs with a > brief description. Hi Paul, Since mere possession of audio and certain other types of surveillance devices in the U.S. is a felony, you're obviously asking for these inputs from our members outside the U.S. No one in the US. would want to admit to committing a felony by acknowledging possession of sensitive devices. 18USC 2511 and 2512 (Title 18 is the Criminal Code in the U.S., and section 2511 and 2512 specifically discusses possession, advertising of, use by, etc. surveillance devices by other than government agencies or persons directly under contract to supply these devices to the government) is the applicable section of code. Practically anyone involved in TSCM or surveillance in the U.S. knows this section of code by heart, since we live and quite literally can rot in jail by it. Jim Atkinson, the owner and operator of this list, maintains a copy of this information on his website here: http://www.tscm.com/USC18_119.html Perhaps list members from countries where the law is not so restrictive can assist you. You also may be able, with permission, to copy certain photos from various websites showing pictures of these devices. Be aware, however, that I have never seen a photo on a website of a truly professional surveillance device. They all are low end, homemade type devices, or the mass produced garbage from the Pacific Rim. Any images shown on U.S. websites either are illegal or are of deactivated devices (usually mockups). Good luck with your site. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4686 From: Shawn Hughes Date: Tue Jan 29, 2002 10:33am Subject: Re: Digest Number 843 At 04:06 AM 1/29/02 , you wrote: >......three to five Chinese men in plain clothes would board it, taking a >briefcase-sized black box with them. They finished 20 to 30 minutes later. Ok, I might just be an idiot cop, but if this intel is correct, they basically swept an entire aircraft with a scanlock or OSCOR (or worse). Doing bomb training, I've gotten to pop panels off of commercial aircraft. You literally could hide gear the size of a Volkswagen in there and not find it for a day. I mean, theres literally MILES of wiring and piping. You can't disassemble that stuff to even peek into junction boxes(so says the FAA) unless you are certified. We were told we (EOD) could in an emergency, but that the planes airworthiness cert would be invalidated. So, say one of you guys were the team leader on that project. How would you keep a high probability of sureness that the aircraft wasn't compromised? Shawn 4687 From: Shawn Hughes Date: Tue Jan 29, 2002 10:39am Subject: And you thought the static hazard was bad! >======================================= >Chips Pack Charge - Explosive Possibilities for Silicon > > >Among the most promising applications of the reaction, researcher Sailor >said, is propulsion of dust-sized >robots and devices built on chips. > > >Thanks to a classic case of accidental discovery, researchers at the >University of California, San Diego >(UCSD) have found that silicon -- the material used to make computer chips >-- has explosive properties >when combined with the right elements and ignited by an electrical charge. > > >This finding is the root of a running joke among researchers: "This is going >to make your cell phone blow >up," head researcher Michael Sailor told NewsFactor. > > >Sailor, a UCSD professor of chemistry and biochemistry in the school's >material science program, said real >applications of the ability to blow up a chip include destruction of >military weapons that fall into enemy >hands and elimination of sensitive data and access to it by programming >chips to self-destruct. > > >However, Sailor said "more relevant" applications include the propulsion of >tiny chips, such as micro- >electrical mechanical systems (MEMS), using miniature silicon explosives and >the ability to carry a small >flame test for sensing chemicals, which now requires a laboratory. > > >High-Tech Gunpowder > > >The researchers at the Sailor Group, who provided technical details of >futuristic applications in the January >issue of German scientific journal "Advanced Materials," discovered >accidentally about a year ago that >silicon had explosive properties similar to those of gunpowder -- a mix of >carbon, potassium nitrate and >sulfur, Sailor said. > > >When researcher Frederic Mikulec tried to cleave a silicon wafer with a >diamond scribe, it blew up in his >face, as the story goes. > > >"It was a little pop. It was just a small explosion, like a cap going off in >a cap gun," Sailor said. "We >worked with this stuff for 10 years, and it never blew up." > > >Sailor said the discovery does not mean that computer chips used today could >blow up. He added that the >reaction only works with super-fine silicon that is machined down to very >small particles through an >electrochemical process. > > >Fueling UAVs > > >The researchers found that combining a very fine form of silicon called >"nanocrystals" with gadolinium >nitrate produced the small, gunpowder-like explosion. > > >Among the most promising applications of the reaction, according to Sailor, >is propulsion of dust-sized >robots and devices built on chips. > > >"We can cause chips to fly around the room and make grasshoppers out of >them," he said, referring to such >uses as sniffing out nuclear weapons or locating and checking shipments. > > >Sailor said silicon explosions also could be used to fuel "micro unmanned >aerial vehicles," which are robots >the size of mosquitoes. > > >Hot Handheld > > >Another prime application of the explosive silicon process is a portable >device that could perform rapid >chemical analysis of toxic metals and other elements in the field. Such a >device would be ideal for >investigation of industrial accidents, according to researchers. > > >Sailor said the silicon- and gadolinium-based explosive burns extremely hot >and is devoid of chemical >impurities, making it ideal for a portable flame test, which is similar to a >litmus test. > > >"It's a hot, portable flame that can be placed on a chip," Sailor said. > > >Self-Destruct Silicon > > >Still, the most intriguing aspect of the research is the ability to blow up >the same material that powers >computers and other devices using a small electrical charge. > > >"Now, you can program a chip to self-destruct," Sailor said. "There's no >firing pin, just a little current that >runs through the part of the chip that has the explosive in it." > > >Sailor, who said researchers tested the electronic ignition with a 9-volt >battery, told NewsFactor that he is >amazed by the interest from people and businesses, including cell phone >makers and companies involved in >data security. However, the UCSD professor said he doubts that the >researchers' joke ever will become a >reality. > > >"I just don't see people putting it in cell phones to make them blow up," he >said. 4688 From: James M. Atkinson Date: Tue Jan 29, 2002 0:03pm Subject: Re: Digest Number 843 At 11:33 AM -0500 1/29/02, Shawn Hughes wrote: >At 04:06 AM 1/29/02 , you wrote: > > >>......three to five Chinese men in plain clothes would board it, taking a >>briefcase-sized black box with them. They finished 20 to 30 minutes later. > > >Ok, I might just be an idiot cop, but if this intel is correct, they >basically swept an entire aircraft with a scanlock or OSCOR (or worse). > >Doing bomb training, I've gotten to pop panels off of commercial aircraft. >You literally could hide gear the size of a Volkswagen in there and not >find it for a day. > >I mean, theres literally MILES of wiring and piping. You can't disassemble >that stuff to even peek into junction boxes(so says the FAA) unless you are >certified. We were told we (EOD) could in an emergency, but that the planes >airworthiness cert would be invalidated. > > >So, say one of you guys were the team leader on that project. How would you >keep a high probability of sureness that the aircraft wasn't compromised? > >Shawn Create a sterile isolation zone 1000 feet around the hangar in all directions, and zone it off with TWO 12 foot high fences topped with razor wire. Between the two fences have a "no man zone" with multiple layers of razor wire. All of the above will of course be alarmed, resulting in an immediate response of armed security personnel. You will need a "central control" person, and four teams of two people, which means you have at least five people on duty 7/24. There will be an area outside the isolation fence of at least 1000-1500 additional feet where all foliage has been cut back, and all buildings are under the control of the security detail (or can be 100% vouched for). the goal is to totally control who has access the the area just outside the isolation zone The area between the isolation fence and the hangar where the plane is kept will be extremely well lit 7/24, and ancillary lighting will be used to illuminate the area outside the fence as required by the CCTV system being used. A primary CCTV system will provide 100% coverage of all areas outside the isolation fence out to 1000 feet. The cameras will be INSIDE the fence, and controllable (and powered) the primary security station inside the fence. This is basically to documents anybody approaching the isolation fence from the outside world. Next we install a ring of camera above the isolation area that peer down into the "no-mans land" but also including the area about 10-15 on each side of the fence (these go to the poles which provide lighting the area outside of the isolation zone. Inside the isolation zone we install a series of thousands of overt and covert, live and dummy EB-141 with a magnum charges to mechanically raise an alarm if any of the electrician systems are compromised or someone covertly penetrates the fence line. This "alarm field" should begin about 15-20 foot inside the isolation zone and be about 300 foot wide. However, the width of the alarm ring should not exceed one third the range of the security responses weapons range with scoped carbines (ie: M-16, MP-5, etc). Note that there is a "travel ring" on both sides of the isolation fence for maintenance and response purposes. Inside the "alarm ring" there will a single wall or embankment to keep personal or equipment from straying into the alarm zone, but also to provide moderate cover in the event of an forcible engagement (Jersey barriers work well). This should provide a 500-700 foot sterile zone around the hanger, with a minimum of 5 people on duty at any given time just to protect the outer perimeter. The sterile zone then has an entirely separate security detail which are on duty only when there is some kind of activity in, on, or around the hangar. This security force greets people arriving, clears them, and escorts them though the sally ports and into the sterile zone (two escorts per person, or piece of equipment). A third group of security personnel will be responsible for pre-clearing all visitors (at least 2000 feet away from the hanger), and will escort the "initially cleared" people to a secondary area where they will be separated from all personal effects, tools, clothes electronics, etc and given a thin cotton bunny suit to change in to change into (for modesty). Visitor will then be scanned for metal, RF, or any chemical residue, and if necessary searched by hand (and allowed to shower). Only those personal effects absolutely required inside the sterile zone will be returned (ie: clothes, shoes, etc). Ideally the security force should provide a brightly covered uniform, with each color changing on a random basis. Inside the hangar there will be the "hangar security detail" (yes a fourth group) who solely are responsible for protecting the area starting at the hangar doors/walls and moving inward to the actual skin of the aircraft, but not the aircraft itself. They ensure that nothing and no one comes into the hangar unless it is absolutely required, carefully inspected, and its movements carefully documented. The aircraft itself must have it own protective detail (yep, a fifth group of people), and every person working on the airplane will have two observers (security people) with them at all times who will maintain positive eye contact on the persons hands at all times (basically one security guy watches the hands, and the other supervises and acts as relief). This makes for five levels of hard security, and at least three inspections of everything that can get within 1000 feet of the hangar. Every inch of the protected area is heavily covered with video cameras, and the plane itself contains overt and covert video (installed by and controlled by the security detail). Each security detail (all five+ of them) has its own command center, it's own shift leader, and procedures which overlap. Basically, the outer perimeter folks, protect the inner folks, which protect the hangar folks, and so on. Ensure the security force is well paid, well disciplined, well lead, and well equipped, and you will have no problems. On a related note; quarter the security force in dorms just outside the facility (but within 2000 feet, and do not allow then to leave the compound for short times except with two minders/escorts per person. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4689 From: Fernando Martins Date: Tue Jan 29, 2002 8:37am Subject: RE: Bug Photos Wanted Hi2all Paolo, you just have to go to www.google.com and in the 'images' area play a little with words, like spy or bug. Here are some examples: http://images.google.com/images?q=micro-spy http://images.google.com/images?q=bug http://images.google.com/images?hl=pt&q=micro-bug http://images.google.com/images?hl=pt&q=spybug Be aware of copywrite rights and other legal stuff related to this pictures. I'm not sending any descriptions as you asked, but you can search for them on the related sites. I didn't make those bugs nor have any of them. Sometimes in some electronics magazines there may be some pictures ... I'm only remembering Elektor (uk) or Electronique Pratique (fr), that I used to buy some years ago. Simple homemade stuff like a microphone inside a pen. And since this is my first mail to the list, I want to congratulate people for some very interesting mails I already read here, and say that I work as security consultant (phisycal, electronic and IT), and my interest here is to learn solutions for protection against intrusion of facilities and personal privacy. I'm more from the IT area, I'm upgrading my knowledge about electronics and specially protection tools and techniques, to what I'm a newbie. In the Army I had some experience with telephony (old analogic PBX stuff) and radio (Racal, PRC/425, AVP-1, stuff like that) but that was long time ago. Any other magazine like Signal from AFCEA (www.afcea.org/signal) that somebody here can advice? I had access to this one (on paper version) because I worked in a member company, but now i'm not there anymore and just can follow the web version. Any other tips, URL's for reference and lecture are wellcome. Regards FM ª -----Original Message----- ª From: Paolo Sfriso [mailto:paulsfriso@t...] ª Sent: terÁa-feira, 29 de Janeiro de 2002 9:19 ª To: TSCM-L@yahoogroups.com ª Subject: [TSCM-L] Bug Photos Wanted ª ª ª ª Dear Colleagues. ª ª I am developing a website www.microspia.org (microspia is the ª Italian word for bug, literally micro-spy) where I would like ª to place a photographic display of found bugs of any sort: ª from the radio-shack viarity to the more esoteric kind. ª ª I would be extremely gratefull if fellow listmembers could ª send me a couple of JPEG photos of traced or experimental ª bugs with a brief description. ª ª The site will be in Italian and proper credit will be given ª to all contributors. ª ª Thanks. ª ª Paul Sfriso ª Director ª GRUPPO S.I.T. ª Security, Investigations & Technology ª Quarto d'Altino, Venice ª ITALY ª ª phone +39 0422 828517 ª fax +39 0422 823224 ª 24hr GSM cellphone +39 335 5257308 ª www.grupposit.com ª paulsfriso@t... ª ª ª ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Sponsored by VeriSign - The Value ª of Trust Pinpoint the right security solution for your ª company - FREE Guide from industry leader VeriSign gives you ª all the facts. ª http://us.click.yahoo.com/pCuuSA/WdiDAA/yigFAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª 4690 From: kirk Date: Tue Jan 29, 2002 11:52am Subject: Re: Bug Photos Wanted I understood Pauls request for photos of found bugs, meaning just that, when you "find a bug on sweep" you usually photograph it in place for documentation purposes. Nothing he mentioned was related to personal possesion of illegal devices or schematics. Or maybe I'm just missing something here? Good luck Paul, I'll see what I can dig up for you. Kirk ---------- Original Message ---------------------------------- From: "Paolo Sfriso" Date: Tue, 29 Jan 2002 10:18:56 +0100 > >Dear Colleagues. > >I am developing a website www.microspia.org (microspia is the Italian word >for bug, literally micro-spy) where I would like to place a photographic >display of found bugs of any sort: from the radio-shack viarity to the more >esoteric kind. > >I would be extremely gratefull if fellow listmembers could send me a couple >of JPEG photos of traced or experimental bugs with a brief description. > >The site will be in Italian and proper credit will be given to all >contributors. > >Thanks. > >Paul Sfriso >Director >GRUPPO S.I.T. >Security, Investigations & Technology >Quarto d'Altino, Venice >ITALY > >phone +39 0422 828517 >fax +39 0422 823224 >24hr GSM cellphone +39 335 5257308 >www.grupposit.com >paulsfriso@t... > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 4691 From: Aimee Farr Date: Tue Jan 29, 2002 7:16pm Subject: RE: Re: Bug Photos Wanted > No one in the US. would want to admit to committing a felony by > acknowledging possession of sensitive devices. 18USC 2511 and > 2512 (Title 18 is the Criminal Code in the U.S., and section > 2511 and 2512 specifically discusses possession, advertising of, > use by, etc. surveillance devices by other than government > agencies or persons directly under contract to supply these > devices to the government) is the applicable section of code. > Practically anyone involved in TSCM or surveillance in the U.S. > knows this section of code by heart, since we live and quite > literally can rot in jail by it. I have a good deal of the congressional record(s). I don't think congress contemplated your services, or this environment. As proposed, Title III was seen as a law enforcement issue. I know some here testified at the '75 hearings, but I think this issue needs to be revisited. Putting security professionals at cross-purposes or conflicts with both their clients and law enforcement/agencies is not in our best interests. I would think an exception could be structured so as to be in the best interests of all stakeholders... What is the problem? ~Aimee 4692 From: Steve Uhrig Date: Tue Jan 29, 2002 7:50pm Subject: Re: Bug Photos Wanted Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > As proposed, Title III was seen as a law enforcement issue. I > know some here testified at the '75 hearings, but I think this > issue needs to be revisited. Putting security professionals at > cross-purposes or conflicts with both their clients and law > enforcement/agencies is not in our best interests. > I would think an exception could be structured so as to be in > the best interests of all stakeholders... What is the problem? The problem is 18USC 2511 and 2512 specifically prohibit possession, use, advertising of, etc, of electronic surveillance equipment except by government agencies or those under contract with a government agency to supply such equipment. And people are violating those laws. That is the problem. Unless you propose to change them by jury nullification, you know the proper way for the proper branch of government to change them. They're not going to be changed at the judicial level, and that is the point where most violators will bump into the law. The stuff has no place in the hands of lids, kids or space cadets, many of whom already think the law does not apply to them as evidenced by the numerous spy shops advertising illegal products. The spy shops ARE NOT under contract to supply the stuff to law enforcement merely by including some useless disclaimer on their website. 'Under contract' means having a purchase order in house already to supply the devices, before they even are obtained. That virtually never is the case with the spy shops, although they all claim to 'sell to police'. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4693 From: Matthew Paulsen Date: Tue Jan 29, 2002 8:01pm Subject: RE: Bug Photos Wanted Just try lookup at www.ditto.com FYI to all I've gotten 2 viruses on this list since I started getting messages here. If you don't have an antivirus scanner, get one. Here's one off my site that is free from Computer Associates, Inc. http://mpconsulting.home.attbi.com/prods/IPESetup.exe Hopefully I don't have a download restriction. We'll see. Matt -----Original Message----- From: Fernando Martins [mailto:fernando.martins@e...] Sent: Tuesday, January 29, 2002 6:37 AM To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] Bug Photos Wanted Hi2all Paolo, you just have to go to www.google.com and in the 'images' area play a little with words, like spy or bug. Here are some examples: http://images.google.com/images?q=micro-spy http://images.google.com/images?q=bug http://images.google.com/images?hl=pt&q=micro-bug http://images.google.com/images?hl=pt&q=spybug Be aware of copywrite rights and other legal stuff related to this pictures. I'm not sending any descriptions as you asked, but you can search for them on the related sites. I didn't make those bugs nor have any of them. Sometimes in some electronics magazines there may be some pictures ... I'm only remembering Elektor (uk) or Electronique Pratique (fr), that I used to buy some years ago. Simple homemade stuff like a microphone inside a pen. And since this is my first mail to the list, I want to congratulate people for some very interesting mails I already read here, and say that I work as security consultant (phisycal, electronic and IT), and my interest here is to learn solutions for protection against intrusion of facilities and personal privacy. I'm more from the IT area, I'm upgrading my knowledge about electronics and specially protection tools and techniques, to what I'm a newbie. In the Army I had some experience with telephony (old analogic PBX stuff) and radio (Racal, PRC/425, AVP-1, stuff like that) but that was long time ago. Any other magazine like Signal from AFCEA (www.afcea.org/signal) that somebody here can advice? I had access to this one (on paper version) because I worked in a member company, but now i'm not there anymore and just can follow the web version. Any other tips, URL's for reference and lecture are wellcome. Regards FM ª -----Original Message----- ª From: Paolo Sfriso [mailto:paulsfriso@t...] ª Sent: terÁa-feira, 29 de Janeiro de 2002 9:19 ª To: TSCM-L@yahoogroups.com ª Subject: [TSCM-L] Bug Photos Wanted ª ª ª ª Dear Colleagues. ª ª I am developing a website www.microspia.org (microspia is the ª Italian word for bug, literally micro-spy) where I would like ª to place a photographic display of found bugs of any sort: ª from the radio-shack viarity to the more esoteric kind. ª ª I would be extremely gratefull if fellow listmembers could ª send me a couple of JPEG photos of traced or experimental ª bugs with a brief description. ª ª The site will be in Italian and proper credit will be given ª to all contributors. ª ª Thanks. ª ª Paul Sfriso ª Director ª GRUPPO S.I.T. ª Security, Investigations & Technology ª Quarto d'Altino, Venice ª ITALY ª ª phone +39 0422 828517 ª fax +39 0422 823224 ª 24hr GSM cellphone +39 335 5257308 ª www.grupposit.com ª paulsfriso@t... ª ª ª ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Sponsored by VeriSign - The Value ª of Trust Pinpoint the right security solution for your ª company - FREE Guide from industry leader VeriSign gives you ª all the facts. ª http://us.click.yahoo.com/pCuuSA/WdiDAA/yigFAAª /kgFolB/TM ª ª ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª Yahoo! Groups Sponsor ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4694 From: Aimee Farr Date: Tue Jan 29, 2002 8:07pm Subject: RE: Re: Bug Photos Wanted Mr. Uhrig said: > The problem is 18USC 2511 and 2512 specifically prohibit > possession, use, advertising of, etc, of electronic surveillance > equipment except by government agencies or those under contract > with a government agency to supply such equipment. > > And people are violating those laws. > > That is the problem. Doh! *laughter* I mean, is there not an exception which could be carved to better service the interests of all stakeholders? Is there not a sphere of legitimate research, investigation, etc. that needs to be enabled? > Unless you propose to change them by jury nullification, you > know the proper way for the proper branch of government to > change them. They're not going to be changed at the judicial > level, and that is the point where most violators will bump into > the law. I get that. > The stuff has no place in the hands of lids, kids or space > cadets, many of whom already think the law does not apply to > them Well, officially, "space cadets" might lie outside of our jurisdiction. > as evidenced by the numerous spy shops advertising illegal > products. The spy shops ARE NOT under contract to supply the > stuff to law enforcement merely by including some useless > disclaimer on their website. 'Under contract' means having a > purchase order in house already to supply the devices, before > they even are obtained. That virtually never is the case with > the spy shops, although they all claim to 'sell to police'. I know, Steve. (I realize you are trying to be educational for everybody, I'm not dissin' ya.) I'm not proposing a blanket loophole, but this seems stifling for everybody. I'm just asking where there are conflicts, if creative means couldn't reconcile them. The protective interest in Title III for the private sector was privacy, but truly it was a law enforcement enabler -- private sector interests have not been wholly addressed. Inhibiting your services does not service that interest. I also wonder if -- given the way things work -- we could encourage better information sharing and enable enforcement through legislative changes. I'm just trying to ponder on some possible answers. I won't do it again. ;) ~Aimee 4695 From: Aimee Farr Date: Tue Jan 29, 2002 10:03pm Subject: Surveillactivism [Due to my research interests, I stumbled across this "list" on Amazon.com. This guy might have placed equal emphasis on "gear," if Amazon had more offerings. I thought this was insightful in terms of how surveillance has mainstreamed into the activist toolkit. ~Aimee] Johnny Crow's Listmania Lists create your own list Books and Products for the Revolutionary & Activist at heart by Johnny Crow, Individualist & Revolutionary A People's History of the United States : 1492 to Present by Howard Zinn List Price: $18.00 Our Price: $12.60 You Save: $5.40 (30%) Usually ships in 24 hours Johnny Crow's comments: One of the Best and most Informative books on American History. Must Read ---------------------------------------------------------------------------- ---- The Activist's Handbook: A Primer Updated Edition with a New Preface by Randy Shaw List Price: $18.95 Our Price: $13.26 You Save: $5.69 (30%) Usually ships in 24 hours Johnny Crow's comments: Insightful book, a must read for all who wish to do more! ---------------------------------------------------------------------------- ---- Organizing for Social Change : Midwest Academy : Manual for Activists by Kim Bobo, et al List Price: $23.95 Our Price: $16.76 You Save: $7.19 (30%) Usually ships in 2 to 3 days Johnny Crow's comments: Want to organize a socail change, or become involved in activism, this is for you. ---------------------------------------------------------------------------- ---- Minolta Maxxum STsi QD Panorama 35mm SLR Camera with 35-80mm,70-210mm Silver Zoom Lens List Price: $499.99 Our Price: $399.99 Usually ships in 24 hours Johnny Crow's comments: Always Needed to Capture those moments for history, and lend credit to your storys. ---------------------------------------------------------------------------- ---- Night Owl Camera Adapter Our Price: $39.99 Limited Availability Johnny Crow's comments: Use this to take night time photos, for all those "special" missions in the name of activism ---------------------------------------------------------------------------- ---- Manufacturing Consent : The Political Economy of the Mass Media by Edward S. Herman, Noam Chomsky List Price: $18.95 Our Price: $18.95 Usually ships in 24 hours Johnny Crow's comments: Must Read. ---------------------------------------------------------------------------- ---- Guerrilla Warfare : Che Guevara by Ernesto Guevara, Marc Becker (Introduction) List Price: $8.89 Our Price: $8.89 Usually ships in 24 hours Johnny Crow's comments: Absolute must read for those who wish to understand the truth about Revoltions, and Guerilla Activism 4696 From: enemyatthegate007 Date: Tue Jan 29, 2002 8:53pm Subject: history channel i know i im very very unknowledgable in this field and im trying to learn but im watching the history channel and it about james bond gadgets.there is a spy shop on there showing his toys,hes from beverly hills.i do know there is a lot of spy scans out there.i wonder if he is bogus.they didnt say his shops name.hum i wonder. james jones EPS,CPP chief of operations www.bodyguardinc.com 4697 From: Steve Uhrig Date: Wed Jan 30, 2002 9:06am Subject: Re: Surveillactivism Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > Night Owl Camera Adapter > Our Price: $39.99 > Limited Availability > Johnny Crow's comments: Use this to take night time photos, > for all those "special" missions in the name of activism This would sell more if listed together with 'The Secret Life of Walter Mitty' by James Thurber. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4698 From: DrPepper Date: Wed Jan 30, 2002 10:25am Subject: Re: Re: Bug Photos Wanted Interestingly enough, I watched the TV program "Boys Toys" on DishTV channel 120 last night, and they had a piece on Spy gear. The guy showed a "bug", and some other stuff. It was an outfit in Hollywood, somewhere, and they also provide this stuff to the movie industry as well as selling it across the counter. Ron C. ==================================== Aimee Farr wrote: > Mr. Uhrig said: > > > The problem is 18USC 2511 and 2512 specifically prohibit > > possession, use, advertising of, etc, of electronic surveillance > > equipment except by government agencies or those under contract > > with a government agency to supply such equipment. > > > > And people are violating those laws. > > > > That is the problem. > > Doh! *laughter* > > I mean, is there not an exception which could be carved to better service > the interests of all stakeholders? Is there not a sphere of legitimate > research, investigation, etc. that needs to be enabled? > > > Unless you propose to change them by jury nullification, you > > know the proper way for the proper branch of government to > > change them. They're not going to be changed at the judicial > > level, and that is the point where most violators will bump into > > the law. > > I get that. > > > The stuff has no place in the hands of lids, kids or space > > cadets, many of whom already think the law does not apply to > > them > > Well, officially, "space cadets" might lie outside of our jurisdiction. > > > as evidenced by the numerous spy shops advertising illegal > > products. The spy shops ARE NOT under contract to supply the > > stuff to law enforcement merely by including some useless > > disclaimer on their website. 'Under contract' means having a > > purchase order in house already to supply the devices, before > > they even are obtained. That virtually never is the case with > > the spy shops, although they all claim to 'sell to police'. > > I know, Steve. (I realize you are trying to be educational for everybody, > I'm not dissin' ya.) I'm not proposing a blanket loophole, but this seems > stifling for everybody. I'm just asking where there are conflicts, if > creative means couldn't reconcile them. > > The protective interest in Title III for the private sector was privacy, but > truly it was a law enforcement enabler -- private sector interests have not > been wholly addressed. Inhibiting your services does not service that > interest. I also wonder if -- given the way things work -- we could > encourage better information sharing and enable enforcement through > legislative changes. I'm just trying to ponder on some possible answers. > > I won't do it again. ;) > > ~Aimee > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 4699 From: Aimee Farr Date: Wed Jan 30, 2002 1:13pm Subject: RE: Re: Surveillactivism > Once upon a midnight dreary, Aimee Farr pondered, weak and weary: > > > Night Owl Camera Adapter > > Our Price: $39.99 > > > Limited Availability > > > Johnny Crow's comments: Use this to take night time photos, > > for all those "special" missions in the name of activism > > This would sell more if listed together with 'The Secret Life of > Walter Mitty' by James Thurber. > > Steve [referencing list on Amazon by one "Johnny Crow."] True, activists aren't sophisticated, but they are advanced in other ways (human assets, resolve, ideological ploys, walk-ins by animus, etc.). They are "noisy and networked." Political/reputational information is often given the least protection, even though it can cause the most damage. I have a "spy antagonist," I call you guys. Activist antagonists... o oppositional research/profiling o conflict management/intervention o image management o investigation o on-site security o web scouring service o bridge consultants (people who know that group and can frame the conflict) o crisis/strategic communications o legal/PR/security/management/mid- and low-tier employees.... o and so on. You attack him, you attack THEM -- triggering the activist pack mentality and escalating the conflict. A "Saul Alinsky" in 2002 is so empowered by communication and networks he can just about cut any corporate throat he wants to. You either intervene/resolve, or neutralize/deflect -- or you are looking at the cost of a political campaign relative to the stake of the company. These guys don't just use reputational attacks, they use indirect warfare and guerrilla strategies. They purposely do things to cause you to spend money on useless defensive measures. Often, there is no negotiating position -- they just hate what the company does, is, or represents. ("Extremists" are non-negotiable.) With activists, you can't judge the army by the antagonist -- or even the army -- their strength is often in their alliances. Lots of lawyers run to file on this guy or use aggressive tactics, then find out, in effect, they just PO'd 50,000 people with convergent interests. ...Whoop$. 60 Minutes won't give a damn about the tradecraft. But, yes, he looks harmless from your professional perspective, and I wouldn't be surprised if your psych was 100% on. ~Aimee 4700 From: Paolo Sfriso Date: Wed Jan 30, 2002 8:01am Subject: Re: Re: Bug Photos Wanted Hi Steve. Sorry, I didnt realise that in the U.S. mere possession of a bug is considered a criminal offence. Over here they can be legally sold and/or possessed but not used (6 months to 4 years or 1 to 5 hears of committed by a PI or a public servant without a warrant). The legal approach over here is the same one would have to a kitchen knife: it can be nothing more than a utensil or an extremely dangerous instrument. All depends on its use. Kind Regards. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... Hi Paul, Since mere possession of audio and certain other types of surveillance devices in the U.S. is a felony, you're obviously asking for these inputs from our members outside the U.S. No one in the US. would want to admit to committing a felony by acknowledging possession of sensitive devices. 18USC 2511 and 2512 (Title 18 is the Criminal Code in the U.S., and section 2511 and 2512 specifically discusses possession, advertising of, use by, etc. surveillance devices by other than government agencies or persons directly under contract to supply these devices to the government) is the applicable section of code. Practically anyone involved in TSCM or surveillance in the U.S. knows this section of code by heart, since we live and quite literally can rot in jail by it. Jim Atkinson, the owner and operator of this list, maintains a copy of this information on his website here: 4701 From: Johnston, Richard Date: Wed Jan 30, 2002 2:24pm Subject: RE: Re: Bug Photos Wanted Now that is a job I would like -- Designing "bugs" for the movie industry! They don't have to work (We'll dub in the sound later.) they just have to look cool. -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: Wednesday, January 30, 2002 9:25 AM To: aimee.farr@p... Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Re: Bug Photos Wanted Interestingly enough, I watched the TV program "Boys Toys" on DishTV channel 120 last night, and they had a piece on Spy gear. The guy showed a "bug", and some other stuff. It was an outfit in Hollywood, somewhere, and they also provide this stuff to the movie industry as well as selling it across the counter. Ron C. ==================================== Aimee Farr wrote: > Mr. Uhrig said: > > > The problem is 18USC 2511 and 2512 specifically prohibit > > possession, use, advertising of, etc, of electronic surveillance > > equipment except by government agencies or those under contract > > with a government agency to supply such equipment. > > > > And people are violating those laws. > > > > That is the problem. > > Doh! *laughter* > > I mean, is there not an exception which could be carved to better service > the interests of all stakeholders? Is there not a sphere of legitimate > research, investigation, etc. that needs to be enabled? > > > Unless you propose to change them by jury nullification, you > > know the proper way for the proper branch of government to > > change them. They're not going to be changed at the judicial > > level, and that is the point where most violators will bump into > > the law. > > I get that. > > > The stuff has no place in the hands of lids, kids or space > > cadets, many of whom already think the law does not apply to > > them > > Well, officially, "space cadets" might lie outside of our jurisdiction. > > > as evidenced by the numerous spy shops advertising illegal > > products. The spy shops ARE NOT under contract to supply the > > stuff to law enforcement merely by including some useless > > disclaimer on their website. 'Under contract' means having a > > purchase order in house already to supply the devices, before > > they even are obtained. That virtually never is the case with > > the spy shops, although they all claim to 'sell to police'. > > I know, Steve. (I realize you are trying to be educational for everybody, > I'm not dissin' ya.) I'm not proposing a blanket loophole, but this seems > stifling for everybody. I'm just asking where there are conflicts, if > creative means couldn't reconcile them. > > The protective interest in Title III for the private sector was privacy, but > truly it was a law enforcement enabler -- private sector interests have not > been wholly addressed. Inhibiting your services does not service that > interest. I also wonder if -- given the way things work -- we could > encourage better information sharing and enable enforcement through > legislative changes. I'm just trying to ponder on some possible answers. > > I won't do it again. ;) > > ~Aimee > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 4702 From: tek492p Date: Wed Jan 30, 2002 8:51pm Subject: Re: history channel James -- The "Spy Shop" in Beverly Hills showing the James Bond type gadgets is CCS. To learn more about CCS, and "Spy Shops" in general, read the following two messages posted by Steve Uhrig..... Message #3888, Re: vendor needed, Fri, 10/12/2001 Message #4502, Re: Attacking CCS? Yes, exactly that, Thu, 1/10/2002 Jack 4703 From: tek492p Date: Wed Jan 30, 2002 8:45pm Subject: Re: history channel James -- The "Spy Shop" in Beverly Hills showing the James Bond type gadgets is CCS. To learn more about CCS, and "Spy Shops" in general, read the following two messages posted by Steve Uhrig..... Message #3888, Re: vendor needed, Fri, 10/12/2001 Message #4502, Re: Attacking CCS? Yes, exactly that, Thu, 1/10/2002 Jack 4704 From: tek492p Date: Wed Jan 30, 2002 9:05pm Subject: Re: TEL "RING" QUESTION Bill -- In reference to the telephone ring with the Caller ID blocked and the *68 (do you mean *69?), does the telephone line local number have an incoming 800 number? 1. You cannot *69 (call back) an incoming 800 number. 2. If the call is from a business with multiple out-going lines, and the caller is calling from an inside extension, most Caller ID's will show a Name: Unknown & Number: Unknown. Jack 4705 From: Charles P Date: Wed Jan 30, 2002 9:42pm Subject: Re: TEL "RING" QUESTION Questions: Does this mean about 12 times per day? When you say cid was "blocked" does it say "blocked" or "private" or does it just not have any display, or say "out of area" Elaborate on the faxes forwarding to the fax line, are you forwarding them manually? There are so many machines dialing numbers these days, that seems most likely. But you said it's been going on for years... any strong electrical signals in the area? Is there a home phone system or just standard Pots lines? I found a pbx that interpreted electrical interference as dial pulses. The person at extension 111 was going crazy with "hangup" calls. charles >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> During any given 24 hr period...the following occurs: --incoming phone call--caller ID always blocked--phone answered--NOT a sound. This occurs approx 12 plus times w/the majority of "incoming" during the 0700-1700 hr period. Rarely 1700-0700. BUT, it does occur during those hours as well. --*68 nothing --phone co security can't(?) ID the prob..or answer the why? question --different issue--random faxes coming in on "home" line--(prob solicitation)--immediately fwd to fax line with no capture-receive. Initially, we thought that the telco was doing some routine line cks..but this has been going on for several YEARS! Any thoughts or fixes? 4706 From: sdonnell Date: Thu Jan 31, 2002 1:37am Subject: Re: Re: Bug Photos Wanted "Johnston, Richard" wrote: > Now that is a job I would like -- Designing "bugs" for the movie > industry! > They don't have to work (We'll dub in the sound later.) they just have > to > look cool. Hi, That wouldnt be too difficult; It could be something as simple as an infamous "black cube" or part of a circuit brd from something like a cordless phone. Just add a couple of "dongle" wires, if you really want to get fancy, spiral wind them or add gator clips. If you really want to be in contension for that tech-catagory Oscar, consider something w/ a real "radio" appearance like an old pager such as a Moto Spirit or Pageboy2, or even a Bravo receiver brd. I wonder if anyone has ever built something like this, and planted it as a type of "training aid", just to see how long it would take for anyone to notice/find it? Steve [Non-text portions of this message have been removed] 4707 From: James M. Atkinson Date: Thu Jan 31, 2002 9:11am Subject: Re: Re: Bug Photos Wanted Regarding training aids suitable for discovery during the physical search consider the following. 1) Take one or more sugar cubes, tie an jumper wire with alligator clips to it, wrap it in duct tape strips, and dip it in black liquid plastic. 2) Take a ball point pen, remove half the ink reserve tube, fill the open area with a combination of 5-6 small transistors, lead shot, and epoxy, and drill a small where a microphone would typically be located. 3) Open up a small pocket calculator, add 2-3 ounces of NLJ/lead shot/epoxy, drill two small holes (one for simulated control switch, one for microphone). 4) My favorite... is to go to a local gambling supply business and buy several thousand really thick weighted plastic poker chips and have your business name and phone number molded/printed on one side. Then on the other side have "covert eavesdropping devices are no larger then this, are you really secure?", drill a small hole in it (to simulate a microphone), epoxy two of them together, and duct tape them in place under desks and furniture during penetration tests. If your really feeling cute, you can epoxy a CR series lithium cell and several dozen SMT transistors as a wafer between the chips. -jma At 2:37 AM -0500 1/31/02, sdonnell wrote: >"Johnston, Richard" wrote: > >> Now that is a job I would like -- Designing "bugs" for the movie >> industry! >> They don't have to work (We'll dub in the sound later.) they just have >> to >> look cool. > >Hi, That wouldnt be too difficult; It could be something as simple as an >infamous "black cube" or part of a circuit brd from something like a >cordless phone. Just add a couple of "dongle" wires, if you really want >to get fancy, spiral wind them or add gator clips. If you really want to >be in contension for that tech-catagory Oscar, consider something w/ a >real "radio" appearance like an old pager such as a Moto Spirit or >Pageboy2, or even a Bravo receiver brd. > >I wonder if anyone has ever built something like this, and planted it as >a type of "training aid", just to see how long it would take for anyone >to notice/find it? > >Steve -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4708 From: Date: Thu Jan 31, 2002 5:58am Subject: Electronic Surveillance in Florida Nursing Homes FMDA Issues Statement Against Attorney General-AHCA Report on Electronic Surveillance in Florida Nursing Homes WEST PALM BEACH, Fla., Jan. 31 /PRNewswire/ -- The joint Attorney General- Agency for Health Care Administration report released last week, recommended that video surveillance cameras be allowed in the bedrooms and bathrooms of nursing home patients. FMDA's major concerns with this include: * Privacy/Dignity: The physician and nurse practitioner members of FMDA feel strongly that video surveillance cameras undermine the privacy and dignity of nursing home patients and their doctors, nurse practitioners, caregivers and visitors. The most personal type of care is often provided at a patient's bedside. Nurse practitioner members specifically view this as a breech of confidentiality as well as demeaning, demoralizing, and disruptive to the care of these frail, incapacitated human beings. * Staffing: The use of video surveillance cameras will have a negative impact on the facility's ability to recruit and retain staff at the very time when there is a real shortage of nurses and certified nursing assistants. The surveillance cameras will also disrupt the positive, trusting relationship between a patient and caregiver that may have the potential to interfere with their therapeutic relationship as well. Another major impact will be the downward spiral of staff moral. * Insurance: According to insurance liability carriers, video cameras will have a severely negative impact on a facility's ability to secure coverage. * Medical Directors: With medical directors already facing insurance liability coverage cancellation, non-renewal and huge premium increases, this recommendation comes at a time when we need to encourage more physician participation in long-term care. Video surveillance has the potential to create a serious shortage of physicians acting as medical directors or attending physicians. * Litigation: Approval of video surveillance in nursing homes will increase the potential for increased litigation which drives up costs. Resources that would otherwise go into patient care will have to be diverted to defend frivolous lawsuits. * Proper Use: There are many unanswered issues about resident privacy, the appropriate use of video tapes, video equipment maintenance, and the integrity of the tapes. * Interpretation: FMDA believes that the contents of tapes will be easily misinterpreted or misrepresented and used against staff, physicians and the nursing facility. * Family Involvement: Close family involvement in the day-to-day care of their loved one in the nursing home is one of the fundamental principles of good care for patients. Having video cameras may reduce family involvement and decrease patient-family interactions that are so essential to the welfare of both. "Video surveillance cameras will do nothing but harm the relationship between patient and caregiver and they should not be allowed in patient bedrooms. Add to that the fact that they will be the tool of eager trial attorneys and you have a prescription for disaster," said Morris Kutner, MD, CMD, immediate past-president, Florida Medical Directors Association. The Florida Medical Directors Association represents more than 350 medical directors, attending physicians, physician assistants, and advanced registered nurse practitioners in long-term care facilities in Florida. The mission of FMDA is to promote the highest quality care in nursing homes by providing leadership, professional education and advocacy. MAKE YOUR OPINION COUNT - Click Here http://tbutton.prnewswire.com/prn/11690X22202077 SOURCE Florida Medical Directors Association CO: Florida Medical Directors Association ST: Florida IN: HEA SU: 01/31/2002 09:47 EST http://www.prnewswire.com 4709 From: Jordan Ulery Date: Thu Jan 31, 2002 5:08pm Subject: Freedom of Information? EDITORIALS On the Public's Right to Know The day Ashcroft censored Freedom of Information Ruth Rosen, Editorial writer and columnist San Francisco Chronicle Sunday, January 6, 2002 THE PRESIDENT DIDN'T ask the networks for television time . The attorney general didn't hold a press conference. The media didn't report any dramatic change in governmental policy. As a result, most Americans had no idea that one of their most precious freedoms disappeared on Oct. 12. Yet it happened. In a memo that slipped beneath the political radar, U.S. Attorney General John Ashcroft vigorously urged federal agencies to resist most Freedom of Information Act requests made by American citizens. Passed in 1974 in the wake of the Watergate scandal, the Freedom of Information Act has been hailed as one of our greatest democratic reforms. It allows ordinary citizens to hold the government accountable by requesting and scrutinizing public documents and records. Without it, journalists, newspapers, historians and watchdog groups would never be able to keep the government honest. It was our post-Watergate reward, the act that allows us to know what our elected officials do, rather than what they say. It is our national sunshine law, legislation that forces agencies to disclose their public records and documents. Yet without fanfare, the attorney general simply quashed theFOIA. The Department of Justice did not respond to numerous calls from The Chronicle to comment on the memo. So, rather than asking federal officials to pay special attention when the public's right to know might collide with the government's need to safeguard our security, Ashcroft instead asked them to consider whether "institutional, commercial and personal privacy interests could be implicated by disclosure of the information." Even more disturbing, he wrote: "When you carefully consider FOIA requests and decide to withhold records, in whole or in part, you can be assured that the Department of Justice will defend your decisions unless they lack a sound legal basis or present an unwarranted risk of adverse impact on the ability of other agencies to protect other important records." Somehow, this memo never surfaced. When coupled with President Bush's Nov. 1 executive order that allows him to seal all presidential records since 1980, the effect is positively chilling. In the aftermath of Sept. 11, we have witnessed a flurry of federal orders designed to beef up the nation's security. Many anti-terrorist measures have carefully balanced the public's right to know with the government's responsibility to protect its citizens. Who, for example, would argue against taking detailed plans of nuclear reactors, oil refineries or reservoirs off the Web? No one. Almost all Americans agree that the nation's security is our highest priority. Yet half the country is also worried that the government might use the fear of terrorism as a pretext for protecting officials from public scrutiny. Now we know that they have good reason to worry. For more than a quarter of a century, the Freedom of Information Act has ratified the public's right to know what the government, its agencies and its officials have done. It has substituted transparency for secrecy and we, as a democracy, have benefited from the truths that been extracted from public records. Consider, for example, just a few of the recent revelations -- obtained through FOIA requests -- that newspapers and nonprofit watchdog groups have been able to publicize during the last few months: -- The Washington-based Environmental Working Group, a nonprofit organization, has been able to publish lists of recipients who have received billions of dollars in federal farm subsidies. Their Web site, www.ewg.org < http://www.ewg.org , has not only embarrassed the agricultural industry, but also allowed the public to realize that federal money -- intended to support small family farmers -- has mostly enhanced the profits of large agricultural corporations. -- The Charlotte Observer has been able to reveal how the Duke Power Co., an electric utility, cooked its books so that it avoided exceeding its profit limits. This creative accounting scheme prevented the utility from giving lower rates to 2 millioncustomers in NorthCarolina and South Carolina. -- USA Today was able to uncover and publicize a widespread pattern of misconduct among the National Guard's upper echelon that has continued for more than a decade. Among the abuses documented in public records are the inflation of troop strength, the misuse of taxpayer money, incidents of sexual harassment and the theft of life-insurance payments intended for the widows and children of Guardsmen. -- The National Security Archive, a private Washington-based research group, has been able to obtain records that document an unpublicized event in our history. It turns out that in 1975, President Gerald Ford and Secretary of State Henry Kissinger gave Indonesian strongman Suharto the green light to invade East Timor, an incursion that left 200,000 people dead. -- By examining tens of thousands of public records, the Associated Press has been able to substantiate the long-held African American allegation that white people -- through threats of violence, even murder -- cheated them out of their land. In many cases, government officials simply approved the transfer of property deeds. Valued at tens of million of dollars, some 24,000 acres of farm and timber lands, once the property of 406 black families, are now owned by whites or corporations. These are but a sample of the revelations made possible by recent FOIA requests. None of them endanger the national security. It is important to remember that all classified documents are protected from FOIA requests and unavailable to the public. Yet these secrets have exposed all kinds of official skullduggery, some of which even violated the law. True, such revelations may disgrace public officials or even result in criminal charges, but that is the consequence -- or shall we say, the punishment -- for violating the public trust. No one disputes that we must safeguard our national security. All of us want to protect our nation from further acts of terrorism. But we must never allow the public's right to know, enshrined in the Freedom of Information Act, to be suppressed for the sake of official convenience. --------------------------- Ruth Rosen Editorial writer and columnist San Francisco Chronicle 901 Mission Street San Francisco, CA 94103 Phone: 415-536-3093 Fax: 415-543-7708 rrosen@s... [Non-text portions of this message have been removed] 4710 From: A Grudko Date: Thu Jan 31, 2002 4:25pm Subject: Re: Re: Re: Bug Photos Wanted - Original Message - > Sorry, I didnt realise that in the U.S. mere possession of a bug is considered a criminal offence. Hello Paolo + If so then under US law I'm a criminal. I have my first located bug encapsulated in resin on my desk. Thankfully that's not the case under our laws. We have photos of a few bugs and ancillary connections/equipment that we have found over the decades. We're happy to freely share this amongst colleagues for commercial distribution as long as we get acknowledgement. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4711 From: Grey Operator Date: Thu Jan 31, 2002 4:53pm Subject: Police Bugging stir up hornets nest in UK A couple of links for the list to peruse:- Tuesday, 29th January 2002 Murder case over due to Police bugging http://news.bbc.co.uk/hi/english/uk/scotland/newsid_1790000/1790183.stm Wednesday, 30th January 2002 Police suspended over bugging http://news.bbc.co.uk/hi/english/uk/england/newsid_1791000/1791735.stm Five freed as judge condemns Police http://www.thetimes.co.uk/article/0,,2-2002047642,00.html Officers caught by Judges diligence http://www.thetimes.co.uk/article/0,,2-2002047811,00.html Lawyers claim Police bugging is widespread http://www.thetimes.co.uk/article/0,,2-2002047147,00.html Thursday,31st January 2002 Second trial in doubt as officers suspended http://www.thetimes.co.uk/article/0,,2-2002050750,00.html I sit on both sides of the fence with this, as I deal with TSCM, & Covert Surveillance in my current law enforcement work. IMHO these guys deserve everything they get for being so professionally incompetent & ethically and morally bankrupt. Some many of us in the community are working so hard to educate & prevent against this sort of incompetent abuse.It deeply saddens me that I and many of my colleagues will suffer as a result of this. It is something we have tried so hard to prevent and educate against in recent years. Only the bad guys win........... TTFN Mick [Non-text portions of this message have been removed] 4712 From: Date: Fri Feb 1, 2002 2:48pm Subject: Confiscated PC Reveals Terrorist Focus On Water Supply "Better break Out the Perrier!" Confiscated PC Reveals Terrorist Focus On Water Supply The FBI's National Infrastructure Protection Center (NIPC) said it has uncovered evidence that terrorists may have planned attacks on water supply systems in the United States and abroad. According to a bulletin issued by the NIPC Tuesday and labelled as of "high" importance, a computer, owned by an individual with indirect links to Osama bin Laden, was found to contain several software programs used for structural engineering of "dams and other water-retaining structures." The presence of the programs demonstrates "terrorist interest" in water supply systems, the bulletin said. The bulletin did not identify the individual who owned the computer nor provide more details about how the device was obtained by law enforcement. NIPC officials were not immediately available for comment. The NIPC said the programs included CATIGE, which stands for computer-aided teaching in geotechnical engineering; and Microstran, a structural engineering system. Both are developed in Australia, according to their Web sites. Also installed on the PC were AutoDesk's AutoCAD 2000 computer-assisted design and drafting program, as well as the Beam stress analysis software package from ORAND Systems, according to the NIPC. The computer also contained programs used to identify and classify soils, the bulletin said. EOM HAVE A GREAT DAY !!! Please Note: No trees were destroyed in the sending of this contaminant free message We do concede, a significant number of electrons may have been inconvenienced. : >) ---------- http://www.intelligentx.com/newsletters/technology/articles/story_tech1_020102.html [Non-text portions of this message have been removed] From: Matt Paulsen Date: Wed Jan 29, 2003 11:56pm Subject: RE: Court rejects infrared drug search " AND, since when is "the area common to or surrounding a house" consisting of the airspace above? Or below.... " The crystal ball shows aquifers and sinkholes in your future. Another peanut in the gallery added... -----Original Message----- From: MailExp [mailto:mailexp@o...] Sent: Tuesday, January 28, 2003 6:43 PM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Court rejects infrared drug search Not advocating either, BUT - how is it an intrusion when you don't know, feel or suffer the presence of an observation that you did not know was taking place from 1000' above your head? AND, since when is "the area common to or surrounding a house" consisting of the airspace above? It does not for any other right or law. It would be nicer to see someone in a courtroom apply common sense and logic, instead of wasting time making people file more papers just to do their job. Just another viewpoint from the peanut gallery... -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Tuesday, January 28, 2003 8:33 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Court rejects infrared drug search Not advocating an idiot growing pot plants but;Glad someone in a courtroom still understands "Curtilage".......... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6844 From: MailExp Date: Thu Jan 30, 2003 8:16am Subject: RE: Court rejects infrared drug search Canadian law is obviously different than US, although I don't know that this has been successfully challenged in the US. Anyone? More facts are arguably needed here for this discussion. Air space above a property has no intellectual value; and does not belong to the property owner. Therefore, use of it and the surrounding information that results, should be fair game. If the ONLY basis for his conviction was this, then I could see issues. However, it does not seem to be in this case. Hopefully this was only the start of the constable's PC and it progressed from there. We are missing part of the story. I am surprised to see Canada having issue with this though. From a country that grants applications for our Title III equivalent on an enormous basis (over a thousand a day, yes that is correct) I see though only thing coming from this is paperwork, with a standard approval. It seems as though they want court involvement on everything, which in the end only helps the LEA. I threw away my crystal ball a long time ago. Ed -----Original Message----- From: Matt Paulsen [mailto:mpaulsen6@a...] Sent: Thursday, January 30, 2003 12:56 AM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Court rejects infrared drug search " AND, since when is "the area common to or surrounding a house" consisting of the airspace above? Or below.... " The crystal ball shows aquifers and sinkholes in your future. Another peanut in the gallery added... -----Original Message----- From: MailExp [mailto:mailexp@o...] Sent: Tuesday, January 28, 2003 6:43 PM To: tscm-l@yahoogroups.com Subject: RE: [TSCM-L] Court rejects infrared drug search Not advocating either, BUT - how is it an intrusion when you don't know, feel or suffer the presence of an observation that you did not know was taking place from 1000' above your head? AND, since when is "the area common to or surrounding a house" consisting of the airspace above? It does not for any other right or law. It would be nicer to see someone in a courtroom apply common sense and logic, instead of wasting time making people file more papers just to do their job. Just another viewpoint from the peanut gallery... -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Tuesday, January 28, 2003 8:33 PM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Court rejects infrared drug search Not advocating an idiot growing pot plants but;Glad someone in a courtroom still understands "Curtilage".......... __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 6845 From: Craig Snedden Date: Thu Jan 30, 2003 8:33am Subject: RE: 2nd sweeper....Long Post. My apologies Hi Andy, Thanks for the feedback. Only one problem.... The Theft Act 1968 is not a UK wide act. Here in Scotland we have no codified legislation covering theft. It is a common law crime..... (Which is what makes my life such fun..!) I hadn't thought of it in relation to the question, as I was thinking about the Telco's position on "permitted equipment", some of which you will know can be used as a type of physical tap. In my experience Telco's take no heed to any "permitted equipment" installed by an end user after the network connection into the building (what I call the "private side"). But I concede the point that if anyone were to be charged with an offence then this would be a possible route and my thanks for pointing it out. However, in pondering this one further, I can see (and have experience of dealing with) theft of electricity offences as being relatively easily provable, but with telecommunications you are not paying for the volume of electrons you use, but by a tariff set on time of day, distance involved and duration of the call made. A physical tap could therefore be looked upon as another "extension" on the line, only connected when the master instrument (the target) is in use. So long as the device is is not being used to make surreptitious calls unbeknown to the billpayer. I think it would therefore be difficult to prove any material loss of revenue by the telco or cost to the billpayer (meaning no additional charges appearing on the phonebill as a result of the device being connected)..... Comments? Do you (or anyone else on the list) know of any reference cases (British) that can be quoted? As far as the Data Protection Act goes, it is also an offence to obtain or attempt to obtain information subject to the act which you (i.e. the "attacker") know (or should reasonably know) you are not entitled to. (Ignorance of what you are and are not entitled to being no defence...!!!). As I said, a minefield which for the purposes of this discussion I was going to ignore. :-) Oh happy days! Best regards Craig -----Original Message----- From: Andy M [mailto:asmoore@a...] Sent: 25 January 2003 11:15 To: Craig Snedden Subject: Re: [TSCM-L] 2nd sweeper....Long Post. My apologies Craig, I think that you'll find that a physical tap to phone lines in the UK constitutes theft (Theft Act 1968) as 'absrtacting electricity'. You're right with regards the RF devices. I'd suggest that the Data Protection Act is more applicable to the information 'defender', as oposed to the 'attacker' as the 'defender' is expected to conduct risk analysis and implement such measures "as are reasonable" to maintain the confidentiality of sensitive data. The UK's sadly lacking in legislation to protect proprietry data (as the US has) so we're wide open as regards industrial/economic esopioage...... Andy M ----- Original Message ----- From: "Craig Snedden" To: Sent: Thursday, January 23, 2003 3:52 PM Subject: RE: [TSCM-L] 2nd sweeper....Long Post. My apologies > My apologies in advance for the length of this posting. Got carried away > with myself. > > :~ (sheepish smile) > > > To follow up Vance's post, I believe the situation in the UK criminal > justice system would be different in as much as; > > 1. > > Ownership and possession of a transmitting device of any type is not a crime > within mainland UK. Unauthorised transmission or reception of RF emissions > is.... > > 2. > > The connection of any type of device (which would include a simple parallel > connection to a "speaker") to the "private" side of a telecommunications > system (PBX) (or single line) is not "normally" a criminal offence (however > there are lots of potholes with the Data Protection Act which fall into > place at this point - a minefield which for the purposes of this discussion > I shall ignore.). > > The principal exception being any device which might be deemed to cause > "damage or disruption to the public telephone system - i.e. the carrier > network. This would be a point for the courts to decide. > > 3. > > The connection of any device to the "private" side of a PBX (or single line) > can only be done with the knowledge and consent of the system owner (usually > whoever pays the phonebill). > > > So...... What does all that mean? > > > Scenario 1. > > If a "stand alone" (mic & tx) transmitter was discovered on the premises of > a client which had been planted by a third party then the client is not the > person responsible for either the tx or rx of any signal. Is he/she expected > to know if the person who planted it has the necessary licence? Likewise, is > the specialist expected to know if the buggist has the necessary licence? In > law, no: Therefore, no trouble to the client if he leaves the device in > situ. If he left it in situ and later reported it to the authorities, only > the buggist (or any person found to be listening to the tx freq) not having > the required authority to tx/rx on that freq (emission type, power etc.) > would face any criminal charge. > > > Scenario 2. > > If the specialist discovers a device connected to the "private" side of the > telephone system and brings it to the attention of the system owner, then > the call is with the system owner to decide whether to advise any > responsible authority. If the device is left and later found to be a > "hazard" to the public network, then the system owner, being knowledgeable > about it's presence, would possibly be liable, as would be the buggist if > caught. > > > Scenario 3. > > A device having been found on the public network side should be reported > firstly to the network provider. (They will take a dim view of anyone, TSCM > "professional" or not, being anywhere near thier equipment). Omission to > report may result in someone being pursued for having "endangered the > integrity of the network". However, who that someone might be is another > question. Certainly the buggist if caught. Possibly the system owner if he > sanctioned the device to remain in situ. (reason being that you are engaged > by the client and are acting at his direction. So long as you make it clear > (in writing) that your advice is to inform the network operator asap, then > the courts would have to take the view that you are not acting "in concert" > with any other person and therefore have no responsibility for breaking any > applicable law).... > > Clear...? No I thought not. > > Interestingly, this follows from Vance's point that to leave the "bug" in > situ and use it as corroboration then any material gained from it would be > inadmissable as evidence since it was obtained from an illegal source. Here > in the UK, that approach would really depend on whether the "bug" was deemed > to be "illegal" in the first place...... > > Certainly the unlicensed rx of any signal tx by the device would be illegal. > But, would the feeding of "chicken feed" into such a bug and seeing who > reacted to it be classed as an illegal transmission...? > > It might be argued not, since I did not switch the transmitter on and cause > it to actually tx (it was the buggist) ("A big boy did it and ran > away..!!"). > > Another might argue that it is illegal, since they might argue that I > should, as a TSCM "professional" be aware that the tx from such a device is > likely to be illegal and should therefore have taken steps to switch it > off..... My defence to that one being that I did not know if the device was > legal or not and therefore left it on in an effort to trace it's ownership. > It might have belonged to the Security Services for all I knew....... > > > Anyone know any UK caselaw on this? I can't find any right now. > > > In truth, reporting such an incident to the police here would most likely be > met with a blank stare and little if no response. The telecomms would > certainly respond (mostly by just removing the object from the network). > > :-) > > Craig > > > > -----Original Message----- > From: Ocean Group [mailto:inertia@o...] > Sent: 22 January 2003 20:21 > To: TSCM Group > Subject: [TSCM-L] 2nd sweeper.... > > > I had a chat with a lawyer friend and she informed me that the specialist > would not be charged as an accessory because the planting of the bug was not > a joint enterprise between the specialist and the 3rd party(the bugger,em > shall we say the bug planter.). The specialist would also have no reason to > suspect that the client was acting in bad fate(unless he did) etc etc and it > does not make the specialist liable by assuming that the client would report > it. > > However interesting enough, she said that should the client keep the bug and > "use" it, for any incrimination, the information would be naturally enough > inadmissable but the specialist could be very well charged for accessory to > the fact. So the moral of the story is, if you find a bug, a- to not give it > to the client unless he is totally trustworthy or b- disable etc take > reasonable precautions etc..... > > > This is the situation as regards the Irish courts however I'd assume it's a > pretty standard issue. > > All the best, > > Vance Deran > > Ocean Group, > Technical Security Division, > Ireland. > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.445 / Virus Database: 250 - Release Date: 21/01/2003 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.445 / Virus Database: 250 - Release Date: 21/01/2003 6846 From: Izaac Date: Thu Jan 30, 2003 3:33pm Subject: Re: tscming a lan On Wed, Jan 29, 2003 at 01:45:32AM -0500, Hugo Drax wrote: > firewall protecting the device, IDS/logging system residing in the cabinet ... produces it output /on paper./ -- ___ ___ . . ___ \ / |\ |\ \ _\_ /__ |-\ |-\ \__ 6847 From: A Grudko Date: Fri Jan 31, 2003 4:24am Subject: Re: Court rejects infrared drug search - Original Message - From: MailExp > Air space above a property has no intellectual value; and does not belong to the property owner. Therefore, use of it and the surrounding information that results, should be fair game. I'm not so sure. Are you happy to have Admiral Poindexter and Gerry Springer's TV crew in a black helicopter with various 'black boxes' hovering over your bedroom? Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6848 From: infospy Date: Fri Jan 31, 2003 8:21am Subject: Re: Court rejects infrared drug search If I point a Microphone (or one of the other toys you gentlemen play with) at your home or office from my home or office next door, and record anything I can. Is this legal? It's air space. Just wondering Howard Phillips N.E.W. Security Service Background and Insurance Investigations Serving North Eastern Wisconsin WI license 6165-063 902-559-1200 ----- Original Message ----- From: "MailExp" To: Sent: Thursday, January 30, 2003 8:16 AM Subject: RE: [TSCM-L] Court rejects infrared drug search > Canadian law is obviously different than US, although I don't know that > this has been successfully challenged in the US. Anyone? More facts > are arguably needed here for this discussion. Air space above a > property has no intellectual value; and does not belong to the property > owner. Therefore, use of it and the surrounding information that > results, should be fair game. If the ONLY basis for his conviction was > this, then I could see issues. However, it does not seem to be in this > case. Hopefully this was only the start of the constable's PC and it > progressed from there. We are missing part of the story. I am > surprised to see Canada having issue with this though. From a country > that grants applications for our Title III equivalent on an enormous > basis (over a thousand a day, yes that is correct) I see though only > thing coming from this is paperwork, with a standard approval. It seems > as though they want court involvement on everything, which in the end > only helps the LEA. > > I threw away my crystal ball a long time ago. > > Ed > > -----Original Message----- > From: Matt Paulsen [mailto:mpaulsen6@a...] > Sent: Thursday, January 30, 2003 12:56 AM > To: tscm-l@yahoogroups.com > Subject: RE: [TSCM-L] Court rejects infrared drug search > > > " > AND, since when is "the area > common to or surrounding a house" consisting of the airspace above? Or > below.... > " > The crystal ball shows aquifers and sinkholes in your future. > > Another peanut in the gallery added... > > -----Original Message----- > From: MailExp [mailto:mailexp@o...] > Sent: Tuesday, January 28, 2003 6:43 PM > To: tscm-l@yahoogroups.com > Subject: RE: [TSCM-L] Court rejects infrared drug search > > > Not advocating either, BUT - how is it an intrusion when you don't know, > feel or suffer the presence of an observation that you did not know was > taking place from 1000' above your head? AND, since when is "the area > common to or surrounding a house" consisting of the airspace above? It > does not for any other right or law. It would be nicer to see someone > in a courtroom apply common sense and logic, instead of wasting time > making people file more papers just to do their job. > > Just another viewpoint from the peanut gallery... > > -----Original Message----- > From: Mitch D [mailto:rockdriver@y...] > Sent: Tuesday, January 28, 2003 8:33 PM > To: tscm-l@yahoogroups.com > Subject: Re: [TSCM-L] Court rejects infrared drug search > > > Not advocating an idiot growing pot plants but;Glad someone in a > courtroom still understands "Curtilage".......... > > __________________________________________________ > Do you Yahoo!? > Yahoo! Mail Plus - Powerful. Affordable. Sign up now. > http://mailplus.yahoo.com > > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > 007140:HM/A=1414307/R=0/*https://www.clearcredit.com/registration/defaul > t.asp?n=b&cpID=c01888p1379&ckID=gen14628> > > pmail/S=:HM/A=1414307/rand=786786542> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > > > Yahoo! Groups Sponsor > > ADVERTISEMENT > > 007140:HM/A=1414307/R=0/*https://www.clearcredit.com/registration/defaul > t.asp?n=b&cpID=c01888p1379&ckID=gen14628> > > pmail/S=:HM/A=1414307/rand=235220143> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6849 From: Mitch D Date: Fri Jan 31, 2003 10:53am Subject: Re: Court rejects infrared drug search --- infospy wrote: > If I point a Microphone (or one of the other toys you > gentlemen play with) > at your home or office from my home or office next door, and > record anything > I can. Is this legal? It's air space. > > Just wondering If you're in my neighborhood,you may consider reading this: Tenn. Code Ann. ß 39-13-601 (1999): A person who is a party to a wire, oral or electronic communication, or who has obtained the consent of at least one party, can lawfully record a communication and divulge the contents of the recorded communication unless he has a criminal or tortious purpose for doing so. Violations are punishable as felonies with jail sentences of between two and 12 years and fines not exceeding $5,000. Tenn. Code Ann. ß 39-13-602, 40-35-111 (1999). Anyone whose communications have been unlawfully intercepted can sue to recover the greater of actual damages, $100 per day of violation or $10,000, along with punitive damages, attorney fees and litigation costs. Tenn. Code Ann. ß 39-13-603 (1999). Recording or disseminating a communication carried out through a cellular or cordless telephone, or disseminating the contents with knowledge of their illegal origin, without the consent of at least one party can be punished as a felony with a potential prison sentence of between one and six years and a fine not to exceed $3,000. Tenn. Code Ann. ß 39-13-604, 40-35-111 (1999). Viewing a person or using a hidden camera in a place where there is a reasonable expectation of privacy, when the viewing or recording "would offend or embarrass an ordinary person," is a misdemeanor. Tenn. Code Ann. ß 39-13-605. __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6850 From: Rick Hofmann - MICROSEARCH Date: Fri Jan 31, 2003 11:25am Subject: Telecom question A lawyer called with the following scenario: The lawyer's client has been charged with placing annoying phone calls. The client claims he does not know the victim, and denies placing any calls to the victim's number. The PD has (or claims to have) evidence obtained from a telephone company trap that the client's number has been placing the offending calls. My questions is, can phone company traps be "spoofed"? I suppose it is also possible that a person could have clipped on to the client's line using a butt set at his TNI. I was curious about other explanations members of this list might conjure up. Thanks in advance for any ideas. Very truly yours, Rick Hofmann, CCO, CPP, PI16998 MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: 714-209-0037 http://home.earthlink.net/~microsearch 6851 From: Michael Puchol Date: Fri Jan 31, 2003 5:44pm Subject: Re: Court rejects infrared drug search Thanks for that information Mitch, so... ----- Original Message ----- From: "Mitch D" To: Sent: Friday, January 31, 2003 5:53 PM Subject: Re: [TSCM-L] Court rejects infrared drug search > Viewing a person or using a hidden camera in a place where there > is a reasonable expectation of privacy, when the viewing or > recording "would offend or embarrass an ordinary person," is a > misdemeanor. Tenn. Code Ann. ß 39-13-605. ...if I am home, in my bedroom, with the window blinds closed, and generating heat during normal marital activities, and someone flies over my house with a thermal camera and records the "action", wouldn't ALL of the above apply? I really don't see how this form of surveillance shouldn't be subjected to the same laws and regulations as wiretaps or conventional surveillance. In my own home I have an expectation of privacy, the recordings would definitely offend and emarrass me, so it is a blatant invasion of privacy. Period. If the Canadian agents had a probable cause, suspicion, tip, etc. they could have applied for surveillance authorisation, THEN flown over his house and recorded his plant-o-phile activities. On the other hand, it was quite an ingenious way to look for hydroponic plantations! Regards, Mike 6852 From: James M. Atkinson Date: Fri Jan 31, 2003 5:50pm Subject: Re: Court rejects infrared drug search The federal courts have already ruled that if the person uses anything to assist their normal hearing then it is considered to be "assisted eavesdropping". The item being used could be a sophisticated eavesdropping device, a spy shop toy, a child's toy, or even an empty cup held against the wall. The rule of thumb is that if you can her it with the naked, un-assisted ear then it is fair game... but assist that hearing and it becomes eavesdropping. -jma At 8:21 AM -0600 1/31/03, infospy wrote: >If I point a Microphone (or one of the other toys you gentlemen play with) >at your home or office from my home or office next door, and record anything >I can. Is this legal? It's air space. > >Just wondering > > > > >Howard Phillips >N.E.W. Security Service >Background and Insurance Investigations >Serving North Eastern Wisconsin >WI license 6165-063 >902-559-1200 >----- Original Message ----- >From: "MailExp" >To: >Sent: Thursday, January 30, 2003 8:16 AM >Subject: RE: [TSCM-L] Court rejects infrared drug search > > >> Canadian law is obviously different than US, although I don't know that >> this has been successfully challenged in the US. Anyone? More facts >> are arguably needed here for this discussion. Air space above a >> property has no intellectual value; and does not belong to the property >> owner. Therefore, use of it and the surrounding information that >> results, should be fair game. If the ONLY basis for his conviction was >> this, then I could see issues. However, it does not seem to be in this >> case. Hopefully this was only the start of the constable's PC and it >> progressed from there. We are missing part of the story. I am >> surprised to see Canada having issue with this though. From a country >> that grants applications for our Title III equivalent on an enormous >> basis (over a thousand a day, yes that is correct) I see though only >> thing coming from this is paperwork, with a standard approval. It seems >> as though they want court involvement on everything, which in the end >> only helps the LEA. >> >> I threw away my crystal ball a long time ago. >> >> Ed >> >> -----Original Message----- >> From: Matt Paulsen [mailto:mpaulsen6@a...] >> Sent: Thursday, January 30, 2003 12:56 AM >> To: tscm-l@yahoogroups.com >> Subject: RE: [TSCM-L] Court rejects infrared drug search >> >> >> " >> AND, since when is "the area >> common to or surrounding a house" consisting of the airspace above? Or >> below.... >> " >> The crystal ball shows aquifers and sinkholes in your future. >> >> Another peanut in the gallery added... >> >> -----Original Message----- >> From: MailExp [mailto:mailexp@o...] >> Sent: Tuesday, January 28, 2003 6:43 PM >> To: tscm-l@yahoogroups.com >> Subject: RE: [TSCM-L] Court rejects infrared drug search >> >> >> Not advocating either, BUT - how is it an intrusion when you don't know, >> feel or suffer the presence of an observation that you did not know was >> taking place from 1000' above your head? AND, since when is "the area >> common to or surrounding a house" consisting of the airspace above? It >> does not for any other right or law. It would be nicer to see someone >> in a courtroom apply common sense and logic, instead of wasting time >> making people file more papers just to do their job. >> >> Just another viewpoint from the peanut gallery... >> >> -----Original Message----- >> From: Mitch D [mailto:rockdriver@y...] >> Sent: Tuesday, January 28, 2003 8:33 PM >> To: tscm-l@yahoogroups.com >> Subject: Re: [TSCM-L] Court rejects infrared drug search >> >> >> Not advocating an idiot growing pot plants but;Glad someone in a >> courtroom still understands "Curtilage".......... >> >> __________________________________________________ >> Do you Yahoo!? >> Yahoo! Mail Plus - Powerful. Affordable. Sign up now. >> http://mailplus.yahoo.com >> >> >> Yahoo! Groups Sponsor >> >> ADVERTISEMENT >> >> > 007140:HM/A=1414307/R=0/*https://www.clearcredit.com/registration/defaul >> t.asp?n=b&cpID=c01888p1379&ckID=gen14628> >> >> > pmail/S=:HM/A=1414307/rand=786786542> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service >> . >> >> >> >> >> [Non-text portions of this message have been removed] >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to >> http://docs.yahoo.com/info/terms/ >> >> >> >> >> Yahoo! Groups Sponsor >> >> ADVERTISEMENT >> >> > 007140:HM/A=1414307/R=0/*https://www.clearcredit.com/registration/defaul >> t.asp?n=b&cpID=c01888p1379&ckID=gen14628> >> >> > pmail/S=:HM/A=1414307/rand=235220143> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service >> . >> >> >> >> >> [Non-text portions of this message have been removed] >> >> >> >> ======================================================== >> TSCM-L Technical Security Mailing List >> "In a multitude of counselors there is strength" >> >> To subscribe to the TSCM-L mailing list visit: >> http://www.yahoogroups.com/community/TSCM-L >> >> It is by caffeine alone I set my mind in motion. >> It is by the juice of Star Bucks that thoughts acquire speed, >> the hands acquire shaking, the shaking is a warning. >> It is by caffeine alone I set my mind in motion. >> =================================================== TSKS >> >> Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ >> >> >> > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6853 From: James M. Atkinson Date: Fri Jan 31, 2003 6:00pm Subject: Re: Telecom question The lawyers client should plea bargain, and hope for mercy. Seriously though, The police or prosecutor is going to have to prove that it was THIS guy who made the call, and if he has done a good job of keep his mouth shut it will be almost for anyone to prove he did it. Of course if the police have an audio recording of this guy (from the harassing calls), or he had made previous threats, was sending harassing messages, and so on then the the guy is screwed. -jma At 9:25 AM -0800 1/31/03, Rick Hofmann - MICROSEARCH wrote: > A lawyer called with the following scenario: > > The lawyer's client has been charged with placing annoying phone >calls. The client claims he does not know the victim, and denies placing >any calls to the victim's number. The PD has (or claims to have) evidence >obtained from a telephone company trap that the client's number has been >placing the offending calls. > > My questions is, can phone company traps be "spoofed"? I suppose it is >also possible that a person could have clipped on to the client's line >using a butt set at his TNI. I was curious about other explanations >members of this list might conjure up. Thanks in advance for any ideas. > >Very truly yours, > >Rick Hofmann, CCO, CPP, PI16998 > >MICROSEARCH, LLC - Electronic Surveillance Detection - Counterespionage >Post Office Box 2084 - Cypress, California 90630 714-952-3812 Fax: >714-209-0037 >http://home.earthlink.net/~microsearch -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6854 From: Steve Uhrig Date: Fri Jan 31, 2003 8:46pm Subject: Riser Bond TDR FS Hi all, If anyone needs a high end TDR, I recently got in a Riser Bond 1205T- OSP. I've now gone over it and it's perfect, ready to sell. This is a twisted pair TDR, and it will read two pairs at once, so you can see the difference between pairs and note any differences on one which may indicate a tap or anomaly. It has two inputs, two sets of leads, and displays two traces on the backlit LCD screen which can be superimposed. The unit is in near new condition, new battery, all accessories, manual, two sets of test leads, new canvas accessory carry pouch, and I even put a brand new yellow Pelican case with shoulder strap on it when I calibrated it. This TDR can be used on telephone lines, LAN wiring, or any metallic cable. It has digital storage and can internally store a number of waveforms to print later, or download to a computer when you generate your report for the client. No additional hardware is needed. It's all built in, simple memory storage button on the front panel. I even include the RS-232 computer interface cable. You can print in realtime or store TDR readings to print later, or download into a computer for storage or further analysis. The latest software is available for free download from www.riserbond.com. They update it periodically so I don't bother to include the software. Info on this TDR is there also, as well as tutorials on using it. The dual line capability, two traces at once to compare on the screen, is a superb benefit for TSCM work. In the past, I've had two separate TDRs on two lines to compare. This unit does it all in one. The 1205T-OSP is a current product. The -OSP suffix means OutSide Plant, meaning it is extra rugged for field use. The closed case is totally waterproof. It has one button testing, meaning you clip on the leads to the line under test, push one button, and the unit sets itself up automatically adjusting to the line parameters, and displays a usable waveform all within 10 seconds or so. You can merely jump from line to line using the automatic function, or override anything manually to disassemble the line electronically to whatever extent necessary. Automatic filters switch in to null out noise, 60 cycles or other garbage, and it's like magic. You can manually disable the filters if you wish to do so. Every function has a button. No complicated menus. Set velocity factor, cable impedance, pulse width and much more. A laminated cheat sheet is attached to the case with velocity factors of most common cables. The manual, which stores in the lid, goes into even more detail. Here's a super easy to use, versatile, powerful TDR for the most discriminating user. Current new price, never discounted, is $3195 in the 2002 catalog. The 2003 catalogs are not out yet, but the new price certainly will be higher. My price, as new, calibrated, all accessories, new battery, my warranty, is $2200. Save a thousand bucks. That's not chump change. I take credit cards and ship internationally. Overnight shipping available if need is immediate. If you are outside the U.S. and your mains power is 220VAC, please be sure to mention this when you order so I can include the proper charger. I've only had two others of this model, and both sold quickly. If you don't have a TDR, you're not able to sweep phone lines as effectively as you might. If you have an older one, a tired ragged out Tek or just want the latest greatest, here it is. Email if interested. Feel free to ask for references from me or the dozens on this list who have purchased TDRs from me before. Other Riser Bond TDRs are available also, including 1205CX, 1205CXA, 1270, all with new batteries, all accessories, calibrated, in excellent condition with my warranty. Some were used for only one week on a large install. They're at all different price levels starting at $500. Inquire for details if you'd like one different from the 1205T-OSP described above. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6855 From: Mitch D Date: Fri Jan 31, 2003 10:10pm Subject: Re: Court rejects infrared drug search --- Michael Puchol wrote: > Thanks for that information Mitch, so... > > ----- Original Message ----- > From: "Mitch D" > To: > Sent: Friday, January 31, 2003 5:53 PM > Subject: Re: [TSCM-L] Court rejects infrared drug search > > > > > Viewing a person or using a hidden camera in a place where > there > > is a reasonable expectation of privacy, when the viewing or > > recording "would offend or embarrass an ordinary person," is > a > > misdemeanor. Tenn. Code Ann. ß 39-13-605. > > ...if I am home, in my bedroom, with the window blinds closed, > and > generating heat during normal marital activities, and someone > flies over my > house with a thermal camera and records the "action", wouldn't > ALL of the > above apply? I really don't see how this form of surveillance > shouldn't be > subjected to the same laws and regulations as wiretaps or > conventional > surveillance. In my own home I have an expectation of privacy, > the > recordings would definitely offend and emarrass me, so it is a > blatant > invasion of privacy. Period. If the Canadian agents had a > probable cause, > suspicion, tip, etc. they could have applied for surveillance > authorisation, > THEN flown over his house and recorded his plant-o-phile > activities. On the > other hand, it was quite an ingenious way to look for > hydroponic > plantations! > > Regards, > > Mike The hidden camera law was implemented to deter video recording that would be used for criminal/tortious,or perverted purposes( so I've been told by a local "low yer").Weather this applies to LEA's is another whole discussion,but I understand where youre coming from........ __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6856 From: MailExp Date: Fri Jan 31, 2003 3:32pm Subject: RE: Court rejects infrared drug search Not the same issue at all. When you are speaking, especially in your own home, you have an inherent right to privacy. Especially in the confines of your own home. Heat waves that emanate beyond the walls should not be protected. In the same way, if you chose to have a conversation inside your home with the use of a loudspeaker, your expectation of privacy would be lost. Wonder no more. -----Original Message----- From: Mitch D [mailto:rockdriver@y...] Sent: Friday, January 31, 2003 11:53 AM To: tscm-l@yahoogroups.com Subject: Re: [TSCM-L] Court rejects infrared drug search --- infospy wrote: > If I point a Microphone (or one of the other toys you gentlemen play > with) at your home or office from my home or office next door, and > record anything > I can. Is this legal? It's air space. > > Just wondering If you're in my neighborhood,you may consider reading this: Tenn. Code Ann. ß 39-13-601 (1999): A person who is a party to a wire, oral or electronic communication, or who has obtained the consent of at least one party, can lawfully record a communication and divulge the contents of the recorded communication unless he has a criminal or tortious purpose for doing so. Violations are punishable as felonies with jail sentences of between two and 12 years and fines not exceeding $5,000. Tenn. Code Ann. ß 39-13-602, 40-35-111 (1999). Anyone whose communications have been unlawfully intercepted can sue to recover the greater of actual damages, $100 per day of violation or $10,000, along with punitive damages, attorney fees and litigation costs. Tenn. Code Ann. ß 39-13-603 (1999). Recording or disseminating a communication carried out through a cellular or cordless telephone, or disseminating the contents with knowledge of their illegal origin, without the consent of at least one party can be punished as a felony with a potential prison sentence of between one and six years and a fine not to exceed $3,000. Tenn. Code Ann. ß 39-13-604, 40-35-111 (1999). Viewing a person or using a hidden camera in a place where there is a reasonable expectation of privacy, when the viewing or recording "would offend or embarrass an ordinary person," is a misdemeanor. Tenn. Code Ann. ß 39-13-605. __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6857 From: Ocean Group Date: Sat Feb 1, 2003 2:00pm Subject: Spare a moment... We should all spare a moment to share in the grief of the lost souls on the NASA shuttle Columbia and their families as well as their friends and team mates in mission control. The shuttle never made it through re-entry and all contact was lost. May the lord have mercy on their souls. 6858 From: Hawkspirit Date: Sun Feb 2, 2003 6:09am Subject: tscming a lan What I think we are talking about here is not the cable on the customers premises under the customers control. We are talking about the part of the networks traveling through out the city. Typical of a t1 span between the customer and the telephone central office which could be over five miles. Roger From: "Hugo Drax" Subject: Re: tscming a lan If your customer has sensitive data it should sit behind a secured isolated server in a tamper-resistant cabinet include tamper evidence seals with a firewall protecting the device, IDS/logging system residing in the cabinet for alerting and only permit timed access to the server via VPN with SecureID tokens(fobs). Physical security is a must. 6859 From: Hawkspirit Date: Sun Feb 2, 2003 6:18am Subject: tscming a lan TDR's are really limited in resolution if data is on the span that you are testing so shutting down the data is a must. No other machine will give you the detail or comparative information that a TDR will on cable splits and bridges. This is why we work a lot at night and on weekends. On the optical cables use an optical TDR. Use BERT's and loop back tests to locate repeaters and routers and physically inspect them for attacks on their monitoring ports. Roger From: "Matt Paulsen" Subject: RE: tscming a lan Hi Roger, Thanks for the information. Most of what you're discussing looks wan based voice/data - t1's, ds0's, opx's, etc. If we're still back to using a TDR (dry not wet, correct?), why should I bother with the other equipment I have? Does it provide any value to TSCM a lan in the context as I've laid it out? If you're saying that we have to break the lan to test, that's not very easy to do in a life systems level network where if you break the lan you endanger lives and set off physical security systems and impact engineering systems - chillers, electrical, etc. Or do I place that under this is a ISO issue, talk to the CEO if you've got an issue with it. Second, I'm still trying to understand how a TDR fits into the larger context of a fiber rich network with single & multimode cable all over the place. Third, I'm looking for surreptitious testing before breaking the lan. RE: CSU/DSU's, I've done from network loop back, 0x's, 1's, etc., as well as from the CO down to the CSU. Mostly I get 'it's all ok' from my testing. I tend to find that the telco's are braindead for the most part unless you get a senior engineer involved that realizes that there's this thing called a switch, and it runs on this other thing called software at their end. 6860 From: Hawkspirit Date: Sun Feb 2, 2003 6:28am Subject: tscming a lan Try this book "T1 A Survival Guide" by Matthew Gast O'Reilly is the publisher. Roger From: "Matt Paulsen" Subject: RE: tscming a lan Hi Hugo, Thanks for the input. Most of what you've laid out is already done. If the questions I've asked require a book to answer, I'll buy it. Any suggestions? Thanks, Matt 6861 From: Date: Sun Feb 2, 2003 7:07am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 6862 From: Date: Sun Feb 2, 2003 7:07am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6863 From: Fernando Martins Date: Sun Feb 2, 2003 11:26am Subject: irc question ... I wonder if there is any known irc channels@network about tscm or electronic security (like about cctv, access control, ...)? FM 6864 From: Gregory Horton Date: Mon Feb 3, 2003 0:02am Subject: Stop telemarketers Received this e-mail from a pal. Is this on the up and up? Subject: No Telemarket K. Alan Carlton, Professional Home & Building Inspection Consultant, Fort Worth, Texas 817 572-3300 Amateur Radio Operator N5GKY YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. Most Telemarketers use what is called Predictive Dialers, which are PCs with software that dials ever number in a phone exchange until it gets lucky. Now you can use their own technology against them, and it's legal. Here is how their system works: the dialer calls your number, you answer, and you have probably notice the line appears dead after you said, "Hello". What their computer is doing is listening for a short burst of audio, your "HELLO", followed by a period of silence. With this heard, it will log your phone number as valid and transfer the call to an available telemarketer, the reason for the delay before someone comes on line. Now, if their computer receives a long audio burst (an answering machine) " Hello, this is Alan Carlton", then it will disconnect, but it will log you phone number as valid, for a later call-back. Oh Lovely! Some are even capable of detecting Fax tones and will even transmit a fax trying to sell selling something you're probably are not interested in. However, do not answer, or when you do answer the phone, or if fax tones are detected, or if it detects an answering machine, in all four (4) cases IT LOGS YOUR NUMBER AS A GOOD PHONE NUMBER FOR FUTURE CALL- BACK --- PLUS THE COMPANY IS ALSO SELLING THESE VERIFIED VALID NUMBERS LIST TO OTHER TELEMARKETERS. A SIMPLE WAY TO STAY OFF THE LIST IS TO USE THEIR OWN TECHNOLOGY AGAINST THEM. The predictive dialer's software also looks for NON-valid phone numbers, and there is a simple way you can make your phone number appear invalid to the telemarketers' computers, thus they do not call back and accumulate no database, at least with your number, to sell other Telemarketers. Here is how to do it: If you call a number that has been disconnected or is no longer in service you will hear 3 short tones, "doo...dah...dee", thanks to Ma-Bell. Each time you Refresh this page you should hear, "doo...dah...dee". The actual frequency of these tones are 985.2 Hz, 1370.6 Hz, and 1776.7 Hz. Guess what the telemarketers' software does when it detects these 3 tones at the beginning of your outgoing message? It thinks it has reached a line that is disconnected or is no longer in service. So, it disconnects and does not log your phone number as a working number. BINGO! NOW record these onto you outgoing message or voice mail announcement, and start exterminating telemarketers. Try this example, but use your own name, "doo...dah...dee, Hello, This is Alan Carlton". It must be at the beginning of your announcement to work. You may have to explain it to you friends, but they will soon have it on theirs' too. [Non-text portions of this message have been removed] 6865 From: Steve Uhrig Date: Mon Feb 3, 2003 10:45am Subject: Very interesting US Army weapons procurement http://acquisition.army.mil/svs/output/DABJ3503T0056.html Items they are buying are all the way at the bottom. The rest is boilerplate. Quantity 13. Have we come full circle? Tom Clancy's comment: " The difference between fiction and reality is that fiction has to make sense. " Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6866 From: Fernando Martins Date: Tue Feb 4, 2003 3:05am Subject: cctv Any good or bad experiences with Philips cctv/observation equipment/systems? http://www.philipscsi.com/ FM 6867 From: Romeo Mabasa Date: Mon Feb 3, 2003 4:09am Subject: TSCM strategy, evaluation & contrtol Hi guys, We're currently developing the above mentioned things and need your input. We were given a budget and we need ways to improve on it. So nay help will be appreciated. -- __________________________________________________________ Sign-up for your own FREE Personalized E-mail at Mail.com http://www.mail.com/?sr=signup 6868 From: Date: Mon Feb 3, 2003 8:56am Subject: Re: Stop telemarketers The main thing I see that is wrong with those tones is that our DTMF tones are two frequencies per tone, not one (thus Dual Tone Multi-Frequency designation). Do you know the second tone for the three tones you mentioned? Sgt. Kirk Sewell Illinois State Police, Technical Investigations 500 Iles Park Place, Suite 300 Springfield, IL 62718 (217)524-6079 6869 From: Date: Mon Feb 3, 2003 9:35am Subject: Stop telemarketers Yes, this seems to work. The idea is fresh from the last issue of 2600 magazine... (Embedded image moved to file: pic06729.pcx) ----- Forwarded by Cory Bys/First Bank on 02/03/2003 09:29 AM ----- |---------+----------------------------> | | Gregory Horton | | | | | | | | | 02/03/2003 12:02 | | | AM | | | | |---------+----------------------------> >--------------------------------------------------------------------------------------------------------------| | | | To: TSCM-L@yahoogroups.com | | cc: | | Subject: [TSCM-L] Stop telemarketers | >--------------------------------------------------------------------------------------------------------------| Received this e-mail from a pal. Is this on the up and up? Subject: No Telemarket K. Alan Carlton, Professional Home & Building Inspection Consultant, Fort Worth, Texas 817 572-3300 Amateur Radio Operator N5GKY YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. Most Telemarketers use what is called Predictive Dialers, which are PCs with software that dials ever number in a phone exchange until it gets lucky. Now you can use their own technology against them, and it's legal. Here is how their system works: the dialer calls your number, you answer, and you have probably notice the line appears dead after you said, "Hello". What their computer is doing is listening for a short burst of audio, your "HELLO", followed by a period of silence. With this heard, it will log your phone number as valid and transfer the call to an available telemarketer, the reason for the delay before someone comes on line. Now, if their computer receives a long audio burst (an answering machine) " Hello, this is Alan Carlton", then it will disconnect, but it will log you phone number as valid, for a later call-back. Oh Lovely! Some are even capable of detecting Fax tones and will even transmit a fax trying to sell selling something you're probably are not interested in. However, do not answer, or when you do answer the phone, or if fax tones are detected, or if it detects an answering machine, in all four (4) cases IT LOGS YOUR NUMBER AS A GOOD PHONE NUMBER FOR FUTURE CALL- BACK --- PLUS THE COMPANY IS ALSO SELLING THESE VERIFIED VALID NUMBERS LIST TO OTHER TELEMARKETERS. A SIMPLE WAY TO STAY OFF THE LIST IS TO USE THEIR OWN TECHNOLOGY AGAINST THEM. The predictive dialer's software also looks for NON-valid phone numbers, and there is a simple way you can make your phone number appear invalid to the telemarketers' computers, thus they do not call back and accumulate no database, at least with your number, to sell other Telemarketers. Here is how to do it: If you call a number that has been disconnected or is no longer in service you will hear 3 short tones, "doo...dah...dee", thanks to Ma-Bell. Each time you Refresh this page you should hear, "doo...dah...dee". The actual frequency of these tones are 985.2 Hz, 1370.6 Hz, and 1776.7 Hz. Guess what the telemarketers' software does when it detects these 3 tones at the beginning of your outgoing message? It thinks it has reached a line that is disconnected or is no longer in service. So, it disconnects and does not log your phone number as a working number. BINGO! NOW record these onto you outgoing message or voice mail announcement, and start exterminating telemarketers. Try this example, but use your own name, "doo...dah...dee, Hello, This is Alan Carlton". It must be at the beginning of your announcement to work. You may have to explain it to you friends, but they will soon have it on theirs' too. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ********************************** N O T E ***************************************** All e-mail sent to and from this address will be received or otherwise recorded by the First Banks corporate e-mail system and is subject to archival, monitoring or review by, and/or disclosure to, someone other than the recipient. *********************************************************************************************** ********************************** N O T E ***************************************** All e-mail sent to and from this address will be received or otherwise recorded by the First Banks corporate e-mail system and is subject to archival, monitoring or review by, and/or disclosure to, someone other than the recipient. *********************************************************************************************** [Non-text portions of this message have been removed] 6870 From: T. Beachler Date: Mon Feb 3, 2003 2:22pm Subject: Re: Digest Number 1181 I'd like a follow up on this as well. TSCM-L@yahoogroups.------------------------------------------------------------------------ Message: 7 Date: Sun, 02 Feb 2003 22:02:57 -0800 From: Gregory Horton Subject: Stop telemarketers Received this e-mail from a pal. Is this on the up and up? Subject: No Telemarket K. Alan Carlton, Professional Home & Building Inspection Consultant, Fort Worth, Texas 817 572-3300 Amateur Radio Operator N5GKY YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. Most Telemarketers use what is called Predictive Dialers, which are PCs with software that dials ever number in a phone exchange until it gets lucky. Now you can use their own technology against them, and it's legal. Here is how their system works: the dialer calls your number, you answer, and you have probably notice the line appears dead after you said, "Hello". What their computer is doing is listening for a short burst of audio, your "HELLO", followed by a period of silence. With this heard, it will log your phone number as valid and transfer the call to an available telemarketer, the reason for the delay before someone comes on line. Now, if their computer receives a long audio burst (an answering machine) " Hello, this is Alan Carlton", then it will disconnect, but it will log you phone number as valid, for a later call-back. Oh Lovely! Some are even capable of detecting Fax tones and will even transmit a fax trying to sell selling something you're probably are not interested in. However, do not answer, or when you do answer the phone, or if fax tones are detected, or if it detects an answering machine, in all four (4) cases IT LOGS YOUR NUMBER AS A GOOD PHONE NUMBER FOR FUTURE CALL- BACK --- PLUS THE COMPANY IS ALSO SELLING THESE VERIFIED VALID NUMBERS LIST TO OTHER TELEMARKETERS. A SIMPLE WAY TO STAY OFF THE LIST IS TO USE THEIR OWN TECHNOLOGY AGAINST THEM. The predictive dialer's software also looks for NON-valid phone numbers, and there is a simple way you can make your phone number appear invalid to the telemarketers' computers, thus they do not call back and accumulate no database, at least with your number, to sell other Telemarketers. Here is how to do it: If you call a number that has been disconnected or is no longer in service you will hear 3 short tones, "doo...dah...dee", thanks to Ma-Bell. Each time you Refresh this page you should hear, "doo...dah...dee". The actual frequency of these tones are 985.2 Hz, 1370.6 Hz, and 1776.7 Hz. Guess what the telemarketers' software does when it detects these 3 tones at the beginning of your outgoing message? It thinks it has reached a line that is disconnected or is no longer in service. So, it disconnects and does not log your phone number as a working number. BINGO! NOW record these onto you outgoing message or voice mail announcement, and start exterminating telemarketers. Try this example, but use your own name, "doo...dah...dee, Hello, This is Alan Carlton". It must be at the beginning of your announcement to work. You may have to explain it to you friends, but they will soon have it on theirs' too. --------------------------------- Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now [Non-text portions of this message have been removed] 6871 From: Date: Mon Feb 3, 2003 0:04pm Subject: Forensics Used to Rate bin Laden Tape Forensics Used to Rate bin Laden Tape by Steve Harvey (Jan. 20, 2003) -- A recorded message purportedly made by Osama bin Laden that aired on Arab satellite television network Al-Jazeera in mid-November brought the field of audio forensics to the fore as investigators scrambled to verify that the world's most wanted terrorist was still alive. If genuine, the recording, in which the speaker specifically refers to recent events such as the Oct. 12 Bali bombing, would be the first concrete evidence that the al Qaeda leader survived the U.S.-led bombing of Afghanistan. Renowned forensic consultant Tom Owen of Owl Investigations was contacted by a number of news organizations for his opinion regarding the veracity of the Nov. 12 tape. Owen, who formerly worked at New York's Lincoln Center Archives as chief engineer for 11 years, currently serves as chairman of the AES Standards Group WG-12 on Forensic Audio and is the chairman of the American Board of Recorded Evidence. He maintains a fully equipped laboratory that offers analog and digital audio-video signal processing and voice identification at his New Jersey facility. The CIA and National Security Agency were quick to verify that the new tape was genuine. But a statement from a Swiss laboratory at the end of November suggesting that the speaker was an imposter-though the tests were inconclusive due to insufficient data, lab officials said-demonstrated the difficulties involved with voice identification. The process of verification is relatively simple, Owen explains. "Basically, it's a comparison analysis between a known and an unknown." But the problem with a figure such as bin Laden, of course, lies with the reliability of the "known" samples. The ideal "known" source is verbatim exemplars, states Owen. According to the 1998 standard laid down by the American Board of Recorded Evidence, verbatim exemplars should consist of prepared statements recorded by the subject under controlled circumstances. "Which is never going to happen," says Owen of bin Laden. There are only a few top certified voice analysts in the country, according to Owen, including such well-known independent consultants as Anthony Pellicano and former FBI experts Bruce Koenig and Steve Cain. "What differentiates me from the others," says Owen, "is that I used the only person-to-person interview that [bin Laden] has done, which was in 1998 with John Miller from ABC-TV. You see him on camera, so you know that's him, and you know that's him talking." As luck would have it, when the new recording arrived, Owen was in the middle of voice-identification training with three Saudi intelligence agents who were able to isolate words common to the known and unknown recordings. "They translated everything for me. We had five or six words, such as allah, and we looked at those. The unknown message had already been translated by the State Department, but they were taking some liberties with the translation, at least in the opinion of the Arabic-speaking people." Owen continues, "Most males speak at a pitch of about 130 Hz, fundamental frequency, so you're looking for a pitch analysis that's going to be somewhat reliable. On the interview with Miller, it's fairly reliable because it's network-quality audio. On the new message, there's a lot of noise-it has a 5 kHz radio band. Even when you try to clean it up, there are still problems. They probably did that on purpose." One simple verification method, Owen says, is to "make a short-term memory tape of the unknown/known, back and forth. You try to use phrases that have a similar breath pattern and a similar rate of speech." Of the new bin Laden tape, he opines, "When you look at the rate of speech, mannerisms-if you look for dialects and accents, that doesn't change. The syllable coupling-I don't detect any pathology like a cleft palate or a physical problem." More sophisticated analysis is performed with either an aural spectrogram machine or biometric algorithms, which the Swiss used. "The problem with biometrics is that it assumes perfect samples. That's its biggest downfall, because the voice is dynamic." Owen instead relies on analog Voice Identification and digital Kay Elemetrics sound spectrographs. But while the pixelization of the screen limits the efficacy of the digital system, he observes, on the analog printouts "the resolution in terms of the formants of the voice-meaning the time, energy and frequency of the voice-is very clear." Of the latest tape comparison, Owen concludes, "When you look at the visual cues on the spectrogram, either on the computer or the analog machine, you see the same distribution, the same transition between the consonants and the vowels, the trajectory of the formants on the same words. They matched very well. My opinion was that it was probably [bin Laden], but not positive." www.medialinenews.com [Non-text portions of this message have been removed] 6872 From: John M Date: Mon Feb 3, 2003 10:44pm Subject: Stop telemarketers I've had these tones on the lead-in of my answering machine greeting for the last year or so. Hard to say absolutely how much of an effect it's had, since I don't have any before/after study or census of unsolicited sales calls. My rough feeling though is that it may have reduced the number of telemarketing calls a fair amount. Doesn't completely eliminate them, but it seems to help. You can download the tones from here: http://www.sandman.com/sounds/sit.wav Or just do a Google search for "SIT" or "special information tone". Doing this yourself is a heck of alot cheaper then forking out $45 for a Telezapper too. -------- Message: 7 Date: Sun, 02 Feb 2003 22:02:57 -0800 From: Gregory Horton Subject: Stop telemarketers Received this e-mail from a pal. Is this on the up and up? Subject: No Telemarket K. Alan Carlton, Professional Home & Building Inspection Consultant, Fort Worth, Texas 817 572-3300 Amateur Radio Operator N5GKY YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com From: David Alexander Date: Thu Jan 29, 2004 6:06am Subject: RE: man flies Atlantic with 5 bullets in pocket > Date: Thu, 15 Jan 2004 16:24:58 -0000 > From:"David Alexander" > Subject:man flies Atlantic with 5 bullets in pocket > > The big news here in the UK this morning is that a man with a Sierra Leone > passport arrived at Heathrow Airport (London, England) with 5 rounds of > ammunition in his pocket. He arrived on a flight from the USA. > > I don't know if the US 'readers' of this list are aware of the > problems that > flights from the UK (and I suspect other countries too) have had. A lot of > flights have either been delayed or cancelled. A personal source in HMCS indicated that several of the UK delays were industrial actions by UK pilots & their unions. Having formerly had 450 unionized UK employees under my management and dealing first hand with the mechanisms their union put them up to, it would not be a surprising for this to have been part of the cause. You are right that a small part of the disruption has been down to the Airline Pilots, but over 80% of the problem is down to the US not giving the flights clearance. > Also we are very > unhappy with > the (in our opinion) the high-handed way that the US security authorities > have been dealing with other countries. For example, the FBI and DHS are > insisting that European countries flout their own privacy laws and supply > data about passengers that should not be in the public domain. The net > result among most people I know is quite simple - we're not coming to > America as long as this is in force. We have zero confidence in > the security > authorities to keep the information safe and not misuse it. The data is not to be released into the public domain, but rather is cooperative governmental information. We know that's what US Govt says it for, and I'm sure they mean it. Unfortunately we don't trust them to get it right. Their various agencies do not have a good track record- and once it's out there you can't get it back again. Was there a lot more than passenger lists and simple data for profiling (like methods of payment, citizenship/nationality, and such..) that was being shared? Yes, full biometric data from passports Much of that information was always available. I ended up being interviewed by Special Branch years ago for paying for tickets in cash, among other issues. The EU has dismantled their internal border systems to the point where after Canada & Mexico, the EU is a favored point for importing persons not desired in the USA. > > I'd just like to say that right now, we are laughing ourselves stupid. > > I know it's not you guys who read this list, please don't think > I'm having a > go at you personally, I'm not. Your postings show how dumba** you > think most > of this is and how ineffective it is on internal flights. Now you > know, it's > no better on the international ones either. > Airport security is (and in my estimation will always remain) marginally effective. The fellow had five rounds in his pocket. I've been in the secure areas of a commercial airport openly carrying ammo cans. Nobody asked me who, what or why. Having conducted numerous penetration inspections/exercises on supposedly secure facilities I've experienced a porosity of security that does not lead me to expect any "true security" in public facilities, like airports/airlines. Agreed, so why make it even more inconvenient and more hassle than it's worth. I'll do it for business trips (but not to the USA) but d*mned if I'll do it for a holiday. > Considering how long your sea and land borders are I'm sure that, if I > wanted to, I could get a whole platoon of 'illegals' into the USA without > detection or going anywhere near a scheduled flight. The general step-up at other ingress points is noticeable. Whether it is REMS and UGS in border areas, the cutting back of foliage and the implimentation of modest security on other transpost crossings, there has been a change. Even at a sleepy Manitoba/USA crossing there were armed Military on site and the increase in other measures was noticeable. I meant from a small boat into a sandy cove, or through the woods. I'm sure that the bad guys have no intention of sticking to 'comfortable', easy, routes. > I also think > that, with > the relatively low value of second-hand airliners at the moment, if I was > OBL and looking to repeat 9/11 I'd just buy a couple of old > soviet Aeroflot > transport aircraft and book them on 'one-way cargo runs' into the USA. > > My 2c. > > David Alexander > Dbi Consulting Ltd Valid issues. Expect that these types of vectors are a concern for any potential target country. Airborne & Seaborne infiltration of personnel & materials isn't all that hard, but there is no reason to make it as easy as a walk in the park. There's no reason to make it unacceptably harsh for me, or to risk my personal data either. The aggravation factor has gone up, but I don't think the level of security has, in real terms, increased by much. Certainly not enough to justify where it stands now. IMHO this is another example of the US authorities trying to use a sledgehammer to crack a nut which would be better opened by the use of lateral thought. It is worth remembering that important aspects of physical security include deterring the wrong doers and providing a comfort to the secured peoples at a level that lets them get on with life, albeit hopefully not in a false sense of invincibility & immunity. That's just the point - it's reached a level of discomfort for those of us who understand these issues As always your views from a UK vantage are enjoyed and appreciated. It does concern that you would consider not traveling over the issues. It does beg to wonder if the public demands for information sharing are only an acknowledgement of data long shared on a cooperative less public method. This kind of information sharing was not happening before - our European laws forbid it. Identity theft is a tiny fraction of the problem here in Europe that it is in the US because we have good laws to control data and privacy. Individuals have control and unequivocal redress against abusers. There has always been good co-operation for law enforcement and between the intelligence agencies on either side of the 'pond', but the transfer of full data about those who give no cause for suspicion is currently unacceptable. IMHO the main issue is that the US system needs fixing so it works properly - technology, procedures and people. Once that happens I will be happy to trust them with my data, but not until then. I will give you an example. A 66 year old Caucasian English man spent about 10 days in a South African jail because he was held by them after a request from the US authorities. The reason - his name was similar to the name of a terrorist suspect (who was black and in his twenties). It took the US 10 days to check the facts and say it wasn't the man they wanted, even though the South Africans sent pictures, fingerprints, etc immediately after they took the man into custody. I know how I would feel if that happened to me or my loved ones. Sorry if this seems like a rant, but I do feel very strongly about this subject. Steve W David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8195 From: Date: Thu Jan 29, 2004 6:57am Subject: Ashcroft Thinks Patriot Act Will Stand Ashcroft Thinks Patriot Act Will Stand By CURT ANDERSON .c The Associated Press WASHINGTON (AP) - The Bush administration issued a veto threat Thursday against legislation introduced in Congress that would scale back key parts of the anti-terrorism Patriot Act. In a letter to Senate leaders, Attorney General John Ashcroft said the changes contemplated by the Security and Freedom Ensured Act, or SAFE, would ``undermine our ongoing campaign to detect and prevent catastrophic terrorist attacks.'' If the bill reaches President Bush's desk in its current form, Ashcroft said, ``the president's senior advisers will recommend that it be vetoed.'' The threat comes a week after Bush, in his State of the Union address, called for Congress to reauthorize the Patriot Act before it expires in 2005. The law, passed shortly after the 2001 terror attacks, expanded the government's wiretap and other surveillance authority, removed barriers between FBI and CIA information-sharing, and provided more tools for terror finance investigations. Civil liberties groups and some lawmakers, including Republicans, believe the act goes too far and endangers the privacy of innocent citizens. The SAFE Act, which has not yet had a hearing in either the House or Senate, was introduced last fall by Sens. Larry Craig, R-Idaho; Dick Durbin, D-Ill.; and other lawmakers of both parties. In a statement at the time, Craig said the bill was a ``measured'' response to concerns that the Patriot Act threatens civil liberties and privacy rights. ``This legislation intends to ensure the liberties of law-abiding individuals are protected in our nation's fight against terrorism, without in any way impeding that fight,'' Craig said. The bill would modify so-called ``sneak and peek'' search warrants that allow for delayed notification of the target of the search. In addition, warrants for roving wiretaps used to monitor a suspect's multiple cell phones would have to make sure the target was present at the site being wiretapped before information could be collected. The legislation also would reinstate standards in place prior to passage of the Patriot Act regarding library records by forcing the FBI to show it has reason to believe the person involved is a suspected terrorist or spy. In addition, the bill would impose expiration dates on nationwide search warrants and other Patriot Act provisions, providing for congressional review. Ashcroft, who last year embarked on a national speaking tour in support of the Patriot Act, said the legislation would ``make it even more difficult to mount an effective anti-terror campaign than it was before the Patriot Act was passed.'' The bill is S. 1709. On the Net: Congress: http://thomas.loc.gov Justice Department: http://www.usdoj.gov 01/29/04 12:42 EST [Non-text portions of this message have been removed] 8196 From: Steve Uhrig Date: Wed Jan 28, 2004 0:15pm Subject: Riser Bond TDR recall Hi all, Riser Bond, now known as Radiodetection Company, has issued a safety recall for their 6000 series TDRs. The specific models mentioned in the recall are 6000, 6000DSL, RD6000 (Standard, VF, DD) and 6000DT. There is a shock hazard, where under certain combinations of connection and operating conditions, the metallic parts of the connectors and case housing can become energized with potentially hazardous voltages. All units in this series are being taken out of service. Ultimately. the company will develop a mod for the unit to address the issues. That mod has not yet been released, so for now they're just recalling all units. Apparently they're taking this seriously, judging from the string of certified letters I've been receiving from them, seemingly one for every unit I've purchased. If you have one of the above, contact Mr. Chuck Morton of Radiodetection at 207-647-9495 x112 for instructions. Do NOT contact me. I am only the messenger. If you need a time tested and proven yellow box Riser Bond TDR (not the series mentioned above), I have several used units in stock at substantial discounts off the new price. All are in perfect condition, with accessories, documentation and new batteries. Info on Riser Bond products can be found on their website www.riserbond.com. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8197 From: Date: Thu Jan 29, 2004 7:51am Subject: Tracking kids 24/7 Tracking kids 24/7 Using high-tech products, parents can instantly find out where a child is or what he's doing on the computer. But what does this do to the parent-child relationship? By Jennifer Wolcott | Staff writer of The Christian Science Monitor In this high-tech era, when new electronic gizmos are unveiled almost every day, the term "parental controls" is taking on a whole new meaning. Besides limiting children's access to certain websites, parents can now keep tabs on the Internet sites they surf, read the instant messages and e-mails they send, and even delegate the task of monitoring screen time with a device they install in Junior's computer. But that's not all. The growing business of child surveillance now extends into the offline world, thanks to new GPS devices - including cellphones, wristwatches, and even a surgically implanted chip - that enable adults to track down kids almost anywhere. Adults who use these tools insist they provide a sense of security in today's world of Amber alerts, terrorist warnings, and online predators. Some even go so far as to say it would be neglectful not to use them. But many people warn that tracking devices can create big problems by eroding trust between parents and children. They ask, Are the benefits worth the risk? "What we are doing [with these tools] is diminishing our anxiety but increasing the odds that kids will want to do the wrong thing because they deeply resent their parents' mistrust," says family therapist Alvin Rosenfeld. As for the safety argument, Dr. Rosenfeld doesn't buy it. "It's astonishing the amount of anxiety in our society. Most abductions are by relatives, and online predators really don't come along that often. But when these things happen, the media focus on it so much that parents become terrified." The first to object to such child-surveillance devices, as one would assume, are often those being watched. Recently, one 10-year-old girl fired off this e-mail to spy-software consultant Joshua Finer: "I came across your website, and I think you are a freak! You're breaking the rules of privacy!" But most kids haven't a clue. According to Mr. Finer, the majority of parents who use spy software do it in stealth mode. Of the 20 million American children who access the Internet, about 50 percent of them are "being protected by Internet safety software," he says. Of those, 75 percent have filtering software and 25 percent spy software. C.T. O'Donnell is one parent who favors the use of these products. The father of two teens and president of KidsPeace, a national children's crisis charity, he feels strongly about parents informing their children they are looking over their shoulders and telling them why: "It's my job as a parent to protect you." If parents are going to keep track of a child's whereabouts and activities, it's best to be open about it, child therapists agree. Even then, they say, the use of spy software and other such devices can weaken the parent-child bond. "It all comes down to respect and trust," says Rosenfeld. If a child has done nothing to challenge a parent's trust in him, there's little reason to use the products, he feels. "If children prove themselves unworthy of being trusted, that's different." For his own kids, Rosenfeld believes in using what now seems almost old- fashioned: cellphones. His daughter is a new driver, so having a cellphone enables her to let her parents know when she's about to get on the road and when they can expect her home. A study by the Yankee Group of Boston found that among 11- to 18-year-olds, 56 percent own or use a cellphone. Also, 55 percent of parents say cellphones provide an added layer of security in case of an emergency. But Rosenfeld isn't about to plunk down extra cash for a cellphone that includes a GPS locator so he can track his daughter's whereabouts at all times. Others find this extra feature invaluable - for younger teens anyway. When Nicky Pratt, a stay-at-home mom in Garden City, N.Y., got GPS phones for her kids, the oldest - her 17-year-old son - refused to use it. And she didn't push it. "I can't blame him," she says. "I wouldn't have wanted that at his age. But he does have to check in with me." His younger siblings, on the other hand, thought the phones were cool. Now when they drop by a friend's home after school, they don't have to phone home since Mom can check her own GPS phone to see exactly where they are. "My 13-year-old son never was great at remembering to call," Ms. Pratt says, "so this keeps me from worrying. "Let's face it," she adds, "the world we live in is not the nicest of places." In his research on kid-locating devices, her husband, Tom, came across the wristwatches that feature not only a built-in GPS device but also buttons for calling home or the police. "They seemed bulky to me, and it was too easy to call 911," he says. "Besides, I liked the idea of putting everyone in the family on the same network." Those watches, marketed for kids ages 4 to 12, are locked onto children's wrists with a key, which parents keep. "It's like they're criminals," says Rosenfeld. Also controversial among parenting pros is spy software. Depending how much they want to know about what their children are up to online, parents can choose from among a wide variety of programs. They include IamBigBrother, which specializes in recording all incoming and outgoing instant messages; SpyAgent, which records all correspondence, whether it be instant messages, e-mails, or chat-room exchanges; and eBlaster, one of the most sophisticated and aggressive, which immediately forwards incoming and outgoing e-mails to a parent as they are sent. Xanovia also offers the ability to spy on webcam activity as well as to capture and compress screen shots. Instead of installing such intrusive programs, many parents opt for filtering software, which may deny access to unwanted websites, block pop-up or pop-under windows, and shut out many unwanted e-mails. And then there are those timers that can be installed in computers. Rick Cohen, inventor of EyeTimer, says parents are drawn to his product because it "takes them out of the role of being the bad guy." Instead of Mom or Dad shouting "time's up," the computer does it for them with 10-, five- and one-minute warnings before shutdown. "I realize it's not a substitute for being a good parent," says Mary Rable, a mother of three, "but you have to pick your battles, and this is one that's been eliminated for me." She allows her 10-year-old son and 7-year-old daughter to spend 45 minutes each on the computer per day, and she relies on EyeTimer to enforce that rule. Keeping kids from zoning out for hours in front of a computer is one of parents' greatest concerns today, says Mr. Cohen. Studies show that children spend an average of 35 hours per week in front of a screen, whether it be a computer or a TV. But some quibble with the idea of delegating important negotiations to an electronic device. Others go beyond that, questioning the long-term effects of all of this virtual parenting. "I'm concerned," says Wendy Simonds, an assistant sociology professor at Georgia State University, "that subsequent generations are going to take all this surveillance for granted and stop thinking about all the technology that surrou nds them and what it means. "Adults don't want to micromanage kids' lives," she adds, "but I understand the temptation to do that because this technology exists." It all goes back to the need for community, says Robert Butterworth, a Los Angeles therapist who studies families and technology. "When I was growing up, neighbors were always watching us, and we didn't want to mess up because somebody might tell [our parents]. That sense of community no longer exists because no one wants to get involved, so parents are forced to use technology." Full HTML version of this story which may include photos, graphics, and related links www.csmonitor.com | Copyright © 2004 The Christian Science Monitor. All rights reserved. For permission to reprint/republish this article, please email copyright@c... from the January 28, 2004 edition - http://www.csmonitor.com/2004/0128/p13s02-lifp.html [Non-text portions of this message have been removed] 8198 From: Date: Thu Jan 29, 2004 4:44pm Subject: Lawmakers kill eavesdropping bill Lawmakers kill eavesdropping bill By JUSTIN BERGMAN Associated Press Writer January 26 2004 RICHMOND, Va. -- A Senate committee Monday killed legislation that would have made it illegal to record a conversation without first getting the other person's consent. Sen. R. Creigh Deeds, D-Bath County, said his bill was in response to the Republican eavesdropping scandal of 2002, in which former state GOP executive director Edmund A. Matricardi III admitted he illegally listened in on and taped two Democratic Party conference calls. Matricardi pleaded guilty to a federal felony count of unlawful interception of a wire communication and was sentenced last July to three years of probation and fined $5,000. "Politicians are the ones that don't have this figured out," Deeds said. "It's happened too often in the past. It'll probably reappear." However, Republicans called the law unnecessary, saying Deeds was engaging in "political posturing." Sen. Kenneth W. Stolle, Senate Courts of Justice Committee chairman, said what Matricardi did was illegal, whether he recorded the conversation or not. "The factual scenarios don't have anything to do with one another," said Stolle, R-Virginia Beach. "What Matricardi got convicted of has always been illegal in Virginia. ... There's absolutely no excuse for doing what the party did in those circumstances. But what (Deeds') bill did had nothing to do with that." The bill would have made it a Class 1 misdemeanor not to obtain consent from every party on a conference call or other electronic communication before recording it. Law enforcement personnel would have been exempted. Claudia Tucker, chief of staff to former House speaker S. Vance Wilkins Jr., also pleaded guilty to a misdemeanor for listening in on one of the Democratic conference calls. She was fined $1,000 for one count of unauthorized publication of a wire communication. Stolle said it was "asinine" to create a huge expectation of privacy where it wasn't necessary. "I think it's political posturing," he said. "I don't know if he's trying to make a statement, what he's trying to do." The Courts of Justice Committee defeated the bill 7-4. The bill is SB250 On the Net: http://leg1.state.va.us/ Copyright © 2004, Daily Press [Non-text portions of this message have been removed] 8199 From: Date: Thu Jan 29, 2004 4:48pm Subject: 'Warspying' San Francisco 'Warspying' San Francisco Hobbyists explore the City by the Bay, as seen though its wireless cameras. By Kevin Poulsen, SecurityFocus Jan 28 2004 4:45PM Striding through San Francisco's busy financial district after dusk, 20-year-old Jake Appelbaum is an odd sight. His left hand is clutching the handle of a two-foot-long fiberglass pole wrapped in a metal spiral, which he holds high like a lance. The device is a directional antenna: a thin cable hangs between it and what looks like a handheld TV in Appelbaum's other hand. As he walks, Appelbaum studies the fluttering static on the receiver's LCD screen while rapidly thumb-clicking a button below it, occasionally glancing up to avoid slamming into other pedestrians on the sidewalk -- most of whom stare as he passes. "You get the Playboy Channel on that?," one asks. He doesn't. But at the corner of Mason and Post a clear black-and-white image flickers onto the 2.5 inch screen. It's the interior of an office: a clock and a piece of art can be seen above a desk cluttered with stacks of books. The view is angled sidewise and up towards a drop ceiling, and is partly obscured, giving the video feed a decidedly covert look. Watching the display, Appelbaum sweeps the antenna slowly, left to right, up and down, dowsing for the source of the signal, which seems to be emanating from an upper floor of a hotel. "That's a hidden camera right there," he says, with perhaps more confidence than is due. Applebaum is part of an informal three-person "warspying" expedition out to peek in on San Francisco's wireless cameras, and the image of the empty office is one of the more interesting finds of the evening. 'We kind of look at this as useless, recreational fun.' -- MWD A 2002 New York Times article first brought to light how easily outsiders could intercept the video from the inexpensive cameras sold by Seattle-based X10 Wireless Technology (once very familiar to netizens from a steady barrage of pop-up ads around the Web) using nothing more than the receivers sold with the cameras. Later that year, a how-to in 2600 magazine coined the phrase "warspying" to describe the sport of driving or walking around to sniff out wireless video signals from X10s and other cameras that share the unlicensed 2.4GHz band. The sport generally involves hacking up a standard 2.4GHz video receiver, equipping it with an external antenna connector, a long-lasting power supply and possibly an amplifier to boost its range. Hobbyists with more cash than soldering skills can spring for a $400 Icom IC-R3 scanner, capable of picking up wireless video signals and displaying them on a built-in two-inch LCD screen. "Experimenting with wireless video opens a whole new world for monitoring, whether for fun or security," reads the Icom webpage. "I have no doubt that there's people out there doing it right now," says Simon Byers, a researcher at AT&T Labs. "It's so easy, and it's highly entertaining. Just look at the amount of people being arrested for being peeping Toms each year, and all the psuedeo-voyeur type porn out there. I have no doubt that it's going on to a certain degree." But just what are the video sniffers picking up? If the San Francisco expedition late last week is any indication, the answer is, not all that much. The outing was organized by a 60-year-old techie and ham radio operator who asked to be identified only by his online moniker, "Massive White Dude." MWD first went warspying (he prefers the neutral term "warviewing") a year ago, and he experimented with a couple of different receivers and antennas to discover what he says is the best combination for the job. His receiver of choice is the Action ACN-53292, a sleek handheld unit sold as part of a system designed to let you retransmit your favorite cable TV shows and watch from anywhere in the house. The Action receiver doesn't scan through the video channels automatically (hence the need for vigorous button-pushing), but it sports a color LCD display, accepts an external antenna, and through an undocumented feature can tap four extra video channels that a standard X10 receiver misses. MWD found it in an airline catalog. "We kind of look at this as useless, recreational fun," he says, demonstrating the gear near a video hotspot he's already charted in the Potrero Hill district. There, images from two cameras fighting over the same frequency are grainy and dark. He gets better results a few blocks away, where he taps the signal from a pole-mounted freeway cam pointed at the San Francisco skyline. From near the highway he can see what the camera sees, in color, on his little Action receiver. Geek Appeal Once the expedition moves into uncharted territory, though, results become more rare. With Applebaum and another young hacker handling the equipment in the backseat, it takes half-an-hour of driving around in MWD's Volvo before the crew gets another hit near a city hospital. The screen shows a car pulling into a parking lot, the driver in a close-up reaching out to pluck a ticket from the dispenser. Out of the Volvo and on foot with the directional antenna, MWD and his apprentices zero in on the camera: it's at the entrance to the hospital's visitor lot -- a sign beneath the tinted dome warns that the area is under video surveillance. Thumbing though the other channels, the trio finds a view from a second camera, peering down from the ceiling of the parking attendant's booth. On screen, the attendant organizes some papers, steps to the other side of the booth and leans to the window to speak with a driver-unaware, presumably, that the ragtag clutch of strangers huddled across the street have a bird's-eye view of him. This kind of snooping doesn't violate federal wiretap laws, which generally protect audio communication, but not video, says Joseph Metcalf, an assistant professor at the University of Oregon law school. Moreover, the law keeps it legal to monitor radio transmissions that aren't encrypted or scrambled in any way, unless they're in a band specifically protected by statute, like analog cell phone signals. "If a communication is readily accessible to the general public, that communication is not protected by the federal Wiretap Act," says Metcalf. But MWD doesn't relish trying to explain that to the San Francisco Police Department. Even when he's not warviewing, he keeps a police scanner running in his car, to "keep an ear on the pulse on the city," and tonight it provides some comfort by not squawking out calls about strange men carrying alien-looking ray gun equipment, or driving slowly and suspiciously though the city's varied neighborhoods in an ominous black '64 Volvo. After the hospital parking lot, San Francisco's airwaves yield nothing through nearly two hours of driving and button-pushing. A cruise through family-friendly Noe Valley fails to produce a single wireless nanny-cam. The county jail, city hall, the library-- zip. Finally, in a gritty neighborhood of warehouses and adult video stores, MWD's gang starts sniffing out cameras again: finding signals from the car, then parking and closing in on foot. At a small grocery store, a tiny black X10 is mounted atop a hanging florescent light and pointed at the door. Outside an apartment building, a color image from a security camera shows an empty hall. A few other cameras pop up, but nothing exciting -- until the financial district, where on the same block as the office cam, MWD's receiver picks up the very freeway camera that marked the start of the expedition. The camera is more than two miles away, while most wireless video cameras have trouble reaching the curb. The appearance of the signal so far from its source energizes the team. "That's definitely the catch of the night there," says MWD. With a little detective work, MWD will eventually discover that the signal is a directional transmission from the camera to a local TV station that features the feed on its website and in its nightly newscast. His satisfaction at the discovery hints at the real nature of warspying: at least for MWD, the appeal isn't voyeuristic at all -- it's pure geek. The stroll through the financial district ends when Appelbaum notices a police car driving by a little too slowly as he waves the giant antenna around. The gang piles into the Volvo and heads out. "The problem is, if the cops take an interest in you while you're doing something like this, the only way to get out of the situation is to admit that you're a dork," says MWD. "I'd almost rather be taken back to the station." Copyright © 1999-2004 SecurityFocus NEWS < http://www.securityfocus.com/news/7931 > [Non-text portions of this message have been removed] 8200 From: James M. Atkinson Date: Fri Jan 30, 2004 0:34am Subject: NEW CPM-700 and Inexpensive 12 GHz Microwave Probe OK Folks, here it is. The CPM-700 is a great tool for any sweep team, in fact a sweep team should have at least 2 or 3 of this systems, and protective details should have one for each member of the detail. While it has always suffered from poor performance above 2 GHz (and was essentially deaf above 3 GHz) a new probe to boost this coverage from 2 to 12 GHz is now available, and I have uploaded an updated page on it to: http://www.tscm.com/cpm700a.html If you need TSCM gear then please consider buying it from Granite Island Group, our prices are very attractive, order turn around is fast, and we take all major credit cards, wire transfer, etc. When others are selling a Basic CPM-700 system for $2995 or more, we sell for only $2195... when they charge you $4395 for a system with the extra probes, we only charge $2752... sort of makes you scratch your head think for a minute. Check it out, and when you need sweep gear give us a call or email... you will not regret it. http://www.tscm.com/cpm700a.html -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8201 From: David Alexander Date: Fri Jan 30, 2004 4:28am Subject: US organisations irresponsible with customer data - now we have proof Further to my posting yesterday, here is the proof that my concerns are valid: Electronic Privacy Information Center (EPIC), Washington, D.C. http://www.epic.org/alert/EPIC_Alert_11.02.html ====================================================================== [1] EPIC FOIA Docs: Northwest Gave NASA Info on Millions of Passengers ====================================================================== EPIC has obtained documents through the Freedom of Information Act (FOIA) revealing that Northwest Airlines provided the National Aeronautics and Space Administration (NASA) with three months of passenger information for research purposes. Confirmation of the disclosure came after a two-year effort by EPIC to obtain information about the government's post-9/11 development of air travel security measures. In July 2002, EPIC received documents from the Transportation Security Administration showing that NASA met with Northwest officials in December 2001 to discuss NASA research, including the development of "non-invasive neuro-logic sensors" as well as passenger screening technology. Days later, NASA asked that Northwest provide "system-wide Northwest Airlines passenger data from July, August and September 2001" for use in NASA's "research and development work." In September 2003, it was reported that JetBlue Airways turned over passenger information to a Defense Department contractor for use in a data mining and passenger profiling study. At the time, a Northwest official told the New York Times, "we do not provide that type of information to anyone." In the wake of the JetBlue incident, EPIC submitted a FOIA request to NASA asking for records related to negotiations for passenger information with Northwest or other airlines. In response, NASA provided EPIC documents confirming that Northwest gave NASA three months of passenger information for use in a data mining and passenger profiling study. The documents show that in September 2003 NASA returned to Northwest the CDs on which the passenger data were provided, after retaining the data for nearly two years. In an e-mail message to Northwest, a NASA researcher noted, "you may have heard about the problems that JetBlue is now having after providing passenger data for a project similar to ours." David Alexander Dbi Consulting Ltd Stoneleigh Park Mews Stoneleigh Abbey Kenilworth Warwickshire CV8 2DB Office : 01926 515515 Mobile: 07836 332576 Email : David.Alexander@d... Have you visited our website? http://www.dbiconsulting.co.uk 8202 From: James M. Atkinson Date: Fri Jan 30, 2004 1:32pm Subject: X10 Files... for Chapter 11 X10 files for Chapter 11 By Paul Festa Staff Writer, CNET News.com http://news.com.com/2100-1014-5095260.html Story last modified October 22, 2003, 3:16 PM PDT The company that only last year billed itself as the world's largest online advertiser has filed for Chapter 11 bankruptcy protection. X10 Wireless Technology, which marketed its Net cameras through a vast campaign of Web pop-under advertisements, made the filing on Tuesday in the U.S. Bankruptcy Court for the Western District of Washington. The filing came one day before the company faced a hearing in Orange County Superior Court for punitive damages following its loss to a tiny ad start-up called Advertisement Banners.com, based in Anaheim, Calif. That company had alleged that X10 had stolen its method of serving pop-under ads, or ads that show up beneath a Web page and remain on the screen once the window is closed. On Oct. 7, the jury in the case awarded Advertisement Banners $4.3 million in compensatory damages, according to court records. The judge issued a gag order Tuesday in the case that will last until the jury is dismissed. X10 and its bankruptcy attorney did not return calls. Attorneys for Advertisement Banners cited the gag order in declining to comment. Under Chapter 11 bankruptcy protection, a company typically continues to operate, shielded from creditors, while it reorganizes its finances. Court documents revealed that at Wednesday's punitive damages hearing, X10 told the court it had filed for bankruptcy protection, and the court put off the punitive damages hearing until Nov. 18. The filing reveals some financial details of a company that had made itself known throughout the Web for its ubiquitous pop-under campaign and yet remained secretive about its operations. The privately held firm, based in Kent, Wash., estimated its assets at between $1 million and $10 million, and its debts at between $10 million and $50 million. Advertisement Banners is by far the company's largest creditor, to the tune of $3.9 million, according to the filing. X10 owes Los Angeles law firm Sheppard Mullin Richter Ham $667,412; Microsoft $459,264; Yahoo $346,128; Google $69,984; and America Online $55,413. It also owes $95,047 to Overture Services, which was recently acquired by Yahoo. X10 filed what the bankruptcy court termed a "deficient" filing, meaning that it lacked a statement of its financial affairs. The court set a 15-day deadline for the completion of the filing, or X10 risks a dismissal. ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8203 From: contranl Date: Fri Jan 30, 2004 8:40am Subject: Video-scanners . . Why do i keep on reading that the icom ic-r3 is such a handy device to receive wireless video-cameras in the 2,4 ghz band ???? I like to point out that : IT DOES NOT WORK ! Sensitivity is absolutely zero and of no use. The first 4 channel home-video receiver (2,4 ghz link) that you can buy on every corner of the street is a 1000 times better. Shure...Icom has made some nice products...but this one is a failure I can only conclude that any company selling and advertising the ic- r3 is making a fool of it self and prooving at the sametime that they have no experience in this area. On top of that the frequency range is to limited and does not cover all used channels. I do make a good receiver myself that does work good and is specially designed for the purpose of discovering unknown video- transmissions. It covers 2200~2600 mhz and 1000~1400 mhz at the same time (2 receivers parallel). Monitor will switch on automatically and a alarm will sound when a valid video signal is received.(sync-detectors) Search speed is high enough to use it even while driving at a reasonable speed without missing a signal. It will also alert you to other signals such as microwave/radar/wlan/ spreadspectrum/freq-hopping signals by showing the typical patterns on the built-in lcd videoscreen Check it out at: www.tetrascanner.com in the "other projects section" Thanks Tetrascanner Amsterdam The Netherlands . 8204 From: Steve Weinert Date: Thu Jan 29, 2004 0:24pm Subject: RE: man flies Atlantic with 5 bullets in pocket (Note - I've tried to repair the "> "to make sense of who typed which statements! > -----Original Message----- > Date: Thu, 29 Jan 2004 12:06:40 -0000 > From: "David Alexander" > Subject: RE: man flies Atlantic with 5 bullets in pocket > > > Date: Thu, 15 Jan 2004 16:24:58 -0000 > > From:"David Alexander" > > Subject:man flies Atlantic with 5 bullets in pocket > > ...... > > The data is not to be released into the public domain, but rather is > > cooperative governmental information. > We know that's what US Govt says it for, and I'm sure they mean it. > Unfortunately we don't trust them to get it right. Their various > agencies do > not have a good track record- and once it's out there you can't > get it back > again. I think as valid as your concerns are, they are concerns you should extend to include both the UK Gov & the "crown". A couple visits to Cheltenham might be enlightening.... You are right to be concerned. > > > > Was there a lot more than passenger lists and simple data for profiling > > (like methods of payment, citizenship/nationality, and such..) that was > > being shared? > > Yes, full biometric data from passports Only the newest even have this information, which the EU requires as part of the priviledge of gaining use of an EU passport. > > > > > I'd just like to say that right now, we are laughing ourselves stupid. > > > > I know it's not you guys who read this list, please don't think > > I'm having a > > go at you personally, I'm not. Your postings show how dumba** you > > think most > > of this is and how ineffective it is on internal flights. Now you > > know, it's > > no better on the international ones either. > > > > > Airport security is (and in my estimation will always remain) marginally > > effective. The fellow had five rounds in his pocket. I've been in the > > secure areas of a commercial airport openly carrying ammo cans. Nobody > > asked me who, what or why. > > Having conducted numerous penetration inspections/exercises on supposedly > > secure facilities I've experienced a porosity of security that > > does not lead > > me to expect any "true security" in public facilities, like > > airports/airlines. > Agreed, so why make it even more inconvenient and more hassle than it's > worth. I'll do it for business trips (but not to the USA) but > d*mned if I'll > do it for a holiday. The inconvience? Peeved is more likely. On a broader view of this, it is amazing how much information is actually out there. Financial, the wee things like changes in your deliveries and phone use records, that are only "sort" of private. The UK's intensive use of Big Brother technology (cameras mostly) amazes the man on the street from the USA point of view. It is an interesting world, eh?! > > > Considering how long your sea and land borders are I'm sure that, if I > > wanted to, I could get a whole platoon of 'illegals' into the > USA without > > detection or going anywhere near a scheduled flight. > > > The general step-up at other ingress points is noticeable. Whether it is > > REMS and UGS in border areas, the cutting back of foliage and the > > implimentation of modest security on other transpost crossings, there has > > been a change. Even at a sleepy Manitoba/USA crossing there were armed > > Military on site and the increase in other measures was noticeable. > > I meant from a small boat into a sandy cove, or through the > woods. I'm sure > that the bad guys have no intention of sticking to 'comfortable', easy, > routes. > REMS & UGS ..... (remote electronic monitoring systems & unattended ground surveilance)... I was surprised to be quizzed after boating across the border to clear some reefs in an extremely remote local, as we never landed on the other side. Borders are very "holely" - in the pre-EU Europe I got myself in a smidge of a bind as I had ended up in Switzerland and wanted to exit to Germany but couldn't show how I got there (I had taken my car in through France while, let's say, "sightseeing" at an unmarked, umonitored crossing). The EU's external borders are considered very open - with much of the same logistics issues in security as the USA has. > > > Valid issues. Expect that these types of vectors are a concern for any > > potential target country. Airborne & Seaborne infiltration of personnel & > > materials isn't all that hard, but there is no reason to make it > > as easy as > > a walk in the park. > > There's no reason to make it unacceptably harsh for me, I've somehow missed how it is difficult or "harsh". Over a beer I'd love to chat about some of the interviews I was at the receiving end of in the UK with Customs and such.... Harsh is three trips to Ringway trying to fly out, but being kept off the flight because the UK Gov wasn't sure who was who and basically didn't seem ready to let the travel begin. > or to risk my > personal data either. The aggravation factor has gone up, but I > don't think > the level of security has, in real terms, increased by much. Certainly not > enough to justify where it stands now. IMHO this is another example of the > US authorities trying to use a sledgehammer to crack a nut which would be > better opened by the use of lateral thought. Suggestions for a better way? The UK Gov & the "crown" collected a huge amount of information when my visa was done and updated to other statuses. Invasionary? Maybe... but then they had something I needed, so I considered it a trade. > > > It is worth remembering that important aspects of physical > > security include > > deterring the wrong doers and providing a comfort to the secured > > peoples at > > a level that lets them get on with life, albeit hopefully not in a false > > sense of invincibility & immunity. > > That's just the point - it's reached a level of discomfort for those of us > who understand these issues > > > As always your views from a UK vantage are enjoyed and > > appreciated. It does > > concern that you would consider not traveling over the issues. > > It does beg > > to wonder if the public demands for information sharing are only an > > acknowledgement of data long shared on a cooperative less public method. > > This kind of information sharing was not happening before - our European > laws forbid it. Identity theft is a tiny fraction of the problem here in > Europe that it is in the US because we have good laws to control data and > privacy. Individuals have control and unequivocal redress against abusers. > There has always been good co-operation for law enforcement and > between the > intelligence agencies on either side of the 'pond', but the > transfer of full > data about those who give no cause for suspicion is currently > unacceptable. Having worked hand in hand with several European outfits, including Police/CID types, I'm much less optomistic that the EU laws have kept your identity data private or even privvy to only government. > IMHO the main issue is that the US system needs fixing so it works > properly - technology, procedures and people. Once that happens I will be > happy to trust them with my data, but not until then. > I will give you an example. A 66 year old Caucasian English man > spent about > 10 days in a South African jail because he was held by them after > a request > from the US authorities. The reason - his name was similar to the > name of a > terrorist suspect (who was black and in his twenties). It took the US 10 > days to check the facts and say it wasn't the man they wanted, even though > the South Africans sent pictures, fingerprints, etc immediately after they > took the man into custody. I know how I would feel if that > happened to me or > my loved ones. This was in the news and at face value sounded to be a hugely bungled event. The media seemed to have dropped all coverage once he was freed and the problem(s) were never outted. > Sorry if this seems like a rant, but I do feel very strongly about this > subject. > > David Alexander As I said, your views are greatly appreciated and with sympathy. Almost makes one want to get a Sealand Passport and disappear off the radar screen in that way. Do hope you change your mind and "risk" the adventure of popping across the pond. With the weak dollar it is a great value for UK based travelers! First beer is on me! Steve W 8205 From: Date: Mon Feb 2, 2004 9:18am Subject: New Camcorders Put Tape on Notice New Camcorders Put Tape on Notice By Daniel Greenberg Special to The Washington Post Sunday, February 1, 2004; Page F07 If videotape is not quite dead yet, it sure feels antique: We no longer mess with loops of tape to listen to music or watch movies, so why do we have to bother with it to make them? Manufacturers, however, are finally catching up to the times. Two new, absurdly small camcorders, Panasonic's D-Snap SV-AV100 and the Fisher FVD-C1 CameraCorder, can untie you from tape, instead using postage-stamp-size SD Cards to record video. The tiny memory cards allow these camcorders to weigh only six ounces each and fit neatly into a hand, purse or pocket -- unobtrusive enough to feel like a spy camera, and far smaller than even the most compact DVD-R camcorder, until now the only way to go tapeless. And the speed of flash memory means both models can upload movies to a computer far faster than any tape-based camcorder. The price for such portability and convenience? About a thousand dollars, and then some. The Fisher camcorder runs $900, the Panasonic $1,000. Each includes a capacious 512-megabyte SD Card -- but even that won't hold more than 30 minutes of video at close-to-DVD quality settings (640 by 480 video at 30 frames per second). If you opt for the Panasonic's 704-by-480 higher-quality mode, your recording time drops to just 10 minutes. You can switch to lower-quality settings -- for example, 320 by 240 pixels, on par with VHS, and 176 by 144, closer to Web video -- but they look grainy in comparison. Just buying a bigger card isn't quite practical yet; only one vendor, SanDisk, even makes a one-gigabyte SD Card, and it's only available at "select retailers" for a list price of $500. If you can discipline your use -- or if you don't mind carrying around a holsterful of 512GB SD Cards -- what do you get with each gadget? Both exhibit the same basic design, with flip-up color LCD screens that can be pivoted into a variety of useful and flexible positions. (The Panasonic's display is larger, but not as sharp.) Both camcorders have optical zoom lenses, but the Panasonic's works faster and goes further -- 10x to the Fisher's 5.8x zoom. Both come with small remote controls, USB 2.0 cables (not the usual FireWire connection) for fast file transfers, rechargeable batteries and docking cradles for easy recharging and picture transfer. Enthusiasts will find a variety of manual settings to play with, such as white balance and manual focus. The Fisher wins the overall ergonomic competition with its more comfortable shape and a sensible button layout that puts all the essential controls right under the thumb. The Panasonic camcorder feels more cluttered -- the all-important navigation cursor is hidden under the flip-out LCD screen and arranged at an odd angle. Fisher also beats Panasonic with its software bundle, which includes Ulead's PhotoExplorer 8 and VideoStudio 7. Panasonic's basic MediaStage software was good only for organization, not editing. And the company's installer routine shows such signs of sloppiness as poorly translated prompts ("Do you make the shortcut of Media Stage in the desktop computer?") and driver software that hadn't passed Microsoft compatibility testing. Both of these camcorders can double as digital still cameras, but only the Fisher includes a flash and a choice of resolutions -- two and three megapixel modes in addition to the appallingly low 640-by-480 resolution the Panasonic is stuck at. It also lets you shoot a still photo while filming, a very convenient option in practice. These two cameras are more notable for what they suggest about the future than what they can do now. Imagine, in particular, if you could combine the Panasonic's higher-quality video modes with the Fisher's ease of use. And if the results didn't cost double or triple the going rate for a tape-based digital camcorder. Until then, digital videotape such as MiniDV, for all its bulk, weight and overall inconvenience, remains the affordable, practical solution. [Non-text portions of this message have been removed] 8206 From: James M. Atkinson Date: Mon Feb 2, 2004 10:15pm Subject: Road Bomb 'Jammers' Being Used in Iraq washingtonpost.com Road Bomb 'Jammers' Being Used in Iraq By JOHN J. LUMPKIN The Associated Press Friday, January 30, 2004; 4:30 PM WASHINGTON - U.S. soldiers riding in convoys in Iraq are relying on electronic "jammers" to help protect against the roadside bombs insurgents have used to deadly effect. The anti-bomb technology isn't perfect, however. In some cases it only delays a bomb from detonating, so it can still explode and kill bystanders. It's unclear how widely the jammers - the same technology that saved Pakistan's leader from a recent assassination attempt - are being used in Iraq. Gen. Peter J. Schoomaker, the Army's chief of staff, acknowledged their use in testimony this week before the House Armed Services Committee, but he declined to discuss the bomb defenses in detail. The military does not want to provide useful information to Iraqi insurgents, officials say. Rep. Gene Taylor, D-Miss., suggested few are being used. "The Iraqis have figured out if they hit that detonator enough times, they're going to kill a vehicle that does not have a jammer," Taylor told Schoomaker. "The percentage of vehicles that have some form of electronic jammer - it is minuscule, and I know it, you know it, and the Iraq insurgents know it." But Schoomaker said protection doesn't depend on universal use. "Every vehicle doesn't have to be equipped," he said. "You have to have groups of vehicles that have that kind of capability, under an umbrella." The jammers work by preventing a remotely transmitted signal - say, rigged from a cell phone - from detonating an explosive when the bomber presses the button. Depending on the distance, power and design of the jammer, some might prevent the bomb from going off. Others might instead set it off before or after the convoy passes - potentially wreaking havoc on bystanders. Roadside bombs have been primary killers of U.S. troops in Iraq. Many go off under passing convoys, killing or injuring the occupants of one of the vehicles. But in some cases, they have gone off only after a convoy has passed. That can be a sign that a jammer on one of the vehicles did its job, said James Atkinson, head of the Granite Island Group, a Gloucester, Mass.-based security and counterespionage firm. Anti-bomb jammers have been in use since the early 1980s, Atkinson said. Military aircraft have used them for decades, and versions of anti-jamming technology are advertised on the Internet. It's unclear if those versions are effective, however. Depending on their sophistication, jammers can cost from hundreds to millions of dollars. Most can be powered by a car engine. Some work by transmitting on frequencies that bombers are known to use. Guerrillas frequently rig remote-controlled detonators out of garage door openers, car alarm remotes or cellular phones, Atkinson said. Others, called barrage jammers, put out signals on a wide range of frequencies, he said. These will knock cellular phones and CB radios off the air in a given area. Both kinds can cause a premature or late detonation of a bomb, or prevent it from going off entirely. "When you see a car bomb that goes off several blocks away from its intended target, it's usually a dead giveaway it was jammed," Atkinson said. Jamming devices carried in the motorcade of Pakistan's President Pervez Musharraf delayed the detonation of a huge bomb that exploded moments after his limousine passed over a bridge near the capital Dec. 14, Pakistani intelligence has said. Since then, Pakistan has imported more jamming devices for security of VIPs, a senior government official told The Associated Press on the condition of anonymity Thursday. He refused to give further details, including where the devices were imported from, citing security reasons. In Israel, a special unit in the Ministry of Defense developed jamming technology in the early 1990s and used it extensively in southern Lebanon in the mid- to late 1990s in an effort to neutralize roadside charges placed by Hezbollah. It is unclear what defenses exist against other kinds of bombs, such as those that rely on timers or are hard-wired to a switch. Pakistani officials claimed their jamming devices also interrupted a timer. In Iraq, employing the jammers is one of a number of steps the military is taking to protect vehicles and soldiers. Others include deploying a more heavily armored Humvee and giving soldiers improved body armor. "We've taken some major moves there that are paying off, in my view." Schoomaker said. In Baghdad, a military official said the Iraqi bombs have varied widely in sophistication. "Our soldiers have become ... very adept at noticing, observing," said Brig. Gen. Vincent Boles, commander of the 3rd Corps Support Command. "We're discovering more than are exploding." © 2004 The Associated Press ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 8207 From: Date: Tue Feb 3, 2004 9:29am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8208 From: James M. Atkinson Date: Tue Feb 3, 2004 6:20pm Subject: New 2047 U/C For Sale I am offering for sale another NEW 2047 U/C Ultrasonic Stethoscope. You can read about this model at: http://www.tscm.com/mlk2047.html I am asking $1145, and I can take all major credit cards. The first person to pony up payment gets the item. Only offered for sale in the US, and will only be shipped to a US address. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8209 From: Patrick Ryals Date: Tue Feb 3, 2004 1:54pm Subject: RE: New Camcorders Put Tape on Notice Unfortunately for the vast majority of investigative/evidence related purposes of our industry - you can't afford to leave a $200 to $500 SD card lying around as "evidence". Until a non-tape alternative arrives that meets the low cost of tape - we're stuck with it. Sincerely, Patrick Ryals Nexus Investigations, Inc. LA CA#22920 Message: 1 Date: Mon, 2 Feb 2004 15:18:38 EST From: MACCFound@a... Subject: New Camcorders Put Tape on Notice New Camcorders Put Tape on Notice By Daniel Greenberg Special to The Washington Post Sunday, February 1, 2004; Page F07 If videotape is not quite dead yet, it sure feels antique: We no longer mess with loops of tape to listen to music or watch movies, so why do we have to bother with it to make them? Manufacturers, however, are finally catching up to the times. Two new, absurdly small camcorders, Panasonic's D-Snap SV-AV100 and the Fisher FVD-C1 CameraCorder, can untie you from tape, instead using postage-stamp-size SD Cards to record video. The tiny memory cards allow these camcorders to weigh only six ounces each and fit neatly into a hand, purse or pocket -- unobtrusive enough to feel like a spy camera, and far smaller than even the most compact DVD-R camcorder, until now the only way to go tapeless. And the speed of flash memory means both models can upload movies to a computer far faster than any tape-based camcorder. The price for such portability and convenience? About a thousand dollars, and then some. The Fisher camcorder runs $900, the Panasonic $1,000. Each includes a capacious 512-megabyte SD Card -- but even that won't hold more than 30 minutes of video at close-to-DVD quality settings (640 by 480 video at 30 frames per second). If you opt for the Panasonic's 704-by-480 higher-quality mode, your recording time drops to just 10 minutes. You can switch to lower-quality settings -- for example, 320 by 240 pixels, on par with VHS, and 176 by 144, closer to Web video -- but they look grainy in comparison. Just buying a bigger card isn't quite practical yet; only one vendor, SanDisk, even makes a one-gigabyte SD Card, and it's only available at "select retailers" for a list price of $500. If you can discipline your use -- or if you don't mind carrying around a holsterful of 512GB SD Cards -- what do you get with each gadget? Both exhibit the same basic design, with flip-up color LCD screens that can be pivoted into a variety of useful and flexible positions. (The Panasonic's display is larger, but not as sharp.) Both camcorders have optical zoom lenses, but the Panasonic's works faster and goes further -- 10x to the Fisher's 5.8x zoom. Both come with small remote controls, USB 2.0 cables (not the usual FireWire connection) for fast file transfers, rechargeable batteries and docking cradles for easy recharging and picture transfer. Enthusiasts will find a variety of manual settings to play with, such as white balance and manual focus. The Fisher wins the overall ergonomic competition with its more comfortable shape and a sensible button layout that puts all the essential controls right under the thumb. The Panasonic camcorder feels more cluttered -- the all-important navigation cursor is hidden under the flip-out LCD screen and arranged at an odd angle. Fisher also beats Panasonic with its software bundle, which includes Ulead's PhotoExplorer 8 and VideoStudio 7. Panasonic's basic MediaStage software was good only for organization, not editing. And the company's installer routine shows such signs of sloppiness as poorly translated prompts ("Do you make the shortcut of Media Stage in the desktop computer?") and driver software that hadn't passed Microsoft compatibility testing. Both of these camcorders can double as digital still cameras, but only the Fisher includes a flash and a choice of resolutions -- two and three megapixel modes in addition to the appallingly low 640-by-480 resolution the Panasonic is stuck at. It also lets you shoot a still photo while filming, a very convenient option in practice. These two cameras are more notable for what they suggest about the future than what they can do now. Imagine, in particular, if you could combine the Panasonic's higher-quality video modes with the Fisher's ease of use. And if the results didn't cost double or triple the going rate for a tape-based digital camcorder. Until then, digital videotape such as MiniDV, for all its bulk, weight and overall inconvenience, remains the affordable, practical solution. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------ Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ ------------------------------------------------------------------------ 8210 From: savanted1 Date: Fri Feb 6, 2004 2:05pm Subject: Justice Department asks FCC to address VoIP wiretapping In a letter to the Federal Communications Commission (FCC), written on behalf of the FBI, the Drug Enforcement Administration and the US Justice Department, FBI Deputy General Counsel Patrick W. Kelley urges federal communications regulators to delay setting rules for Voice-over-Internet Protocol (VoIP) systems until law enforcement and national security concerns can be addressed. Law enforcement agencies worry that it may be difficult to place wiretaps on VoIP systems in the same way as surveillance is possible for 'regular' telephones. VoIP allows voice calls to be placed digitally over broadband Internet connections. Communications companies would like the FCC to clarify VoIP rules. Opponents of regulation fear that measures to allow monitoring of conversations would be costly, could stifle innovation and jeopardize privacy. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/7884914 .htm 8211 From: Date: Sat Feb 7, 2004 0:33am Subject: Ears added to electronic eyes to secure Athens Olympics Ears added to electronic eyes to secure Athens Olympics Microphones that will listen to street noise during the Olympic Games are being added to surveillance cameras around the city to improve security, Greece's public order minister said Thursday. "If there is an explosion, we must be able to hear sound in real time. We can't wait for someone to make a phone call," Giorgos Floridis said. The decision could add to protests against a giant surveillance system being installed around the capital. Several public demonstrations against Olympic security are being planned for this month. In January, the mayor of an Athens suburb hosting the Olympic weightlifting event ordered municipal works to spray paint three cameras after residents complained about their right to privacy. During the Olympics, stationary cameras around Athens will operate from 1,250 concrete columns 12 meters tall. Hundreds of cameras will also be installed at venues and other points around the city in addition to surveillance equipment on helicopters and a blimp. Floridis insisted cameras will be vital for security during the Aug. 13-29 Games and flatly denied that the cone-shaped microphones will be used to monitor conversations or broadcast instructions to bystanders. http://english.eastday.com/epublish/gb/paper1/1170/class000100002 /hwz180541.htm [Non-text portions of this message have been removed] 8212 From: Spook Date: Sat Feb 7, 2004 5:27pm Subject: More Bomb Technician/EOD Ultrasonic Stethoscopes for Sale I have two more 2047 U/C Ultrasonic Stethoscopes for sale. These are primarily use by bomb technicians and EOD specialists, and are commonly used to detect certain types of low level sounds emitted by clock mechanisms, timing devices, and so on. These are also very useful in finding hidden tape recorders and video recorders as it allows the TSCM specialist to listen to the ultrasonic noise which is otherwise inaudible to the human ear. The first unit I am offering is used, but in excellent condition with both the contact microphone, and the ultrasonic probes. Also it included the under-the-chin headphones, and leather case and everything is in almost as new condition. I an asking $800 dollars for this first unit. The second unit is also in good condition, but does not include the ultrasonic probe, or the leather case. This second unit is in used condition, but has not been abused in anyway and is fully operational and includes the contact microphone. I am asking $500 for this second unit. You can read about this model at: http://www.tscm.com/mlk2047.html I can take all major credit cards, but the equipment is only being offered for sale in the US, and will only be shipped to a US address. Please email if your interested. -jma 8213 From: James M. Atkinson Date: Sun Feb 8, 2004 2:29am Subject: Re: More Bomb Technician/EOD Ultrasonic Stethoscopes for Sale Oops, I also forgot to mention that I also accept funds via PayPal under the user name of "jmatk@tscm.com"(of course if you just feel like sending donations you can use the same PayPal account -jma At 06:27 PM 2/7/2004, Spook wrote: >I have two more 2047 U/C Ultrasonic Stethoscopes for sale. These are >primarily use by bomb technicians and EOD specialists, and are commonly >used to detect certain types of low level sounds emitted by clock >mechanisms, timing devices, and so on. These are also very useful in >finding hidden tape recorders and video recorders as it allows the TSCM >specialist to listen to the ultrasonic noise which is otherwise inaudible >to the human ear. > >The first unit I am offering is used, but in excellent condition with both >the contact microphone, and the ultrasonic probes. Also it included the >under-the-chin headphones, and leather case and everything is in almost as >new condition. I an asking $800 dollars for this first unit. > >The second unit is also in good condition, but does not include the >ultrasonic probe, or the leather case. This second unit is in used >condition, but has not been abused in anyway and is fully operational and >includes the contact microphone. I am asking $500 for this second unit. > >You can read about this model at: http://www.tscm.com/mlk2047.html > > I can take all major credit cards, but the equipment is only being >offered for sale in the US, and will only be shipped to a US address. > >Please email if your interested. > >-jma > ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8214 From: Date: Sun Feb 8, 2004 3:40am Subject: Probe taps city, piece by piece Posted on Sun, Feb. 08, 2004 Probe taps city, piece by piece By Emilie Lounsberry and Nancy Phillips Inquirer Staff Writers Follow the bugs. First, the FBI tapped the phones of a Muslim cleric and businessman operating out of a rundown building in Mount Airy. Then, they tapped the phone at the plush Center City office of √ºber-lawyer Ronald A. White, a wealthy power broker obscure to the public but well-known to the politicians who coveted his campaign cash. Next, federal authorities tapped the city's treasurer, an eager young acolyte of White's who helped dole out lucrative city bond work. Finally came the big leap: a bug in the mayor's office. In textbook fashion, federal investigators have taken ever bolder steps as they ratchet up their investigation into municipal corruption in Philadelphia. They have mounted what Mayor Street recently described as a "wider and wider-range probe, kind of all over the place." By the time the bug was pulled out of the ceiling of the mayor's office four months ago, the FBI already had reams of evidence: spools of tape from at least eight phone taps and three office bugs, for starters. Now, federal authorities are nearing the final phase before indictments. Prosecutors are reviewing tapes, calling witnesses before the grand jury, and squeezing anyone they believe committed a crime. Their message: Cooperate, turn on others, or risk a long prison sentence. Textbook. As the investigation unfolds, voters cynical about City Hall have had plenty of cause to grow more so. What has come to light amid the flood of subpoenas - at least six city agencies, two members of the mayor's staff, and more than 50 firms have been hit - is not savory. Money managers paid a cool $1 million for "introductions" to the pension board. Airport concessions granted to "disadvantaged" entrepreneurs rolling in money. Contracts renewed despite warnings that no work was being done. Debt collectors, developers, airport bars and newsstands, construction companies, money managers, banks, printers, law firms, consultants, investment houses, car-rental firms - all have come under FBI scrutiny. While the probe has awakened public attention to Philadelphia's entrenched pay-to-play tradition, federal authorities also are pursuing something much more clear-cut and unambiguously illegal: extortion, mail fraud, wire fraud and racketeering. Investigators have seized computers and confiscated e-mail. They have taken the mayor's BlackBerry handheld devices. They have subpoenaed his financial records from Commerce Bank, along with those of his wife and his son. And they have combed through his campaign-finance reports. But the most extraordinary move - the placement of the bug inside the mayor's office - yielded nothing. No conversations were recorded during the two weeks the bug was in place, according to federal documents. The mayor has said he has done nothing wrong. FBI and IRS agents are following the flow of money that drives city business in an investigation that has spanned more than two years. Although all kinds of city contracts are under review, it is clear that the FBI and U.S. Attorney's Office have been examining the city's affirmative-action agenda. The picture is not pretty. Programs to give a leg up, a city contract, to the disenfranchised have been manipulated to help the wealthy or well-connected, or both. The losers have been the hundreds of struggling minority firms with no political juice. Predictably, perhaps, this has stirred a backlash. Resentment at the probe helped fuel Street's reelection. African Americans are not the only ones wondering why the the murky linkage between city contracts and campaign contributions was suddenly being scrutinized when blacks began benefiting from it. In time, transcripts of conversations secretly recorded by the FBI will provide a clearer picture of what may be a municipal corruption investigation of unprecedented scope in Philadelphia. Indictments are on the way, court system sources say. "They really want to take it to City Hall," said one lawyer with knowledge of the investigation. "A lot will depend on what they have on tape." In City Hall, meanwhile, a gallows humor prevails. One joke making the rounds among Street aides: What do we call the time when we fielded questions about a Molotov cocktail tossed at the office of the mayor's opponent? The good old days. ‚Ä¢ Who is on the tapes? Who is cooperating? How far up will it go? Politicians, business people and the public are bracing for the answers to those questions. The answers will likely have much to do with two men: Ronald A. White and Imam Shamsud-din Ali, a pair with some striking differences and similarities. White, 54, is big. He carries perhaps 250 pounds on his short, strong frame. He is ebullient, a lover of the good life. Ali, 64, is the spiritual one. He is slender and soft-spoken. Both have made much of themselves from tough beginnings. White grew up in the Richard Allen Homes projects, fatherless, but went on to earn a law degree from the University of Pennsylvania. Ali, born Clarence Fowler, spent five years in prison in the 1970s on a murder conviction before the courts overturned the case. He is now one of the city's leading Muslim clerics. The two are friends; White represented Ali in his 1992 divorce. The pair have something more in common. They have been important political allies of Mayor Street's. And they have been cut in on city business. When it comes to that, White has been far the more successful. A lawyer who raised hundreds of thousands of dollars for two political-action committees, White has been paid more than $1.6 million since 1996 for legal work for the city, its employee pension fund, and other agencies. White has a connection to virtually every area investigators are known to be scrutinizing. At the Philadelphia Housing Authority, where federal investigators have requested records of about 30 individuals and companies, White has done legal work and bond work. At the city Redevelopment Authority, where records also are being sought, White helped represent the authority on all but one of its bond issues from November 2000 through June 2003. At Philadelphia International Airport, federal prosecutors have subpoenaed records of two companies owned by White's wife that have shares in several newsstands and restaurants. Nine days after the discovery of the bug in the mayor's office, FBI agents seized more than 50 boxes of documents from White's Center City office, including boxes with markings that read: PHA, Tasker Homes and Bonds 2002. In city political circles, White was viewed as an unofficial member of Street's administration whose support was vital to people who wanted to do business with the city. "Every prize that could be gotten, you had to go through White," said one person familiar with some aspects of the investigation. White and his lawyer, Creed C. Black Jr., have declined to talk about the ongoing inquiry. Ali, meanwhile, is a longtime supporter of the mayor's who has rallied support for him in the Muslim community. He also emerged quickly as a focus of investigators. The day after the investigation burst into public view with the discovery of the bug, the FBI raided the office of Ali's debt-collection firm, Keystone Information & Financial Services. They also raided his Cheltenham Township home and the offices of his accountant. Federal investigators are scrutinizing a no-bid contract under which Keystone was to collect delinquent city taxes. The firm was paid a $60,000 commission to collect a massive delinquent debt owed by a Chestnut Hill firm that reached a settlement with the city. Investigators also are examining Keystone's role as a partner in a contract to manage the wireless telephone system at Philadelphia International Airport. And federal authorities are investigating Sister Clara Muhammad School, where Ali is director, for allegedly failing to provide adult-literacy classes and GED courses after being paid to do so under a contract with Community College of Philadelphia. Federal investigators have subpoenaed documents related to a charter school that Ali's wife, Faridah, wanted to open on Sister Clara's West Philadelphia campus. Ali and his lawyer, Tariq El-Shabazz, have declined to comment on the investigation. Federal investigators and prosecutors aren't talking. Strict grand-jury secrecy rules prevent them from saying what has unfolded behind the closed doors of the federal courtroom, where they have been sketching the early outlines of their case. Several City Hall staffers have been called before the panel, including the mayor's chief of staff, Joyce Wilkerson, and John Christmas, a deputy chief of staff. Lawyers familiar with parts of the investigation, meanwhile, say they are struck by the wide use of electronic surveillance in the case. The listening devices were in place for months at a time, capturing conversations that could provide key evidence for prosecutors. While the wiretaps were operating, the mayor and others in his office placed at least 21 calls to White's office and cell phone, according to city phone records obtained by The Inquirer. Of those, eight calls were made on Street's phone line. All were brief, lasting no longer than five minutes. The phone records examined by The Inquirer covered the time from June of last year until October, when the bug was discovered in the ceiling above the mayor's desk at City Hall. The taps on White's phones were in place from January of last year until October. With at least eight wiretaps and three bugs, the inquiry marks the most extensive use of electronic surveillance in Philadelphia since the Abscam scandal of the 1980s. "I don't think you get this number of wiretaps approved without some very persuasive evidence," former U.S. Attorney David Marston said. "Anytime you have a major federal investigation into big-city corruption, it's a very serious time for that city." Contact staff writer Emilie Lounsberry at 215-854-4828 or elounsberry@p... or Nancy Phillips at 215-854-2254 or nphillips@p.... Inquirer staff writers Angela Couloumbis, Cynthia Burton, Joseph Tanfani and Marcia Gelbart contributed to this article. ¬© 2004 Philadelphia Inquirer and wire service sources. All Rights Reserved. http://www.philly.com [Non-text portions of this message have been removed] 8215 From: Date: Sun Feb 8, 2004 3:44am Subject: Taped threat to Street aide reported Posted on Sat, Feb. 07, 2004 Taped threat to Street aide reported The FBI warned George R. Burrell about allegedly menacing words from Imam Shamsud-din Ali, sources say. By Leonard N. Fleming Inquirer Staff Writer Imam Shamsud-din Ali, a longtime supporter of Mayor Street, was picked up on FBI wiretaps making threats about top mayoral aide George R. Burrell and another man who is not a city official, several sources with knowledge of the investigation say. The FBI warned Burrell, the city's secretary of external affairs and a onetime mayoral candidate, that Ali was heard saying to an unidentified person that Burrell should watch himself because Ali believed that Burrell had been talking with federal investigators, sources say. There has been no indication that Burrell has assumed the role of a cooperating witness with the federal government in its widespread investigation of alleged municipal corruption in City Hall that came into public view and scrutiny with the Oct. 7 discovery of a bug hidden in the ceiling of the mayor's office. The agents warned Burrell and the other man last year, several weeks after the bug was found, the sources said. Tariq El-Shabazz, Ali's attorney, strongly denied that his client had threatened anyone. Ali, 64, a leader of Philadelphia's largest mosque, has been identified as a focus of the investigation. Federal agents raided Ali's home and business, Keystone Information & Financial Services, the day after the listening device was found. Federal authorities began intercepting calls from Ali's office phone in July 2001. Officials later tapped his cellular and home phones. The taps ceased in 2002. FBI spokeswoman Linda Vizi yesterday declined to say whether agents contacted Burrell, but she did say it was standard policy to contact someone who has been threatened. Burrell declined to comment. He holds a key role in the administration, serving as Street's liaison with other politicians, and makes decisions about who gets city contracts. Barbara A. Grant, the mayor's spokeswoman, also declined comment. El-Shabazz said he was not privy to the federal government wiretaps because his client had not been charged with anything. "Our position is and has been, and always will be, that there has been no threat to George Burrell or anyone else," he said. Known in recent years as a gentle, politically astute cleric and influential leader, Ali was once named Clarence Fowler and was believed to be a leader of the Black Mafia. In 1970, he was convicted of killing a North Philadelphia minister. After he served 51/2 years in prison, Ali's conviction was overturned by the state Supreme Court in 1976. Contact staff writer Leonard N. Fleming at 215-854-4330 or lfleming@p.... Inquirer staff writer Emilie Lounsberry contributed to this article. © 2004 Philadelphia Inquirer and wire service sources. All Rights Reserved. http://www.philly.com [Non-text portions of this message have been removed] 8216 From: James M. Atkinson Date: Tue Feb 10, 2004 2:42am Subject: Receiver Page being updated I am in the process of updating the pages I have concerning TSCM receivers, and radios, etc that is helpful to our profession. Please feel free to send me your thoughts on which radios should be listed, commentary on each, observations, etc. It is going to be a really, really awesome page. Please let me know your thoughts. -jma ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8217 From: James M. Atkinson Date: Tue Feb 10, 2004 3:12pm Subject: Canberra and Jakarta deny embassy bugs Canberra and Jakarta deny embassy bugs By Mark Baker, Herald Correspondent in Nusa Dua, Bali February 5, 2004 Indonesian and Australian officials yesterday hosed down claims Australia's spy agencies had been caught bugging the Indonesian embassy in Canberra. Allegations that listening devices had been found in the embassy threatened to overshadow a regional anti-terrorism conference in Bali discussing intelligence sharing. But claims by several Indonesian MPs, backed by an intelligence official in Jakarta, that electronic bugs had been found in both the embassy chancery and ambassador's residence, drew strong rebuttals. The allegations were published in Jakarta newspapers yesterday, including Koran Tempo, which ran a front page story and cartoon showing a kangaroo with a stethoscope outside an embassy door. "There was a microphone inside the alarm in the meeting room of the embassy. That is an act of bugging," MP Djoko Susilo told the paper after he and several other legislators met Major-General Nachrowi Ramli, head of the Indonesian agency which controls official communications codes. The general was quoted as saying that he believed Australia was spying on the embassy, but that in 20 years Indonesia's diplomatic codes had never been broken. "Bugging is normal . . . because strategic information can certainly be detected by the host countries," he told the Jakarta Post. Indonesian Foreign Ministry spokesman Marty Natalegawa confirmed yesterday that a team of security experts had been sent to Canberra last year to investigate "suspicions that our communications system was being compromised" by embassy security equipment installed by the Australian Federal Police in the wake of the Bali bombings. He said investigators found the problem was created by "criss-crossing" frequencies between the embassy's communications and Canberra television transmitters. This story was found at: http://www.smh.com.au/articles/2004/02/04/1075853939461.html ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8218 From: Date: Wed Feb 11, 2004 5:49am Subject: office swept -- for listening devices, at a cost of $16,500. Fawell fixed contract, feds charge February 11, 2004 BY STEVE WARMBIR, TIM NOVAK AND DAVE NEWBART Staff Reporters Scott Fawell, a former top aide to George Ryan, could feel the breath of federal investigators on his neck, so he decided to do a little cleaning and redecorating at his government office at Navy Pier. Fawell had his office and others swept -- for listening devices, at a cost of $16,500. He rented out a special spy clock for his office for $400 a month, one that could alert him if a visitor was wearing a bug and working for the FBI. That's what prosecutors alleged Tuesday in new indictments. Even as the investigation swirled around him, Fawell still put the fix in on a $11.5 million public contract for a consulting firm that was a client of his close pal Al Ronan, the powerhouse Chicago lobbyist, federal prosecutors alleged Tuesday in a fresh indictment of Fawell, a onetime political golden boy. Fawell, 46, is already serving a 61/2 year prison sentence at Yankton, S.D., for political corruption while he worked as a top aide to Ryan, first when Ryan was secretary of state, then when he was governor. Now, Fawell could see his prison time increase substantially for the contract he allegedly fixed while heading McPier, the city-state agency that runs Navy Pier and McCormick Place. Fawell's former boss, Ryan, faces political corruption charges, while Fawell's onetime girlfriend and aide at McPier, Alexandra Coutretsis, began cooperating extensively with federal investigators after getting slapped with perjury charges. Fawell's friend Ronan, while not indicted Tuesday, seems clearly in the crosshairs of federal prosecutors. They charged Ronan's lobbying firm, Ronan Potts LLC, with taking part in the fixed contract at McPier. Also charged in the case by prosecutors Patrick Collins and Scott Levine was Ronan's onetime top aide, Julie Starsiak, 56, of Chicago, a former vice president at the firm. She lied to investigators, prosecutors allege. Ronan was not referred to by name in the indictment by prosecutors but was called "Fawell Associate 1. "Ronan allegedly paid for meals, golf, entertainment and vacations for Fawell while Fawell ran McPier, the indictment alleges. Ronan also is accused of chipping in for Fawell's legal defense fund. Fawell, in turn, had McPier hire people referred by Ronan. McPier also awarded contracts to Ronan clients at Fawell's request, the feds allege. Fawell used McPier money to pay for rooms at the McCormick Place Hyatt for himself, Ronan and Coutretsis. From another favored McPier vendor, Fawell allegedly got a satellite dish at his home, plus free installation. By charging Ronan's firm criminally, federal prosecutors have effectively crippled it, lobbying experts said. Since 1997, Ronan Potts has given at least $295,000 to dozens of Illinois politicians. Ronan, a former state lawmaker, was considered a top money-raiser for Gov. Blagojevich and is close to the governor's budget director John Filan. An attorney for Ronan's firm, James Cutrone, shifted the blame Tuesday to former employee Starsiak, who left the firm last year to start her own. "The fault lies here in the hands exclusively with Ms. Starsiak," Cutrone said. "It does not extend beyond her to other employees of the firm. "The charges center on a prime contract bid out in 2001 for a consulting firm to manage an $800 million expansion of McCormick Place. Seven teams bid on the contract. At first, Fawell allegedly cut a deal with another consulting firm in which he would get a job after he left McPier, among other benefits, for steering the contract the firm's way. But that deal fell apart when the heat from the ongoing federal investigation of Fawell got too hot. Instead, Fawell allegedly decided to help his friend Ronan and Ronan's client, Jacobs Facilities Inc., based in St. Louis. With Fawell's approval, his aide Coutretsis passed along inside information on the consulting contract to Starsiak, who funneled it to two officials at Jacobs, prosecutors say. The former Jacobs employees, James Nagel, 41, of Glen Ellyn, and Elizabeth Koski, 35, of Elmhurst have been charged in the case. McPier sources said they expected the agency's board to fire Jacobs. The consulting firm has been paid $2.66 million so far. A Jacobs spokeswoman declined to comment Tuesday on the charges but said the firm has cooperated with federal investigators. [Non-text portions of this message have been removed] 8219 From: Robert Dyk Date: Wed Feb 11, 2004 9:21pm Subject: Surveillance Periscope (Vehicle mounted) This item was just listed for any active surveillance types out there... Surveillance Periscope http://cgi.ebay.ca/ws/eBayISAPI.dll?ViewItem&item=3077869038 Thanks for your time, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 8220 From: Date: Wed Feb 11, 2004 7:05pm Subject: Defense objects to use of GPS technology to follow Scott Peterson Defense objects to use of GPS technology to follow Scott Peterson 06:33 PM PST on Wednesday, February 11, 2004 By KIM CURTIS / The Associated Press REDWOOD CITY - Scott Peterson's defense lawyer pressed a prosecution expert Wednesday to concede that satellite technology used to track the murder suspect before his arrest was error prone and effectively useless. A judge must decide whether to accept evidence gathered from global positioning system devices that police secretly put on vehicles Peterson drove in the weeks after his pregnant wife's disappearance. The GPS technology has yet to be qualified as acceptable evidence in a criminal trial in California. The hearing that began Wednesday will determine whether the Peterson case changes that. Modesto police used GPS to track Peterson last year from early January through late April, when he was arrested near San Diego days after the bodies of his wife, Laci, and unborn son surfaced in San Francisco Bay. Defense lawyer Mark Geragos wants a judge to prohibit all GPS-related evidence at Peterson's double-murder trial. Police installed the devices in vehicles Scott Peterson owned, borrowed and rented after Laci Peterson disappeared on Christmas Eve 2002 electronic surveillance that trailed him to San Francisco Bay at least once in January. Bound by gag orders, neither side has discussed what evidence would be lost or gained from information the tracking devices gathered. Because GPS technology has yet to be tested in California's criminal courts, prosecutors first must establish its reliability using qualified experts and then demonstrate the technology was used correctly. Only then can GPS-related evidence be introduced at trial. That process began Wednesday when Judge Alfred A. Delucchi heard the testimony of prosecution expert Peter Van Wyck Loomis, whose Silicon Valley company made the GPS technology in the device that followed Peterson. During the hearing, Geragos seized on instances when the GPS devices appeared to fail, including once when it showed Peterson taking an impossible route. That error lasted for several minutes before the device corrected itself. Geragos pressed Loomis to say the devices were unreliable because of how police hid them on Peterson's vehicles. Loomis rejected those claims, saying the devices were accurate though he did say that Modesto police had used older, less expensive models. "It's accepted commercial technology," Loomis told Geragos. The military developed the satellite-based radio navigation system, which can pinpoint a user's location within feet at any time, in all weather, anywhere in the world. The decades-old technology is now used by everyone from airline pilots to wildlife management officials, and weekend hikers to Sunday drivers. Geragos pressed Loomis, who said he had little experience with the devices used in this case. Loomis said he had seen a photograph of one of them but had never used it himself, tested it or seen evidence of testing. Geragos said Modesto police had tested their own devices, and they failed an assertion prosecutor David Harris denied. The GPS hearing will likely continue next Tuesday, when Geragos may call his own expert to question how police used the devices to track Peterson. Also Wednesday, Laci Peterson's family spoke to the media. Her stepfather, Ron Grantski, said the family has discussed how they should be celebrating the first birthday of the Petersons' unborn son, Conner, whose due date was Feb. 10 of last year. "We shouldn't be going to court," Grantski said. "I should be teasing Laci about Conner keeping her up." Also Wednesday, prosecutors filed their opposition to Geragos's request to sequester jurors and to have separate juries for the trial and penalty phases of the case. [Non-text portions of this message have been removed] 8221 From: Robert Dyk Date: Thu Feb 12, 2004 6:41am Subject: Surveillance Periscope This item was just listed for any active surveillance types out there... Surveillance Periscope http://cgi.ebay.ca/ws/eBayISAPI.dll?ViewItem&item=3077869038 Thanks for your time, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 8222 From: Date: Thu Feb 12, 2004 11:24am Subject: Smart Software Gives Surveillance Eyes a 'Brain' Smart Software Gives Surveillance Eyes a 'Brain' Date: Thursday, February 12 @ 15:26:03 EST Topic: Computers and Electronics In these days of heightened security and precautions, surveillance cameras watching over us as we cross darkened parking lots or looking over our shoulders at airports may seem reassuring, but they're only of use if someone is watching them. Researchers have found a way to give these cameras a rudimentary brain to keep an eye out, and the research is already been licensed to a New York company with an aim toward homeland security. From the University of Rochester: Smart Software Gives Surveillance Eyes a 'Brain' In these days of heightened security and precautions, surveillance cameras watching over us as we cross darkened parking lots or looking over our shoulders at airports may seem reassuring, but they're only of use if someone is watching them. Researchers at the University of Rochester's computer science laboratories have found a way to give these cameras a rudimentary brain to keep an eye out for us, and the research is already been licensed to a Rochester company with an aim toward homeland security. "Compared to paying a human, computer time is cheap and getting cheaper," says Randal Nelson, associate professor of computer science and creator of the software "brain". "If we can get intelligent machines to stand in for people in observation tasks, we can achieve knowledge about our environment that would otherwise be unaffordable." Far from being an electronic "Big Brother," the software would only focus on things for which it was trained to look‚Äîlike a gun in an airport, or the absence of a piece of equipment in a lab. Nelson has even created a prototype system that helps a person find things around the house, such as where reading glasses were left. Nelson set about experimenting with how to differentiate various objects in a simple black-and-white video image like that used in a typical surveillance camera. The software initially looks for changes that happen within the image, such as someone placing a cola can on a desk. The change in the image is immediately highlighted as the software begins trying to figure out if the change in the image is a new object in the scene, or the absence of an object that was there before. Using numerous methods, such as matching up background lines that were broken when the new object was set in front of them, the prototype system is accurate most of the time. It then takes an inventory of all the colors of the object so that an operator can ask the software to "zoom in on that red thing" and the software will comply, even though the soda can in question may be red and silver and overlaid with shadows. The next step, however, is where Nelson's software really shines. Nelson has been working for years on ways to get a computer to recognize an object on sight. He began this line of research over a decade ago as he wrote software to help a robot "shop"‚Äîpicking out a single item, like a box of cereal, from several similar items. One of the tasks he recently gave his students was to set up a game where teams tried to "steal" objects from one another's table while the tables were monitored by smart cameras. The students would find new ways to defeat the software, and consequently develop new upgrades to the system so it couldn't be fooled again. Though a six-month-old baby can distinguish different objects from different angles, getting a computer to do it is a Herculean task of processing, and more complicated still is identifying a simple object in a complicated natural setting like a room bustling with activity. Unlike the baby, the software needs to be told a lot about an object before it's able to discern it. Depending on how complex an object is, the software may need anywhere from one to 100 photos of the object from different angles. Something very simple, like a piece of paper, can be "grasped" by the program with a single picture; a soda can may take half a dozen, while a complex object like an ornate lamp may need many photographs taken from different angles to capture all its facets. With those images in mind, the software matches the new object it sees with its database of object to determine what the new object is. The technology for this 'smart camera' has already been licensed to the local company PL E-Communications, LLC., which has plans to develop the technology to control video cameras for security applications. For instance, CEO Paul Simpson is looking into using linked cameras covering a wide area to exchange information about certain objects, be they suspicious packages in an airport or a suspicious truck driving through a city under military control. Even unmanned aerial reconnaissance drones like the Predator that made headlines during the current Iraqi war can use the technology to keep an eye on an area for days at a time, noting when and where objects move. "We're hoping to make this technology do things that were long thought impossible‚Äîmaking things more secure without the need to have a human operator on hand every second." says Simpson. Nelson and PL E-Communications were connected through the Center for Electronic Imaging Systems (CEIS), a NYSTAR-sponsored Center for Advanced Technology (CATs) devoted to promoting economic development in the greater Rochester region and New York State. CEIS develops and transfers technology from local universities to industry for commercialization, and by educating the next generation of leaders in the fields of electronic imaging and microelectronics design. This article comes from Science Blog http://www.scienceblog.com/community The URL for this story is: http://www.scienceblog.com/community/modules.php?name=News&file=article& sid=2306 [Non-text portions of this message have been removed] 8223 From: Date: Thu Feb 12, 2004 9:09am Subject: Re: Digest Number 1487 Hello SOCIETY What about this topic ? 1. Quote of the Month: Interpreting God's Intentions --------------------------------------------------- "Both speeches had the quality of sermons. Both leaders invoked God, and neither had any doubt about whose side God was on. And both interpreted God's intentions." -- Brian Michael Jenkins, RAND terrorism expert, writing in a Los Angeles Times commentary that compared recent speeches by President Bush and Osama bin Laden >> http://www.rand.org/rnbrd/commentary/020104LAT.html Sincerely Martin KO CIA N ----- P¯ipojte se p¯es RazDva a vyberte si jednu z nov˝ch cen v Bonus Clubu. VÌce na http://club.razdva.cz. From: James M. Atkinson, Comm-Eng Date: Wed Jan 31, 2001 6:18pm Subject: McDonald's Fast Food Job Application McDonald's Fast Food Job Application: This is an actual job application someone submitted at a McDonald's fast-food establishment. NAME: Greg DESIRED POSITION: Reclining. HA But seriously, whatever's available. If I was in a position to be picky, I wouldn't be applying here in the first place. DESIRED SALARY: $185,000 a year plus stock options and a Michael Ovitz style severance package. If that's not possible make an offer and we can haggle. EDUCATION: Yes. LAST POSITION HELD: Target for middle management hostility. SALARY: Less than I'm worth. MOST NOTABLE ACHIEVEMENT: My incredible collection of stolen pens and post-it notes. REASON FOR LEAVING: It sucked. HOURS AVAILABLE TO WORK: Any. PREFERRED HOURS: 1:30-3:30 p.m., Monday, Tuesday, and Thursday. DO YOU HAVE ANY SPECIAL SKILLS?: Yes, but they're better suited to a more intimate environment. MAY WE CONTACT YOUR CURRENT EMPLOYER?: If I had one, would I be here? DO YOU HAVE ANY PHYSICAL CONDITIONS THAT WOULD PROHIBIT YOU FROM LIFTING UP TO 50 LBS?: Of what? DO YOU HAVE A CAR?: I think the more appropriate question here would be "Do you have a car that runs?" HAVE YOU RECEIVED ANY SPECIAL AWARDS OR RECOGNITION?: I may already be a winner of the Publishers Clearinghouse Sweepstakes. DO YOU SMOKE?: Only when set on fire. WHAT WOULD YOU LIKE TO BE DOING IN FIVE YEARS?: Living in the Bahamas with a fabulously wealthy super model who thinks I'm the greatest thing since sliced bread. Actually, I'd like to be doing that now. DO YOU CERTIFY THAT THE ABOVE IS TRUE AND COMPLETE TO THE BEST OF YOUR KNOWLEDGE?: No, but I dare you to prove otherwise. SIGN HERE: Scorpio with Libra rising. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2433 From: Date: Wed Jan 31, 2001 3:14pm Subject: This is not why I get the big bucks.... In a message dated 1/31/01 5:57:58 AM Pacific Standard Time, agrudko@i... writes: << Jeepers, this switch to yahoogroops has caused some headaches - anyway.... >> http://au.egroups.com/mygroups It's the same good old systems of eGroups. And it works great for us Yanks. You won't be disappointed. You'll have the same id and password. Also, you can try these. Australia http://au.egroups.com/mygroups Canada http://www.egroups.ca/ UK http://www.egroups.co.uk/ China http://cn.egroups.com/ HK http://www.egroups.com.hk/ India http://in.egroups.com/ Japan: http://www.egroups.co.jp/ Korea http://kr.egroups.com/ Taiwan http://tw.egroups.com/ Fra nce http://www.egroups.fr/ Germany http://www.egroups.de/ Italy http://it.egroups.com/ 2434 From: Steve Uhrig Date: Thu Feb 1, 2001 8:22am Subject: Surveillance at Super Bowl http://www.viisage.com/january_29_2001.htm Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2435 From: A Grudko Date: Thu Feb 1, 2001 10:06am Subject: Re: This is not why I get the big bucks.... ----- Original Message ----- From: > agrudko@i... writes: > Jeepers, this switch to yahoogroops has caused some headaches -> > http://au.egroups.com/mygroups> It's the same good old systems of eGroups. > And it works great for us Yanks. You won't be disappointed. You'll have the same id and password. Howdy Mac.... Why do they call you Yanks anyway? Maybe we should not go there....:-) Well, so far I've had 2 members of our South African PI list which I moderate accuse me of censorship 'cos their messages kept bouncing, another getting all messages twice, and I've been refused access to another list which I moderate!!! My feelings about Yahoo: as NYPD Sgt John McLean would say, 'Yippie kiay........' Andy Grudko Johannesburg 2436 From: James M. Atkinson, Comm-Eng Date: Thu Feb 1, 2001 4:40pm Subject: Blonde Handyman A blonde, wanting to earn some money, decided to hire herself out as a handyman-type person and started canvassing a well-to-do neighborhood. She went to the front door of the first house and asked the owner if he had any jobs for her to do. "Well, you can paint my porch. How much will you charge?" The blonde said "How about 50 dollars?" The man agreed and told her that the paint and other materials that she might need were in the garage. The man's wife, inside the house, heard the conversation and said to her husband, "Does she realize that the porch goes all the way around the house?" The man replied, "She should, she was standing on it." A short time later the blonde came to the door to collect money. "You're finished already?" he asked. "Yes," the blonde answered, "and I had paint left over, so I gave it two coats." Impressed, the man reached in his pocket for the $50. "And by the way," the blonde added, "it's not a Porch, it's a Lexus." -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2437 From: James M. Atkinson, Comm-Eng Date: Thu Feb 1, 2001 8:13pm Subject: Hot Cup of Coffee The young clerk's responsibilities included bringing the judge a hot cup of coffee at the start of every day. Each morning the judge was enraged that the coffee cup arrived two-thirds full. The clerk explained that he had to rush to get the coffee delivered while it was still hot, which caused him to spill much of it along the way. None of the judge's yelling and insults produced a full cup of coffee, until he finally threatened to cut the clerk's pay by one-third if he continued to produce one-third less than the judge wanted. The next morning he was greeted with a cup of coffee that was full to the brim, and the next morning and the morning after that. The judge couldn't resist gloating over his success and smugly complimented the clerk on his new technique. "Oh, there's not much to it," admitted the clerk happily, "I take some coffee in my mouth right outside the coffee room, and spit it back in when I get outside your office." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2438 From: Thomas H. Jones Date: Fri Feb 2, 2001 3:11pm Subject: RE: 2.4 GHz VBA >The VBA is roughly 8 inches long, 3 inches wide, and three quarters >inch thick (not including the sturdy fold-up antenna that is >provided). > >The only thing I don't like about it is that I feel the bandwidth >should be wider, and cover 2.00 to 2.700 GHz (700 MHz bandwidth), the >ripple is a little too high on the lower skirt. (cough-cough) I hope >Tom and Bruce see this, perhaps they could come out with a Wide band >version (cough-cough) To Jim and All, Thank you for the comments on the VBA. We have planned for some time to come out with a new wider band version of the VBA at the same price. It will go into production in the next few weeks. We had planned to replace the VBA with this model, but if the interest remains for the narrow-band version, we will certainly keep it. The new product will be called the LAA-1530 (Log-Periodic Active Antenna), and the frequency range will be from 1.5 to 3GHz. This will be identical to the current VBA with roughly the same total system gain. However, the noise floor of the unit will certainly be increased because of the wider frequency range. The size and packaging will change slightly due to variation in the antenna, but the total length will be about the same. Jim has pointed out to me that PCS phone systems at 1.8GHz may have a tendency to de-sensitize (overload) the pre-amp. It is a fair comment, but the design is basically finished and we will not modify it unless this proves to be a real problem. We will have to let you guys in field try it to see if this is a real problem. I would not expect it to be a problem unless you are pointing at a transmitter within 30 or 40 ft, so you must know your environment. Also, if you do overload the pre-amp, you will certainly know it, and this is the purpose of the device to detect transmitters. Regards, REI 2439 From: James M. Atkinson, Comm-Eng Date: Fri Feb 2, 2001 3:46pm Subject: RE: 2.4 GHz VBA At 3:11 PM -0600 2/2/01, Thomas H. Jones wrote: > >The VBA is roughly 8 inches long, 3 inches wide, and three quarters >>inch thick (not including the sturdy fold-up antenna that is >>provided). >> >>The only thing I don't like about it is that I feel the bandwidth >>should be wider, and cover 2.00 to 2.700 GHz (700 MHz bandwidth), the >>ripple is a little too high on the lower skirt. (cough-cough) I hope >>Tom and Bruce see this, perhaps they could come out with a Wide band >>version (cough-cough) > >To Jim and All, >Thank you for the comments on the VBA. We have planned for some time to >come out with a new wider band version of the VBA at the same price. It >will go into production in the next few weeks. We had planned to replace >the VBA with this model, but if the interest remains for the narrow-band >version, we will certainly keep it. The new product will be called the >LAA-1530 (Log-Periodic Active Antenna), and the frequency range will be >from 1.5 to 3GHz. This will be identical to the current VBA with roughly >the same total system gain. However, the noise floor of the unit will >certainly be increased because of the wider frequency range. The size and >packaging will change slightly due to variation in the antenna, but the >total length will be about the same. Jim has pointed out to me that PCS >phone systems at 1.8GHz may have a tendency to de-sensitize (overload) the >pre-amp. It is a fair comment, but the design is basically finished and we >will not modify it unless this proves to be a real problem. We will have to >let you guys in field try it to see if this is a real problem. I would not >expect it to be a problem unless you are pointing at a transmitter within >30 or 40 ft, so you must know your environment. Also, if you do overload >the pre-amp, you will certainly know it, and this is the purpose of the >device to detect transmitters. >Regards, >REI Tom, Bruce (and the rest of the list), I would applaud adding a new active antenna to the product line but would strongly suggest that you keep the VBA specific for 2.4 coverage, and would even go so encourage you to punch up the gain a bit more. A wider band version is good, but your right about the noise issues related in increasing bandwidth. I personally would prefer a higher gain active antenna as opposed to a wider bandwidth unit (or perhaps one with a logarithmic amplifier) Also, I would like to see (and would pay good money for) a 902-928 MHz version of the VBA (perhaps an 806 to 1700 MHz version with a switchable band reject filter for the cellular and Inmarsat bands). Good job Tom, I look forward to obtaining one of the new LAA-1530 units. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2440 From: Charles P Date: Fri Feb 2, 2001 5:00pm Subject: Want to bug someone? -humor For a cute interlude, try: http://www.send4fun.com/buggedp.htm charles charles@t... www.telephonesecurity.com [Non-text portions of this message have been removed] 2441 From: James M. Atkinson, Comm-Eng Date: Fri Feb 2, 2001 8:41pm Subject: Video Camera on Microwave Oven Frequency Just came across a Chinese made covert video transmitter and integral camera locked right on the 2.450 GHz microwave oven frequency with no means to change frequency. Typical FM modulated video (16-8 MHz wide) with two audio channels, and judging by the current draw (and a spectrum analyzer measurement) I estimate power output to be at least 135 mW. Typical consumer grade trash, and worthless is someone fires up a microwave oven nearby. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2442 From: Date: Fri Feb 2, 2001 10:58pm Subject: The Art of War: Contents HAVE A GREAT DAY !!! ---------- http://www.zedz.net/suntzu/index.html [Non-text portions of this message have been removed] 2443 From: Andre Holmes <1ach@g...> Date: Sat Feb 3, 2001 9:48am Subject: FCC delays TV-band spectrum sale Computerworld News & Features Story FCC delays TV-band spectrum sale | Computerworld News & Features Story Network Search Sites Services ITcareers Search Advanced Search | Contacts News & Features | Resources/Research | Careers | Communities | Subscriptions | Media Center Headlines | Biz Stories | Tech Stories | Emerging Companies | QuickStudy | Columnists | This Week in Print | CW Minute News & Features NEWS Latest Headlines . Browse by Date . Browse by Topic Business Headlines Tech Headlines This Week in Print CW Audio Minute FEATURES Field Reports Emerging Companies QuickStudies Executive Technology OPINIONS Latest Columns All Columnists Forums Letters Shark Tank PUBLICATIONS White Papers Surveys & Reports QUICKPOLL Take Latest poll Archives FCC delays TV-band spectrum sale By BOB BREWIN (February 01, 2001) The Federal Communications Commission decided to give cellular telephone companies already tapped out by last week's $17 billion spectrum auction a breather before starting the next multibillion-dollar airwaves sale. Yesterday, the FCC decided to push back an auction for spectrum currently occupied by television channels 60 to 69 from March 6 to Sept. 12. The FCC delayed the new sale after considering a request from nationwide carrier Verizon Wireless. The short time between the 1,900-MHz auction, which ended Friday (see story), and the March start date of the 700-MHz spectrum currently occupied by the TV broadcasters "would not allow companies enough time to accurately assess the interest in acquiring additional spectrum," said John Scott, vice president and general deputy counsel at Verizon, in a Jan. 18 letter to the FCC. Scott said a delay would be prudent because the FCC hadn't yet come up with a plan to quickly move broadcasters off that band and onto new digital-TV channels. Under FCC rules, the broadcasters can continue to occupy that band until 2006, even though carriers have paid billions of dollars this year for the right to use it. The FCC also received several comments from other major carriers in support of Verizon. Craig Mathias, an analyst at Far Point Group in Ashland, Mass., agreed that carriers "need some breathing room before the next auction." In his view, the carriers need time to figure out how much they want to spend for additional spectrum, since last week's auction "sucked a lot of money out of the digital economy." The customer, Mathias added, will ultimately pay the bill for the additional spectrum because carriers will pass their airwaves costs along to end users. But the Rural Telecommunications Group, which represents rural telephone companies, sharply disagreed about the need for a postponement. Caressa Bennet, an attorney at Bennet and Bennet in Washington, which represents the rural carriers, said in a letter to the FCC last week that Verizon's request for a delay was "merely for Verizon's business convenience. The commission should reject this invitation to fashion its auction process to meet Verizon's needs. Verizon's call for delay reflects the narrowest of self-interest masked as a general concern." Verizon, Bennet said in her letter, is engaged in a delaying game designed to "serve the interests of large carriers." She added that the FCC has already postponed the 700 MHz auction a number of times. Several companies also supported the rural group in its comments sent to the FCC. Other recent stories by Bob Brewin Send feedback Printer friendly E-mail this page Request a reprint ADVERTISEMENT MORE ON THIS TOPIC E-Commerce Chronicles: Wireless Wanderings FCC postpones March wireless auction Norwood demos Bluetooth office network On the Road Again Time to Catch Computing's 'Third Wave' Alaska Air Launches Wireless Check-in SAS Plans In-flight Wireless Web Access Building Broadband Into Business News Briefs Briefs at Deadline Help Desk | Site Guide | Send Us E-mail | Privacy Policy | Subscription Help Copyright © 2001 Computerworld, Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of Computerworld, Inc. is prohibited. Computerworld and @Computerworld and the respective logos are trademarks of International Data Group, Inc. [Non-text portions of this message have been removed] 2444 From: Andre Holmes <1ach@g...> Date: Sat Feb 3, 2001 9:58am Subject: EQUIPMENT SOURCE http://www.jensentools.com [Non-text portions of this message have been removed] 2445 From: Andre Holmes <1ach@g...> Date: Sat Feb 3, 2001 11:36am Subject: CUMPUTER NEWS http://www.cwrld.com/nl/sub.asp [Non-text portions of this message have been removed] 2446 From: Steve Uhrig Date: Sat Feb 3, 2001 9:23pm Subject: Unblocked receivers still available I still have a few of these if anyone still wants one. ------------------- I have come across a small supply of government trade in ICOM R8500 receivers, and am offering them for sale here first before posting them on my used equipment page. These generally sell very quickly once they are posted. Many are familiar with the R8500. This is ICOM's newest wideband HF/VHF/UHF receiver, quite common with sweepers. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. Recently to some members of this group I demonstrated a high end surveillance transmitter which operates on these blocked frequencies where the receivers have holes. These are full coverage receivers originally purchased by the government, generally used for one weekend surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. The receiver has an IF output and a discriminator output already available at jacks on the rear panel. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer-controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM just raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. Importing one from England or Canada will cost you more than my price and you have the very real risk of Customs seizing the thing at the border. I only have a few of these, so don't wait if you need a portable, decent full coverage receiver. Price is $2000 shipped in the U.S. (we pay the shipping and insurance fees totalling $58). This is less than current retail for a blocked receiver. Anyone buying an R8500 receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for this receiver, and is a good antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25- 2000 megs. The antenna is shipped separately in a sturdy tube which can be reused for a carrying case. I take credit cards for payment. And I will consider trades for other pieces of high end TSCM equipment. Swap something you don't need for something you do. Also have a few full coverage R100s if anyone needs one of them. Inquire. More equipment like this is on our used equipment page: http://www.swssec.com/used.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2447 From: mike f Date: Mon Feb 5, 2001 10:14am Subject: <<<<>>>> A Few of You Know how much I am Interested Forensics As I Mentioned some of U Know how much I like Forensics,....... Nicholas Short & Company has down a good job. AFTER REVEIWING and checking out 23+ Forensic Web sites that Mr.Short & company have Organised,by category, & or crime,I have to be honest. They Have not Done a Good Job.......Nope They Have Done An XXX-Cell-Ant Job WAY MORE THAN 23+ FORENSIC SITES! As an Example Check out this page here that is Crime Scene Forensics http://www.insurancefraud.com/nparsed/for_scene.htm MAIN PAGE http://www.insurancefraud.com/nparsed/forensic_index.htm http://www.insurancefraud.com/nparsed/for_drugs.htm http://www.insurancefraud.com/nparsed/for_database.htm <====good sites here!!! Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 2448 From: Dragos Ruiu Date: Mon Feb 5, 2001 3:33pm Subject: Fwd: kyxspam: 802.11b wep attacks ---------- Forwarded Message ---------- Subject: kyxspam: 802.11b wep attacks Date: Mon, 5 Feb 2001 09:56:57 -0800 From: Dragos Ruiu url: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html Security of the WEP algorithm This is some information about our analysis of the Wired Equivalent Privacy (WEP) algorithm, which is part of the 802.11 standard. This work was performed jointly by Nikita Borisov, Ian Goldberg, and David Wagner. If you have any questions, please contact us at wep@i.... Executive Summary We have discovered a number of flaws in the WEP algorithm, which seriously undermine the security claims of the system. In particular, we found the following types of attacks: Passive attacks to decrypt traffic based on statistical analysis. Active attack to inject new traffic from unauthorized mobile stations, based on known plaintext. Active attacks to decrypt traffic, based on tricking the access point. Dictionary-building attack that, after analysis of about a day's worth of traffic, allows real-time automated decryption of all traffic. Our analysis suggests that all of these attacks are practical to mount using only inexpensive off-the-shelf equipment. We recommend that anyone using an 802.11 wireless network not rely on WEP for security, and employ other security measures to protect their wireless network. WEP setup The 802.11 standard describes the communication that occurs in wireless local area networks (LANs). The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network; this function is not an explicit goal in the 802.11 standard, but it is frequently considered to be a feature of WEP. WEP relies on a secret key that is shared between a mobile station (eg. a laptop with a wireless ethernet card) and an access point (ie. a base station). The secret key is used to encrypt packets before they are transmitted, and an integrity check is used to ensure that packets are not modified in transit. The standard does not discuss how the shared key is established. In practice, most installations use a single key that is shared between all mobile stations and access points. More sophisticated key management techniques can be used to help defend from the attacks we descibe; however, no commercial system we are aware of has mechanisms to support such techniques. The following two sections describe the problems in the algorithm and the technical details of our attacks; they assume some background understanding of cryptographic protocols. You may wish to skip to the following section, which discusses the practicality of the attacks. Problems WEP uses the RC4 encryption algorithm, which is known as a stream cipher. A stream cipher operates by expanding a short key into an infinite pseudo-random key stream. The sender XORs the key stream with the plaintext to produce ciphertext. The receiver has a copy of the same key, and uses it to generate identical key stream. XORing the key stream with the ciphertext yields the original plaintext. This mode of operation makes stream ciphers vulnerable to several attacks. If an attacker flips a bit in the ciphertext, then upon decryption, the corresponding bit in the plaintext will be flipped. Also, if an eavesdropper intercepts two ciphertexts encrypted with the same key stream, it is possible to obtain the XOR of the two plaintexts. Knowledge of this XOR can enable statistical attacks to recover the plaintexts. The statistical attacks become increasingly practical as more ciphertexts that use the same key stream are known. Once one of the plaintexts becomes known, it is trivial to recover all of the others. WEP has defences against both of these attacks. To ensure that a packet has not been modified in transit, it uses an Integrity Check (IC) field in the packet. To avoid encrypting two ciphertexts with the same key stream, an Initialization Vector (IV) is used to augment the shared secret key and produce a different RC4 key for each packet. The IV is also included in the packet. However, both of these measures are implemented incorrectly, resulting in poor security. The integrity check field is implemented as a CRC-32 checksum, which is part of the encrypted payload of the packet. However, CRC-32 is linear, which means that it is possible to compute the bit difference of two CRCs based on the bit difference of the messages over which they are taken. In other words, flipping bit n in the message results in a deterministic set of bits in the CRC that must be flipped to produce a correct checksum on the modified message. Because flipping bits carries through after an RC4 decryption, this allows the attacker to flip arbitrary bits in an encrypted message and correctly adjust the checksum so that the resulting message appears valid. The initialization vector in WEP is a 24-bit field, which is sent in the cleartext part of a message. Such a small space of initialization vectors guarantees the reuse of the same key stream. A busy access point, which constantly sends 1500 byte packets at 11Mbps, will exhaust the space of IVs after 1500*8/(11*10^6)*2^24 = ~18000 seconds, or 5 hours. (The amount of time may be even smaller, since many packets are smaller than 1500 bytes.) This allows an attacker to collect two ciphertexts that are encrypted with the same key stream and perform statistical attacks to recover the plaintext. Worse, when the same key is used by all mobile stations, there are even more chances of IV collision. For example, a common wireless card from Lucent resets the IV to 0 each time a card is initialized, and increments the IV by 1 with each packet. This means that two cards inserted at roughly the same will provide an abundance of IV collisions for an attacker. (Worse still, the 802.11 standard specifies that changing the IV with each packet is optional!) Attacks Passive Attack to Decrypt Traffic The first attack follows directly from the above observation. A passive eavesdropper can intercept all wireless traffic, until an IV collision occurs. By XORing two packets that use the same IV, the attacker obatins the XOR of the two plaintext messages. The resulting XOR can be used to infer data about the contents of the two messages. IP traffic is often very predictable and includes a lot of redundancy. This redundancy can be used to eliminate many possibilities for the contents of messages. Further educated guesses about the contents of one or both of the messages can be used to statistically reduce the space of possible messages, and in some cases it is possible to determine the exact contents. When such statistical analysis is inconclusive based on only two messages, the attacker can look for more collisions ofthe same IV. With only a small factor in the amount of time necessary, it is possible to recover a modest number of messages encrypted with the same key stream, and the success rate of statistical analysis grows quickly. Once it is possible to recover the entire plaintext for one of the messages, the plaintext for all other messages with the same IV follows directly, since all the pairwise XORs are known. An extension to this attack uses a host somewhere on the Internet to send traffic from the outside to a host on the wireless network installation. The contents of such traffic will be known to the attacker, yielding known plaintext. When the attacker intercepts the encrypted version of his message sent over 802.11, he will be able to decrypt all packets that use the same initialization vector. Active Attack to Inject Traffic The following attack is also a direct consequence of the problems described in the previous section. Suppose an attacker knows the exact plaintext for one encrypted message. He can use this knowledge to construct correct encrypted packets. The procedure involves constructing a new message, calculating the CRC-32, and performing bit flips on the original encrypted message to change the plaintext to the new message. The basic property is that RC4(X) xor X xor Y = RC4(Y). This packet can now be sent to the acces point or mobile station, and it will be accepted as a valid packet. A slight modification to this attack makes it much more insiduous. Even without complete knowledge of the packet, it is possible to flip selected bits in a message and successfully adjust the encrypted CRC (as described in the previous section), to obtain a correct encrypted version of a modified packet. If the attacker has partial knowledge of the contents of a packet, he can intercept it and perform selective modification on it. For example, it is possible to alter commands that are sent to the shell over a telnet session, or interactions with a file server. Active Attack from Both Ends The previous attack can be extended further to decrypt arbitrary traffic. In this case, the attacker makes a guess about not the contents, but rather the headers of a packet. This information is usually quite easy to obtain or guess; in particular, all that is necessary to guess is the destination IP address. Armed with this knowledge, the attacker can flip appropriate bits to transform the destination IP address to send the packet to a machine he controls, somewhere in the Internet, and transmit it using a rogue mobile station. Most wireless installations have Internet connectivity; the packet will be successfully decrypted by the access point and forwarded unencrypted through appropriate gateways and routers to the attacker's machine, revealing the plaintext. If a guess can be made about the TCP headers of the packet, it may even be possible to change the destination port on the packet to be port 80, which will allow it to be forwarded through most firewalls. Table-based Attack The small space of possible initialization vectors allows an attacker to build a decryption table. Once he learns the plaintext for some packet, he can compute the RC4 key stream generated by the IV used. This key stream can be used to decrypt all other packets that use the same IV. Over time, perhaps using the techniques above, the attacker can build up a table of IVs and corresponding key streams. This table requires a fairly small amount of storage (~15GB); once it is built, the attacker can decrypt every packet that is sent over the wireless link. Monitoring Despite the difficulty of decoding a 2.4GHz digital signal, hardware to listen to 802.11 transmissions is readily available to attackers in the form of consumer 802.11 products. The products possess all the necessary monitoring capabilities, and all that remains for attackers is to convince it to work for them. Although most 802.11 equipment is designed to disregard encrypted content for which it does not have the key, we have been able to successfully intercept WEP-encrypted transmissions by changing the configuration of the drivers. We were able to confuse the firmware enough that the ciphertext (encrypted form) of unrecognized packets was returned to us for further examination and analysis. Active attacks (those requiring transmission, not just monitoring) appear to be more difficult, yet not impossible. Many 802.11 products come with programmable firmware, which can be reverse-engineered and modified to provide the ability to inject traffic to attackers. Granted, such reverse-engineering is a significant time investment (we have not done this ourselves), but it's important to note that it's a one time cost. A competent group of people can invest this effort and then distribute the rogue firmware through underground circles, or sell it to parties interested in corporate espionage. The latter is a highly profitable business, so the time investment is easily recovered. Conclusions Wired Equivalent Privacy (WEP) isn't. The protocol's problems is a result of misunderstanding of some cryptographic primitives and therefore combining them in insecure ways. These attacks point to the improtance of inviting public review from people with expertise in cryptographic protocol design; had this been done, the problems stated here would have surely been avoided. Other Materials Slides from Nikita's talk at the Mac Crypto Workshop (January 30, 2001). A DRAFT of a paper describing the attacks. wep@i... -- Dragos Ruiu dursec.com ltd. / kyx.net - we're from the future gpg/pgp key on file at wwwkeys.pgp.net or at http://dursec.com/drkey.asc CanSecWest/core01: March 28-30, Vancouver B.C. Speakers: a whole bunch of cool guys and the massive sig was a pain.... see http://dursec.com 2449 From: sebastien rittner Date: Tue Feb 6, 2001 9:43am Subject: T1 checking Hi all, How do you guys check a T1 trunk. Not that everybody can eavesdrop such a thing but I think that would be wise to sweep from A to Z. Best regards, Sebastien. ===== email : sebastien@t... web : www.tscm-technician.net voicemail : 510-903-0188 ext 7363 ___________________________________________________________ Do You Yahoo!? -- Pour dialoguer en direct avec vos amis, Yahoo! Messenger : http://fr.messenger.yahoo.com 2450 From: James M. Atkinson, Comm-Eng Date: Tue Feb 6, 2001 6:48pm Subject: Re: T1 checking At 4:43 PM +0100 2/6/01, sebastien rittner wrote: >Hi all, >How do you guys check a T1 trunk. >Not that everybody can eavesdrop such a thing but I >think that would be wise to sweep from A to Z. > >Best regards, Sebastien. > > >===== >email : sebastien@t... >web : www.tscm-technician.net >voicemail : 510-903-0188 ext 7363 Have the CO patch for a pure analog loop, or generate a loop back tone, then use a TDR to sniff the entire loop, open both pair and re-shoot from both end again with a TDR. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2451 From: James M. Atkinson, Comm-Eng Date: Tue Feb 6, 2001 6:51pm Subject: Surveillance remains controversial Surveillance remains controversial http://www.irishnews.com/current/news13.html By Kieran McDaid This is not the first time Jeffrey Donaldson has alleged his phone has been bugged. Last September, Mr Donaldson claimed his phone was tapped on the orders of the British government because of his opposition to the Good Friday agreement. At the time, he accused the government of ìstooping to any levelî to undermine opposition to the peace deal. In a BBC programme last year, former Secretary of State Mo Mowlam admitted she had sanctioned the bugging of a car used by senior Sinn Fein members during 1999 talks. In March last year, two men hunting near Blackwatertown, Co Armagh discovered fully operational surveillance equipment. Sinn Fein claimed the equipment was directed towards St Jarlathís church. Last January, the Republicís then Foreign Minister David Andrews met with British Foreign Secretary Robin Cook at an EU summit in Brussels. The two men discussed claims made in a Channel 4 programme that the British government had bugged telephone callsfrom Ireland over a long period. In 1997, it was claimed that military intelligence had placed a tracking device in a car used by Gerry Adams to trace his movements during secret discussions with British officials. The uncovering of military ëspy-postsí in vacant flats and deserted farmhouses has been a regular occurrence. Fears over the health implications of surveillance equipment have also emerged. Research in 1994 claimed those living in the south Armagh village of Crossmaglen were three times more likely to suffer brain haemorrhages than the rest of the population in the north. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2452 From: Mike Date: Tue Feb 6, 2001 8:55pm Subject: Polygraphs I can get 10 Grass Valley Polygraph units DIRT CHEAP. These units are about 20 years old and are supposedly in great condition. Anyone know if there is still a market for them and if so how much? (They are rack mounted with the paper graph. Each unit weighs about 100lbs or more. ) They are in the Chicago area and i'll give someone 2 of them if they are willing to box and ship (and pay for shipping) for the other 8 units to Astoria, OR 97103 The owner says they were used by a hospital for animal testing and cost about 20K each when new. Will sell all 10 - any offers? Mike [Non-text portions of this message have been removed] 2453 From: James M. Atkinson, Comm-Eng Date: Wed Feb 7, 2001 1:46pm Subject: The Consultant [humor] A shepherd was herding his flocks in a remote pasture when suddenly a brand new Jeep Grand Cherokee advanced out of a dust cloud towards him. The driver, a young man in a Brioni suit, Gucci shoes, Ray Ban sunglasses and a YSL tie, leaned out of the window and asked our shepherd: "If I can tell you exactly how many sheep you have in your flock, will you give me one?" The shepherd looks at the yuppie, then at his peacefully grazing flock and calmly answers "sure!" The yuppie parks the car, whips out his notebook, connects it to a cell-phone, surfs to a NASA page on the Internet where he calls up a GPS satellite navigation system, scans the area, opens up a database and some 60 Excel spreadsheets with complex formulas. Finally he prints out a 150 page report on his hi-tech miniaturized printer, turns round to our shepherd and says: "you have here exactly 1586 sheep!" "This is correct. As agreed, you can take one of the sheep," says the shepherd. He watches the young man make a selection and bundle it in his Jeep. Then he says: "If I can tell you exactly what your business is, will you give me my sheep back?" "Okay, why not" answers the young man. "You are a consultant," says the shepherd. "This is correct," says the yuppie, "How did you guess that?" "Easy" answers the shepherd. "You turn up here although nobody called you. You want to be paid for the answer to a question I already knew the solution to. And you don't know anything about my business because you took my dog." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2454 From: Date: Wed Feb 7, 2001 0:26pm Subject: e-bug from Dick Seward By Jennifer Beauprez Denver Post Feb. 6, 2001 - Watch out, an e-bug might bite you. That's the word from the Denver-based Privacy Foundation, which has discovered an e-mail technology that lets people spy on your conversations by sending your forwarded comments back to the e-mail's original sender. "There is wide potential for abuse here," said David Martin, a University of Denver professor. He and Privacy Foundation chief technologist Richard Smith recently learned of the so-called "e-mail bug" and are now demonstrating how it works. For instance, a person could attach the e-bug to an electronic version of a rÈsumÈ to an employer and then read what was said about it as the e-mail was forwarded to other office workers. Business deals, too, could be fixed if negotiations were conducted via e-mail and one side learned inside information as the proposal was discussed through the potential customer's internal e-mail system. It could even be used to note off-color remarks from governmental officials, to gather e-mail addresses for companies that send out spam or by a boss to find out what you're saying about him. "The technology is not comparable to the ILOVEYOU virus, which deleted hard drives, shut down Web sites and was extremely destructive," Martin said. "But it could cost companies hundreds of millions of dollars." The spying technique doesn't take advantage of any security flaw in e-mail software. Rather, secret programming code is inserted into a computer language called JavaScript, which is used on Web sites to create pop-up windows and navigational aids. When the e-mail is forwarded, the implant secretly sends the text of those messages to the original sender. At risk are those who use Microsoft Outlook, Outlook Express and Netscape 6 Mail. Such HTML e-mail programs let users send and receive e-mail messages that look and act like Web pages and have JavaScript turned on by default. Earlier versions of Netscape are not affected because they do not support all the features of the JavaScript. HotMail, Yahoo! and AOL 6.0 are also immune to the wiretap. Martin said people can protect themselves by disabling the JavaScript on their e-mail program. They may learn how to do so by logging onto the Privacy Foundation's Web site, at http://www.privacyfoundation.org. Denver entrepreneur Peter Barton, along with FirstData Corp., the Denver Foundation and DU, formed the foundation in July to research and educate the public on issues. JavaScript isn't critical to most e-mail messages, Martin said: "There's not much downside to turning it off." But simply turning off JavaScript on your own e-mail doesn't debug the message entirely. The wiretap can still be carried with the e-mail. So if you forward it on to someone whose e-mail is JavaScript-enabled and that person forwards the message or sends a reply, then the contents of the e-mail will still bounce back to the original sender. A number of offshore companies provide the e-mail bugging technology free to online users. But deploying such bugs is illegal in the United States, said Philip A. Gordon, a fellow at the Privacy Foundation and an attorney with Horowitz & Wake in Denver. He said the sneaky computer code violates federal wiretapping laws, since it's equivalent to listening in on a conversation without consent. "This is as close as you can get to a telephone wiretap in the electronic environment," Gordon said. If the victims discover they've been e-bugged, they could file a civil lawsuit or press criminal charges punishable by up to five years in prison and $500,000 in fines, he said. Enforcing those laws is tricky, Martin said, because the identity of the sender is often difficult to trace. Spies can route their mail through third-party Internet services and keep the sender's identity from being divulged. "It can be extremely difficult to trace," said Martin. "You would have to bribe someone or break the law. A government would have to issue a warrant. That's rarely done - it would have to be a matter of national security." "Dick Seward "THE BUG HUNTER" 23 yrs. debugging. FCC & CCW lisenced. CALI Affiliated. Great prices & lots of experience. (949-770-8384)" The Privacy Foundation is calling for the major makers of e-mail programs to address the problem. Microsoft spokesman Ryan James said the newest downloadable update to Outlook Express, version 5.5, is not affected because JavaScript is off by default. Netscape spokeswoman Catherine Corre said the company is working on a patch, which will be available within the next few days, to stop the wiretaps. Meanwhile, Corre said, Netscape users should disable JavaScript in the Messenger program. The Associated Press contributed to this report. Copyright 2001 The Denver Post. All rights reserved. ________________________________________________________________ GET INTERNET ACCESS FROM JUNO! Juno offers FREE or PREMIUM Internet access for less! Join Juno today! For your FREE software, visit: http://dl.www.juno.com/get/tagj. 2455 From: James M. Atkinson, Comm-Eng Date: Thu Feb 8, 2001 8:23am Subject: Re: Polygraphs At 6:55 PM -0800 2/6/01, Mike wrote: >I can get 10 Grass Valley Polygraph units DIRT CHEAP. >These units are about 20 years old and are supposedly in >great condition. Anyone know if there is still a market for them and >if so how much? (They are rack mounted with the paper graph. Each unit >weighs about 100lbs or more. ) They are in the Chicago area and i'll give >someone 2 of them if they are willing to box and ship (and pay for shipping) >for the other 8 units to Astoria, OR 97103 > The owner says they were used by a hospital for animal testing and cost >about >20K each when new. Will sell all 10 - any offers? >Mike Mike, Are you sure that they are poly's (with the transducers), or could they just be the strip chart strip chart recorder. The reason I mention this is that poly's are of minimal value unless you have the entire system. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2456 From: Paolo Sfriso Date: Thu Feb 8, 2001 3:32am Subject: Cellphone use on aircraft Fwg is a free translation of a news item published by ANSA on February "nd and republished today by CNN-Italy: Saudi Army Captain is condemned to 70 whip lashes. According to the Saudi newspaper "Al-qtissadiya" an un-named Saudi Army Captain was condemned to 70 whip lashes "for having put aircraft passenger's life in serious danger" by the court of Tabuk (in NW Saudi Arabia). The Army Captain insisted on using his cellphone onboard an internal Saudi flight after having been warned by the aircraft crew. Your Italian Connection. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Tecnology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 (0)335 5257308 paulsfriso@t... www.grupposit.com 2457 From: Jones, Billy R Date: Thu Feb 8, 2001 8:39am Subject: A e-mail bug was discovered October 5, 1998 by Carl Voth, this exploit uses features of Microsoft Dynamic HTML to surreptitiously intercept text added to email messages after they have been forwarded to secondary recipients. The exploit assumes that the original exploit message will eventually be forwarded to others with HTML-enabled mail browsers. The exploit takes advantage of DHTML functionality in Internet Explorer 4.0 which is used by Outlook 98. Outlook Express has not been tested but is presumed to be equally vulnerable. Any other email clients that use Internet Explorer as their HTML engine (eg. Eudora?) are likely vulnerable as well. For further information, please see http://www.cen.uiuc.edu/~ejk/browser-security.html\ http://www.geocities.com/ResearchTriangle/Facility/8332/reaper-exploit-relea se.html Jim, Can you kill my name and address - Since Aramco is the US subsidary of the Saudi National Oil Company, we like to stay a little quiet (politics and all). Best Regards, Billy R. Jones Electronic Security Technician Aramco Services Company 9009 West Loop South, MS-109 Houston, Texas 77096 713-432-4737 voice 713-432-4382 FAX 713-503-7940 (Cellular) bjones@a... http://www.aramcoservices.com 2458 From: Miguel Puchol Date: Thu Feb 8, 2001 10:09am Subject: RV: Email exploit HTML e-mail is like killing flies with a cannon. To send the same information you use up to 10 times more bandwidth. I always respond to HTML formatted messages with plain text ones. It's just a waste of space, and as it turns out, a big source of trouble, as if we hadn't enough with viruses and malicious scripts... Cheers all, and watch out! Mike > -----Mensaje original----- > De: Jones, Billy R [mailto:bjones@a...] > Enviado el: jueves, 08 de febrero de 2001 15:40 > Para: 'TSCM-L@yahoogroups.com' > Asunto: [TSCM-L] > > > A e-mail bug was discovered October 5, 1998 by Carl Voth, this > exploit uses > features of Microsoft Dynamic HTML to surreptitiously intercept text added > to email messages after they have been forwarded to secondary recipients. > The exploit assumes that the original exploit message will eventually be > forwarded to others with HTML-enabled mail browsers. > The exploit takes advantage of DHTML functionality in Internet > Explorer 4.0 > which is used by Outlook 98. Outlook Express has not been tested but is > presumed to be equally vulnerable. Any other email clients that > use Internet > Explorer as their HTML engine (eg. Eudora?) are likely vulnerable > as well. > > For further information, please see > http://www.cen.uiuc.edu/~ejk/browser-security.html\ > > http://www.geocities.com/ResearchTriangle/Facility/8332/reaper-exp > loit-relea > se.html > > > > Jim, > Can you kill my name and address - Since Aramco is the US subsidary of the > Saudi National Oil Company, we like to stay a little quiet (politics and > all). > Best Regards, > Billy R. Jones > Electronic Security Technician > Aramco Services Company > 9009 West Loop South, MS-109 > Houston, Texas 77096 > 713-432-4737 voice > 713-432-4382 FAX > 713-503-7940 (Cellular) > bjones@a... > http://www.aramcoservices.com > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2459 From: James M. Atkinson, Comm-Eng Date: Thu Feb 8, 2001 1:19pm Subject: Re: e-bug from Dick Seward At 10:26 AM -0800 2/7/01, dseward2@j... wrote: >By Jennifer Beauprez Denver Post >Feb. 6, 2001 - Watch out, an e-bug might bite you. >That's the word from the Denver-based Privacy Foundation, which has >discovered an e-mail technology that lets people spy on your >conversations Ok, but it sound like a lot of hype, and they didn't really "discover" anything that most of use were not already aware of. Also, it's not exactly a "e-mail technology: but is a scripting protocol that some Email programs recognize. >by sending your forwarded comments back to the e-mail's original sender. >"There is wide potential for abuse here," said David Martin, a University >of >Denver professor. He and Privacy Foundation chief technologist Richard >Smith >recently learned of the so-called "e-mail bug" and are now demonstrating >how >it works. For instance, a person could attach the e-bug to an electronic >version of a rÈsumÈ to an employer and then read what was said about it >as >the e-mail was forwarded to other office workers. Ah, no.... his description is way out of touch with reality >Business deals, too, could be fixed if negotiations were conducted via >e-mail and one side learned inside information as the proposal was >discussed >through the potential customer's internal e-mail system. It could even be >used to note off-color remarks from governmental officials, to gather >e-mail >addresses for companies that send out spam or by a boss to find out what >you're saying about him. No.... while it is possible to imbed malicious elements inside an email message it really is not a practical method of eavesdropping. For example I can squirt an email to someone that will sample room audio for a few minutes and send back the audio file, or I can launch a script that can (and will) snap a picture of what is in the field of view of the camera (if they have a USB based camera on their computer). But neither is a practical method of eavesdropping. >"The technology is not comparable to the ILOVEYOU virus, which deleted >hard >drives, shut down Web sites and was extremely destructive," Martin said. >"But it could cost companies hundreds of millions of dollars." Listening to clueless pundits is also costing companies hundreds of millions of dollars >The spying technique doesn't take advantage of any security flaw in >e-mail >software. Rather, secret programming code is inserted into a computer >language called JavaScript, which is used on Web sites to create pop-up >windows and navigational aids. When the e-mail is forwarded, the implant >secretly sends the text of those messages to the original sender. JavaScript is not any kind of a "secret programming code" any more then Visual Basic >At risk are those who use Microsoft Outlook, Outlook Express and Netscape >6 >Mail. Such HTML e-mail programs let users send and receive e-mail >messages >that look and act like Web pages and have JavaScript turned on by >default. Yeah, so? Which is also why security use Email programs instead of "integrated packages" to read, write, and send email. >Earlier versions of Netscape are not affected because they do not support >all the features of the JavaScript. HotMail, Yahoo! and AOL 6.0 are also >immune to the wiretap. AOL 6.0 is actually vulnerable to other types of mischief. >Martin said people can protect themselves by disabling the JavaScript on >their e-mail program. They may learn how to do so by logging onto the >Privacy Foundation's Web site, at http://www.privacyfoundation.org. >Denver >entrepreneur Peter Barton, along with FirstData Corp., the Denver >Foundation >and DU, formed the foundation in July to research and educate the public >on >issues. Ah-ha.... so what is really going on here is a publicity stunt to drive people to the Privacy Foundations website. >JavaScript isn't critical to most e-mail messages, Martin said: "There's >not >much downside to turning it off." >But simply turning off JavaScript on your own e-mail doesn't debug the >message entirely. The wiretap can still be carried with the e-mail. So if >you forward it on to someone whose e-mail is JavaScript-enabled and that >person forwards the message or sends a reply, then the contents of the >e-mail will still bounce back to the original sender. OK, but it still does not make it a realistic threat. >A number of offshore companies provide the e-mail bugging technology free >to >online users. But deploying such bugs is illegal in the United States, >said >Philip A. Gordon, a fellow at the Privacy Foundation and an attorney with >Horowitz & Wake in Denver. He said the sneaky computer code violates >federal >wiretapping laws, since it's equivalent to listening in on a conversation >without consent. They are correct about it being contraband in the United States, but the comments about off shore companies is way off base. >"This is as close as you can get to a telephone wiretap in the electronic >environment," Gordon said. If the victims discover they've been e-bugged, >they could file a civil lawsuit or press criminal charges punishable by >up >to five years in prison and $500,000 in fines, he said. Yes, the use of bugs, wiretaps, and other kinds of e-mischief can seriously open up a user to serious legal problems. >Enforcing those laws is tricky, Martin said, because the identity of the >sender is often difficult to trace. Spies can route their mail through >third-party Internet services and keep the sender's identity from being >divulged. No, the sender of the email is easy to find, as is the recipient of the collected intelligence (especially if it is being done be someone inside the company). >"It can be extremely difficult to trace," said Martin. "You would have to >bribe someone or break the law. A government would have to issue a >warrant. But not if it is being done be someone inside the company, it would be fairly simple to find. >That's rarely done - it would have to be a matter of national security." > >"Dick Seward "THE BUG HUNTER" 23 yrs. debugging. FCC & CCW lisenced. CALI >Affiliated. Great prices & lots of experience. (949-770-8384)" Er... since when did the FCC start licensing TSCM people? >The Privacy Foundation is calling for the major makers of e-mail programs >to >address the problem. OK, but while their at it why not call for me to hit the lotto as well. "Calling for" this and that is just and old publicity stunt. >Microsoft spokesman Ryan James said the newest downloadable update to >Outlook Express, version 5.5, is not affected because JavaScript is off >by >default. ... and one should hope so. >Netscape spokeswoman Catherine Corre said the company is working on a >patch, >which will be available within the next few days, to stop the wiretaps. >Meanwhile, Corre said, Netscape users should disable JavaScript in the >Messenger program. >The Associated Press contributed to this report. >Copyright 2001 The Denver Post. All rights reserved. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2460 From: Charles P Date: Thu Feb 8, 2001 9:44pm Subject: FCC licensing made easy >>"THE BUG HUNTER" 23 yrs. debugging. FCC & CCW lisenced. CALI >>Affiliated. Great prices & lots of experience. " >Er... since when did the FCC start licensing TSCM people? I've been FCC licensed sinced 1967: N2AXO, formerly WA3IOB so I guess I could put "FCC Licensed" on my shingle too! :-) perhaps a CB license would work too, but they don't give those out anymore, do they? cp 2461 From: Robert G. Ferrell Date: Fri Feb 9, 2001 10:54am Subject: Re: e-bug from Dick Seward >X-eGroups-Return: sentto-49964-2922-981660032-rferrell=rgfsparc.cr.usgs.gov@returns.onelist.com >X-Sender: jmatk@tscm.com >X-Apparently-To: TSCM-L@yahoogroups.com >X-Sender: spook@c... >To: TSCM-L@yahoogroups.com >From: "James M. Atkinson, Comm-Eng" >MIME-Version: 1.0 >Mailing-List: list TSCM-L@yahoogroups.com; contact TSCM-L-owner@yahoogroups.com >Delivered-To: mailing list TSCM-L@yahoogroups.com >>Feb. 6, 2001 - Watch out, an e-bug might bite you. >>That's the word from the Denver-based Privacy Foundation, which has >>discovered an e-mail technology that lets people spy on your >>conversations There's an absurdly simple "fix" for this "e-bug." It's called RFC 822: "Messages consist of lines of text. No special provisions are made for encoding drawings, facsimile, speech, or structured text." SMTP != HTML. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== From: Justin T. Fanning Date: Fri Feb 1, 2002 3:39pm Subject: Bluetooth/802.11b as a audio medium? (long but good!) I was looking through a catalogue today and noticed a HP product they are calling a "Bluetooth printer adapter" (I realise other companies like 3com make them also but HP is really pushing Bluetooth at the moment). See a picture here: http://www.shopping.hp.com/cgi-bin/hpdirect/shopping/scripts/product_detail/product_detail_view.jsp?product_code=MPIPA330&script_name=product.cgi It's basically a small box about the size of a soft cigarette pack with a centronics parallel (printer port) connector on one side. The box draws it's power from the PC and contains a complete 2.4 Ghz transceiver (with antenna) and all the necessary hardware/software to control the Bluetooth spec. (Does the world really need another wireless spec? Brings to mind the saying ... The wonderful thing about standards is that there are so many to choose from!) (If your having trouble sleeping and feel like reading the 1,084 page Bluetooth spec. you can find it here:) http://www.bluetooth.com/pdf/Bluetooth_11_Specifications_Book.pdf The one minute version goes something like this: spread spectrum, frequency hopping, full-duplex signal at up to 1600 hops/sec. The signal hops among 79 frequencies at 1 MHz intervals i.e. 2.402 Ghz + K Mhz (k=0 to 78), Pmin 0dBm (1mW), Pmax 20 dBm (100mW). Bluetooth has a data bandwidth of 1 Mb (base) with a usable throughput of ~ 700 k/sec. Built in proprietary encryption algorithm and key exchange, with key size 8 - 128 bits, usable distance is quoted as 10 Meters (34 feet). OK, now the question ... If a hostile Bluetooth printer adapter (or 802.11b for that matter) was added to a corporate/government network as a hostile transport layer would it be discovered? Most people on this list could easily locate a Bluetooth or 802.11b RF signal with relative ease (level 1 - 2 threat), but this is only the transport layer base band. In a corporation that legitimately uses wireless, how do you distinguish between legitimate traffic or hostile traffic originating from the clients own resources? Think of it this way, why would a corporate or government attempt a risky placement of an RF device that may only have a lifetime of days (not to mention risking their own freedom in the placement) when a package can be Emailed (or hacked) onto the existing network and the data traffic simply delivered over the existing wireless infrastructure to the car park, across the road etc. (In fact driving around town with an 802.11b equipped portable seems to be the new elite geek sport in most major cities). The data could of course also be room audio as almost all notebooks and a lot of high end PC's now also have built in microphones. While I know its JMA's (and many other's) policy to give such devices swift justice, I've never actually seen a PC or notebook where the mic has been hardware deactivated and I've seen a _lot_ of corporate setups. Does anyone go down to the packet addressing layer, even the packet "payload" (content) layer? What if the content was encrypted? How many TSCM'ers sweep for unknown 802.11b MAC address's or Bluetooth device address's? Is this the future of TSCM? Regards, Justin 4714 From: Michael Puchol Date: Fri Feb 1, 2002 4:35pm Subject: Re: Bluetooth/802.11b as a audio medium? (long but good!) Justin, > If a hostile Bluetooth printer adapter (or 802.11b for that matter) > was added to a corporate/government network as a hostile transport > layer would it be discovered? First, you would do an inventory of 'legal' RF devices, such as 802.11b access points, Bluetooth devices, etc. present in the organisation. Then, an RF survey of the area surrounding the company, to detect other such devices. Then, an RF survey of the actual building, to discover 'rogue' or planted devices. Sometimes employees install wireless devices without consulting with their IT department, which can cause HUGE security problems. Finding these 'rogue' devices is a must. > Most people on this list could easily locate a Bluetooth or 802.11b > RF signal with relative ease (level 1 - 2 threat), but this is only > the transport layer base band. In a corporation that legitimately > uses wireless, how do you distinguish between legitimate traffic or > hostile traffic originating from the clients own resources? That's a tough one with just a SA or other RF survey tool. You would need to go into the transport layer itself, by using a sniffer. For wireless 802.11b, I recommend AiroPeek, which lets you sniff a wireless network without actually attaching to it. If you can get a wire into the LAN, a standard sniffer would show all active nodes. NAI's Network Inspector is wonderful as it gives you a full catalogue of network devices, subnets, etc. Make sure you sniff all sides of switches and routers - you may miss network segments otherwise, and all available subnets. To be thorough, I'd leave a sniffer running for 2-4 days on each segment, then do a statistical analysis on the data. You can then determine which nodes are most active, and what traffic they are sending - you may find strange IPs sending data to outside networks, etc. A really nice audit tool is eEye's Iris, which catalogues sniffed traffic according to connection type, and it even lets you reconstruct web browsing & email sessions - of course the usual filtering tools are available. > Think of it this way, why would a corporate or government attempt a > risky placement of an RF device that may only have a lifetime of days > (not to mention risking their own freedom in the placement) when a > package can be Emailed (or hacked) onto the existing network and the > data traffic simply delivered over the existing wireless > infrastructure to the car park, across the road etc. (In fact > driving around town with an 802.11b equipped portable seems to be > the new elite geek sport in most major cities). Well, Network Stumbler seems to be gaining adepts every day! I have done audits & penetration tests on companies that had wireless APs in place, with absolutely no protection, not even WEP. The execs were dumbstruck when evidence was presented that ALL of their network data, passwords, servers, even printers were accessible to anyone with a laptop, a WLAN card, and a few hours to spare. In one case, a costumer wouldn't believe his network was unsecure, so his IT man told him, so we printed out the report on his Xerox DocuPrint from the car park. Remember, you must have a written contract with your client to do all these tests, and a NDA to show you won't tell anyone of what you found is also helpful. > The data could of course also be room audio as almost all notebooks > and a lot of high end PC's now also have built in microphones. While > I know its JMA's (and many other's) policy to give such devices > swift justice, I've never actually seen a PC or notebook where the > mic has been hardware deactivated and I've seen a _lot_ of corporate > setups. With a standard 802.11b, effective throughput 5Mbps at best, you could be sending out some 150 sepparate audio feeds with the right compression. However such traffic would be WAY visible to a sniffer or IDS. > Does anyone go down to the packet addressing layer, even the packet > "payload" (content) layer? What if the content was encrypted? > How many TSCM'ers sweep for unknown 802.11b MAC address's or > Bluetooth device address's? Is this the future of TSCM? It certainly is a 'clear and present danger' to quote a movie title, so you must really watch out for these devices. Looking at the actual data being sent around is really useful in identifying problems or misuse/abuse - plus you get to learn about network protocols! All the best, Mike 4715 From: Date: Fri Feb 1, 2002 0:24pm Subject: Judge Rules on Wiretap Evidence Judge Rules on Wiretap Evidence By PAUL NOWELL .c The Associated Press CHARLOTTE, N.C. (AP) - A federal judge ruled Friday that wiretap evidence collected by Canadian intelligence agents can be used in the trial of a man accused of helping the militant group Hezbollah. Said Mohamad Harb, 31, a Lebanon-born naturalized U.S. citizen, and three Middle Eastern co-defendants were charged last year with planning to provide Hezbollah with cash and supplies, including stun guns, blasting equipment, night vision goggles and mine detection equipment. Harb's trial, scheduled for April, will be one of the first prosecutions under a 1996 law that forbids providing material support to a known terrorist organization. Harb, who has been held without bail, could get up to 60 years in prison if convicted. U.S. Magistrate Judge Brent McKnight's ruling means prosecutors may call the Canadian Security Intelligence Service agents to testify about the summaries of telephone wiretaps made in 1999 and 2000. Harb's defense lawyers challenged the use of the testimony and the transcripts without the tapes, which have been destroyed. At a hearing last year, they said admitting such evidence would violate Harb's rights. McKnight said the evidence can be admitted under the ``past recollection exception to the hearsay rule.'' ``Although this exception was accorded the least discussion by both parties, it is clearly the most relevant since the witnesses who authored the summaries will testify at trial,'' he wrote. Messages left late Friday for defense attorney Chris Fialko were not immediately returned. The Canadian Security Intelligence Service says it intercepted Harb's phone conversations during the normal course of business and later shared the information with U.S. intelligence and the FBI. CSIS produced 113 pages of transcripts but said it was standard procedure to destroy the tapes. Initially, Harb was among 18 people charged with smuggling millions of dollars worth of cheap cigarettes out of North Carolina to resell in states where higher taxes push the price up. A superseding indictment in March levied the more serious accusations - that Harb and eight others are part of a Charlotte-based cell of Hezbollah. The North Carolina case was brought long before the Sept. 11 terrorist attacks. AP-NY-02-01-02 1815EST 4716 From: Andre Holmes <1ach@v...> Date: Thu Jan 31, 2002 11:42pm Subject: RWonline - Industry Resources Heres a wealth of information. ANDRE http://www.rwonline.com/pandsdir/index.shtml# [Non-text portions of this message have been removed] 4717 From: Matthew Paulsen Date: Sat Feb 2, 2002 5:11am Subject: Oops Dave - Hey Bob - got the ax? Bob - ... Dave - Bob? Hey Bob... Bob - ... Dave - Bob, you're not looking too good. Are you ok? http://news.bbc.co.uk/hi/english/world/europe/newsid_1795000/1795792.stm [Non-text portions of this message have been removed] 4718 From: tek492p Date: Sun Feb 3, 2002 7:34pm Subject: INTERTECT: Introduction Hello to the group -- INTERTECT, which provides TSCM services to the southern California and west coast (USA) areas, has recently up-graded its equipment package to include the following new equipment: Tektronix 492 Spectrum Analyzer, (50 kHz to 21 GHz). Riser-Bond 1220 Time Domain Reflectometer. Technical Services Agency (TSA) CCR-3 Carrier Current Receiver. Alinco DJ-X10 Hand-Held Scanning Receiver, (100 kHz to 2 GHz). For more information about our company and services, please contact us at the following: Intertect P. O. Box 7873 Northridge, CA 91327 (USA) Telephone: (818) 831-0515 Jack Lindauer, President/CEO Electronic Surveillance Countermeasures 4719 From: Date: Sun Feb 3, 2002 2:48am Subject: Electronic Telephone Systems What methods or equipment are available to examine electronic telephone systems such as ROLM or MERIDIAN? I know the instrument can be physically examined and tested using one of many telephone analyzers (What manufacturer is considered the best?), the frame rooms can be examined, the telephone instrument programming can be examined via the telephone system computer and the telephone lines can be checked with a TDR. Are there any other recommended procedures? Douglas Jones, Sgt. Miami-Dade Police Department 4720 From: jim33060 Date: Sun Feb 3, 2002 3:07pm Subject: Travel Insurance for overseas trip I will be soon traveling to S.E. Asia for a two-week assignment. Would like some advice on Insuring my Kit, Oscor, Orion, etc. I'm Gun Shy about my homeowners, can't afford to be cancelled like most will do nowadays if god forbid you need them to cover a loss. Any real life suggestions? 4721 From: James M. Atkinson Date: Mon Feb 4, 2002 9:32am Subject: 11 years for 'Bond spy fantasist' http://www.thisislondon.co.uk/dynamic/news/top_story.html?in_review_id=495008&in_review_text_id=454985 11 years for 'Bond spy fantasist' by Martin McGlown A security guard inspired by James Bond was jailed for 11 years today for trying to sell defence secrets to the Russians. Raphael Bravo hoped to receive thousands of pounds for the files he stole from British Aerospace in Stanmore. They contained information "useful to the enemy" and "prejudicial to the safety or interest of the state", the Old Bailey heard. The files dealt with the self-defence radar system of the Harrier jet, warfare surveillance systems for Army helicopters and even the capabilities of foreign countries, including Iraq, to detect British missiles. Bravo, 30, described as an "unsociable loner", was arrested by Special Branch officers outside a central London hotel last August after agreeing to meet a man he believed to be a Russian agent. In fact, the "agent" worked for MI5. He told police he got the idea to trade secrets from "reading spy novels and watching TV and James Bond movies." Bravo pleaded guilty to nine charges of theft and offences under the Official Secrets Act. He asked for two more offences to be considered. Sentencing him today, Recorder of London Michael Hyam said: "Anyone who has put at risk the security of this country must accept that he will receive a long prison sentence. "In cases of this sort emphasis must be placed on the deterrent factor of the sentence. Despite what you intended, there is no evidence that allied or UK interests were in fact prejudiced by what you did. There is no evidence that you acted with anyone else. Your only motive was financial gain." The court heard how Bravo, who worked nights for the Crusader security firm, stole the secret documents while carrying out his patrols. He had access to safes which required combinations or keys. After he posted one document to the Russian Embassy in London, MI5 received a tipoff from a source not specified in court. Days later Bravo was phoned at his Harlesden home by the MI5 "agent". A meeting was arranged at the White House hotel in Euston. Officers swooped on Bravo after he arrived on a motorcycle and delivered the documents in a carrier bag, said Aftab Jafferjee, prosecuting. Bravo told the agent: "I could go to prison for this." Asked what he wanted in return for the 200 pages of files, he replied: "Money, as much as I can get." He added that he could obtain more files on a "regular basis". He later confessed to police: "I expected to be paid a few thousand pounds, which is cheaper for the Russians than having to spend several million for that type of information." Mr Jafferjee said security at BAe Systems had been reviewed since the case. Defending Bravo, Rock Tansey described him as a "naive" man whose family are "shocked and devastated". It was even a mystery to the defendant himself why he should have committed these offences. "As he saw it, the Russians were not the enemy of this country any more. The Cold War was over and the relationship between the UK and Russia was changing," said Mr Tansey. "There was no way he would have sold that sort of material to Libya, North Korea, Iraq or China because he realised these were the real enemies of this country. "He is genuinely remorseful for what he has done. No planning went into the question of which document he took. He knew he would not be able to understand. They were very technical. The most top secret documents had red spines and these were the ones he looked for." Mr Tansey said Bravo needed money and was depressed by the repetitive nature of his job. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4722 From: James M. Atkinson Date: Mon Feb 4, 2002 9:43am Subject: Spying homes in on Chinese snoring http://seattlepi.nwsource.com/opinion/56133_hoagland27.shtml Spying homes in on Chinese snoring Tuesday, January 29, 2002 By JIM HOAGLAND SYNDICATED COLUMNIST WASHINGTON -- The spies who allegedly bugged the headboard of the Chinese president's airborne bed must have expected to gather more than the scoop on Jiang Zemin's snoring patterns. What reward would justify the high risk of discovery this exploit entailed? Bugging a presidential jetliner of another nation is tricky business. But it can be argued that the potential payoff is worth it. Final, decisive conversations on strategy are often held at 30,000 feet as a visiting potentate wings toward a summit where he hopes to outmaneuver his host nabob. The potentate knows that on the ground his every word will be picked up by the nabob's omnipresent listening devices. Sensitive in-flight strategy sessions may become extinct as the spy story expertly spun by Chinese officials last week spreads around the globe. Other leaders who have ordered their versions of Air Force One outfitted in the United States now must worry that their Boeing-made walls may have ears too. It is improbable that Washington developed a special covert audio program for flying heads and targeted only one. That is not how it works in the spy world. Shutting up will be easier than shutting down: Secret services abroad would have to tear apart the upholstery, fittings and, yes, headboards of their nation's flying presidential offices to see if Washington is listening to the Great One's every word and snore. To debug the $120-million Boeing 767-300ER model China purchased in June 2000, the plane would have had to be gutted beyond repair, say people with experience in different phases of this business. They warn that "sacrificing the plane," as Chinese officials say they did, is the only sure way to find highly sophisticated satellite-driven bugs. An electronic sweep would not have picked them up. Unnamed Chinese military officials told reporters for The Washington Post and The Financial Times last week that 27 listening devices had been ripped out of Jiang's airliner, which was delivered from the United States in August. The devices were supposedly discovered in October after they emitted a static whine on test flights -- a proposition that U.S. sources say is technically unlikely. The Chinese seem to be covering their tracks on how and, perhaps more importantly, when they actually found the devices. That is one of the many mysteries about this story, which the U.S. government will not confirm, deny or discuss. Only this is obvious: Chinese officials chose to surface their detailed allegations one month before President Bush makes his first trip to Beijing. My guess is the Chinese are seeking tactical advantage from the leaks. They may expect to put Bush on the defensive and to make him more conciliatory by disclosing the incident, which Jiang almost certainly will not mention himself. That is not the sort of thing presidents do to each other in their world. China's official spokesmen, while doing nothing to cast doubt on the story, won't take responsibility for confirming it, either. These new allegations serve another, unintended purpose: They underscore that the highly active espionage bureaucracies of the two countries dominate the Chinese-American relationship more thoroughly than do the diplomats, politicians or businessmen. Relations have still not fully recovered from the 1999 U.S. bombing of the Chinese embassy in Belgrade because of a CIA error. In December 2000, a senior colonel from China's most sensitive military intelligence branch defected while visiting New York, triggering a witch hunt for American agents in the command of the People's Liberation Army. Last April the two nations engaged in a tense confrontation over the forcing down of a U.S. reconnaissance plane on Hainan Island. Bush will have to handle the fallout of the bugging charges, even though his administration was almost certainly not responsible for a decision to bug Jiang's airliner. That would have been the work of spymasters of the Clinton administration. The Boeing air frame was originally sold to Delta Airlines and then repurchased by China's military in mid-2000 and sent to a "modification house" (in San Antonio apparently) for a super deluxe outfitting that seems to have included an electronic bonus the Chinese were not expecting. Like investment bankers, spies work on a risk-to-reward ratio. They would have assured policy-makers who must sign off on their operations that the risk of detection was "minimal," and cited previous successes that went off without detection, says one who has been at such sessions. Wasn't that worth capturing Jiang's every word, burp or sneeze? Amazingly, somebody at the upper reaches of government agreed, and launched a boomerang that has now spun back at Washington from China. Jim Hoagland is associate editor/senior foreign correspondent for The Washington Post. Copyright 2002 Washington Post Writers Group. E-mail: hoaglandj@w... -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4723 From: James M. Atkinson Date: Mon Feb 4, 2002 9:41am Subject: FBI Director Juggles Espionage Unit http://www.guardian.co.uk/uslatest/story/0,1282,-1484280,00.html FBI Director Juggles Espionage Unit Wednesday January 30, 2002 11:10 PM WASHINGTON (AP) - The FBI director has reassigned the acting head of his national security division, one of the bureau's highest-ranking women, after losing confidence in her investigation into whether China tried to recruit a U.S. spy, according to people familiar with the move. FBI Director Robert S. Mueller made the decision about a week ago to replace Sheila Horan. During 1998, Horan headed the investigation into the bombings of two U.S. embassies in Africa, which led investigators to al-Qaida followers of Osama bin Laden. Mueller notified Senate oversight committee members, and on Tuesday personally explained his decision during a closed-door Senate briefing. Horan was reassigned to an administrative position. Sources familiar with the meeting said Mueller told senators he had serious concerns within the division, which investigates reports of spying in the United States, and he outlined the changes he has made. The New York Times, which first reported Horan's reassignment, said Mueller was dissatisfied with her investigation of suspicions that China tried to recruit a spy against the United States. The Times, citing anonymous officials, said few details were available and that the identity of the subject of the investigation was unknown. The newspaper said these officials did not say whether any spying had occurred. The FBI declined to comment Wednesday about Horan or her future at the bureau. A person answering calls at her home referred calls to her office at FBI headquarters, where she could not be reached immediately. An FBI spokesman, Bill Carter, said the director's decision was an administrative matter and that Horan would not speak with reporters. The Times reported that she was expected to leave the FBI. Horan took over as acting director of the national security division after the retirement of Neil Gallagher in November, who left the bureau after a tumultuous period. The FBI's espionage division suffered a setback in February with veteran counterintelligence agent Robert Hanssen's arrest on spying charges. Hanssen pleaded guilty to spying for the Soviet Union, then Russia, over at least 15 years. Gallagher was involved in the investigation of scientist Wen Ho Lee. Government watchdogs accused Gallagher of misleading Congress about the investigation. Gallagher told Senate committees in June 1999 that he had full confidence in an early Energy Department inquiry into the national weapons laboratory at Los Alamos, N.M., saying the investigation made a compelling case to focus on Lee. The Taiwan-born naturalized American was accused of leaking nuclear secrets to China. The General Accounting Office, Congress' investigative arm, said the statement was misleading because the FBI's Albuquerque, N.M., office had expressed serious misgivings about the inquiry that Gallagher should have known about. Gallagher told GAO investigators the mistake was inadvertent and said he did not intentionally mislead lawmakers. Guardian Unlimited © Guardian Newspapers Limited 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4724 From: James M. Atkinson Date: Mon Feb 4, 2002 9:39am Subject: Senior FBI National Security Division chief demoted over spy probe http://www.cnn.com/2002/LAW/01/30/fbi.demotion/index.html Senior FBI National Security Division chief demoted over spy probe January 30, 2002 Posted: 3:10 PM EST (2010 GMT) WASHINGTON (CNN) -- One of the FBI's senior national security officials has been demoted over the handling of an investigation into possible Chinese espionage. According to bureau officials, Sheila Horan has been removed from her job as deputy assistant director for counterintelligence in the National Security Division, and has been moved to the Administrative Services Division. The action was ordered by FBI Director Robert Mueller. Bureau officials say the espionage investigation deals with the possible attempt by China to recruit a spy against the United States. No details were provided about the status of that investigation. Bureau officials told CNN Horan did not pursue the probe aggressively enough to satisfy Mueller, and he felt she was slow to inform him of details of the investigation. The counterintelligence unit has been embarrassed within the last few years by various scandals, including the discovery that one of the bureau's own --now-convicted veteran FBI agent Robert Hanssen -- had been spying for Russia for years. The FBI was also red-faced after its intensive investigation of nuclear scientist Wen Ho-Lee, suspected of spying for China, largely fell apart. He pleaded guilty to one count of mishandling classified material and has now published a book accusing the FBI of treating him unfairly because of his Chinese heritage. The case Horan was looking into is said to be unrelated to the discovery of listening devices -- bugs -- found aboard a Boeing 767 delivered to China recently for use by the Chinese government. Horan, 54, joined the FBI in 1973. She is one of the bureau's highest ranking women. She has worked counterintelligence since 1975. In August 1997, she was named special agent in charge of the FBI's National Security Division in the bureau's Washington field office. In December 1998 she was promoted to deputy assistant director for counterintelligence at headquarters. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4725 From: James M. Atkinson Date: Mon Feb 4, 2002 9:31am Subject: CIA helps museum open door on spying http://www.portal.telegraph.co.uk/news/main.jhtml?xml=/news/2002/01/27/wspy27.xml&sSheet=/portal/2002/01/27/por_right.html CIA helps museum open door on spying By David Wastell in Washington (Filed: 27/01/2002) THE long shadows of some of the world's most notorious spies and double-agents, from Anthony Blunt to Aldrich Ames, will be cast over Washington in June with the opening of the world's largest museum dedicated to the history of espionage. Former members of the KGB and CIA have been recruited to give advice on exhibits ranging from special "escape boots" designed for British pilots in the Second World War to a concealed camera used to monitor East German hotel bedrooms. In a city that has seen more than its fair share of spies and is still, presumably, home to hundreds of them, the museum will acknowledge the work done by the world's secret agents and by America's much-maligned L21 billion-a-year intelligence effort. "Intelligence officers do not usually want or seek banner headlines," said Peter Earnest, a former career CIA officer who spent 20 years running clandestine networks behind the Iron Curtain. "The Cold War was an intelligence war, and it was intelligence that stopped it from becoming a hot war, but there were no parades of intelligence officers at the end of it. "People often talk about intelligence failures but they don't hear about many of the successes - embassies that have not been bombed, airports that have not been attacked - and one of our aims is to get people thinking about the role that intelligence has played in history." Officially, the CIA has no view on the museum, which will be housed in a group of 100-year-old buildings in what was once the bustling heart of Washington. Unofficially, the agency, whose headquarters are a few miles up the Potomac River in Langley, Virginia, has been encouraging it. As well as Mr Earnest, who is the museum's executive director, members of its advisory board include Judge William Webster, the former director of the FBI and CIA, Antonio Mendez, who was the CIA's chief of disguise, and a string of other intelligence experts. For balance, there is one Briton, Christopher Andrew, the spy historian, and a Russian who defected: Oleg Kalugin, a former KGB major-general who ran the Soviets' counter-intelligence wing. The museum is being financed by Milton Maltz, a wealthy broadcasting executive and businessman of Cleveland, Ohio, who once worked in America's National Security Agency. Many more spies and former spies, including some still in prison, have been interviewed on video to provide realistic accounts of their operations. The museum will acknowledge British and American traitors, including Blunt, who was stripped of his knighthood when revealed as a double-agent, and Ames, regarded as the most damaging CIA turncoat for his betrayal to the Russians of dozens of American agents, many of whom were executed. It will also examine the spycraft of the traitor Robert Hanssen, who overlooked the site of the new museum from his fourth-floor office at FBI headquarters until he was arrested, last February, for selling secrets to Moscow for 15 years. Hanssen used what Mr Earnest described as "classic techniques" to pass information to his KGB contacts, such as secret "dead drops" for leaving documents in parks and public places in the Washington area. Artefacts on display will include a "Kiss of Death" KGB lipstick tube, designed to fire a single bullet when twisted, an Enigma code-breaking machine and a range of fake warts used to smuggle microdots of secret information. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4726 From: James M. Atkinson Date: Mon Feb 4, 2002 9:45am Subject: Judge Rules On Wiretap Evidence http://www.guardian.co.uk/uslatest/story/0,1282,-1489453,00.html Judge Rules On Wiretap Evidence Friday February 1, 2002 11:20 PM CHARLOTTE, N.C. (AP) - A federal judge ruled Friday that wiretap evidence collected by Canadian intelligence agents can be used in the trial of a man accused of helping the militant group Hezbollah. Said Mohamad Harb, 31, a Lebanon-born naturalized U.S. citizen, and three Middle Eastern co-defendants were charged last year with planning to provide Hezbollah with cash and supplies, including stun guns, blasting equipment, night vision goggles and mine detection equipment. Harb's trial, scheduled for April, will be one of the first prosecutions under a 1996 law that forbids providing material support to a known terrorist organization. Harb, who has been held without bail, could get up to 60 years in prison if convicted. U.S. Magistrate Judge Brent McKnight's ruling means prosecutors may call the Canadian Security Intelligence Service agents to testify about the summaries of telephone wiretaps made in 1999 and 2000. Harb's defense lawyers challenged the use of the testimony and the transcripts without the tapes, which have been destroyed. At a hearing last year, they said admitting such evidence would violate Harb's rights. McKnight said the evidence can be admitted under the ``past recollection exception to the hearsay rule.'' ``Although this exception was accorded the least discussion by both parties, it is clearly the most relevant since the witnesses who authored the summaries will testify at trial,'' he wrote. Messages left late Friday for defense attorney Chris Fialko were not immediately returned. The Canadian Security Intelligence Service says it intercepted Harb's phone conversations during the normal course of business and later shared the information with U.S. intelligence and the FBI. CSIS produced 113 pages of transcripts but said it was standard procedure to destroy the tapes. Initially, Harb was among 18 people charged with smuggling millions of dollars worth of cheap cigarettes out of North Carolina to resell in states where higher taxes push the price up. A superseding indictment in March levied the more serious accusations - that Harb and eight others are part of a Charlotte-based cell of Hezbollah. The North Carolina case was brought long before the Sept. 11 terrorist attacks. Guardian Unlimited © Guardian Newspapers Limited 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4727 From: James M. Atkinson Date: Mon Feb 4, 2002 9:50am Subject: Would-be spy jailed for eight years http://www.thescotsman.co.uk/index.cfm?id=125082002 Would-be spy jailed for eight years Dan McDougall Crime Correspondent A BRITISH Aerospace security guard who stole top secret military documents and tried to sell them to the Russian secret service was last night jailed for eleven years. Raphael Bravo, 30, who admitted his knowledge of espionage amounted to the James Bond films, snatched the highly confidential material, including designs for Royal Navy anti-radar equipment, while on night shift patrol at BAe's HQ in Stanmore, London an Old Bailey jury heard. The stolen papers which also included top secret information on protection systems for Royal Navy ships and the defence systems of hostile countries like Iraq, were said by the prosecution to pose a "substantial threat to the safety of the state". But the Crown admitted there was no evidence Bravo had a political motive and had purely been driven by greed. Bravo, described to the court as a loner, took the red-spined secret documents when he patrolled at the British Aerospace HQ in west London in June and July last year. He worked from 7pm to 7am, but colleagues noted he was unhappy in his job, and it emerged in court that he had even spoken to them of selling documents to the Russians. Aftab Jafferjee, prosecuting said: "Mr Bravo abused his position and trust by stealing the documents and endeavoured to sell the secrets to a foreign power, that is Russia. Any document labelled secret means that the compromising of such information would be likely to threaten life directly or cause serious damage to the operational effectiveness of the security of the UK or allied forces." The court heard that after removing the files from the base last year Bravo tried to sell on the documents to the Russians for "as much money as he could get", first phoning the embassy and then sending them a sample paper with his pager number attached. But MI5 were instantly on the married Londoner's trial. The security guard was caught when he tried to hand over the documents to a man he believed was a Russian agent, turned out to be working for MI5. Bravo of Willesden, north west London, admitted at an earlier hearing that he took documents relating to front-line defence systems. He pleaded guilty to nine offences and asked for two others to be taken into consideration. Seven charges were under the Official Secrets Act and four were theft. Bravo expected to be paid a few thousand pounds for the secrets. He said after his arrest that he had telephoned the Russian embassy after getting the number from the phone directory, but found that there was only an answering machine. He then decided to post the documents to the embassy with a note saying if they were interested in more documents to contact him. The guard who worked for Crusader security under contract to BAe Systems said he decided to take advantage whenever a cabinet containing secret documents was left open. He later pleaded guilty to the crimes, but said his sole knowledge of espionage came from "newspapers, spy novels and James Bond". Sentencing Bravo, Judge Michael Hyam said: "Despite what you intended there is no evidence that national or allied interests were in fact prejudiced by what you did. "But had you succeeded there is no doubt whatever that the interests of this country and its allies would have been substantially prejudiced." Bravo's arrest resulted from a combined operation between MI5 and Special Branch. After the trial Commander Roger Pearce, the Metropolitan Police's director of intelligence, said Bravo's sentence reflected the severity of this crime. He said: "This man abused his position of trust and his actions could potentially have put lives at risk. "The arrest of Raphael Bravo was a result of an intelligence-led operation involving Special Branch and a number of other agencies working closely together and we are satisfied with the outcome." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4728 From: James M. Atkinson Date: Mon Feb 4, 2002 9:45am Subject: Security guard spy jailed after MI-5 traps him http://www.thetimes.co.uk/article/0,,2-2002054451,00.html SATURDAY FEBRUARY 02 2002 Security guard spy jailed after MI-5 traps him BY SAM LISTER A SECURITY guard who tried to sell military secrets to the Russians was jailed for 11 years at the Old Bailey yesterday. Rafael Bravo, 30, could have threatened lives and caused serious damage to the security of Britain and its allies had he succeeded in selling files he stole while working night shifts at British Aerospace, the court was told. The documents, marked "UK eyes only" and "Nato secret", detailed frontline defence systems for British Apache helicopters, Harrier jump-jets, warships and radar surveillance. Soon after the thefts, between July and August last year, Bravo was trapped by a classic MI5 "sting" when he passed the papers to British agents, believing they were Russians. Sentencing Bravo, the Recorder of London, Judge Michael Hyam, said that, although he accepted that the guard had been motivated only by financial gain, he was compelled to impose a lengthy jail term to deter others. "Despite what you intended there is no evidence that national or allied interest were in fact prejudiced by what you did. But had you succeeded there is no doubt whatever that the interests of this country and its allies would have been substantially prejudiced," he said. "Anyone who has put at risk his country's security must expect to receive long sentences." Bravo, described as a loner and typical opportunist spy, pleaded guilty to six offences under the Official Secrets Act and five under the Theft Act after admitting to taking the files from desks and cabinets around the BAe headquarters in Stanmore, north London. The court heard that the scheme was so ill thought-out and unsophisticated that it appeared inspired by little more than spy novels and James Bond films. The theft set off a major security alert. Bravo, a British national of Spanish descent, was phoned at his bedsit in Willesden, north London, by an MI5 man pretending to be Russian. He was arrested after a meeting at which he agreed to show the files and asked for "as much money as I can get". Although he is known to have asked for less than L1million for the documents, experts said they would have been worth many millions more to foreign powers. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4729 From: Date: Mon Feb 4, 2002 7:37am Subject: Re: INTERTECT: Introduction In a message dated 2/3/02 5:35:50 PM Pacific Standard Time, tek492p@y... writes: << Hello to the group -- >> Nice equipment! Where did you and/or your staff get it's training? 4730 From: Hawkspirit Date: Mon Feb 4, 2002 0:39pm Subject: Packet Sniffers Justin T. Fanning" Subject: Bluetooth/802.11b as a audio medium? (long but good!) Does anyone go down to the packet addressing layer, even the packet "payload" (content) layer? What if the content was encrypted? How many TSCM'ers sweep for unknown 802.11b MAC address's or Bluetooth device address's? Is this the future of TSCM? Regards, Justin I agree Justin, TSCM is definitely going in the direction of packet sniffing. I don't know if you followed my discussion of T1 multiplexed CO lines a few months ago. Securing these type of phone communications is the new challenge on the horizon. Packet sniffers maybe a mandatory and key piece of the sweep gear real soon. I personally am saturating on them now. I like to stay up with the leaders of the race at all times. Roger Tolces www.bugsweeps.com 4731 From: Allen Sedenka Date: Mon Feb 4, 2002 7:47am Subject: CODING ON AIRLINE TICKET On a trip to Chicago last week, I noticed that during the boarding process at the gate instead of row numbers being called for boarding, Group 1 & Group 2 ticket holders (these designations were printed above the seat #) were allowed to board first. Those not holding this designation on their tickets were asked to step aside for additional screening prior to boarding. Does anyone know what these designations are or how they are assigned, etc? I had a Group 1 designation. --------------------------------- Do You Yahoo!? Yahoo! Auctions Great stuff seeking new owners! Bid now! [Non-text portions of this message have been removed] 4732 From: Gordon Mitchell Date: Mon Feb 4, 2002 3:37pm Subject: Re: Packet Sniffers There are lots of opportunities to move toward network security. They range from the obvious (moving the mouse to see if someone left their computer logged in) to analysis of the link layer. In all of the sweeps that we do we check for 802.11 at 2.4 GHz, soon at 5. This sort of thing is fundamental. Use a professional tool like Wildpackets Airopeek on a laptop equipped with a wireless lan card. This provides great detail on really bad problems like computers offering NetBios ports, etc. Avoid hacker tools that are used for wardriving -- they will do bad things to your credibility if you end up in an expert witness situation. Bluetooth is growing slowly and is worth tracking. When it becomes more common it will be worth monitoring also. Gordon phone +1 (425) 489-0446 or toll free (888) 284-5457 Electronic eavesdropping detection Bug-Killer.com Finding clues in computers eSleuth.com Hawkspirit wrote: > > Justin T. Fanning" > Subject: Bluetooth/802.11b as a audio medium? (long but good!) > > Does anyone go down to the packet addressing layer, even the packet > "payload" (content) layer? What if the content was encrypted? > How many TSCM'ers sweep for unknown 802.11b MAC address's or > Bluetooth device address's? Is this the future of TSCM? > Regards, > > Justin > > I agree Justin, TSCM is definitely going in the direction of packet > sniffing. I don't know if you followed my discussion of T1 multiplexed CO > lines a few months ago. Securing these type of phone communications is the > new challenge on the horizon. Packet sniffers maybe a mandatory and key > piece of the sweep gear real soon. I personally am saturating on them now. > I like to stay up with the leaders of the race at all times. > > Roger Tolces > www.bugsweeps.com > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- 4733 From: Michael Puchol Date: Mon Feb 4, 2002 4:14pm Subject: Fw: Packet Sniffers Aaaargh! Hit 'Reply to sender' only again! Here goes again, Hi Gordon, > > Avoid hacker tools that are used for wardriving -- they will do bad things > to > > your credibility if you end up in an expert witness situation. I have to disagree here - some of these 'hacker' tools do stuff you couldn't do with commercially available software, and obviously a cracker is going to be using precisely these tools. You are probably referring to NetStumbler, a piece of software that displays nearby WLAN access points that will respond to broadcast requests with an SSID set to 'ANY'. Some APs now don't respond to these. In any case, it is an extremely useful tool to identify APs within a certain area without having to do an extensive (and expensive) RF survey with spectrum analyzers and the like. Within a couple of seconds you'll have a list of APs that you can format appropiately (I'm not saying you go to court or to your costumer with a screen dump of NS!), and show to whoever is responsible of network security - if they're slightly competent, they'll identify roge APs straight away. Some organisations are not looking for high-tech bugs, but for dumb employees placing security hazards in their networks (proxy software, conferencing, chat, wireless LAN, etc.) so you don't really need a full-blown TSCM inspection. Another such 'hacker' tool is L0phtCrack, which again is a double-edged sword. It will capture SMB logons in Windows NT networks, and attempt dictionary-based and brute-force attacks on the LM hash. With such tool, you can present a report to a client showing him a) how easy it would be for your average school kid to get most of his organisation's passwords, and b) how necessary it is to implement strong password policies. Without this tool, it is not possible to know how secure your network really is. I admit that this program has moved onto a commercial enterprise, but there is still a freeware version available, with source code, which basically does the same, only slower. I see nothing wrong in using software like this for legitimate purposes, just like you can buy a kitchen knife to cut tomatos - you can also kill your neighbour with it. My point is that if you are not familiar with the tools that attackers will use, then you're not really going to be doing your clients any favours. Then, if they are still not convinced about the lack of security they may have, you can run a demo! Before you cut in, yes, you need to have consent from the owners of the network before you run such tests. Just my ‚Ǩ0.02's worth Mike 4734 From: James M. Atkinson Date: Mon Feb 4, 2002 6:03pm Subject: Alliance of Concerned Shamans From: Alliance of Concerned Shamans To:Chief Who Sits on Big Rock and has Mighty Club Subject: Fire. Fire bad. Maybe fire good, but no one know. Since no one know, best not to make fire. That way, we not find out, which is good. Fire anger gods. Angry gods mean bad hunts and no babies. We no want no babies. Repeat: Fire bad. People make fire too fast. Only five year ago, no fire. Last year, sparks. Now, fire. No one consult us first. No one ask gods. People just bang rocks, make sparks. We upset. We know gods upset, because gods talk to us -- not to people. So no more make fire! Fire bad. People burned. What if someone make big-big fire, burn down woods? Then animals die, we no eat animals, we die. Fire bad. Some say fire good. They stupid. If fire good, gods would have given us fire. Gods no give us fire, so, fire bad. D'uh! Stupid people who say fire good should be burned with fire! Hah! That will teach them. We shamans all say:Fire bad. You mess with fire, you make gods angry. Fire bad for women and babies and cute little bunnies. So, Chief, please: Hit people who mess with fire with big club. Thank you. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4735 From: Date: Tue Feb 5, 2002 10:26am Subject: Bush Eyeballs Heavy Tech Spending Bush Eyeballs Heavy Tech Spending By Declan McCullagh 2:00 a.m. Feb. 5, 2002 PST WASHINGTON -- President Bush is asking Congress to grant federal police hundreds of millions of dollars for surveillance, information-sharing and computer upgrades. In his proposed 2003 budget sent to Capitol Hill on Monday, Bush proposed an unprecedented increase on spending for anti-terrorism efforts, saying that doing so "recognizes the new realities confronting our nation, and funds the war against terrorism and the defense of our homeland." Because the complex document is merely a proposal, Congress will spend much of this year wrangling over what form the final budget will take for the fiscal year beginning Oct. 1, 2002. Bush proposes spending $2.13 trillion for the 2003 fiscal year, a 3.7 percent overall increase from this year's spending. But if you don't count mandatory programs like Social Security, discretionary spending jumps $124 billion, or 19 percent. One of the biggest winners would be the Justice Department, which includes the FBI, the Drug Enforcement Agency and the thousands of DOJ attorneys in the criminal, civil and other divisions. The DOJ would get a budget increase of $1.8 billion to a total of $30.2 billion, not counting $539.2 million it already received as part of an emergency spending bill enacted after Sept. 11. The FBI would receive $61.8 million and 201 more employees or contractors to support the agency's "surveillance capabilities to collect evidence and intelligence," the DOJ said in a statement on Monday afternoon. That would allow the FBI to devote more resources than ever to controversial spy technologies like Carnivore, keyboard logging devices, and Magic Lantern. Included in that figure is: $5.6 million to expand an unnamed FBI "data collection facility," $32 million and 194 positions devoted to intelligence and information gathering, $10.9 million for expanded electronic surveillance, $11.3 million for an "Electronic Surveillance Data Management System," and $2 million for the Special Operations Group's intelligence and surveillance operations. In addition, the FBI would receive $157.6 million to upgrade and enhance its computer systems. The FBI's National Infrastructure Protection and Computer Intrusion Program would get $21 million and 138 new hires, including 81 agents. The purpose: To respond to "cyber-attacks" and investigate electronic intrusions. To handle the expected increase in wiretaps, especially ones approved by the shadowy Foreign Intelligence Surveillance Act court, the Department of Justice itself would get a boost. The budget anticipates hiring another 10 wiretap-specialist attorneys at a cost of $2 million. On Capitol Hill, initial reaction to the budget was cautious and followed party lines. "The President's budget is a good first step in what is sure to be one of the most challenging budget seasons we've seen in quite some time. The biggest challenge will be to control spending while meeting all of our priorities," said House Budget committee chairman Jim Nussle (R-Iowa). House Minority Leader Richard Gephardt said: "While President Bush should be commended for his commitment to defense and homeland security in his budget released today, he should seriously reconsider his fiscal priorities for our future economic growth." To cover in part the budget increases, Bush has proposed cutting highway spending and environmental projects. Other agencies include: Patent and Trademark Office: The PTO would receive a remarkable 21.2 percent budget increase. James Rogan, Undersecretary of Commerce for Intellectual Property, said on Monday that the cash would let him hire 950 more patent examiners. General Services Administration: It may be best known for the humble task of maintaining government buildings, but the GSA is also responsible for providing "one-stop access to federal services via the Internet or telephone." Bush proposes $45 million for an "e-gov" fund to be handled by a new "Office of Citizen Services," a jump from last year's request of $20 million. National Commission on Libraries and Information Science: President Bush proposes to eliminate this minor bureaucracy, saying its $1 million budget could be better spent by the Institute of Museum and Library Services. That institute would receive $211 million, $16 million than last year. National Archives and Records Administration: Digital signatures, designed to be impossible to forge, finally will make their way into the venerable Federal Register, the voluminous record of new government regulations. NARA will also receive $2.3 million to spend on its Electronic Records Management project. 4736 From: James M. Atkinson Date: Tue Feb 5, 2002 9:39pm Subject: The 10 Commandments of Counterintelligence The 10 Commandments of Counterintelligence BY James M. Olson This article appeared in Studies of Intelligence, Unclassified Edition, Fall-Winter 2001, No.11, published by the CIA's Center for the Study of Intelligence. The Center seeks to promote study, debate, and understanding of the role of intelligence in the American system of government. Mr. Olson served in the Central Intelligence Agency's Directorate of Operations and is presently on the faculty of the George Bush School of Government and Public Service at Texas A&M University. "O that thou hadst hearkened to my commandments! Then had thy peace been as a river, and thy righteousness as the waves of the sea." Isaiah 48:18 The need for counterintelligence (CI) has not gone away, nor is it likely to. The end of the Cold War has not even meant an end to the CI threat from the former Soviet Union. The foreign intelligence service of the new democratic Russia, the Sluzhba Vneshney Razvedki Rossii (SVRR), has remained active against us. It was the SVRR that took over the handling of Aldrich Ames from its predecessor, the KGB, in 1991. It was the SVRR that ran CIA officer Harold James Nicholson against us from 1994 to 1996. It was the SVRR that was handling FBI special agent Earl Pitts when he was arrested for espionage in 1996. It was the SVRR that planted a listening device in a conference room of the State Department in Washington in the summer of 1999. And it was the SVRR that was handling FBI special agent Robert Hanssen when he was arrested on charges of espionage in February 2001. The Russians are not alone. There have been serious, well-publicized concerns about Chinese espionage in the United States. The Department of Energy significantly increased security at its national laboratories in response to allegations that China had stolen US nuclear weapons secrets. Paul Redmond, the former Associate Deputy Director of Operations for Counterintelligence at the CIA, told the House Permanent Select Committee on Intelligence in early 2000 that a total of at least 41 countries are trying to spy on the United States. Besides mentioning Russia, China, and Cuba, he also cited several "friends," including France, Greece, Indonesia, Israel, the Philippines, South Korea, and Taiwan. He warned of a pervasive CI threat to the United States. The United States, as the world's only remaining superpower, will be the constant target of jealousies, resentments, rivalries, and challenges to its economic well-being, security, and leadership in the world. This inevitably means that the United States will be the target of large-scale foreign espionage. A Choice Assignment When I joined the CIA, one of my first interim assignments was with the old CI Staff. I found it fascinating. I was assigned to write a history of the Rote Kapelle, the Soviet espionage network in Nazi-occupied Western Europe during World War II. With its expanded computer power, NSA was breaking out the actual messages sent between the NKVD center in Moscow and the clandestine radios of the various cells in Western Europe. Incredibly, these messages came to me. There I was, a brand new junior officer, literally the first person in the CIA to see the day-to-day traffic from these life-and-death operations. I was deeply affected by the fear, heroism, and drama in these messages. Above all, I felt privileged to have been given such an opportunity. Building on an earlier study of the Rote Kapelle by the CI Staff, I completed a draft several months later that incorporated the new material. To my great surprise, this study was well received by my immediate superiors, and I was told that I was to be rewarded with a personal interview and congratulations from James Jesus Angleton, the legendary head of the CI Staff from 1954 to 1974. Angleton's office was on the second floor of the Original Headquarters Building. I was first ushered into an outer office, where Angleton's aides briefed me on how to conduct myself. And then I went alone into the inner sanctum. The room was dark, the curtains were drawn, and there was just one small lamp on Angleton's desk. I later heard that Angleton had eye trouble and that the light hurt his eyes, but I was convinced the real reason for the semidarkness was to add to his mystique. It certainly worked on me! I nervously briefed Angleton on my study, and he listened without interrupting, just nodding from time to time. When I finished, he methodically attacked every one of my conclusions. Didn't I know the traffic was a deception? Hadn't it occurred to me that Leopold Trepper, the leader of the Rote Kapelle, was a German double? He went on and on, getting further and further out. Even I, as a brand new officer, could tell that this great mind, this CI genius, had lost it. I thought he was around the bend. It was one of the most bizarre experiences of my career. When the meeting was over, I was glad to get out of there, and I vowed to myself that I would never go anywhere near CI again. I did not keep that vow. In my overseas assignments with the Agency, I found myself drawn toward Soviet CI operations. Nothing seemed to quicken my pulse more, and I was delighted when I was called back to Headquarters in 1989 to join the new Counterintelligence Center (CIC) as Ted Price's deputy. When Ted moved upstairs in early 1991 to become the Associate Deputy Director for Operations, I was named chief of the Center. Today, many years after that initial disagreeable encounter with CI, I find it hard to believe that it is actually my picture on the wall of the CIC conference room at CIA Headquarters, where the photos of all former CIA counterintelligence chiefs are displayed. There I am, number seven in a row that begins with Angleton. So, after a career that ended up being far more CI-oriented than I could ever have imagined, I would like to offer some personal observations in the form of "The 10 Commandments of Counterintelligence." I have chosen the form of commandments because I believe the basic rules of CI are immutable and should be scrupulously followed. In my view, it makes little difference whether the adversary is the Russians, the Cubans, the East Germans, the Chinese, or someone else. It likewise makes little difference whether we are talking about good CI practices in 1985 or in 2005. Unfortunately, as I watch US CI today, I am increasingly concerned that the principles I consider fundamental to effective CI are not being followed as carefully and consistently as they should be. These commandments were not handed down to me from a mountaintop, and I make no claim that they are inspired or even definitive. They are simply the culmination, for what they are worth, of my experience. They are intended primarily for my fellow practitioners in CI today, but also for any younger officers in the Intelligence Community (IC) who might someday want to join us. The First Commandment: Be Offensive CI that is passive and defensive will fail. We cannot hunker down in a defensive mode and wait for things to happen. I believe we are spending far too much money on fences, safes, alarms, and other purely defensive measures to protect our secrets. That is not how we have been hurt in recent years. Spies have hurt us. Our CI mindset should be relentlessly offensive. We need to go after our CI adversaries. Aggressive double agent (DA) operations are essential to any CI program, but not the predictable, hackneyed kind we have so often pursued. We need to push our bright and imaginative people to produce clever new scenarios for controlled operations, and we need more of them. The opposition services should be kept constantly off guard so that they never suspect that we have actually controlled the operations they believe they initiated from the beginning. When the requirements, modus operandi, and personality objectives of the DA operation have been achieved, we should in a greater number of cases pitch the opposition case officer. If only one out of 10 or 20 of these recruitments takes, it is worth it. And CI professionals, of course, should not rely exclusively on their own efforts. They should constantly prod their HUMINT colleagues to identify, target, and recruit officers from the opposition intelligence services. The key to CI success is penetration. For every American spy, there are several members of the opposition service who know who he or she is. No matter what it takes, we have to have penetrations. We should operate aggressively against the nontraditional as well as the traditional adversaries. How many examples do we need of operations against Americans by so-called friendly countries to convince us that the old intelligence adage is correct: there are friendly nations, but no friendly intelligence services? If we suspect for whatever reason that the operatives of a foreign intelligence service, friend or foe, are operating against us, we should test them. We should dress up an enticing morsel, made to order for that specific target, and send it by them. If they take it, we have learned something we needed to know, and we have an operation. If they reject it, as true friends should, we have learned something, too. In either event, because we are testing a "friend," plausible deniability has to be strictly preserved. Every foreign service is a potential nontraditional adversary; no service should get a lifetime pass from US offensive CI operations. The Second Commandment: Honor Your Professionals It has been true for years, to varying degrees throughout the IC, that CI professionals have not been favored, to the extent they deserved, with promotions, assignments, awards, praise, esteem, or other recognition. The truth is that CI officers are not popular. They are not always welcome when they walk in. They usually bring bad news. They are easy marks to criticize when things go wrong. Their successes are their failures. If they catch a spy, they are roasted for having taken so long. If they are not catching anyone, why not? What have they done with all that money they spent on CI? It is no-win. For much of my career, many of our best people avoided becoming CI specialists. CI was not prestigious. It had a bad reputation. It was not fast track. It did not lead to promotions or good assignments. Angleton left a distasteful legacy that for years discredited the CI profession. Ted Price did more than anyone else in the Agency to reverse that trend and to rehabilitate CI as a respected professional discipline. Nevertheless, that battle is still not completely won. We have to do more to get our CI people promoted, recognized, and respected so that our best young officers will be attracted to follow us into what we know is a noble profession and where the need is so great. The Third Commandment: Own the Street This is so fundamental to CI, but it is probably the least followed of the commandments. Any CI program worthy of the name has to be able to engage the opposition on the street, the field of play for espionage. And when we do go to the street, we have to be the best service there. If we are beaten on the street, it is worse than not having been there at all. For years, we virtually conceded the streets of the world's capitals, including the major espionage centers, to the KGB, the GRU, and the East European services because we either did not know how to do it or we were not willing to pay the price for a thoroughly professional, reliable, full-time, local surveillance capability. Opposition intelligence officers have to be watched, known meeting areas have to be observed, and, when an operation goes down-often on short notice- undetectable surveillance has to cover it, identify the participants, and obtain evidence. This capability is expensive-selection, training, vehicles, photo gear, video, radios, safe apartments, observation posts, and on and on-but, if we do not have it, we will be a second-rate CI service and will not break the major cases. The Fourth Commandment: Know Your History I am very discouraged when I talk to young CI officers today to find how little they know about the history of American CI. CI is a difficult and dangerous discipline. Many good, well-meaning CI people have gone wrong and made horrendous mistakes. Their failures in most cases are well documented, but the lessons are lost if our officers do not read the CI literature. I find it inconceivable that any CI practitioner today could ply his or her trade without an in-depth knowledge of the Angleton era. Have our officers read Mangold? Have they read Legend and Wilderness of Mirrors? Do they know the Loginov case, HONETOL, MHCHAOS, Nosenko, Pollard, and Shadrin? Are they familiar with Aspillaga and the Cuban DA debacle? Have they examined our mistakes in the Ames and Howard cases? Are they staying current with recent releases like The Mitrokhin Archive and The Haunted Wood? I believe it is an indispensable part of the formation of any American CI officer-and certainly a professional obligation-to study the CI failures of the past, to reflect on them, and to make sure they are not repeated. The many CI courses being offered now are a positive step, but there will never be a substitute for a personal commitment on the part of our CI professionals to read their history, usually on their own time at home. The Fifth Commandment: Do Not Ignore Analysis Analysis has too often been the stepchild of CI. Throughout the CI community, we have fairly consistently understaffed it. We have sometimes tried to make it up as we go along. We have tried to do it on the cheap. Generally speaking, operators make bad analysts. We are different kinds of people. Operators are actors, doers, movers and shakers; we are quick, maybe a little impulsive, maybe a little "cowboy." Our best times are away from our desks. We love the street. Research and analysis is really not our thing-and when we have tried to do it, we have not been good at it. True analysts are different. They love it. They are more cerebral, patient, and sedentary. They find things we could not. They write better. A lot of CI programs in the past have tried to make operators double as their own analysts. As a result, in the United States, CI analysis historically has been the weakest part of the business. Professional CI analysts have been undervalued and under appreciated. A good CI program will recruit and train true analysts in sizable numbers. I do not think it would be excessive as a rule of thumb in a top notch CI service to be evenly divided between operators and analysts. Very few of our US CI agencies come anywhere close to that ratio. Wonderful things happen when good analysts in sufficient numbers pore over our DA reports, presence lists, SIGINT, audio and teltap transcripts, maps, travel data, and surveillance reports. They find the clues, make the connections, and focus our efforts in the areas that will be most productive. Many parts of the US CI community have gotten the message and have incorporated trained analysts into their operations, but others have not. Across the board, we still have serious shortfalls in good, solid CI analysis. The Sixth Commandment: Do Not Be Parochial More harm probably has been done to US CI over the years by interagency sniping and obstruction than by our enemies. I remember when the CIA and the FBI did not even talk to each other-and both had disdain for the military services. It is no wonder that CI was a shambles and that some incredibly damaging spies went uncovered for so long. Occasionally in my career, I encountered instances of sarcasm or outright bad mouthing of other US Government agencies by my officers. That kind of attitude and cynicism infected our junior officers and got in the way of cooperation. These comments often were intended to flaunt our supposed "superiority" by demeaning the capabilities of the other organizations. I dealt with these situations by telling the officers to "knock it off," and I would encourage other CI supervisors around the community to do the same. CI is so difficult, even in the best of circumstances, that the only way to do it is together. We should not let personalities, or jealousies, or turf battles get in the way of our common mission. Our colleagues in our sister services are as dedicated, professional, hardworking, and patriotic as we are, and they deserve our respect and cooperation. The best people I have known in my career have been CI people, regardless of their organizational affiliation. So let's be collegial. The Seventh Commandment: Train Your People CI is a distinct discipline and an acquired skill. It is not automatically infused in us when we get our wings as case officers. It is not just a matter of applying logic and common sense to operations, but is instead a highly specialized way of seeing things and analyzing them. CI has to be learned. I do not know how many times in my career I have heard, "No, we do not really need a separate CI section. We are all CI officers; we'll do our own CI." That is a recipe for compromise and failure. There is no substitute for a professional CI officer, and only extensive, regular, and specialized CI training can produce them. Such training is expensive, so whenever possible we should do it on a community basis to avoid duplication and to ensure quality. CI is a conglomerate of several disciplines and skills. A typical operation, for example, might include analysts, surveillance specialists, case officers, technical experts, and DA specialists. Each area requires its own specialized training curriculum. It takes a long time to develop CI specialists, and that means a sustained investment in CI training. We are getting better, but we are not there yet. The Eighth Commandment: Do Not Be Shoved Aside There are people in the intelligence business and other groups in the US Government who do not particularly like CI officers. CI officers have a mixed reputation. We see problems everywhere. We can be overzealous. We get in the way of operations. We cause headaches. We are the original "black hatters." Case officers want their operations to be bona fide. Senior operations managers do not want to believe that their operations are controlled or penetrated by the opposition. There is a natural human tendency on the part of both case officers and senior operations managers to resist outside CI scrutiny. They believe that they are practicing good CI themselves and do not welcome being second-guessed or told how to run their operations by so-called CI specialists who are not directly involved in the operations. I have seen far more examples or this in my CI career than I care to remember. By the same token, defense and intelligence contractors and bureaucrats running sensitive US Government programs have too often tended to minimize CI threats and to resist professional CI intervention. CI officers, in their view, stir up problems and overreact to them. Their "successes" in preventing CI problems are invisible and impossible to measure, but their whistle blowing when problems are uncovered generate tremendous heat. It is not surprising that they are often viewed as a net nuisance. When necessary, a CI service has to impose itself on the organizations and groups it is assigned to protect. A CI professional who is locked out or invited in only when it is convenient to the host cannot do his job. My advice to my CI colleagues has always been this: "If you are blocked by some senior, obtuse, anti-CI officer, go around him or through him by going to higher management. And document all instances of denied access, lack of cooperation, or other obstruction to carrying out your CI mission. If not, when something goes wrong, as it likely will in that kind of situation, you in CI will take the blame." The Ninth Commandment: Do Not Stay Too Long CI is a hazardous profession. There should be warning signs on the walls: "A steady diet of CI can be dangerous to your health." I do not believe anyone should make an entire, uninterrupted career of CI. We all who work in CI have seen it: the old CI hand who has gotten a bit spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling pray eventually to creeping paranoia, distortion, warping, and overzealousness in one's thinking. It is precisely these traits that led to some of the worst CI disasters in our history. Angleton and his coterie sadly succumbed, with devastating results. Others in the CIA and elsewhere have as well. The danger is always there. My wife, who was working at the CIA when I met her, was well acquainted with this reputation of CI and the stories about its practitioners. When I was serving overseas and received the cable offering me the position as Ted Price's deputy in the new Counterintelligence Center, I discussed it with her that evening at home. Her response, I thought was right on the mark: "Okay, but do not stay too long." Sensible and productive CI needs lots of ventilation and fresh thinking. There should be constant flowthrough. Non-CI officers should be brought in regularly on rotational tours. I also believe it is imperative that a good CI service build in rotational assignments periodically outside CI for its CI specialists. They should go spend two or three years with the operators or with the other groups they are charged to protect. They will come back refreshed, smarter, and less likely to fall into the nether world of professional CI: the school of doublethink, the us-against-them mindset, the nothing-is-what-it-seems syndrome, the wilderness of mirrors. The Tenth Commandment: Never Give Up The tenth and last commandment is the most important. What if the Ames mole hunters had quit after eight years instead of going into the ninth? What if, in my own experience, we had discontinued a certain surveillance operation after five months instead of continuing into the sixth? CI history is full of such examples. The FBI is making cases against Americans today that involved espionage committed in the 1960s and 1970s. The Army's Foreign Counterintelligence Activity is doing the same. The name of the game in CI is persistence. CI officers who are not patient need not apply. There is no statute of limitations for espionage, and we should not create one by our own inaction. Traitors should know that they will never be safe and will never have a peaceful night's sleep. I applauded my CI colleagues in the FBI when I read not long ago of their arrest in Florida of a former US Army Reserve colonel for alleged espionage against the United States many years earlier. They obviously never gave up. If we keep a CI investigation alive and stay on it, the next defector, the next penetration, the next tip, the next surveillance, or the next clue will break it for us. If there were ever to be a mascot for US counterintelligence, it should be the pit bull. In Conclusion These are my 10 commandments of CI. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as an Intelligence Community we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics, or even the priorities. What we should agree on, however, is that strong CI has to be a national priority. Recent news reports from Los Alamos, Washington, and elsewhere have again underscored the continuing need for CI vigilance. 01/31/2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4737 From: tek492p Date: Wed Feb 6, 2002 1:49am Subject: Re: INTERTECT: Introduction --- In TSCM-L@y..., MACCFound@a... wrote: > > Nice equipment! Where did you and/or your staff get it's training? ===================== "training??? or Experience!!! I still have (in my museum) the R. B. Clifton "Hound Dog" Field Strength Meter that I purchased NEW back in 1970. This was the "in vogue" instrument of choice in the private sector for detecting hidden transmitters before the advent of the spectrum analyzer. And, of course I still have my dog-eared-with-pages-falling-out original copy of the back-then Bible of all electronic surveillance books, "The Electronic Invasion" by Robert M. Brown, copyright 1967 (red cover edition). I have been an amateur (ham) radio operator since 1970; in the United States Air Force for nine years in Electronics and Telecommunications (radio, telephone, teletype, Top Secret security clearance, NSA crypto); and worked at two television stations in the Engineering department in a "major market" (Los Angeles). (Yes, each television station had spectrum analyzers for the microwave links from the news vans and news helicopters). So.....Have I sat in a classroom for two weeks with pencil & paper learning TSCM? The answer is no. For me that would be like repeating high school electronics class. For anyone that has an EXTENSIVE electronics background, TSCM is not difficult to learn. Just be sure and do all your homework. As for my "staff"; they are not full-time employees, but work as "independent contractors". Some have military electronics experience, others work for the phone company. And, they all know "Ohm's Law". Jack Lindauer Intertect Electronic Surveillance Countermeasures Los Angeles, California (818) 831-0515 4738 From: Date: Tue Feb 5, 2002 8:57pm Subject: Re: Re: INTERTECT: Introduction In a message dated 2/5/02 11:50:39 PM Pacific Standard Time, tek492p@y... writes: << For anyone that has an EXTENSIVE electronics background, TSCM is not difficult to learn >> Thank you for sharing. 4739 From: James M. Atkinson Date: Wed Feb 6, 2002 0:00pm Subject: Microsoft's Really Hidden Files: A New Look At Forensics (v2.6) Microsoft's Really Hidden Files: A New Look At Forensics (v2.6) By The Riddler November 3, 2001 (v2.0 finished May 16, 2001; v1.0 finished June 11, 2000) Written with Windows 9x in mind, but not limited to. DISCLAIMER: I will not be liable for any damage or lost information, whether due to reader's error, or any other reason. SUMMARY: There are folders on your computer that Microsoft has tried hard to keep secret. Within these folders you will find two major things: Microsoft Internet Explorer has not been clearing your browsing history after you have instructed it to do so, and Microsoft's Outlook Express has not been deleting your e-mail correspondence after you've erased them from your Deleted Items bin. (This also includes all incoming and outgoing file attachments.) And believe me, that's not even the half of it. When I say these files are hidden well, I really mean it. If you don't have any knowledge of DOS then don't plan on finding these files on your own. I say this because these files/folders won't be displayed in Windows Explorer at all -- only DOS. (Even after you have enabled Windows Explorer to "show all files.") And to top it off, the only way to find them in DOS is if you knew the exact location of them. Basically, what I'm saying is if you didn't know the files existed then the chances of you running across them is slim to slimmer. It's interesting to note that Microsoft does not explain this behavior adequately at all. Just try searching on microsoft.com. FORWARD: I know there are some people out there that are already aware of some of the things I mention. I also know that most people are not. The purpose of this tutorial is teach people what is really going on with Microsoft's products and how to take control of their privacy again. This tutorial was written by me, so if you see a mistake somewhere then it is my mistake, and I apologize. Thanks for reading. INDEX: 1) DEFINITIONS 1.1) Ancronyms 2) SEEING IS BELEIVING 3) HOW TO ERASE THE FILES ASAP 3.1) If You Have Ever Used Microsoft Internet Explorer 3.2) Clearing Your Registry 3.3) Slack files 3.4) Keeping Microsoft's Products 4) STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES (For the savvy.) 5) HOW MICROSOFT DOES IT 6) +S MEANS [S]ECRET NOT [S]YSTEM. 7) A LOOK AT OUTLOOK 8) THE TRUTH ABOUT FIND FAST 8.1) Removing Find Fast 9) CONTACT INFORMATION AND PGP BLOCKS 9.1) Recommended reading 10) SPECIAL THANKS 11) REFERENCES Coming in version 3.0: ˘ pstores.exe ˘ Related Windows Tricks. ˘ Looking back on the NSA-Key. ˘ Researching the [Microsoft Update] button. ˘ Why the temp folders aren't intended to be temporary at all. ˘ What's with Outlook Express's .dbx database files? ˘ Win2K support. 1.0. DEFINITIONS I) A "really hidden" file/folder is one that cannot be seen in Windows Explorer after enabling it to "show all files," and cannot be seen in MS-DOS after receiving a proper directory listing from root. a) There is at least one loophole to enable Windows Explorer to see them. b) There is at least one loophole to enable MS-DOS to see them. II) Distinguishes "really hidden" file/folders from just plain +h[idden] ones, such as your "MSDOS.SYS" or "Sysbckup" folder. III) Distinguishes from certain "other" intended hidden files, such as a file with a name with high ascii characters (eg, "YÎÔ®o"). (Interesting to note that Microsoft has disabled the "Find: Files or Folders" from searching through one of these folders.) 1.1. ANCRONYMS DOS = Disk Operating System aka MS-DOS MSIE = Microsoft Internet Explorer TIF = Temporary Internet Files (folder) HD = Hard Drive OS = Operating System FYI = For Your Information 2. SEEING IS BELEIVING No. Enabling Windows Explorer to "show all files" does not show the files in mention. No. DOS does not list the files after receiving a proper directory listing from root. And yes. Microsoft intentionally disabled the "Find" utility from searching through one of the folders. Oh, but that's not all. Just from one of these files I would be able to tell you which web sites you previously visited, what types of things you search for in search engines, and probably gather your ethnicity, religion, and sexual preference. Needless to say one can build quite a profile on you from these files. It has the potential to expose and humiliate -- putting your marriage, friendship, and corporation at risk. Here's one good example of the forensic capabilities.. "I've been reading your article as I have a problem with an employee of mine. He has been using the works pc for the internet and using it to chat and look at porn sites. He was then deleting the cookies and history in order to cover his tracks. A friend of mine pointed me in the direction of this site and your article. I have found it to be incredibly useful,..." --Concerned Boss, 8/24/01 One more thing. They contain your browsing history at ALL times. Even after you have instructed Microsoft Internet Explorer to clear your history/cache. And so the saying goes, "seeing is believing..." To see for yourself simply do as you would normally do to clear your browsing history. Go to Internet Options under your Control Panel. Click on the [Clear History] and [Delete Files] buttons. (Make sure to include all offline content.) So, has your browsing history been cleared? One would think so... Skipping the to chase here. These are the names and locations of the "really hidden files:" c:\windows\history\history.ie5\index.dat c:\windows\tempor~1\content.ie5\index.dat If you have upgraded MSIE several times, they might have alternative names of mm256.dat and mm2048.dat, and may also be located here: c:\windows\tempor~1\ c:\windows\history\ Not to mention the other alternative locations under: c:\windows\profiles\%user%\... c:\windows\application data\... c:\windows\local settings\... c:\windows\temp\... c:\temp\... FYI, there are a couple other index.dat files that get hidden as well, but they are seemingly not very important. 3.0. HOW TO ERASE THE FILES ASAP Step by step information on how to erase these files as soon as possible. This section is recommended for the non-savvy. Further explanation can be found in Section 4.0. Please note that following these next steps will erase all your internet cache and cookies files. If you use the offline content feature with MSIE, it will remove this as well. It will not erase your bookmarks. 3.1. IF YOU HAVE EVER USED MICROSOFT INTERNET EXPLORER 1) Shut your computer down, and turn it back on. 2) While your computer is booting keep pressing the [F8] key until you are given an option screen. 3) Choose "Command Prompt Only." This will take you to real DOS mode. ME users must use a bootdisk to get into real DOS mode. 4) When your computer is done booting, you will have a C:\> followed by a blinking cursor. Type in this hitting enter after each line (sans parenthesis): C:\WINDOWS\SMARTDRV (Loads smartdrive to speed things up.) CD\ DELTREE/Y TEMP (This line removes temporary files.) CD WINDOWS DELTREE/Y COOKIES (This line removes cookies.) DELTREE/Y TEMP (This removes temporary files.) DELTREE/Y HISTORY (This line removes your browsing history.) DELTREE/Y TEMPOR~1 (This line removes your internet cache.) (If this last line doesn't work then type this:) CD\WINDOWS\APPLIC~1 DELTREE/Y TEMPOR~1 (If this doesn't work then type this:) CD\WINDOWS\LOCALS~1 DELTREE/Y TEMPOR~1 (If this still does not work, and you are sure you are using MSIE 5.x, then feel free to e-mail me. If you have profiles turned on, then it is likely located under \windows\profiles\%user%\, while older versions of MSIE keep them under \windows\content\.) This last one will take a ridiculous amount of time to process. The reason it takes so incredibly long is because there is a TON of useless cache stored on your HD. 5) Immediately stop using Microsoft Internet Explorer and go with any of the alternative browsers out there. Netscape 4.7x from netscape.net, mozilla from mozilla.org, or opera from opera.com. FYI, Windows re-creates the index.dat files automatically when you reboot your machine so don't be surprised when you see them again. They should at least be cleared of your browsing history. 3.2. CLEARING YOUR REGISTRY It was once believed that the registry is the central database of Windows that stores and maintains the OS configuration information. Well, this is wrong. Apparently it also maintains a bunch of other information that has absolutely nothing to do with the configuration. I won't get into the other stuff but for one, your Typed URLs are stored in the registry. HKEY_USERS/Default/Software/Microsoft/Internet Explorer/TypedURLs/ HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/TypedURLs/ These "Typed URLs" come from MSIE's autocomplete feature. It records all URLs that you've typed in manually in order to save you some time filling out the address field. By typing "ama" the autocomplete feature might bring up "amazon.com" for you. Although, I find it annoying, some people prefer this feature. One thing is for sure however -- it's an obvious privacy risk. You wouldn't want a guest to type "ama" and have it autocomplete to "amaturemudwrestlers.com" now would you? You can clear your Typed URLs out of your registry by doing going to your Control Panel > Internet Options > Content > [AutoComplete] > and finally [Clear Forms]. If you feel the AutoComplete feature is a privacy risk, then uncheck the appropriate boxes here. FYI, this section has nothing to do with "really hidden files." It was added so people can completely clear their browsing history before having to ditch Microsoft Internet Explorer. 3.3. SLACK FILES As you may already know, deleting files only deletes the references to them. They are in fact still sitting there on your HD and can still be recovered by a very motivated person. ˘ BCWipe is a nice program that will clear these files. (www.bcwipe.com). ˘ For you DOS buffs, there's a freeware file wiper on simtel.net that I use. (www.simtel.net/pub/dl/45631.shtml). ˘ If you are using PGP then there is a "Freespace Wipe" option under PGPtools. ˘ The newer versions of Norton Utilities has a nice filewiping utility. ˘ You might want to check out Evidence Eliminator's 30 day trial. This is probably the best program as far as your privacy goes. (www.evidence-eliminator.com) 3.4. KEEPING MICROSOFT'S PRODUCTS If your work environment forces you to use Microsoft Internet Explorer then I strongly recommend that you talk your boss into checking out one of these programs: ˘ PurgeIE (www.aandrc.com/purgeie) ˘ Cache and Cookie Cleaner for IE (www.webroot.com/washie.htm) ˘ Anonymizer Window Washer (www.anonymizer.com/anonwash) These programs automate the process for you, and is far better then having to ad 'deltree/y' lines to your autoexec. AND if your work environment forces you to use Outlook or Outlook Express then you should get in the habit of compacting your mailboxes. You can do this by going to File > Folder > Compact All if you have Outlook Express. or Tools > Options > Other tab > [Auto Archive] if you have Outlook. Make sure to set things up here. 4.0. STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES This next section is intended for the savvy user. The most important files to be paying attention to are your "index.dat" files. These are database files that reference your history, cache and cookies. The first thing you should know is that the index.dat files is that they don't exist in less you know they do. They second thing you should know about them is that some will *not* get cleared after deleting your history and cache. The result: A log of your browsing history hidden away on your computer after you thought you cleared it. To view these files, follow these steps: In MSIE 5.x, you can skip this first step by opening MSIE and going to Tools > Internet Options > [Settings] > [View Files]. Now write down the names of your alphanumeric folders on a piece of paper. If you can't see any alphanumeric folders then start with step 1 here: 1) First, drop to a DOS box and type this at prompt (in all lower-case) to bring up Windows Explorer under the correct directory... c:\windows\explorer /e,c:\windows\tempor~1\content.ie5\ You see all those alphanumeric names listed under "content.ie5?" (left-hand side.) That's Microsoft's idea of making this project as hard as possible. Actually, these are your alphanumeric folders that was created to keep your cache. Write these names down on a piece of paper. (They should look something like this: 6YQ2GSWF, QRM7KL3F, U7YHQKI4, 7YMZ516U, etc...) If you click on any of the alphanumeric folders then nothing will be displayed. Not because there aren't any files here, but because Windows Explorer has lied to you. If you want to view the contents of these alphanumeric folders you will have to do so in DOS. (Actually, this is not always true. *Sometimes* Windows Explorer will display the contents of the alphanumeric folders -- but mostly it won't. I can't explain this.) 2) Then you must restart in MS-DOS mode. (Start > Shutdown > Restart in MS-DOS mode. ME users use a bootdisk.) Note that you must restart to DOS because windows has locked down some of the files and they can only be accessed in real DOS mode. 3) Type this in at prompt: CD\WINDOWS\TEMPOR~1\CONTENT.IE5 CD %alphanumeric% (replace the "%alphanumeric%" with the first name that you just wrote down) DIR/P The cache files you are now looking at are directly responsible for the mysterious erosion of HD space you may have been noticing. One thing particularly interesting is the ability to view some your old e-mail if you happen to have a hotmail account. (Oddly, I've only been able to retreive hotmail e-mail, and not e-mail from my other web-based e-mail accounts. Send me your experiences with this.) To see them for yourself you must first copy them into another directory and THEN open them with your browser. Don't ask me why this works. A note about these files: These are your cache files that help speed up your internet browsing. It is quite normal to use this cache system, as every major browser does. On the other hand. It isn't normal for some cache files to be left behind after you have instructed your browser to erase it. 5) Type this in: CD\WINDOWS\TEMPOR~1\CONTENT.IE5 EDIT /75 INDEX.DAT You will be brought to a blue screen with a bunch of binary. 6) Press and hold the [Page Down] button until you start seeing lists of URLs. These are all the sites that you've ever visited as well as a brief description of each. You'll notice it records everything you've searched for in a search engine in plain text, in addition to the URL. 7) When you get done searching around you can go to File > Exit. If you don't have mouse support in DOS then use the [ALT] and [Arrow] keys. 8) Next you'll probably want to erase these files by typing this: C:\WINDOWS\SMARTDRV CD\WINDOWS DELTREE/Y TEMPOR~1 (replace "cd\windows" with the location of your TIF folder if different.) This will take a seriously long time to process. Even with smartdrive loaded. 9) Then check out the contents of your History folder by typing this: CD\WINDOWS\HISTORY\HISTORY.IE5 EDIT /75 INDEX.DAT You will be brought to a blue screen with more binary. 10) Press and hold the [Page Down] button until you start seeing lists of URLS again. This is another database of the sites you've visited. 11) And if you're still with me type this: CD\WINDOWS\HISTORY 12) If you see any mmXXXX.dat files here then check them out (and delete them.) Then... CD\WINDOWS\HISTORY\HISTORY.IE5 CD MSHIST~1 EDIT /75 INDEX.DAT More URLs from your internet history. Note, there are probably other mshist~x folders here so you can repeat these steps for every occurence if you please. 13) By now you'll probably want to type in this: CD\WINDOWS DELTREE/Y HISTORY 5.0. HOW MICROSOFT DOES IT How does Microsoft make these folders/files invisible to DOS? The only thing Microsoft had to do to make the folders/files invisible to a directory listing is to set them +s[ystem]. That's it. As soon as the dir/s command hits a system folder, it renders the command useless (unlike normal folders.) A more detailed explanation is given in Section 6. So how does Microsoft make these folders/files invisible to Windows Explorer? The "desktop.ini" is a standard text file that can be added to any folder to customize certain aspects of the folder's behavior. In these cases, Microsoft utilized the desktop.ini file to make these files invisible. Invisible to Windows Explorer and even to the "Find: Files or Folders" utility (so you wouldn't be able to perform searches in these folders!) All that Microsoft had to do was create a desktop.ini file with certain CLSID tags and the folders would disappear like magic. To show you exactly what's going on: Found in the c:\windows\temporary internet files\desktop.ini and the c:\windows\temporary internet files\content.ie5\desktop.ini contains this text: [.ShellClassInfo] UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933} Found in the c:\windows\history\desktop.ini and the c:\windows\history\history.ie5\desktop.ini contains this text: [.ShellClassInfo] UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933} CLSID={FF393560-C2A7-11CF-BFF4-444553540000} The UICLSID line cloaks the folder in Windows Explorer. The CLSID line disables the "Find" utility from searching through the folder. (Additionally, it gives a folder the appearance of the "History" folder.) To see for yourself, you can simply erase the desktop.ini files. You'll see that it will instantly give Windows Explorer proper viewing functionality again, and the "Find" utility proper searching capabilities again. Problem solved right? Actually, no. As it turns out, the desktop.ini files get reconstructed every single time you restart your computer. Nice one, Slick. Luckily there is a loophole which will keep Windows from hiding these folders. You can manually edit the desktop.ini's and remove everything except for the "[.ShellClassInfo]" line. This will trick windows into thinking they have still covered their tracks, and wininet won't think to reconstruct them. I can't stress how ridiculous it is that Windows actually makes sure the files are hidden on every single boot. No other files or folders get this kind of special treatment. So what's the agenda here? 6.0. +S MEANS [S]ECRET NOT [S]YSTEM Executing the "dir/a/s" command from root *should* be the correct command to display all files in all subdirectories in DOS. However, doing so will not display the index.dat files. This is because when DOS tries to get a list of the subdirectories of any +s[ystem] directory it hits a brick wall. No files or folders will be listed within any system directory. Not only does this defeat the whole purpose of the "/s" switch in the first place, but I'd say it looks like Microsoft took extra precautions to keep people from finding the files. Remember. The only thing you need to do to obscure a file in DOS is to mark the parent directory +s[ystem]. I was told by a few people that this was due to a very old DOS bug that dates back many years. Fine. I can accept that. A bug it is. But, would you consider your Temporary Internet Files to be "system files?" It would seem that your TIF folder appears to be marked +s[ystem] for no good reason at all. Just because. Same with your history folder. You may not agree, but I tend to think that Microsoft marked the folders as +s[ystem] solely to hide any directory recursal from DOS. In case you didn't understand, here's a small experiment that will show you what I mean... Since the content.ie5 and history.ie5 subfolders are both located within a +s[ystem] folder, we will run the experiment with them. The proper command to locate them *should* be this: CD\ DIR *.IE5 /as/s The problem is that you will receive a "No files found" error message. Since we already know there is a content.ie5 subfolder located here, why is it giving me the "no files found" message? But there is a way to get around this brick wall. That is, once you are inside the system directory, then it no longer has an effect on the dir listings. For example, if you enter the system folder first, and THEN try to find any +s[ystem] directories you can see them just fine: CD\WINDOWS\TEMPOR~1 DIR *.IE5 /as/s 1 folder(s) found. Now you will get a "1 folder(s) found." message. (But only after you knew the exact location.) In other words, if you didn't know the files existed then finding them would be almost impossible. And, by the way. To see the "bug" in progress... CD\ DIR *.IE5 /a/s It will echo "no files found." Now, just take away the system attributes from the parent directory... CD\WINDOWS ATTRIB -S TEMPOR~1 And retry the test... CD\ DIR *.IE5 /a/s It will echo "1 folder(s) found." 7.0. A LOOK AT OUTLOOK EXPRESS Would you think twice about what you said if you knew it was being recorded? E-mail correspondence leaves a permanent record of everything you've said -- even after you've told Outlook Express to erase it. You are given a false sense of security sense you've erased it twice, so surely it must be gone. The first time Outlook simply moves it to your "Deleted Items" folder. The second time you erase it Outlook simply "pretends" it is gone. The truth is your messages are still being retained in the database files on your HD. (As with your e-mail attachments.) For earlier versions of Outlook Express, they will be located in either of the following folder: c:\program files\internet mail and news\%user%\mail\*.mbx c:\windows\application data\microsoft\outlook\mail\*.mbx At this point you have two choices. a) Get in the habit of compacting your folders all the time. b) Backup, print-out, or import the data into another e-mail client such as Eudora and then delete the mbx files (and thus all your e-mail correspondence) by typing this: cd\progra~1\intern~1\%user%\mail deltree/y mail or cd\windows\applic~1\micros~1\outloo~1\ deltree/y mail *Typing in the above commands will kill all your e-mail correspondence. Do not follow those steps in less you have already exported your e-mail and address book! If you have a newer version of Outlook or Outlook Express the databases are located elsewhere. Look for .dbx and .pst file extensions. These databases are five times as creepy, and I strongly recommend you take at the files. Just from my outbox.dbx file I was able to view some of my old browsing history, bring up previously-visited websites in html format, and even read ancient e-mail from my Eudora client (read: EUDORA). Again, don't take my word for it. See for yourself and THEN tell me what you think Slick Willy is up to here. 8.0. THE TRUTH ABOUT FIND FAST Have you ever wondered what that "Find Fast" program was under your control panel? Here's a hint: It has absolutely nothing to do with the "Find" utility located under the [Start] menu. Just to clear up any confusion before going on, Oblivion adequately explains Find Fast here: "In any version of Word after 95, choose File Open and you'll get the Office App Open dialog. Instead of just a space for the file name, there are text boxes for file name, files of type, text or property & last modified. These are search criteria you can use to find one or more files. There is also an "Advanced" button that opens a dedicated search dialog with more options. When you use either of these dialogs to perform a search, that search process uses the indexes built by Find Fast." --Oblivion But what would you say if I told you that Find Fast was scanning every single file on your hard drive? Did you know that in Office 95, the Find Fast Indexer had an "exclusion list" comprised of .exe, .swp, .dll and other extensions, but the feature was eliminated? If you were a programmer would you program Find Fast to index every single file, or just the ones with Office extensions? FYI, If you have ever had problems with scandisk or defrag restarting due to disk writes, it is because Find Fast was indexing your hard drive in the background. It loads every time you start your computer up. Now here is a good example of the lengths Microsoft has gone through to keep people from finding out Find Fast is constantly scanning and indexing their hard drives. (Always good to have an alibi.) Here's a snippet taken from microsoft.com: "When you specify the type of documents to index in the Create Index dialog box, Find Fast includes the document types that are listed in the following table. Document type File name extension ------------- ------------------- MS Office and Web Documents All the Microsoft Excel, Microsoft PowerPoint, Microsoft Project, and Microsoft Word document types listed in this table. Microsoft Binder (.odb, .obt) and Microsoft Access (.mdb) files. Note that in .mdb files, only document properties are indexed. Word documents .doc (document), .dot (template), .ht* (Hypertext Markup Language document), .txt (text file), .rtf (Rich Text Format) files, Excel workbooks .xl* files PowerPoint .ppt (presentation), .pot (template), .pps (auto-running presentation) files Microsoft Project files .mpp, .mpw, .mpt, .mpx, .mpd files All files *.* files" Did you get that last part? "All files?" Find Fast indexes Office Documents, Web documents, Word Documents, Power Point files, Project files, and (oh I forgot) EVERY SINGLE other file on your computer. Actually, the good news is that this isn't necessarily true. In another statement Microsoft claims that if Find Fast deems the file "unreadable" then the file will not be included in the index. For example, your command.com probably wouldn't get indexed because it doesn't have a lot of plain text -- mostly binary. But, back to the bad news. Every single file that has legible text is going to be included in the Find Fast database. Do you understand the implication here? ALL TEXT SAVED TO YOUR HARD DRIVE IS INDEXED. The forensic capabilities are enormous, folks. Don't forget "all text" also means previously-visited webpages from your cache. See for yourself... 1) Open up a DOS window and type... 2) CD\ 3) DIR FF*.* /AH (This will bring up a list of the find fast databases.) 4) EDIT /75 %ff% (insert %ff% with any of the names that were listed.) Notice the incredible amount of disk accesses to your cache and history folders? Why do we need two indexes? 8.1. REMOVING THE FIND FAST PROGRAM You can remove Find Fast using your Office CD, but I recommend you do it manually... 1) Reboot your computer in MS-DOS Mode. 2) Delete the findfast.cpl file from c:\windows\system\. 3) Delete the shortcut (.lnk) under c:\windows\start menu\programs\startup\. 4) Delete the findfast.exe file from c:\progra~1\micros~1\office\. 5) Important to delete the find fast databases (c:\ff*.*). 6) You can also safely delete FFNT.exe, FFSetup.dll, FFService.dll, and FFast_bb.dll if you have them. Feel free to check out the ffastlog.txt (which is the Find Fast error log). It's a +h[idden] file under c:\windows\system\. 9. CONTACT INFO AND PGP BLOCKS This tutorial is being updated all the time. If you have any useful input, or if you see a mistake somewhere, then please e-mail me so I can compile it into future versions. You will be able to find the most recent version of this tutorial at fuckmicrosoft.com. I am not affiliated with the site. My e-mail address is located at the end of this note. Please let me know where you heard about this tutorial in your message. If you have something important to say to me, then please use encryption. My public key blocks are located below. Be suspicious if you send me an encrypted message but never get a reply. Thanks for reading, -- The Riddler theriddler@f... My 2.6.2 block is no longer valid because my secring was nuked. When I created another keyring with another version of PGP, it read my "SET PGPPATH=" line and copied a new ring over my old one. No backups were made. Moral of the story: Backup your keys. My PGP 2.6.3 Block: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3a Comment: Compatible with PGP 2.6.x mQCNAzvVzqgAAAEEANT+lnfVk79zr/eYkLHs+euTg/JBSQXmUWB5dMxv4Vvv4Xes CnaNrv5Udi3hfABKb1tq41N6kPJ/n/Qz/vSW52Z4wg+Q+ZGGoITIJ1p8bDOceb2Q EsMsY7kzCHqkBF0N53TuVt+ywhVncN+CqecVvhuQ4RXUOVUvru7gGcd76OVxAAUR tAt0aGUgcmlkZGxlcokAlQMFEDvVzqju4BnHe+jlcQEBC14EAM3Th47aEChB0GAf 5xGlLPQnrj6zyf5uovj12PEFnCOwcEhDDAuq4Ito7Keb22DqwlJDNChIM7xLx8bZ d9VaMpkirFzgvFmGu5eNGp18rR9EyIVY/tTdWlRcsUL/nw2XNXxw51tHE7M/O1fp Un4qIcG0CfAQ1QCUfqOwTWbFH/Wy =muLu -----END PGP PUBLIC KEY BLOCK----- My GPG 1.0.6 Block: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.6 (MingW32) mQGhBDu3TSERBACO0Fx9pjMULe6qLQwOgfvdnQconLOMyftZdp9+ZX6t29ebJ/Z5 qQOJ9ce9Xr6Lj4u+M9VDx1FK5ueoD45bUAy0HAvYDV/HEu2vCRimpbreDky/U88a XL59Pe8qwnmfUzYc/LnH86VCr4lPmpbz6/adXj44xE6EwkhFcq6BD4isCwCg8zZO Hk9+KEKOyPHIFWq7TUA/JdUD/jWtNrGZ0tfSAS0WDiBifsBr1HW7n2IMDFX1anqC DN0ToM5IFWGDkOh1NUvP0RvyrnNuBOP/oWxkPLR0nVvifETF0iG9o+kfitC9NmJn QP/iw4WhCoHRCc5wqnAAXQC9j8JdodQ8E5VnfnNGkttgWz7mNzBongrIoTdfVdtf o5NwA/d/lwMhGE0HNXnXOgRBcPjGD0LsR8pFoSP/HJ9Hu3zms2cbQqN2O/f99H2G s9mXR7uvicu9SbKoTwFkptLVbOQIhvBnw0fTlZGrUsaiw4vzt99PffTKq1FPIpQe K7HcnUK2+ZSVs5PxGiDckobJEjBssSw9Lg5RSNMy9H7s9jv3tAt0aGUgcmlkZGxl cohXBBMRAgAXBQI7t00iBQsHCgMEAxUDAgMWAgECF4AACgkQ/bqXDRMV1MxyMgCc CH2uO/f46JgQ0pspQxi7IBv0yNQAn11ebXHbZGuADwuBun1EnQCJb8VIuQINBDu3 UOAQCADKG2mf/FW3kuSAGoFmIMBm4l6m0O7denwUIpZP2jxeNTLmLW6ntGglHP++ wEQpHjKTJfXoSHZH0euuXVZ9hOVdf1+PuRNy0DzrDDiKX7fdQ6eSbw+heSWc0kOF AB1j3pcovG4K2+bK66039kQLIT3kNUZgh9DdMZjIFzBg90aQnaEm5LLMkv1FNVZP YehZm3RRIpLAX5vkJJbUA/VVh/FXDG5f21iAGDHgSdKsLW2JNDAWe6/rY0GV5dgx C0gsqBn1rxNNDyG+z6nFCQtohL/x5zdTzedLQBjIlao91mSWhBsyxiX8mjhvGO97 o6zVUG5KHBKGmvWMqlyOsGY9VSbDAAMGCADIaFAcE+ADY3ku9Fy0NIlJhbj578YY xpsE6KvZI1OqbHSoBnN06A3Mpxp4QRBXlr9eRRl+zMTQl1VcVWkahZYNapOqq6L3 wHBmf9psggCBxqQdI9n5zxnlkphb50J7G9UevB/IGzlW2fe7WMWjo2GegIvGHVWr qeZgyaNf/CyMtihAX3O86rpqakq//nJvQ9MPcp/Brr9KT2NxBlpBm6xWY35IL5FG dZ2hpHaO1TC6bdmWUPhvzmSVtD9f0AnnJEgVc03vBz7xJrc1IEa1DeRdfFNvkoch +mNjc+fBAIQrVMCQ33u+yP/DWSdThrhxz1tAGWV7SlwxVyg6JPRQJ+moiEYEGBEC AAYFAju3UOAACgkQ/bqXDRMV1MwVnACfaGrJRv2lgWHQbQWwv55t2cT+QWEAnA/n ckswjlC9aNcBkcFl7X1SX8JX =pFTK -----END PGP PUBLIC KEY BLOCK----- 9.1. RECOMMENDED READING http://www.theregister.co.uk/content/4/18002.html http://www.findarticles.com/m0CGN/3741/55695355/p1/article.jhtml http://www.mobtown.org/news/archive/msg00492.html http://194.159.40.109/05069801.htm http://www.yarbles.demon.co.uk/mssniff.html http://www.macintouch.com/o98security.html http://www.theregister.co.uk/content/archive/3079.html http://www.fsm.nl/ward/ http://slashdot.org http://www.peacefire.org http://stopcarnivore.org http://nomorefakenews.com http://grc.com/steve.htm#project-x 10. SPECIAL THANKS (and no thanks) This version I want to give special thanks to Concerned Boss, Oblivion, and the F-Prot virus scanner. I also want to take this time to show my dissatisfaction to the New Zealand Herald. Although partly flattering, it was more disgusting to see a newspaper try to take credit for my work. 11. REFERENCES http://support.microsoft.com/support/kb/articles/Q137/1/13.asp http://support.microsoft.com/support/kb/articles/Q136/3/86.asp http://support.microsoft.com/support/kb/articles/Q169/5/31.ASP http://support.microsoft.com/support/kb/articles/Q141/0/12.asp http://support.microsoft.com/support/kb/articles/Q205/2/89.ASP http://support.microsoft.com/support/kb/articles/Q166/3/02.ASP http://www.insecure.org/sploits/Internet.explorer.web.usage.logs.html http://www.parascope.com/cgi-bin/psforum.pl/topic=matrix&disc=514&mmark=all http://www.hackers.com/bulletin/ http://slashdot.org/articles/00/05/11/173257.shtml http://peacefire.org COPYRIGHT INFORMATION This article has been under the protection of copyright laws the moment it was fixed in a tangible form. In less otherwise agreed, this article may only be distributed as a whole and without modification. Thank you. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4740 From: Marty Kaiser Date: Wed Feb 6, 2002 9:55am Subject: Fw: History in the making Hi Gang HISTORY IN THE MAKING IMMEDIATELY download and save this file... then read it. http://www.martykaiser.com/fbi1~1.htm Marty [Non-text portions of this message have been removed] 4741 From: Steve Whitehead Date: Wed Feb 6, 2002 3:05pm Subject: Fw: Steve, The COMSEC C3I Story Received this on my e-mail tonight. I think the list discussed this device a while back. Steve Whitehead E-mail : sceptre@m... TSCM Services URL : http://www.tscm.co.za ----- Original Message ----- From: "COMSEC" To: Sent: Wednesday, February 06, 2002 6:48 PM Subject: Steve, The COMSEC C3I Story > INVENT A PRODUCT, Change a Industry, Shake up the World! > How the Hunted Became the Hunter > > The story HOW I invented and patented the COMSEC C3I TM > United States Patent #5,142,560, a telecommunications > security device that detects wiretapping, surveillance, > espionage previously undetectable. > > The Chicago Commodities Exchanges were the target of a US > Government undercover investigation during 1988-1989. I was > a Foreign Exchange Floor Trader at the Chicago Mercantile > Exchange during that time. I had a gut instinct that my > telephones were being wiretapped. I was right, you just > can't say enough about gut instinct. > > I have friends and acquaintances that are top tier criminal > defense attorneys. I went to these friends to ask what they > thought the likelihood was that my telephones could be > wiretapped. They pretty much all agreed that unless there > was millions of dollars involved, sensational newspaper > headlines and coverage or unless I was dealing with the > wrong people, the likelihood of my telephones being > wiretapped were extremely unlikely. > > The Attorney General of the United States came to > Chicago, IL 3 months later to announce the indictments of > 47 commodities traders for various offenses. The 2 year > undercover government investigation of the Chicago > commodities markets happened to include the trading pit I > traded in. > > Furthermore, the FBI had an undercover agent working in the > trading pit I traded in. There were millions of dollars > involved. On the day the Government decided to announce the > indictments there was a huge news media circus with > accompanied news headlines about the 47 indicted commodity > traders. > > The day the indictments were announced everything came > together. At this point I knew I was on to something. > I called the people who teach the government how to wiretap > and how to detect wiretapping. They all told me it was > impossible to detect these wiretaps because of the way they > are engineered. They told me these wiretaps are > "electronically isolated" to prevent detection. I was told > that "it wasn't possible to detect these wiretaps." > > Next, I went to the Chicago Library Patent Depository. > I read and researched all I could find on wiretapping. I > read all the patents on wiretapping equipment and > wiretapping detection equipment. I found what I thought was > the possible means to detect undetectable wiretapping and > started to construct a device to detect these wiretaps. > > Success > > I could now detect and confirm the governments > "undetectable" wiretapping/surveillance. The government was > not amused. At this point the government decided to flex > its muscle. The Government assigned a federal agent to an > electronic parts store where I bought components for the new > invention. > > For a period of 3 weeks I couldn't buy a newspaper without > a boy scout coming up to the counter to document how I > bought anything. I was wiretapped, followed, photographed > and now the government decided to set up physical > surveillance at a electronics part store where I purchased > parts for the prototype of the new invention. > > I was now ready to complete my Patent Application to be > filed with the Department of Commerce Commissioner of > Patents and Trademarks. I warned a Patent Attorney I was > working with at the time that there could be some blow back. > He assured me he had been through this before and that > there wasn't anything to be concerned about. > > During this period of around the clock physical surveillance > I went to the Patent Attorney's home unannounced. When I got > there he was leaving with my Patent Application in hand. > He didn't look well. He told me that "he had to go to a > meeting." The next day he returned my Patent Application, > and he told me he couldn't help me anymore and never charged > me for his work up to that time. > > There is much more to the story, how I determined there was > an undercover Government Agent, listening in on his > communications over a cordless telephone with a scanner, > running his work car's license plates through Illinois > Department of Motor Vehicles to find out his car was > registered to a Chicago Bear's Football player, etc. > > I completed my Patent Application in September 1990 and was > awarded Patent #5,142,560 in September 1992. > > On December 17,2001 FOX News reported that the US Government > has been wiretapped by Foreign Intelligence and others using > the US National Wiretapping System. There is currently a > on-going National Security investigation across the United > States concerning the US National Wiretapping System being > used against the United States by Foreign Intelligence and > others. > > "The problem: according to classified law enforcement > documents obtained by Fox News, the bad guys had the cops' > beepers, cell phones, even home phones under surveillance. > Some who did get caught admitted to having hundreds of > numbers and using them to avoid arrest. > > "This compromised law enforcement communications between > LAPD detectives and other assigned law enforcement officers > working various aspects of the case. The organization > discovered communications between organized crime > intelligence division detectives, the FBI and the Secret > Service." > > Shock spread from the DEA to the FBI in Washington, and then > the CIA. An investigation of the problem, according to law > enforcement documents, concluded, "The organization has > apparent extensive access to database systems to identify > pertinent personal and biographical information." > > When investigators tried to find out where the information > might have come from, they looked at Amdocs, a publicly > traded firm based in Israel. Amdocs generates billing data > for virtually every call in America, and they do credit > checks. The company denies any leaks, but investigators > still fear that the firm's data is getting into the wrong > hands. > > When investigators checked their own wiretapping system for > leaks, they grew concerned about potential vulnerabilities > in the computers that intercept, record and store the > wiretapped calls." [FOX News Carl Cameron Investigates] > > "The worst penetrations are believed to be in the State > Department. But others say the supposedly secure telephone > systems in the White House, Defense Department and Justice > Department may have been compromised as well. The problem > for FBI agents in the famed Division 5, however, isn't just > what they have uncovered, which is substantial, but what > they don't know yet." [Insight] > > Email me to request a collection of news reports about the > hottest Federal Government investigation in Washington, DC > today. A unbelievable look inside Government wiretapping > and how it will impact you. > > > The COMSEC C3I detects legal and illegal wiretapping > previously undetectable. Full background and product > reviews are available on our web site: > > > We are registered with the Department of Defense and the > General Services Agency Information Technology Service. > > To receive additional information and Special Offers for > Subscribers Only reply to this email with "Subscribe" in the > Subject Line. > > PRIVACY STATEMENT: We will not distribute your address to > anyone. Period. > > Reach me at the following address. > > > Mark J. Neer > President > Communications Security > Tel: 281.586.2034 > Fax: 281.754.4047 > Email: > Internet: > 4742 From: Marty Kaiser Date: Wed Feb 6, 2002 10:33am Subject: Fw: History in the making Hi Gang HISTORY IN THE MAKING IMMEDIATELY download and save this file... then read it. http://www.martykaiser.com/fbi1~1.htm Marty [Non-text portions of this message have been removed] 1 From: Bernard Tyers Date: Wed Feb 2, 2000 0:40pm Subject: TEST. NO BODY ----- rgrds, ...bernard.. [Bernard Tyers*btyers@s...*snet.wit.ie/bbt] "Men are from Macs, and women are from VMS" 2 From: James M. Atkinson, Comm-Eng Date: Wed Feb 2, 2000 5:23pm Subject: DTV Signals Mask Radiated Emissions DTV Signals Mask Radiated Emissions Digital TV broadcast signals add yet another ambient signal to the mix. [original author unknown] If you live in a major metropolitan area, then your local TV stations have already begun broadcasting in digital format. As of November, 100 DTV stations were on the air, and by 2006, all TV broadcasts in the US will be digital. While viewers may enjoy the digital television picture, EMI test engineers find DTV to be just one more aggravation that impedes their work. Both the VHF and UHF bands are within the range of microprocessor clocks, so EMI test engineers already account for local analog TV signals when they are performing radiated emissions testing in an open-area test site (OATS). The DTV broadcasts, which currently operate in the 470 MHz to 806 MHz UHF band, add yet another set of ambient signals to the electromagnetic spectrum. What makes DTV broadcast signals different from conventional TV? Plenty. Although both occupy a 6-MHz bandwidth, the analog TV signal has three distinct narrowband peaks-video subcarrier, color subcarrier, and audio subcarrier (from left to right). In contrast, the DTV spectrum is flat across the entire channel's bandwidth, so it masks more radiated EMI than do the narrow peaks of analog signals. So what can you do about radiated EMI measurements in the presence of ambient DTV broadcast signals? The obvious way around OATS testing in the presence of DTV signals is to leave the OATS-perform your testing in a semianechoic chamber. Unfortunately, few test labs have chambers large enough to perform EMI measurements at 10 m. For OATS measurements, you have a few options. First, you should find out if you have any DTV broadcasters in your area. In the US, you can check the Web sites of the FCC (www.fcc.gov/mmb/vsd/ files/dtvonair.html) or the National Association of Broadcasters (www.nab.org/ PressRel/Dtvstations.asp). I suggest you also check the local DTV broadcaster's Web site to see which programs are broadcast in DTV format and plan your tests around those programs. (Right now, many stations are broadcasting in digital format during evening prime time hours only, but that will gradually change as stations add more programs to their DTV schedules.) You can also check the FCC Web site (www.fcc.gov/oet/dtv/tvchfreq.html) for channel frequency allocations. For precompliance tests, you can detect EMI by narrowing the resolution bandwidth of your spectrum analyzer or EMI receiver to, say, 1 kHz. The narrow bandwidth will effectively reduce the wideband DTV signal within that bandwidth. You can't narrow the bandwidth for actual compliance tests, because FCC Part 151 and CISPR 22:19972 require you to set the resolution bandwidth of your receiver to 120 kHz, says Roland Gubisch, chief engineer for EMC and telecom at Intertek Testing Services (Boxborough, MA). Yet, by reducing the resolution bandwidth for precompliance testing, you can determine whether your product is likely to pass compliance tests. You can also try reducing the distance between your EUT and receiving antenna to boost EUT signals relative to the DTV background. Standards require testing at 3 m or 10 m for compliance tests, but you can-in limited cases-reduce the distance to 1 m or 2 m for precompliance testing of 3-m measurements. A scale factor of 1/d relates emission limits and distance, but you can't apply it at low frequencies (those less than 30 MHz) or for large EUTs (see FCC Part 15 section 15.31(f) for details). The same scale factor applies to CISPR 22 measurements referenced to 10 m, but you can use the scale factor for Class B equipment only (see clause 10.2.1 of CISPR 22:1997). If you do not have access to a semianechoic chamber and if the scaling of distance and bandwidth still does not yield the information you need, you do have another alternative: noise cancellation. This alternative requires two antennas, one near the EUT and another at a greater distance. The near-EUT antenna receives emissions at amplitudes high enough to detect them over the ambient signals. Then, you can measure the power of the emissions at the second antenna's distance and use the result to perform a calculation to cancel the ambient signals. FOOTNOTES 1. Title 47 of the Code of Federal Regulations, Chapter I, Subchapter A (General), Part 15, Radio Frequency Devices, Federal Communications Commission, Washington, DC, www.fcc.gov/oet/info/rules/. Test methods for Part 15 can be found in ANSI C63.4-1992, IEEE Methods of Measurement of Radio-Noise Emissions from Low-Voltage Electrical and Electronic Equipment in the Range of 9 kHz to 40 GHz, ANSI, New York, NY, www.ansi.org. 2. CISPR 22:1997 (EN55022:1998), Limits and methods of measurement of radio disturbance: characteristics of information technology equipment, CENELEC, Brussels, Belgium, www.cenelec.be. Also see CISPR 16-1:1993 (latest edition: 1999), Specification for radio disturbance and immunity measuring apparatus and methods - Part 1. Radio disturbance and immunity measuring apparatus. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 3 From: James M. Atkinson, Comm-Eng Date: Thu Feb 3, 2000 10:25pm Subject: The Transistor The Transistor The transistor was invented on Christmas Day, 1948, by Emily Gerund, a high school teacher of English from Boston, Massachusetts, who was serving a 20 years-to-life sentence in the state penitentiary for throwing her husband's coat under a speeding truck. The judge was rather severe with her because her husband was still in the coat at the time. The Governor of the state owned an electronics firm and so was able to provide surplus vacuum tubes to the prisoners so that they could decorate their Christmas trees. Now Emily had an extremely tiny tree, much too small for a string of SV6s or even for a single QL4. But she just happened to find some germanium crystals lying around. She stuck three wires in each one and used them to decorate her tree. She was quite surprised when after she completed the tree, it started picking up the Jack Benny Show. The Governor, upon learning about this and realizing its implications, immediately rushed to the prison and offered the English teacher a full pardon in exchange for the manufacturing rights to her invention. "Of course, Governor," she replied. ... "In this case, I'll be glad to let you end a sentence with a proposition." -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 4 From: James M. Atkinson, Comm-Eng Date: Fri Feb 4, 2000 11:20am Subject: Old NASA Joke [Humour] When NASA was preparing for the Apollo project, they did some astronaut training on a Navajo Indian reservation. One day, a Navajo elder and his son were herding sheep and came across the space crew. The old man, who spoke only Navajo, asked a question which his son translated. "What are these guys in the big suits doing?" A member of the crew said they were hired by the government as astronauts, practicing for their trip to the moon. The old man got all excited and asked if he could send a message to the moon with the astronauts. Recognizing a promotional opportunity for the spin-doctors, the NASA folks found a tape recorder. After the old man recorded his message, they asked the son to translate it. He refused. So the NASA reps brought the tape to the reservation where the rest of the tribe listened and laughed but they also refused to translate the elder's message to the moon. Finally, the NASA crew called in an official government Navajo translator from the CIA. He reported that the moon message said, "Watch out for these guys; they have come to steal your land." -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 5 From: Steve Uhrig Date: Mon Feb 7, 2000 7:17pm Subject: X Ray machine for sale Hello list, I have for sale two demo Clear View portable X ray machines from Security Defense Systems in NJ. These are the latest models and were used for sales demos only. They are essentially new and carry the full original manufacturer's warranty. These are designed for many security uses and are a primary tool for serious TSCM'ers, especially those who use NLJDs. You can X ray telephone handsets, desk and office artifacts, and similar. You also can X ray your own or someone else's limbs. Although not sold or suggested for that purpose, an X ray machine is the ultimate sweep gadget for impressing customers. Everyone has an OSCOR now. How many have an X ray? How do you inspect 40 telephone handsets on a large sweep? With the X ray, you can do them in fifteen seconds each, and nothing will hide. How else can you do them? See inside lamps, office equipment and other items capable of concealing electronic eavesdropping devices. Viewing area is 50mm (2 inches). Will accept objects to 175mm in size (just under seven inches). Weighs 6.6 pounds. Ships in padded aluminum briefcase. X ray intensity within BRH guidelines, but be responsible. These are the high resolution, high intensity models, in current manufacture. Power is internal rechargeable battery (new battery included) for 20 minutes on time, or external12 VDC or external 110/220 VAC for continuous operation anywhere in the world. Unit is suitable for lab or field use. Secondary applications are veterinary, sports (X ray suspected bone fractures right on the ballfield), EMT/ambulance, EOD to inspect suspect letters/parcels for explosives, narcotics/contraband, materials inspection/failure analysis, even X raying children's candy at Halloween. The factory new price is $7950, and they sell to qualified users only. My price is $5250 each, which is well below any price anyone will pay elsewhere. Best trade price is $6750. Stocking dealer is $6000. Two units available. Can take credit cards for payment. Units are at factory now for inspection and will be ready to ship next week. Warranty starts on receipt of unit. Remember, these are basically new units, not tired old used, "refurbished" or "overhauled" pieces with low resolution, low brightness and low penetration. The last time these were offered they sold in one day, and they were refurbished units. Holler if interested. Also see information on Minox "spy" cameras at http://www.swssec.com/minox.html Regards .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6 From: Date: Mon Feb 7, 2000 7:26pm Subject: Re: X Ray machine for sale In a message dated 2/7/00 7:52:55 PM Pacific Standard Time, Steve@s... writes: << These are the latest models and were used for sales demos only. They are essentially new and carry the full original manufacturer's warranty. >> these must be the Arpege model 7 From: William L. McCrory Date: Mon Feb 7, 2000 2:49pm Subject: Re: X Ray machine for sale The use of an x-ray machine (fluoroscope) is something that needs to be done carefully and responsibly. Both are the source of ionizing radiation that can have serious health side effects. The statement, "You also can X ray your own or someone else's limbs," is unprofessional and suggests that the writer has little familiarity with radiation safety. No one should routinely use a portable fluoroscope without first being put on a radiation health safety program that systematically monitors one's blood for the telltale signs of excessive gamma radiation exposure. Neither should anyone purchase a portable fluoroscope without understanding that good practice will require that it be examined at least annually by a qualified safety examiner. Because of the handling that portable equipment gets, the otherwise sealed seams will sometimes open up and expose the user to radiation. I am unfamiliar with the equipment mentioned in this message, however the implication is that the user may be looking back through leaded glass at the radiation source. There are other units on the market that do not require the user to stand in the path of the radiation source. They are safer choices. Image interpretation training is a close second behind radiation health safety in choosing to use a portable fluoroscope. A portable fluoroscope is a good diagnostic tool, however as anyone who has ever had a briefcase of electronic equipment pass through an airport fluoroscope without being thoroughly physically inspected can attest, the absence of recurring training makes them a much less effective tool. They are not magic wands. They cannot find bombs and they cannot find "bugs." They can only highlight objects which, to the well-trained observer, indicate that further close physical or instrumental examination is necessary. Before buying this or any other used fluoroscopic equipment, insist that it first be examined by a qualified inspector who will not only provide a written inspection report that certifies compliance with federal health standards, but he/she will also help guide you to a radiation safety program. 8 From: James M. Atkinson, Comm-Eng Date: Tue Feb 8, 2000 7:59am Subject: Helpful Tips To Make Life Simpler Martha Stewart's Helpful Tips To Make Life Simpler Old telephone books make ideal personal address books. Simply cross out the names and addresses of people you don't know. Fool other drivers into thinking you have an expensive car phone by holding an old TV or video remote control up to your ear and occasionally swerving across the road and jumping the curb. Lose weight quickly by eating raw pork and rancid tuna. I found that this enabled me to lose 12 pounds in only 2 days. Avoid parking tickets by leaving your windscreen wipers turned to fast wipe whenever you leave your car parked illegally. No time for a bath? Wrap yourself in masking tape and remove the dirt by simply peeling it off. Apply red nail polish to your nails before clipping them. The red nails will be much easier to spot on your bathroom carpet. (Unless you have a red carpet, in which case a contrasting polish should be selected.) If a person is choking on an ice cube, don't panic. Simply pour a jug of boiling water down their throat and presto! The blockage is almost instantly removed. Save on booze by drinking cold tea instead of whiskey. The following morning you can create the effects of hangover by drinking a thimble full of dish washing liquid and banging your head repeatedly on the wall. Give a man a fish and he will eat for a day. Teach a man to fish and he will sit in a boat drinking beer all day. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 9 From: Gordon Mitchell Date: Tue Feb 8, 2000 8:54am Subject: Re: X Ray machine for sale It's actually not that complicated. Because low energy (typically 50 KeV) systems present less risk than the ones used to inspect more dense items they can be adequately monitored by a ring/control combination that is cycled through a radiation health firm every few months. Drawing blood is necessary in atomic bomb facilities (and when clients fail to pay). Getting a machine inspected when it is purchased is a good idea but again not that complicated. Just take it to the licensing facility for your region. You likely will have to take it to them because these machines present such a small radiation risk that they will not come to you. Measurements on our C-arm x-ray machine indicate that if we work day and night in the sweep business (hope, hope...) that we might accumulate 10% of normal background radiation by using the fluoroscope. After using one for the last 5 years I can testify that they don't promote hair growth but certainly do help with inspections. How else can you check the memorabilia in the president's office for electronics without risking disaster or taking hours? Gordon Mitchell, PhD Future Focus, Inc Woodinville, WA Electronic eavesdropping detection & finding clues in computers (425) 489-0446 "William L. McCrory" wrote: > From: "William L. McCrory" > > The use of an x-ray machine (fluoroscope) is something that needs to be > done carefully and responsibly. Both are the source of ionizing > radiation that can have serious health side effects. The statement, > "You also can X ray your own or someone else's limbs," is unprofessional > and suggests that the writer has little familiarity with radiation > safety. > > No one should routinely use a portable fluoroscope without first being > put on a radiation health safety program that systematically monitors > one's blood for the telltale signs of excessive gamma radiation > exposure. Neither should anyone purchase a portable fluoroscope without > understanding that good practice will require that it be examined at > least annually by a qualified safety examiner. Because of the handling > that portable equipment gets, the otherwise sealed seams will sometimes > open up and expose the user to radiation. I am unfamiliar with the > equipment mentioned in this message, however the implication is that the > user may be looking back through leaded glass at the radiation source. > There are other units on the market that do not require the user to > stand in the path of the radiation source. They are safer choices. > > Image interpretation training is a close second behind radiation health > safety in choosing to use a portable fluoroscope. A portable > fluoroscope is a good diagnostic tool, however as anyone who has ever > had a briefcase of electronic equipment pass through an airport > fluoroscope without being thoroughly physically inspected can attest, > the absence of recurring training makes them a much less effective > tool. They are not magic wands. They cannot find bombs and they cannot > find "bugs." They can only highlight objects which, to the well-trained > observer, indicate that further close physical or instrumental > examination is necessary. > > Before buying this or any other used fluoroscopic equipment, insist that > it first be examined by a qualified inspector who will not only provide > a written inspection report that certifies compliance with federal > health standards, but he/she will also help guide you to a radiation > safety program. > > --------------------------- ONElist Sponsor ---------------------------- > > Shop for your Valentine at eGroups. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 10 From: James M. Atkinson, Comm-Eng Date: Tue Feb 8, 2000 10:09am Subject: Whiz Away As many of us have at one time or another worked in one of these...enjoy ----- An American tourist in Moscow found himself needing to take a leak very badly. After a long search he just couldn't find anyplace to relieve himself. So he just went down one of the side streets to take care of business. Before he could even get unzipped a Moscow police officer said, "Hey you, what are you doing?" "I gotta go, man," replied the tourist. "You can't go here. Look, follow me," the policeman offered. The police officer led him to a beautiful garden with lots of grass, pretty flowers, and manicured hedges. "Here," said the cop, "whiz away." The American shrugs, turns, unzips, and starts right on the flowers. "Ahhh. Whew. Thanks. This is very nice of you. Is this Russian courtesy?" asked the tourist. "No. This is the American Embassy." =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 11 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Teletrac & Other AVL Systems? I had a few questions regarding Teletrac and other vehicle tracking systems: The Teletrac transmitter may be set to fire off at a given rate, or "dormant" if the computer operator set it that way. Would removing vehicle power (battery leads) re-boot the Teletrac and cause it to transmit again- at least one transmission? I would also appreciate info on other vehicle tracking systems, such as whether remote or PC-controlled, concelability, transmitter repetition rate, band. Thanks (Please excuse the missing date... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles 12 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Receivers with Video Demodulators? Does Icom or anyone else have a new allmode/GC receiver with a video demodulator? I am looking for 0.010-2000 MHz or beyond and without gaps in coverage. Suggestions/Caveats appreciated. (Please excuse the missing date... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles 13 From: Trace Carpenter Date: Wed Feb 9, 2000 1:28pm Subject: Re: Teletrac & Other AVL Systems? Jay: The Teletrac unit is never programmed to "fire" at a given interval. The unit lies dormant in constant receive mode until it is queried by the system. When it receives a signal that says "where are you?" it replies with "here I am." The "preprogramming" you are referring to is actually done in the tracking computer. At preprogrammed intervals it will dial into the tracking system and query the unit to reply with it's location. Pulling the battery and reconnecting will not cause it to send a locate. Additionally, many private investigators place the units on vehicles with their own battery packs. Jay Coote wrote: > From: "Jay Coote" > > I had a few questions regarding Teletrac and other vehicle tracking systems: > > The Teletrac transmitter may be set to fire off at a given rate, or "dormant" if > the computer operator set it that way. Would removing vehicle power (battery leads) re-boot the Teletrac and cause it to transmit again- at least one transmission? > > I would also appreciate info on other vehicle tracking systems, such as whether remote or PC-controlled, concelability, transmitter repetition rate, band. > > Thanks > (Please excuse the missing date... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > --------------------------- ONElist Sponsor ---------------------------- > > $10 Savings on Pet Valentine Gifts. > Looking for that pet-perfect Valentineís Day gift? > Click here for $10 off purchases of $25 or more. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 14 From: Steve Uhrig Date: Tue Feb 8, 2000 2:02pm Subject: Re: X Ray machine for sale Once upon a midnight dreary, William L. McCrory pondered, weak and weary: > The statement, "You also can X ray your own or someone else's > limbs," is unprofessional and suggests that the writer has little > familiarity with radiation safety. The statement, essentially, is directly from the manufacturer's literature. One *primary* application advertised for the device is realtime use in sports, to X ray a player directly on the ball field. The EMT profession is a major consumer of this precise model machine. > No one should routinely use a portable fluoroscope In TSCM one might use it a grand total of 60 minutes a year, in 15 second increments. > They are not magic wands. They cannot find bombs and they > cannot find "bugs." They can only highlight objects which, to > the well-trained observer, indicate that further close > physical or instrumental examination is necessary. Don't we all say this to each other about every piece of sweep equipment, with my soapbox showing quite a bit more wear than most? > Before buying this or any other used fluoroscopic equipment, > insist that it first be examined by a qualified inspector I *said* the things were at the factory for checkout and would not ship until blessed by them. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 15 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Re: Teletrac & Other AVL Systems? Trace; Thanks for the help. I've had some Teletrac dealing, but could not remember if the unit could fire on the battery power being rebooted. It was, after all, 4 years ago ;-) The teletracs then used a flat "pyramid" antenna and a rectangular metal box which could be removed from a larger plastic box for ease of concealment.. Yep, all shapes and sizes of homemade D battery packs.... Jay ---------- > From: Trace Carpenter > > Jay: > > The Teletrac unit is never programmed to "fire" at a given interval. The unit > lies dormant in constant receive mode until it is queried by the system. When > it > receives a signal that says "where are you?" it replies with "here I am." > The "preprogramming" you are referring to is actually done in the tracking > computer. At > preprogrammed intervals it will dial into the tracking system and query the > unit to reply with it's location. Pulling the battery and reconnecting will > not cause it to > send a locate. Additionally, many private investigators place the units on > vehicles with their own battery packs. > > Jay Coote wrote: > > > From: "Jay Coote" > > > > I had a few questions regarding Teletrac and other vehicle tracking systems: > > > > The Teletrac transmitter may be set to fire off at a given rate, or > "dormant" if > > the computer operator set it that way. Would removing vehicle power > (battery leads) re-boot the Teletrac and cause it to transmit again- at least > one transmission? > > > > I would also appreciate info on other vehicle tracking systems, such as > whether remote or PC-controlled, concelability, transmitter repetition rate, > band. > > > > Thanks > > (Please excuse the missing date... it is a Micro$oft problem and will > > be resolved when I get a real computer and a real browser) > > > > Jay Coote, W6CJ > > Licensed Private Investigator -TSCM specialist > > Los Angeles > > > > --------------------------- ONElist Sponsor ---------------------------- > > > > $10 Savings on Pet Valentine Gifts. > > Looking for that pet-perfect Valentineís Day gift? > > Click here for $10 off purchases of $25 or more. > > Click Here > > > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > *Trace Carpenter > *2926 Maple Ave., Ste. 200 > *Dallas, Texas 75201 > *214.828.4520; 214.740-0112 Facsimile > *Because the fly on the wall might not be the only bug in the room.ô > > > > --------------------------- ONElist Sponsor ---------------------------- > > Free Valentineís Day Delivery from Petopia.com. > Looking for that pet-perfect Valentineís Day gift? > Click here for free delivery with purchases of $25 or more. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 16 From: Hoffman Date: Sat Feb 12, 2000 11:09am Subject: Book Review - Glenn Whidden I like to write amateur book reviews and I thought that I might share several of my book reviews with this TSCM-L mailing list. You see alot of books on countermeasures, and you wonder if it is worth ponying up large sums of cash for a book of questionable content. Some of Mr. Whiddens publications are a perfect example of overpriced books. In his defense though, I will say that Whidden is one of the best educational writers I have ever seen out of the thousands of books in my personal library. In his publication, "The Ear" (grossly overpriced), he has the amazing ability to take a moderately complex topic (to a laymen) and write it so that anyone can understand it. Anyway.. I'll post some of my reviews at random within the next week. ------------------------------------- A GUIDEBOOK FOR THE BEGINNING SWEEPER ------------------------------------- A Guidebook for the Beginning Sweeper is an extremely useful and insightful book written by Glenn H. Whidden and published by his company Technical Services Agency (TSA). This 219 page manual represents just one of the many fine publications authored by Whidden. Other titles include, The Axnan Attack, The Russian Evasdropping Threat, The Ear, and the TSCM Threat Book series (volume I and II). Of the many books I have read and reviewed which deal with the topic of electronic countermeasure services, I conclude this book to be the most usefull from the business standpoint. This book is low on "fluff" and high on technical content. Although, it is likely not the most interesting book you will read, it acts as indespensable reference for anyone interested in the business aspects of security. The book opens with a brief and 'to the point' chapter written for individuals who have pondered the possibilities of offering countersurveillance services. Whidden then offers a brief explanation of the many elements of an eavesdroppping defense; explaining that an effective sweeper should have a proper mindset and should follow ceartain rules of the game in order to be effective in plying ones trade. These aforementioned rules, which Whidden dubs- "The Moscow Rules", comprise an entire chapter of the book. The remainder of the book is dedicated to the business and procedural aspects of countermeasures and security. Although this book does not directly contain information on the technical details of countermeasures (ie: what equipment to use for a "sweep" and how to implement such devices), it does deal thoroughly (yet simplisticly) with the most common eavesdropping threats and outlines common vulnerabilities. Mr Whidden then proceeds to walk the reader step-by-step through the process of performing countermeasures services. Topics covered include; initial client contact, what to say and what not to say. The necessity of using photography when planning sweeps. Different methods to calculate costs for your TSCM services. What to do if you find a clandestine device (both legal and moral issues may arise). A fairly extensive glossary of terms also serves to form the basis of a well-rounded book. Perhaps the most usefull aspect of the book are the extensive (approximately 90 pages) checklists, and sample reports which the security technician can utilize to fulfill his duties of properly informing the client of the thoroughness of the search. The sample reports alone are worth the price of the book. I conclude this review by saying that this is a "must read" book that should be on the reference shelf of anyone who is interested in the field of security. This book is not just for countermeasure technicians but rather is equally usefull for anyone in an administrative capacity. Price: $36 * TSA * 10903 Indian Head Highway, Suite 304 * Ft Washington, MD 20744-4018 * USA * PHONE 1.301.292.6430 17 From: Hoffman Date: Sat Feb 12, 2000 11:17am Subject: Book Review - Udovich, Taylor TELEPHONE EAVESDROPPING AND DETECTION ------------------------------------- ($189.00 plus $10.00 domestic shipping; direct order from publisher.) Telephone Eavesdropping and Detection is the premiere reference manual on the subject of telephone wiretap detection. There simply has never been a more comprehensive and well written book written on the subject. It is published by Taylor Hill, and written by Richard J. Udovich and Charles L. Taylor who are men of well respected credentials. The textbook was published in 1990, so most of the information is current and applicable. The opening credits give the reader an indication of just how well planned this books was, as it lists some of the most well known professionals in various fields ranging from telecommications experts from AT&T, and Bell Research, to well known surveillance and security industry experts. This textbook is formatted in a fairly intuitive manner designed as a teaching aid, and all topics and subtopics are clearly labled to help the student learn and take notes. Although personally, I felt that many chapters were clearly out of order; but a slight nitpick. The best way to review this book is to let the contents speak for themselves. Here is a greatly simplified sample of the topics which are dealt with in this 500+ page manual. The book has 4 main chapters divided into 25 subsections. A useful appendix and glossary is also included. In addition, an evaluation test at the end of each section serves to to verify that the reader understands the contents. -------------- Chapter 1 - Introduction to Basic Electronics Basic Physics Basic Electrical Theory Basic Circuits Electronic Components Sound and Microphones Chapter 2- The Telephone System, Basic Design and Operation Telephone Exchange and Cable Distribution System (Outside Plant) Building Telephone Cable Distribution (Customer Premise) Electro-Mechanical Key Systems Electronic Key Systems (EKSU) Private Branch Exchanges (PBX) Chapter 3- Telephone Wiretaps and Detection Telephone Taps- Operation and Electrical Characteristics Common Wiretap Methods Telephone Wiretap Detection Equipment Wiretap Detection Procedures For A Residence Wiretap Detection Procedures For Outside Plant Cables Wiretap Detection Procedures For Electro-Mechanical Key Systems Wiretap Detection Procedures For Electronic Key Systems Wiretap Detection Procedures For PABX Systems With EKSU Chapter 4- Telephone Instruments and Hookswitch Bypass The 500 Telephone Instrument- Operation, Construction, & Circuit Analysis Hookswitch Bypasses and Electro-Mechanical Telephone Instruments Electronic Telephone Systems- Hookswitch Bypass Analysis Hookswitch Bypass Detection Procedures And Equipment Appendices- Common Audio Pair Conductor Resistance in Loop Ohms Interpreting The Resistor Color Code Summary of Important Terms Line Balance Test Schematics Symbols Feeder And Distribution Service Areas Outside Plant Facilities Test Locations For A Typical Key System Test Locations For A Typical Neighborhood Manufacturers and Distributors Evaulation Test Answers (for all 25 sections) Glossary Index -------------- Telephone Eavesdropping and Detection will be particularly useful to the reader who is looking for a "hands-on" type of books. Within the textbook, there are literally hundreds of diagrams which help to illustrate the lessons in the text. In addition, the manual demonstrates pictorially where the phone taps, and the electronic test equipment (voltmeters, time domain reflectometers, line tracers, TSCM amplifiers etc..) are to be placed, as well as step-by-step instructions on how to perform various tests to detect the myriad of wiretapping threats. I was somewhat dissapointed that the book did not delve more deeply into explaining the intracacies of the telephone system; particularly with respect the the complexities of PBX and electronic telephone systems which are found in most office buildings. However, as the author stated at the beginning of the book, that simply would not be possible, because it's just too much data for one book. So if you want to sink your money into this book, might I also suggest you purchase a few supplemental books on telephone systems (ABC Teletraining has the absolute best series of telephone training books published), or you might want to get some books on basic electronics as well (depending wherein your knowledge is lacking). In closing, I feel the need to mention the price of this book. Indeed it is excessively expensive, as are many books of an esoteric nature which were written specifically for professionals. However, if you are either a professional in the field of surveillance countermeasures, telephone security, or a corporate information security and intellectual property rights practitioner, or even a curious and dedicated hobbyist, this book is worth every penny. There are literally hundreds of books written on countermeasures, as well as several books specifically dealing with wiretap detection. Why buy all those other books, when you can simply purchase this one book which has what all the other books have combined (almost, anyway)? Taylor Hill Publishing P.O. Box 1815 Bay City, Texas 77404 USA (Phone) 1.409.224.4920 http://www.bugsweep.com (authors corporate web site) http://www.bugsweep.com/book.html (information on this book) NOTE: The authors at the web site listed above do not directly sell the book. It must be ordered either from the publisher, or you can go to your local major bookstore and have them order it (with an added mark-up, of course). ISBN#: 0-9625466-0-7 18 From: Kevin D. Murray Date: Fri Feb 18, 2000 5:24pm Subject: Re: Book Review - Glenn Whidden As a regular reader of the list, and a full-time practitioner in this field, I would like to comment on the book reviews posted today. First... Anyone who has written a book review appreciates the time and effort it takes to do it. To whoever posted these unsigned pieces, your efforts are acknowledged. The following is not meant to discourage you. They reflect what I would like to see in future pieces, and some critical personal opinion... Ô Consider attaching the customary "about the author" paragraph to your future book reviews. Without this, readers do not know how much credibility to give to your writings. (For all anyone knows, a writer's expertise could be in a totally unrelated field, like running.) Ô On your comment... "You see alot of books on countermeasures, and you wonder if it is worth ponying up large sums of cash for a book of questionable content. Some of Mr. Whiddens publications are a perfect example of overpriced books. In his defense though... " Mr. Whidden does not need you (or any of us) to defend him. He is probably the best known, and most respected expert in our field. His credo could be "If anyone speaks ill of you, let your life be such that no one will believe him." In his case, it works. (Just an aside... You should be aware that people who know him would be pleased to wear your anal sphincter for a pinkie ring over those comments.) I have purchased, read (and re-read) _all_ of his books and publications. I can say - without reservation - all of them are well worth every penny spent, several times over. Glenn Whidden has a lifetime of experience and knowledge which he is sharing at nominal cost. Let's put this into perspective. Total the cost of all his writings. Could you hire an ex-CIA technical specialist (with patents to his credit) to consult with you for two hours? Not at that price. Even if you paid more... Could you ask all the right questions, invent a business model, and take notes fast enough to walk away with the knowledge in his written works? Of course not. Ô Please spell check before you post your book reviews. Ô May I suggest you review some other publications to add balance, perspective and depth to your review of The Guidebook for the Beginning Sweeper. How about doing a side by side comparison with... A Countermeasures Cookbook on Conducting Professional TSCM Services: The Ultimate Guide to Testing and Checking for Bugs and Illegal Wiretaps, by Ralph Thomas? (For list readers who can't wait... an excellent review of this book appears in the January issue of Security Management magazine (page 140). (Note: It is the review that I am calling excellent, not the book being reviewed.)) Ô When commenting on book costs, why not show a comparison to... something. Peruse the catalogues of the major security / technical / legal book publishers for guidance. (Butterworth, Clark Boardman, West, CRC, Elsevier, Wiley, Prentice Hall, Addison Wesley Longman, McGraw-Hill, etc.) This will give your readers a concrete basis for comparison. It may also inspire you reevaluate the sophomoric comment, "Some of Mr. Whiddens publications are a perfect example of overpriced books." Thank you for considering these requests, and my personal opinions. Kevin Kevin D. Murray CPP, CFE, CCO, BCFE Murray Associates Counterespionage Consultants to Business & Government Eavesdropping Detection Specialists www.spybusters.com 19 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: 4, 6, 8-conductor phone breakout box ? Thanks for reading. I'd like to build a small breakout box with several rotary switches which would allow me to to the following: *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor wall jack. *Select any wire combinations for TDR, DVM, receiver-analyzer or audio amp. *Switch or reverse combinations for balance, resistance and capacitance tests. I don't want to shell out a zillion dollars- Can someone give me a table of pinouts for female RJ 8-conductor connectors as they correspond to the wiring color code? I may want this black box to have through connections, and it must handle connection to 4, 6 and 8-wire phones. Has anyone already built one of these who would care to discuss or share a schematic? (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles 20 From: Charles Patterson Date: Wed Feb 16, 2000 9:20pm Subject: Re: 4, 6, 8-conductor phone breakout box ? Hi Jay, I just returned from ye ol' Radio Shack with a new box to transfer my breakout box into. (My old box was built in a hurry, and it shows a bit too much wear). There are many different wiring schemes, particularly for the 8 conductor jacks but you shouldn't have to worry about that too much since you will need to check all pairs anyway. The middle two conductors are almost always the main pair, at least in a single line phone, the next outer pair could be a second line. In the case of an electronic pbx or key system, the middle pair often carries the analog audio and the outer pair carries the power and signaling. If it is a fully digital system, only one pair is needed for everything. Some use the middle pair (Toshiba, Panasonic DBS) while some use the second pair (Panasonic KXTD) and can still use the middle pair for an analog signal. The third pair (spreading out from the middle) was often used in some system to allow for "off hook call anounce". This was to allow paging through the speaker of a phone while the phone is still in use. Some phones will have that third pair wired right to the speaker in the phone set, perfect to use for listening in. To see the usually coloring try: http://www.ablecomm.com/learnpg.htm When wiring a jack the middle pair is usually numbered 4 and 5, second pair is 6,3. It would be good to at least note these positions as starting points on the rotary switches. In my new box I will have two banana type binding posts wired to the center contact of the rotary switches (one to each switch). I will also wire a mini jack in parallel with the banana posts for easy connection to my amplifier. Then take eight positions of each switch and wire each of them in parallel to the eight positions of an 8c jack. Now you will have each switch able to connect one output banana post to every contact of the jack. Note that this way there will also be a short across the output posts if the two switches are set at the same setting- don't let it fool you if you're spinning the knobs doing a resistance check. On the jack side, I plan to have two 8c jacks wired in parallel and keep a mod jumper cable handy. this way I can use it as a feed through and run the phone set live while testing. I may add a handset size jack just for convenience. 4 conductor line plugs will usually fit fine in an 8c jacks but handset plugs tend to wobble too much. You can use two R/S 275-1385 rotary switches to give you twelve switching positions, you only need 8 positions, I'm still trying to figure out something fun to do with the other 4 positions (my balanced line tester is in a separate box, it was a bit more complicated). I hope this makes sense charles Charles Patterson communications@c... Global Communications Tarrytown, NY http://www.telephonesecurity.com ----- Original Message ----- From: Jay Coote To: Sent: Wednesday, February 16, 2000 8:36 PM Subject: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > From: "Jay Coote" > > Thanks for reading. > > I'd like to build a small breakout box with several rotary switches which would allow me to to the following: > *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor wall jack. > *Select any wire combinations for TDR, DVM, receiver-analyzer or audio amp. > *Switch or reverse combinations for balance, resistance and capacitance tests. > > I don't want to shell out a zillion dollars- Can someone give me a table of > pinouts for female RJ 8-conductor connectors as they correspond to the > wiring color code? I may want this black box to have through connections, > and it must handle connection to 4, 6 and 8-wire phones. > > Has anyone already built one of these who would care to discuss or share a schematic? > > (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > Points, no hidden fees, and much more. Get NextCard today and get the > credit you deserve. Apply now. Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 21 From: Charles Patterson Date: Wed Feb 16, 2000 9:29pm Subject: phone wire color codes The better reference page for color codes is actually: http://www.ablecomm.com/colorcodes.htm scroll down to the modular jacks cp ----- Original Message ----- From: Jay Coote To: Sent: Wednesday, February 16, 2000 8:36 PM Subject: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > From: "Jay Coote" > > Thanks for reading. > > I'd like to build a small breakout box with several rotary switches which would allow me to to the following: > *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor wall jack. > *Select any wire combinations for TDR, DVM, receiver-analyzer or audio amp. > *Switch or reverse combinations for balance, resistance and capacitance tests. > > I don't want to shell out a zillion dollars- Can someone give me a table of > pinouts for female RJ 8-conductor connectors as they correspond to the > wiring color code? I may want this black box to have through connections, > and it must handle connection to 4, 6 and 8-wire phones. > > Has anyone already built one of these who would care to discuss or share a schematic? > > (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > Points, no hidden fees, and much more. Get NextCard today and get the > credit you deserve. Apply now. Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 22 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Re: Book Review - Udovich, Taylor (Original book review below) I am in the middle of this book, and I also highly recommend it. A good TSCM-ist never stops being a student and this book is good for newcomer as well as the veteran. Just a small critique; if this book needs anything more it might be some organization of the sweep procedures described- arranged in the order that the procedures would be performed in a residence or business. (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles ---------- > From: "Hoffman" > > TELEPHONE EAVESDROPPING AND DETECTION > ------------------------------------- > > ($189.00 plus $10.00 domestic shipping; direct order from publisher.) > > Telephone Eavesdropping and Detection is the premiere reference manual > on the subject of telephone wiretap detection. There simply has never been > a more comprehensive and well written book written on the subject. It is > published by Taylor Hill, and written by Richard J. Udovich and Charles L. > Taylor who are men of well respected credentials. The textbook was > published in 1990, so most of the information is current and applicable. > > The opening credits give the reader an indication of just how well > planned this books was, as it lists some of the most well known > professionals in various fields ranging from telecommications experts from > AT&T, and Bell Research, to well known surveillance and security industry > experts. > > This textbook is formatted in a fairly intuitive manner designed > as a teaching aid, and all topics and subtopics are clearly labled > to help the student learn and take notes. Although personally, I felt > that many chapters were clearly out of order; but a slight nitpick. > > The best way to review this book is to let the contents speak > for themselves. Here is a greatly simplified sample of the topics > which are dealt with in this 500+ page manual. The book has 4 main > chapters divided into 25 subsections. A useful appendix and glossary > is also included. In addition, an evaluation test at the end of each > section serves to to verify that the reader understands the contents. > > -------------- > > Chapter 1 - Introduction to Basic Electronics > Basic Physics > Basic Electrical Theory > Basic Circuits > Electronic Components > Sound and Microphones > > > Chapter 2- The Telephone System, Basic Design and Operation > Telephone Exchange and Cable Distribution System (Outside Plant) > Building Telephone Cable Distribution (Customer Premise) > Electro-Mechanical Key Systems > Electronic Key Systems (EKSU) > Private Branch Exchanges (PBX) > > > Chapter 3- Telephone Wiretaps and Detection > Telephone Taps- Operation and Electrical Characteristics > Common Wiretap Methods > Telephone Wiretap Detection Equipment > Wiretap Detection Procedures For A Residence > Wiretap Detection Procedures For Outside Plant Cables > Wiretap Detection Procedures For Electro-Mechanical Key Systems > Wiretap Detection Procedures For Electronic Key Systems > Wiretap Detection Procedures For PABX Systems With EKSU > > > Chapter 4- Telephone Instruments and Hookswitch Bypass > The 500 Telephone Instrument- Operation, Construction, & Circuit > Analysis > Hookswitch Bypasses and Electro-Mechanical Telephone Instruments > Electronic Telephone Systems- Hookswitch Bypass Analysis > Hookswitch Bypass Detection Procedures And Equipment > > > Appendices- > Common Audio Pair > Conductor Resistance in Loop Ohms > Interpreting The Resistor Color Code > Summary of Important Terms > Line Balance Test > Schematics Symbols > Feeder And Distribution Service Areas > Outside Plant Facilities > Test Locations For A Typical Key System > Test Locations For A Typical Neighborhood > Manufacturers and Distributors > > > Evaulation Test Answers (for all 25 sections) > Glossary > Index > > -------------- > > Telephone Eavesdropping and Detection will be particularly useful > to the reader who is looking for a "hands-on" type of books. Within > the textbook, there are literally hundreds of diagrams which help > to illustrate the lessons in the text. In addition, the manual > demonstrates pictorially where the phone taps, and the electronic > test equipment (voltmeters, time domain reflectometers, line tracers, > TSCM amplifiers etc..) are to be placed, as well as step-by-step > instructions on how to perform various tests to detect the myriad > of wiretapping threats. > > I was somewhat dissapointed that the book did not delve more > deeply into explaining the intracacies of the telephone system; > particularly with respect the the complexities of PBX and electronic > telephone systems which are found in most office buildings. However, > as the author stated at the beginning of the book, that simply would > not be possible, because it's just too much data for one book. > So if you want to sink your money into this book, might I also suggest > you purchase a few supplemental books on telephone systems > (ABC Teletraining has the absolute best series of telephone training > books published), or you might want to get some books on basic > electronics as well (depending wherein your knowledge is lacking). > > In closing, I feel the need to mention the price of this book. > Indeed it is excessively expensive, as are many books of an esoteric > nature which were written specifically for professionals. However, > if you are either a professional in the field of surveillance > countermeasures, telephone security, or a corporate information > security and intellectual property rights practitioner, or even > a curious and dedicated hobbyist, this book is worth every penny. > There are literally hundreds of books written on countermeasures, > as well as several books specifically dealing with wiretap > detection. Why buy all those other books, when you can simply > purchase this one book which has what all the other books have > combined (almost, anyway)? > > > Taylor Hill Publishing > P.O. Box 1815 > Bay City, Texas 77404 > USA > (Phone) 1.409.224.4920 > > > http://www.bugsweep.com (authors corporate web site) > http://www.bugsweep.com/book.html (information on this book) > > NOTE: The authors at the web site listed above do not directly > sell the book. It must be ordered either from the publisher, or > you can go to your local major bookstore and have them order it > (with an added mark-up, of course). > ISBN#: 0-9625466-0-7 > > > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > Points, no hidden fees, and much more! Get NextCard today and get the > credit you deserve! Apply now! Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 23 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Re: 4, 6, 8-conductor phone breakout box ? Charles, Thanks for the information. I began on this box about 1 year ago and had a lot of projects in the meantime- a 911 commcenter for my "other" fulltime job, and so on. Now there's more time to organize my TSCM tools. Good! I was concerned about the use of female 8C jacks on my box; more accurately that something may get reversed or fouled up in the through connection, should I connect some types of phones through the box while testing. I'll just have to watch those shorts so I won't have to leave the job site at 01:30 in the attempt to buy a fuse for the phone system ;-) I hope I may pick your brain on this box project and on what you did to speed up balance tests with your box..... One TSCM book suggested a pair of matched 2700 ohm resistors for the balance test. Thanks, (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles ---------- > From: "Charles Patterson" > > Hi Jay, > > I just returned from ye ol' Radio Shack with a new box to transfer my > breakout box into. > (My old box was built in a hurry, and it shows a bit too much wear). > > There are many different wiring schemes, particularly for the 8 conductor > jacks but you shouldn't have to worry about that too much since you will > need to check all pairs anyway. > The middle two conductors are almost always the main pair, at least in a > single line phone, the next outer pair could be a second line. In the case > of an electronic pbx or key system, the middle pair often carries the analog > audio and the outer pair carries the power and signaling. If it is a fully > digital system, only one pair is needed for everything. Some use the middle > pair (Toshiba, Panasonic DBS) while some use the second pair (Panasonic > KXTD) and can still use the middle pair for an analog signal. > > The third pair (spreading out from the middle) was often used in some system > to allow for "off hook call anounce". This was to allow paging through the > speaker of a phone while the phone is still in use. Some phones will have > that third pair wired right to the speaker in the phone set, perfect to use > for listening in. > > To see the usually coloring try: http://www.ablecomm.com/learnpg.htm > > When wiring a jack the middle pair is usually numbered 4 and 5, second pair > is 6,3. It would be good to at least note these positions as starting > points on the rotary switches. > > In my new box I will have two banana type binding posts wired to the center > contact of the rotary switches (one to each switch). I will also wire a mini > jack in parallel with the banana posts for easy connection to my amplifier. > > Then take eight positions of each switch and wire each of them in parallel > to the eight positions of an 8c jack. Now you will have each switch able to > connect one output banana post to every contact of the jack. Note that this > way there will also be a short across the output posts if the two switches > are set at the same setting- don't let it fool you if you're spinning the > knobs doing a resistance check. > > On the jack side, I plan to have two 8c jacks wired in parallel and keep a > mod jumper cable handy. this way I can use it as a feed through and run the > phone set live while testing. I may add a handset size jack just for > convenience. 4 conductor line plugs will usually fit fine in an 8c jacks but > handset plugs tend to wobble too much. > > You can use two R/S 275-1385 rotary switches to give you twelve switching > positions, you only need 8 positions, I'm still trying to figure out > something fun to do with the other 4 positions (my balanced line tester is > in a separate box, it was a bit more complicated). > > I hope this makes sense > charles > > Charles Patterson > communications@c... > Global Communications > Tarrytown, NY > http://www.telephonesecurity.com > > ----- Original Message ----- > From: Jay Coote > To: > Sent: Wednesday, February 16, 2000 8:36 PM > Subject: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > > > > > From: "Jay Coote" > > > > Thanks for reading. > > > > I'd like to build a small breakout box with several rotary switches which > would allow me to to the following: > > *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor > wall jack. > > *Select any wire combinations for TDR, DVM, receiver-analyzer or audio > amp. > > *Switch or reverse combinations for balance, resistance and capacitance > tests. > > > > I don't want to shell out a zillion dollars- Can someone give me a table > of > > pinouts for female RJ 8-conductor connectors as they correspond to the > > wiring color code? I may want this black box to have through connections, > > and it must handle connection to 4, 6 and 8-wire phones. > > > > Has anyone already built one of these who would care to discuss or share a > schematic? > > > > (Please excuse the missing or wrong date on my email... it is a Micro$oft > problem and will > > be resolved when I get a real computer and a real browser) > > > > Jay Coote, W6CJ > > Licensed Private Investigator -TSCM specialist > > Los Angeles > > > > > > --------------------------- ONElist Sponsor ---------------------------- > > > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > > Points, no hidden fees, and much more. Get NextCard today and get the > > credit you deserve. Apply now. Get your NextCard Visa at > > Click > Here > > > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > Points, no hidden fees, and much more. Get NextCard today and get the > credit you deserve. Apply now. Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 24 From: MICROSEARCH Date: Thu Feb 17, 2000 6:52am Subject: Book review clarification The book reviews submitted yesterday on Guidebook for the Beginning Sweeper and Telephone Eavesdropping and Detection came from someone named Hoffman. I would like to insure all readers of this list that I, Rick Hofmann, am NOT the author of the reviews. In my opinion, both books are essential for TSCM professionals and students alike. Best regards, Rick Hofmann, CCO, CPP PI16998 MICROSEARCH - Technical Surveillance Countermeasures - Counterespionage P.O.Box 2084 - Cypress, Ca. 90630 714-952-3812 Fax:714-209-0037 [Non-text portions of this message have been removed] 25 From: A.Lizard Date: Thu Feb 17, 2000 0:12pm Subject: video surveillance how-to guide from the Feds Saw this on the politech mailing list. The guide referred to is downloadable. A.Lizard US DOJ JUSTINFO ( electronic newsletter) February 15, 2000, Volume 6, Number 4 <*> NATIONAL INSTITUTE OF JUSTICE (NIJ) * Video Surveillance Equipment Selection and Application Guide (NIJ Guide 201-99) Law enforcement and corrections personnel often find selecting and using video surveillance systems a challenge, given the number of choices, sales pressures, and budget constraints. This publication is designed to assist law enforcement and procurement officials choose video equipment that will satisfy their needs. Topics include video cameras, self-contained camcorders, video recorders/players, video display systems, and special purpose video equipment. Appendices offer detailed experimental methods and results that are summarized in the text. "Video Surveillance Equipment Selection and Application Guide (NIJ Guide 201-99)" is available on the NCJRS World Wide Web site (http://www.ncjrs.org/resdocs.htm#179545) and by mail. See "Ordering Directions" and "NCJRS Online Access" ................................... **** O R D E R I N G D I R E C T I O N S **** FOR ALL AGENCIES To order or access news, information, services, and publications offered in JUSTINFO, use one of these methods. NOTE: Occasionally, you will be given special instructions. By phone: 8:30 a.m. to 7 p.m., e.t., Monday through Friday NIJ: 1-800-851-3420 BJS: 1-800-732-3277 OJJDP: 1-800-638-8736 BJA: 1-800-688-4252 OVC: 1-800-627-6872 ONDCP: 1-800-666-3332 TTY (toll free): 1-877-712-9279 (local): 301-947-8374 International: 301-519-5500 In writing, for all agencies: - E-mail: puborder@n... - Mail: P.O. Box 6000, Rockville, MD 20849-6000 ************************************************************ **** NCJRS O N L I N E A C C E S S **** This issue of JUSTINFO is available on the World Wide Web (http://www.ncjrs.org/justinfo/feb1500.htm). Go to the online version to take advantage of live links to all the publication and World Wide Web site addresses featured in this issue. <*> NCJRS Justice Information Center on the World Wide Web: http://www.ncjrs.org ................................... <*> Ask NCJRS! E-mail your questions to: askncjrs@n... ************************************************************************ Personal Web site http://www.ecis.com/~alizard Disaster prep & y2k computer fixes: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... PGP 6.5.1 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 26 From: Jay Coote Date: Fri Feb 4, 2005 3:36pm Subject: Sound Deadening? Though this is not strictly related to TSCM but for a client residence, I thought I would ask any sound experts on the list. The problem is I want to deaden sounds, entering the building from outside (in the 300-5000 Hz range). The structure is older, single-story, stucco over woodframe with drywall inside. There is no heat or sound insulation inside the walls, just air space between the outer stucco and inner drywall. Are there safe (no chemical outgassing) expanding foam substances which can be injected between the walls? Other suggestions? Thanks (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will be resolved when I get a real computer and a real browser) Jay Coote, W6CJ Licensed Private Investigator -TSCM specialist Los Angeles 27 From: James M. Atkinson, Comm-Eng Date: Fri Feb 18, 2000 7:59pm Subject: Re: Sound Deadening? At 8:55 PM -0500 2/18/00, Jay Coote wrote: >From: "Jay Coote" > >Though this is not strictly related to TSCM but for a client residence, I >thought I would ask any sound experts on the list. The problem is I want >to deaden sounds, entering the building from outside (in the 300-5000 Hz >range). The structure is older, single-story, stucco over woodframe with >drywall inside. There is no heat or sound insulation inside the walls, >just air space between the outer stucco and inner drywall. > >Are there safe (no chemical outgassing) expanding foam substances which >can be injected between the walls? Other suggestions? > >Thanks > >(Please excuse the missing or wrong date on my email... it is a Micro$oft >problem and will >be resolved when I get a real computer and a real browser) > >Jay Coote, W6CJ >Licensed Private Investigator -TSCM specialist >Los Angeles Ouch, Foam would simply be a serious waste of money. About the only things you can do is to build "acoustical mass" and "acoustic isolation" as part of a retrofit. Your client should talk to someone who specializes in acoustic engineering, and tell them that you need to provide a STC45 rating or better. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 28 From: Dutch Hill Tower Antenna Systems, Inc. Date: Fri Feb 18, 2000 8:12pm Subject: RE: Sound Deadening? Or you could find some one to do a phase cancellation job, audio intercepted from outside, processed and re-constructed to cancel the intercepted noise. Can be made as quite as a mouse, just have him bring money. DAS -----Original Message----- From: James M. Atkinson, Comm-Eng [mailto:jmatk@tscm.com] Sent: Friday, February 18, 2000 8:59 PM To: TSCM-L@onelist.com Subject: Re: [TSCM-L] Sound Deadening? From: "James M. Atkinson, Comm-Eng" At 8:55 PM -0500 2/18/00, Jay Coote wrote: >From: "Jay Coote" > >Though this is not strictly related to TSCM but for a client residence, I >thought I would ask any sound experts on the list. The problem is I want >to deaden sounds, entering the building from outside (in the 300-5000 Hz >range). The structure is older, single-story, stucco over woodframe with >drywall inside. There is no heat or sound insulation inside the walls, >just air space between the outer stucco and inner drywall. > >Are there safe (no chemical outgassing) expanding foam substances which >can be injected between the walls? Other suggestions? > >Thanks > >(Please excuse the missing or wrong date on my email... it is a Micro$oft >problem and will >be resolved when I get a real computer and a real browser) > >Jay Coote, W6CJ >Licensed Private Investigator -TSCM specialist >Los Angeles Ouch, Foam would simply be a serious waste of money. About the only things you can do is to build "acoustical mass" and "acoustic isolation" as part of a retrofit. Your client should talk to someone who specializes in acoustic engineering, and tell them that you need to provide a STC45 rating or better. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved --------------------------- ONElist Sponsor ---------------------------- Get what you deserve with NextCard Visa. Rates as low as 2.9 percent Intro or 9.9 percent Fixed APR, online balance transfers, Rewards Points, no hidden fees, and much more. Get NextCard today and get the credit you deserve. Apply now. Get your NextCard Visa at Click Here ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 29 From: Jordan Ulery Date: Sat Feb 19, 2000 4:26pm Subject: Re: Sound Deadening? I don't have the exact answer, but a source to contact. Airports around the nation are modifying homes in areas where airports are expanding. One of the techniques used to keep local residents content, if not happy, is sound abatement. Contact your local airport public relations man and they can point you in the right direction, sure I am. I know that Logan in Boston and Manchester in Manchester, NH have been doing this sort of work for years. Jay Coote wrote: > From: "Jay Coote" > > Though this is not strictly related to TSCM but for a client residence, I thought I would ask any sound experts on the list. The problem is I want to deaden sounds, entering the building from outside (in the 300-5000 Hz range). The structure is older, single-story, stucco over woodframe with drywall inside. There is no heat or sound insulation inside the walls, just air space between the outer stucco and inner drywall. > > Are there safe (no chemical outgassing) expanding foam substances which can be injected between the walls? Other suggestions? > > Thanks > > (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > --------------------------- ONElist Sponsor ---------------------------- > > Get what you deserve with NextCard Visa. ZERO. Rates as low as 0.0 > percent Intro APR, online balance transfers, Rewards Points, no hidden > fees, and much more. Get NextCard today and get the credit you deserve. > Apply now! Get your NextCard Visa at > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 30 From: Charles Patterson Date: Thu Feb 17, 2000 7:54pm Subject: Re: 4, 6, 8-conductor phone breakout box ? I believe I used the 2700 ohm resistors too If you have two jacks wired really in parallel, then it can work as a feed through without any worries. That shorting thing is not a problem for the phones, the two terminals will not be shorting out the jack. Its just that if you set both switches to the same pin, it will look like a short to a dmm, you will actually be reading only one conductor, and might fool your readings. My new box is turning out pretty good (if I dare say so myself!)! good luck Charles ----- Original Message ----- From: Jay Coote To: Sent: Thursday, February 17, 2000 9:25 AM Subject: Re: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > From: "Jay Coote" > > Charles, > > Thanks for the information. > I began on this box about 1 year ago and had a lot of projects in the meantime- a 911 commcenter for my "other" fulltime job, and so on. Now there's more time to organize my TSCM tools. > > Good! I was concerned about the use of female 8C jacks on my box; more accurately that something may get reversed or fouled up in the through connection, should I connect some types of phones through the box while testing. I'll just have to watch those shorts so I won't have to leave the job site at 01:30 in the attempt to buy a fuse for the phone system ;-) > > I hope I may pick your brain on this box project and on what you did to speed up balance tests with your box..... One TSCM book suggested a pair of matched 2700 ohm resistors for the balance test. > > Thanks, > > (Please excuse the missing or wrong date on my email... it is a Micro$oft problem and will > be resolved when I get a real computer and a real browser) > > Jay Coote, W6CJ > Licensed Private Investigator -TSCM specialist > Los Angeles > > > ---------- > > From: "Charles Patterson" > > > > Hi Jay, > > > > I just returned from ye ol' Radio Shack with a new box to transfer my > > breakout box into. > > (My old box was built in a hurry, and it shows a bit too much wear). > > > > There are many different wiring schemes, particularly for the 8 conductor > > jacks but you shouldn't have to worry about that too much since you will > > need to check all pairs anyway. > > The middle two conductors are almost always the main pair, at least in a > > single line phone, the next outer pair could be a second line. In the case > > of an electronic pbx or key system, the middle pair often carries the analog > > audio and the outer pair carries the power and signaling. If it is a fully > > digital system, only one pair is needed for everything. Some use the middle > > pair (Toshiba, Panasonic DBS) while some use the second pair (Panasonic > > KXTD) and can still use the middle pair for an analog signal. > > > > The third pair (spreading out from the middle) was often used in some system > > to allow for "off hook call anounce". This was to allow paging through the > > speaker of a phone while the phone is still in use. Some phones will have > > that third pair wired right to the speaker in the phone set, perfect to use > > for listening in. > > > > To see the usually coloring try: http://www.ablecomm.com/learnpg.htm > > > > When wiring a jack the middle pair is usually numbered 4 and 5, second pair > > is 6,3. It would be good to at least note these positions as starting > > points on the rotary switches. > > > > In my new box I will have two banana type binding posts wired to the center > > contact of the rotary switches (one to each switch). I will also wire a mini > > jack in parallel with the banana posts for easy connection to my amplifier. > > > > Then take eight positions of each switch and wire each of them in parallel > > to the eight positions of an 8c jack. Now you will have each switch able to > > connect one output banana post to every contact of the jack. Note that this > > way there will also be a short across the output posts if the two switches > > are set at the same setting- don't let it fool you if you're spinning the > > knobs doing a resistance check. > > > > On the jack side, I plan to have two 8c jacks wired in parallel and keep a > > mod jumper cable handy. this way I can use it as a feed through and run the > > phone set live while testing. I may add a handset size jack just for > > convenience. 4 conductor line plugs will usually fit fine in an 8c jacks but > > handset plugs tend to wobble too much. > > > > You can use two R/S 275-1385 rotary switches to give you twelve switching > > positions, you only need 8 positions, I'm still trying to figure out > > something fun to do with the other 4 positions (my balanced line tester is > > in a separate box, it was a bit more complicated). > > > > I hope this makes sense > > charles > > > > Charles Patterson > > communications@c... > > Global Communications > > Tarrytown, NY > > http://www.telephonesecurity.com > > > > ----- Original Message ----- > > From: Jay Coote > > To: > > Sent: Wednesday, February 16, 2000 8:36 PM > > Subject: [TSCM-L] 4, 6, 8-conductor phone breakout box ? > > > > > > > > > > From: "Jay Coote" > > > > > > Thanks for reading. > > > > > > I'd like to build a small breakout box with several rotary switches which > > would allow me to to the following: > > > *Quickly plug into a standard 4, or 6 conductor wall jack, or 8-conductor > > wall jack. > > > *Select any wire combinations for TDR, DVM, receiver-analyzer or audio > > amp. > > > *Switch or reverse combinations for balance, resistance and capacitance > > tests. > > > > > > I don't want to shell out a zillion dollars- Can someone give me a table > > of > > > pinouts for female RJ 8-conductor connectors as they correspond to the > > > wiring color code? I may want this black box to have through connections, > > > and it must handle connection to 4, 6 and 8-wire phones. > > > > > > Has anyone already built one of these who would care to discuss or share a > > schematic? > > > > > > (Please excuse the missing or wrong date on my email... it is a Micro$oft > > problem and will > > > be resolved when I get a real computer and a real browser) > > > > > > Jay Coote, W6CJ > > > Licensed Private Investigator -TSCM specialist > > > Los Angeles > > > > > > > > > --------------------------- ONElist Sponsor ---------------------------- > > > > > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > > > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > > > Points, no hidden fees, and much more. Get NextCard today and get the > > > credit you deserve. Apply now. Get your NextCard Visa at > > > Click > > Here > > > > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > --------------------------- ONElist Sponsor ---------------------------- > > > > Get what you deserve with NextCard Visa. Rates as low as 2.9 percent > > Intro or 9.9 percent Fixed APR, online balance transfers, Rewards > > Points, no hidden fees, and much more. Get NextCard today and get the > > credit you deserve. Apply now. Get your NextCard Visa at > > Click Here > > > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > > > --------------------------- ONElist Sponsor ---------------------------- > > GET A NEXTCARD VISA, in 30 seconds. Get rates as low as 0.0 percent > Intro or 9.9 percent Fixed APR and no hidden fees. Apply NOW. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS From: mooty Date: Wed Feb 2, 2005 6:36am Subject: Re: "Sound of Voices" ?????? O there out there...one must know where to find "them" Wes Mooty 501-247-6405 ----- Original Message ----- From: "A Grudko" To: Sent: Wednesday, February 02, 2005 6:21 AM Subject: RE: [TSCM-L] "Sound of Voices" ?????? > > > -----Original Message----- > From: LD C [mailto:ldc_esq@l...] > > Where does one find a remote "DNA Tracker"? > > I don't think there is such an item yet, except at the top of the > 'Technology Wish-List' of all the usual 3 letter agencies > > A Grudko > > > ---------- > > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > 10892 From: Tim Johnson Date: Wed Feb 2, 2005 7:15am Subject: Re: opto interceptor Dave, I wish to beg your pardon. Nothing that serves the purpose of expediting a sweep is a toy. You have to make use of everything you have available when doing a sweep. Your toy may be the only thing that picks up a signal if your prime equipment happens to be placed in a location that just happens to be a "dead" spot for the signal generated by a covert transmitter. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10893 From: taylortscm@y... Date: Wed Feb 2, 2005 11:35am Subject: Re: opto interceptor david: opto/interceptor is a nice little unit when connected to opto aps104 will give surprising results. dan taylor group delta wrote: hello to the group a friend of mine give me an optoelectronics interceptor to play with it during a sweep i was surprise about the possibilities not so bad to have a fast view of the spectrum this device is able to lock on the strongest signal between 30mhz to 2 ghz the audio is very good also but of course it is just a toy , not a professionnal model to sweep david from paris ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10894 From: kondrak Date: Wed Feb 2, 2005 11:36am Subject: Re: opto interceptor Couldn't agree more....ANY thing that serves a purpose is a tool. Its just some tools have more utility than others... At 08:15 2/2/2005, you wrote: >Dave, I wish to beg your pardon. Nothing that serves the purpose of >expediting a sweep is a toy. You have to make use of everything you >have available when doing a sweep. Your toy may be the only thing >that picks up a signal if your prime equipment happens to be placed >in a location that just happens to be a "dead" spot for the signal >generated by a covert transmitter. > >Tim >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell > >What you say in private is your business. Keeping it private is ours. > >Georgia License # PDC 002074 Technical Security Consultants Inc. >Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations >Special Agents-Technical Agent >http://www.dbugman.com > >This e-mail is intended for the use of the addressee(s) only and may >contain privileged confidential, or proprietary information that is >exempt from disclosure under law. If you have received this message >in error, please inform us promptly by reply e-mail, then delete the >e-mail and destroy any printed copy. > >Neither this information block, the typed name of the sender, or >anything else in this message is intended to constitute an electronic >signature for purposes of the Uniform Electronic Transactions Act or >the Electronic Signatures in Global and National Commerce Act >(E-Sign) unless a specific statement to the contrary is included in >this message. > > >[Non-text portions of this message have been removed] > > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10895 From: James M. Atkinson Date: Wed Feb 2, 2005 0:15pm Subject: Re: "Breaking-In" to technical security One very good way to "cut your teeth" is to work for a company that runs cables in buildings, installs phone system, and data networks for 2-3 years. You need to rull several hundred thousand feet of cables yourself, program thousands of phones, and be able to eat, drink, and sleep data networks on the physical layer. You must be comfortable on a ladder, and know the difference between Plenum, Riser, and PVC jacketed cable, be able to punch 66, bix, 110, or related blocks, and now how to fire stop a cable. It is also important to learn how to lay up screw studs and how to stud-up a wall, how to properly hang rock, and how to how to sling drywall mug. You will also need to learn which side of a batt of insulation goes which way, and why the grain on a ceiling tile is so important. Big plus is you can work with the brotherhood (IBEW) and learn to wire a breaker panel, cut romex, and how to properly wire a dimmer switch or fluorescent light in a board room. Extra points if you learn to lay down carpet, and hone your painting and wallpaper hanging skills. After that work for a large multi-billion dollar company for 3-4 years maintaining their data and telecom systems and immersing yourself in the day-to-day problems and issues that corporate telcom folk deal with on a regular basis. Notice that I have not said anything about working in the security department, or working with a PI to learn TSCM. Start with an extremely strong technical background, fill in strong tradesmen skills, and get some exposure to corporate communications systems. A hard core TSCM professional spends more time at Home Depot, Graybar, and Lowes then that do the local SpyShop, Ham Radio Store, Computer Outlet, or Radio Shack. Often a good ladder and flashlight will reveal a bug or security problem that TSCM equipment will not detect... but if you do not know what to expect in a plenum or wall cavity then you will not know when something does not belong. Break into the construction and technical trades before you try to break into the TSCM business. -jma At 04:11 AM 2/1/2005, ratlater69 wrote: >So I've been thinking for a while about how one would "break in" to >the technical security business, with little or no directly relevant >experience. The obvious answer is military service, which is where I >suspect a substantial number of people "cut their teeth"; is this >consistent with the perception of most people, or do you expect to see >new people coming from the private sector? > > I personally have a fairly strong background in computer & network >security and physics, with a decent understanding of basic >electronics, and have always been interested in technical security but >have never quite been able to push through. I'm under the impression >that most people in the techsec sector share at least some of these >qualifications, though I'm unsure if that is completely accurate. ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10896 From: James M. Atkinson Date: Wed Feb 2, 2005 0:21pm Subject: Sweep Needed in Granada Hills, CA If anybody on the list is interesting in doing a residential sweep in Granada Hills, California 91344 please let me know via a private message. The house is less than 3000 sq ft. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10897 From: A Grudko Date: Wed Feb 2, 2005 2:13pm Subject: RE: "Breaking-In" to technical security -----Original Message----- From: joe joe [mailto:wiggyyy2000@y...] > PIs.. business is to investigate things like whos' cheating on who or nanny's which is where most of their business comes from, Dear joe joe wiggyyy2000 What do you base this assessment of PI's business on? " I say this because as I am sure you know many PI's pretend to do the work(mostly with sub standard equipment) and then place their own bugs to make themselves look better.." Is there a study this is based on? Some verifiable facts please. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 10898 From: savanted1© Date: Wed Feb 2, 2005 1:41pm Subject: TSCM News Identity Theft, Net Scams Rose in '04-FTC According to figures released February 1, 2005 by the UK Office of Fair Trading (OFT), British consumers lose an estimated £1 billion per year on scams. The OFT has launched a month-long campaign warning consumers about the most common scams and educating them on how to protect themselves. One of the most common scams is so-called 419 Nigerian fraud, where consumers receive an e-mail seeking upfront cash to aid in releasing large amounts of cash, which the will be split with the victim. Christine Wade, director of consumer regulation enforcement at the OFT, said scammers are resourceful, enterprising, and manipulative, and damage legitimate businesses by using the same marketing routes. http://www.theregister.co.uk/2005/02/01/oft_targets_scammers ===================================================================== Phishing morphs into pharming A new form of Internet fraud, called pharming, is potentially more dangerous than phishing because it does not require users to respond to spam. The new form of attacks can also be executed over a broader front, possibly misdirecting all e-mail and web traffic away from its victims. Gerhard Eschelbeck, chief technology officer at security firm Qualys, says the recent ISP hijacking of Panix typifies the type of threat that may develop, and pharming is considered by some experts the next-generation version of phishing. Pharming is actually a new exploitation of existing browser vulnerabilities and loopholes, and could be addressed by improved browser security. http://www.theregister.co.uk/2005/01/31/pharming Savanted1Æ Mr. Garrett Hord __|__ -@--@--(_)--@--X-- savanted1@y... savanted1@h... savanted1@n... Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ It Is Wise To Educate A Child Than To Raise An AdultÆ ================================================== This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10899 From: Mike Di Feo Date: Wed Feb 2, 2005 1:06pm Subject: RE: "Breaking-In" to technical security Very well said. TSCM is a technical field. Some people relate it to security. However, the sweep phase of it is extremely technical when done correctly. Through my last 10 years in the TSCM field, I have met many so called technicians previously employed for government that did not have a clue. I am sure that we have competent TSCM technicians at government level and I am positive that those technicians are highly trained electronic experts. Therefore, James is correct you must first learn the equipment, the tools to repair the equipment and place yourself in a situation where you can put to practice the theory. Just remember theory knowledge with out putting it to use is useless and practical experience without theory knowledge is also useless and sometimes dangerous. My background is commercial and non-government. However, I can use any spectrum analyzer, cellular diagnostic unit, scopes, DVM's and any other type equipment that may be needed to repair cellular phone two way radios and many more electronic components. Furthermore, I ran my own repair shop for 23 years. If you can accomplish that then TSCM is almost another repair application. Good luck in your endeavors. Mike Di Feo at Walsh Associate -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, February 02, 2005 10:15 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] "Breaking-In" to technical security One very good way to "cut your teeth" is to work for a company that runs cables in buildings, installs phone system, and data networks for 2-3 years. You need to rull several hundred thousand feet of cables yourself, program thousands of phones, and be able to eat, drink, and sleep data networks on the physical layer. You must be comfortable on a ladder, and know the difference between Plenum, Riser, and PVC jacketed cable, be able to punch 66, bix, 110, or related blocks, and now how to fire stop a cable. It is also important to learn how to lay up screw studs and how to stud-up a wall, how to properly hang rock, and how to how to sling drywall mug. You will also need to learn which side of a batt of insulation goes which way, and why the grain on a ceiling tile is so important. Big plus is you can work with the brotherhood (IBEW) and learn to wire a breaker panel, cut romex, and how to properly wire a dimmer switch or fluorescent light in a board room. Extra points if you learn to lay down carpet, and hone your painting and wallpaper hanging skills. After that work for a large multi-billion dollar company for 3-4 years maintaining their data and telecom systems and immersing yourself in the day-to-day problems and issues that corporate telcom folk deal with on a regular basis. Notice that I have not said anything about working in the security department, or working with a PI to learn TSCM. Start with an extremely strong technical background, fill in strong tradesmen skills, and get some exposure to corporate communications systems. A hard core TSCM professional spends more time at Home Depot, Graybar, and Lowes then that do the local SpyShop, Ham Radio Store, Computer Outlet, or Radio Shack. Often a good ladder and flashlight will reveal a bug or security problem that TSCM equipment will not detect... but if you do not know what to expect in a plenum or wall cavity then you will not know when something does not belong. Break into the construction and technical trades before you try to break into the TSCM business. -jma At 04:11 AM 2/1/2005, ratlater69 wrote: >So I've been thinking for a while about how one would "break in" to >the technical security business, with little or no directly relevant >experience. The obvious answer is military service, which is where I >suspect a substantial number of people "cut their teeth"; is this >consistent with the perception of most people, or do you expect to see >new people coming from the private sector? > > I personally have a fairly strong background in computer & network >security and physics, with a decent understanding of basic >electronics, and have always been interested in technical security but >have never quite been able to push through. I'm under the impression >that most people in the techsec sector share at least some of these >qualifications, though I'm unsure if that is completely accurate. ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10900 From: Jeremy Funk Date: Wed Feb 2, 2005 1:52pm Subject: RE: "Breaking-In" to technical security A quick comment here- I have found my experience in construction, cable running and network design invaluable in opening doors. These qualifications give you a real edge on the nickel-plated EEs running around out there. Don't get me wrong, you need the education, (working on more myself) but do what I did and get through school by slinging cable and building boxes. It's amazing how much it helps you "out there". My two cents. -Jeremy Funk -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Wednesday, February 02, 2005 1:15 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] "Breaking-In" to technical security One very good way to "cut your teeth" is to work for a company that runs cables in buildings, installs phone system, and data networks for 2-3 years. You need to rull several hundred thousand feet of cables yourself, program thousands of phones, and be able to eat, drink, and sleep data networks on the physical layer. You must be comfortable on a ladder, and know the difference between Plenum, Riser, and PVC jacketed cable, be able to punch 66, bix, 110, or related blocks, and now how to fire stop a cable. It is also important to learn how to lay up screw studs and how to stud-up a wall, how to properly hang rock, and how to how to sling drywall mug. You will also need to learn which side of a batt of insulation goes which way, and why the grain on a ceiling tile is so important. Big plus is you can work with the brotherhood (IBEW) and learn to wire a breaker panel, cut romex, and how to properly wire a dimmer switch or fluorescent light in a board room. Extra points if you learn to lay down carpet, and hone your painting and wallpaper hanging skills. After that work for a large multi-billion dollar company for 3-4 years maintaining their data and telecom systems and immersing yourself in the day-to-day problems and issues that corporate telcom folk deal with on a regular basis. Notice that I have not said anything about working in the security department, or working with a PI to learn TSCM. Start with an extremely strong technical background, fill in strong tradesmen skills, and get some exposure to corporate communications systems. A hard core TSCM professional spends more time at Home Depot, Graybar, and Lowes then that do the local SpyShop, Ham Radio Store, Computer Outlet, or Radio Shack. Often a good ladder and flashlight will reveal a bug or security problem that TSCM equipment will not detect... but if you do not know what to expect in a plenum or wall cavity then you will not know when something does not belong. Break into the construction and technical trades before you try to break into the TSCM business. -jma At 04:11 AM 2/1/2005, ratlater69 wrote: >So I've been thinking for a while about how one would "break in" to >the technical security business, with little or no directly relevant >experience. The obvious answer is military service, which is where I >suspect a substantial number of people "cut their teeth"; is this >consistent with the perception of most people, or do you expect to see >new people coming from the private sector? > > I personally have a fairly strong background in computer & network >security and physics, with a decent understanding of basic >electronics, and have always been interested in technical security but >have never quite been able to push through. I'm under the impression >that most people in the techsec sector share at least some of these >qualifications, though I'm unsure if that is completely accurate. -------------------------------------------------------------------------- -------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- -------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- -------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- -------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links [Non-text portions of this message have been removed] 10901 From: wiggyyy2000 Date: Wed Feb 2, 2005 2:49pm Subject: Re: "Breaking-In" to technical security ok first off go on many PI's websites and the first thing they go on is cheaters or annys..i am sure that is not all they are good for but that is where the majority of money comes from these days...as to the fact of many PI groups using sub standard equipment and they themselves planting their own bugs ,you are asking me to name names and I will NOT do that..it is a known fact that quite a few have that practice and I have personally heard a very reliable person that has been in the tscm feild tell me about a scam concerning a PI --- In TSCM-L@yahoogroups.com, "A Grudko" wrote: > > -----Original Message----- > From: joe joe [mailto:wiggyyy2000@y...] > > > PIs.. business is to investigate things like > whos' cheating on who or nanny's which is where most > of their business comes from, > > Dear joe joe wiggyyy2000 > > What do you base this assessment of PI's business on? > > " I say this because as I am sure you know many PI's > pretend to do the work(mostly with sub standard > equipment) and then place their own bugs to make > themselves look better.." > > Is there a study this is based on? > > Some verifiable facts please. > > Andy Grudko (British), DPM, Grad IS (South Africa) > MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 > www.grudko.com , agrudko@i... > Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: > Sandton (+27 11) 465 9673 - 465 1487 (Fax) > Johannesburg (+27 11) 781 7206 - 781 7207(Fax) > Mid Rand (+27 11) 318 1451 - 318 6846(Fax) > Cellular (+27) 82 778 6355 - ICQ 146498943 > SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. > "When you need it done right - first time" > > > > > > > > ---------- > > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 > > > [Non-text portions of this message have been removed] 10902 From: Tim Johnson Date: Wed Feb 2, 2005 2:31pm Subject: Re: "Breaking-In" to technical security I didn't necessarily mean that you would learn from PI's. But, you do need a place to get started and not many of people who were from the government sector are going to bring you into their fold as they have a "standard set by the private sector" that they have to maintain. As a result, they will typically only consider someone from the government sector as an employee. They at least know what their training was and are able to qualify their qualifications and credibility. Starting off in the private sector.....I'd probably lean more toward trying to get hired into a major corporations security department and then let them know your desires to do TSCM work. I've trained a number of people for a number of private sector organizations over the years. In fact, some of the people trained have gone on in later years and entered the private sector on their own. As for the last part of your comment....it is sad, but true that there are some who prey on paranoia and will "find" devices they have hidden in order to generate repeat business. One that comes to mind is a company located in the southwest U. S. When I lived there, they had a reputation for finding the same type device on about 20 to 25 % of their sweeps. In real life the percentage is 1 to 2 % of the time. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10903 From: Tim Johnson Date: Wed Feb 2, 2005 2:39pm Subject: Re: "Breaking-In" to technical security Inj my seminars and presentations I present the following as indicative of the minimum things a TSCM specialist needs to be aware of. And, it isn't learned in the government or private sector schools. Tim What must a TSCM specialist know to properly perform a sweep? Radio and Electronics Investigations Interrogations Locks Alarms Physical Security Systems Analysis Carpentry / Building construction and codes Electricity Telephones Cellular phones Threat assessment Threat evaluation Management and personnel Finance Salesmanship Computers Fax Video and emanations Photography Access Control Etc.. Why? To be able to effectively evaluate an area or facility and to make recommendations to provide the best and most economical means of protecting information and personnel. Performing a sweep is only one aspect of the service a client should receive. -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10904 From: joe joe Date: Wed Feb 2, 2005 4:17pm Subject: Re: "Breaking-In" to technical security yes i agree with you on many of those aspects Tim..:) --- Tim Johnson wrote: > > Inj my seminars and presentations I present the > following as > indicative of the minimum things a TSCM specialist > needs to be aware > of. And, it isn't learned in the government or > private sector schools. > > Tim > > What must a TSCM specialist know to properly perform > a sweep? > > Radio and Electronics > Investigations > Interrogations > Locks > Alarms > Physical Security > Systems Analysis > Carpentry / Building construction and codes > Electricity > Telephones > Cellular phones > Threat assessment > Threat evaluation > Management and personnel > Finance > Salesmanship > Computers > Fax > Video and emanations > Photography > Access Control > Etc.. > > Why? > > To be able to effectively evaluate an area or > facility and to make > recommendations to provide the best and most > economical means of > protecting information and personnel. > > Performing a sweep is only one aspect of the service > a client should receive. > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10905 From: James M. Atkinson Date: Wed Feb 2, 2005 6:28pm Subject: Department of Homeland Security to unveil new procedures (AP) Washington, D.C. - Department of Homeland Security to unveil new procedures to protect action figures. Tuesday, February 2, 2005. Posted 5:31 PM EST (2231 GMT) In the wake of the kidnapping and threatened beheading by Islamic terrorists of an "action figure" named Cody, the Department of Homeland Security (DHS) has declassified and made public their plans for protecting other action figures and dolls. "What is more American than Barbie and Ken?" said I. Emma Mourahn, a DHS spokesperson. Ms. Mourahn revealed that DHS has already spent over $37 million on the protection of "miniaturized iconic assets" (MIA), including such ideas as the implantation of radio frequency ID chips, "dollometric" identification systems, tracking of plastics suppliers, and registration of all MIA designs with DHS icon specialists. "We are proposing $127 million for universities and other industry partners to research new ways to protect dolls and other miniature representations of America's heroes." When asked how they obtained the $127 million figure, Ms. Mourahn said, "We used Greenwald's First Law: 87.65% of all statistics are made up. It works quite well for us on Capitol Hill." Democratic congressperson Charles Rangle, who recently introduced a bill to create conscription (which was overwhelmingly defeated) said, "Okay, so the Bush administration is worried about Barbie and Ken. Everyone is. But what about African-American dolls? Have they even been considered?" The Reverend Jesse Jackson was not available for comment, but a spokesperson for him said, "Dr. Jackson considers this a very important issue and will soon have a statement about the discrimination in white-dominated society of non-white dolls, which historically have suffered the brunt of all doll hate crime, not to mention outright slavery. It is a travesty that in the twenty-first century dolls can be owned like animals." There was no reply from a PETA spokesperson, except to briefly opposed the exploitation of "animal figurines." President Bush was not available for comment, but a source inside the White House revealed that the president is "thinking about this quite a lot. It is constantly on his mind and not a day goes by when he doesn't not think about this issue. The fate of these dolls might bother him so much that he probably prays almost every day for a peaceful resolution to this problem while sort of balancing the need to protect U.S. civilian dolls from the forces of what might be characterized as evil, and by that he does not mean the Democratic party." Pressed further, the source mentioned a new faith-based initiative dating back to the Clinton administration that will ensure that dolls and other plasticized Americans will have a decent quality of life. "It's not fair to blame all this faith-based stuff on Bush," said the source. "It all started in the Clinton administration you know." Al Jazeera recently broadcast an al Quaida video that said, in part, "We view imperialist dog plastic fiends as legitimate targets for jihad. They have no souls. They are created by Jews exploiting oil stolen from the peaceful Islamic people who are having foul democracy forced upon them against their will by these Zionist pigs. They will die like dogs. Islam is a religion of peace, and we urge all Moslems to play with plastic geometric forms instead of these unholy miniature Zionist oppressor figures." The CIA has stated that they think it is 87.65% probable that the video is really from al Quaida, based upon voice analysis. Meanwhile, the TSA has announced that magnifying glasses will no longer be allowed as carry-on items on airliners. "We all know that a magnifying glass can be used to concentrate the rays of the sun and melt these poor little things in 87.65% of the simulated trials we ran," said a TSA insider on condition of anonymity. "It is important from the standpoint of professional goonery to not allow such potential terror weapons on civilian airplanes. We feel certain passengers will not mind giving up their eyeglasses. Besides, we have a study that shows that 87.65% of the 9/11 terrorists were readers of Tom Clancy novels, so this fits in nicely with our plans to ban reading at airports and on airplanes via confiscating books, newspapers, and pens and pencils. If anyone is bored they can watch or listen to the TSA approved entertainment we are developing in order to glamorize goonery as a career choice." The ACLU has filed suit in a federal court in Alexandria, Virginia to force DHS to reveal their plans, as well as to end all discrimination against the dolls. "It is wrong to even refer to these poor things as 'dolls' or 'action figures,'" said ACLU spokesperson K. Neejerque. "We prefer the term 'miniature-disabled' and we also strongly discourage their exploitation by the toy industry. Frankly, the toy industry should be more responsible and provide better role models than Barbie and Ken, not to mention scary military figures who merely incite violence in 87.65% of children according to a study we are currently making up." The Reverend Pat Robertson expressed his outrage at the ACLU, saying, "I am praying for their filthy atheistic souls since they are going to burn in Hell forever, but Jesus does love them. It is high time they realized that boys shouldn't play with dolls since that is currently the leading cause of boys choosing the homosexuality lifestyle. We are also against women playing with dolls, because it clearly says in the 10 Commandments that graven images are evil. This idolatrous industry must be subjected to a boycott immediately." When asked for an example, Reverend Robertson immediately referenced the 1970's doll, "Gay Bob" and said, "It is wrong to produce and let children play with miniature rubberized homo-replicas. We oppose this liberal pro-homosexual agenda." A press release from the American Medical Association stated, "This is absolutely deplorable on the part of the toy industry. It is well known that we have been trying to increase people's height for over 50 years in an attempt to cure obesity, ever since those height-weight charts you see in every doctor's office came out. Since we now know it is virtually impossible for most people to lose weight and keep it off, it is much better for 87.65% of people to merely increase their height by stretching while they keep their weight constant. But these dolls make being short fashionable, which we consider a contributing factor to a very serious health epidemic among those under 25. By the way, ignore all that stuff we used to say about eating high trans-fat margarine instead of butter, avoiding low-calorie eggs, eating diets high in carbohydrate, and so forth since we've changed out minds yet again. So we say to the terrorists: if you absolute must kill your victims, then do so by shooting or stabbing them since that is more healthy and also since glamorizing beheading provides unrealistic expectations for young people to be short. And don't eat fresh vegetables anymore since they cause tail cancer in genetically engineered mice." There was no immediate comment from the American Mannequin ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10906 From: Thomas Shaddack Date: Wed Feb 2, 2005 6:59pm Subject: 2.4 GHz detector ring http://neil.moon-beam.com/users/kris/index.htm No actual schematics nor microcode. :( Only a photograph. Uses a diode detector, and an Atmel microcontroller with integrated ADC (which detects a voltage raise on the detector output and starts flashing a LED). Very crude, very small. Could be made even smaller, using SMD parts. (A variant on this theme could work as a detector of RFID readers.) They are promising next versions that will identify more details about the access point, but I am skeptical here, as commercial electronics for receiving and analyzing the 802.11x packets themselves is too big for a ring. A bracelet or a wristwatch, maybe... 10907 From: SEAN WALSH Date: Wed Feb 2, 2005 5:30pm Subject: Re: Sweep Needed in Granada Hills, CA I believe Granada Hills is in Southern, CA. I would suggest Rick Hoffman of Microsearch. He is located in Southern, CA. (Spectrum analyzers, lab standard test equipment, training and ethics.) He is located in Cypress, CA. 714-952-3812 Sean J. Walsh, C.P.I., C.C.V. Walsh & Associates (415)899-9660, Fax (415)898-5500 www.tscm.net PI 18345 10908 From: ratlater69 Date: Wed Feb 2, 2005 7:10pm Subject: Re: "Breaking-In" to technical security Interesting to know- this makes alot of sense. Also makes the process seem somewhat more interesting. Thanks for the reply :) --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > One very good way to "cut your teeth" is to work for a company that runs > cables in buildings, installs phone system, and data networks for 2-3 > years. You need to rull several hundred thousand feet of cables yourself, > program thousands of phones, and be able to eat, drink, and sleep data > networks on the physical layer. You must be comfortable on a ladder, and > know the difference between Plenum, Riser, and PVC jacketed cable, be able > to punch 66, bix, 110, or related blocks, and now how to fire stop a cable. > > It is also important to learn how to lay up screw studs and how to stud-up > a wall, how to properly hang rock, and how to how to sling drywall mug. You > will also need to learn which side of a batt of insulation goes which way, > and why the grain on a ceiling tile is so important. Big plus is you can > work with the brotherhood (IBEW) and learn to wire a breaker panel, cut > romex, and how to properly wire a dimmer switch or fluorescent light in a > board room. Extra points if you learn to lay down carpet, and hone your > painting and wallpaper hanging skills. > > After that work for a large multi-billion dollar company for 3-4 years > maintaining their data and telecom systems and immersing yourself in the > day-to-day problems and issues that corporate telcom folk deal with on a > regular basis. > > Notice that I have not said anything about working in the security > department, or working with a PI to learn TSCM. > > Start with an extremely strong technical background, fill in strong > tradesmen skills, and get some exposure to corporate communications systems. > > A hard core TSCM professional spends more time at Home Depot, Graybar, and > Lowes then that do the local SpyShop, Ham Radio Store, Computer Outlet, or > Radio Shack. > > Often a good ladder and flashlight will reveal a bug or security problem > that TSCM equipment will not detect... but if you do not know what to > expect in a plenum or wall cavity then you will not know when something > does not belong. > > Break into the construction and technical trades before you try to break > into the TSCM business. > > -jma > > > > > At 04:11 AM 2/1/2005, ratlater69 wrote: > > >So I've been thinking for a while about how one would "break in" to > >the technical security business, with little or no directly relevant > >experience. The obvious answer is military service, which is where I > >suspect a substantial number of people "cut their teeth"; is this > >consistent with the perception of most people, or do you expect to see > >new people coming from the private sector? > > > > I personally have a fairly strong background in computer & network > >security and physics, with a decent understanding of basic > >electronics, and have always been interested in technical security but > >have never quite been able to push through. I'm under the impression > >that most people in the techsec sector share at least some of these > >qualifications, though I'm unsure if that is completely accurate. > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- 10909 From: Michael Dever Date: Wed Feb 2, 2005 8:35pm Subject: RF PREAMPLIFIERS Would anyone on the list care to recommend a manufacturer who can supply small battery operated (or battery capable) RF pre-amplifiers for the bands from say 10MHz up to say 6GHz? I want to attach them to or at least carry them with a handheld SA. Thanks in advance. Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10910 From: mpaulsen6 Date: Wed Feb 2, 2005 11:21pm Subject: hardware logger not a felony for this kid from: http://www.chron.com/cs/CDA/ssistory.mpl/metropolitan/3020344 Feb. 2, 2005, 7:34AM Answers costly for high-tech cheater Teen charged with misdemeanor after his teacher's computer is rigged By ROBERT CROWE Copyright 2005 Houston Chronicle A high school student flunked out in his scheme to steal test answers by plugging high-tech equipment into a teacher's computer, Fort Bend school officials said Tuesday. ADVERTISEMENT The 16-year-old sophomore at Clements High in Sugar Land was charged with a misdemeanor that could bring jail time and a stiff fine, authorities said. The boy admitted rigging a keystroke-recording device onto the computer after Fort Bend Independent School District police confronted him, said district spokeswoman Mary Ann Simpson. She said the scheme was uncovered after authorities learned that the boy had attempted to sell the answers. The device was installed for four days in the middle of November, He installed it when the teacher was not looking. Simpson said. In mid-December, school district police received a tip from students that the boy was trying to sell answers to final exams. "He was cooperative and admitted he had done this," Simpson said, adding that police confiscated the device, which plugged into a keyboard port in the back of a computer tower. Simpson said she did not know the subject of the class in which the device was used. Campus police referred the case to the Fort Bend County District Attorney's Office, which has charged the teen with breach of computer information, a Class B misdemeanor punishable by a fine of up to $2,000 and up to 180 days in jail. The student will spend the rest of the school year at an alternative campus. Had he been charged with a felony, he probably would have been expelled, Simpson said. The student was able to find test answers after he took the device off the teacher's computer, then plugged it into his own machine to search for key words, authorities said. Fort Bend ISD police sent out e-mails warning campus administrators and other school districts to beware of such schemes. "We want teachers to be familiar with what's hooked up to their computers," Simpson said. "Be aware that this could be done." Keystroke detectors, also called loggers, come in a variety of shapes and forms. The Fort Bend student used a device, about the size of a pen cap, that plugs into a keyboard cable, then into a computer keyboard port. The devices sell on the Internet for $70 to $150. robert.crowe@c... 10911 From: satcommunitfive Date: Thu Feb 3, 2005 0:12am Subject: Re: opto interceptor I have most of the opto gear and they are only really good for narrowband stuff, and really need an antenna to suit what freq your looking for. most 2.4Ghz video senders are invisible to them great for grabbing comms freqs at shows etc tho ! my 2c --- In TSCM-L@yahoogroups.com, kondrak wrote: > Couldn't agree more....ANY thing that serves a purpose is a tool. Its just > some tools have more utility than others... > > At 08:15 2/2/2005, you wrote: > > > >Dave, I wish to beg your pardon. Nothing that serves the purpose of > >expediting a sweep is a toy. You have to make use of everything you > >have available when doing a sweep. Your toy may be the only thing > >that picks up a signal if your prime equipment happens to be placed > >in a location that just happens to be a "dead" spot for the signal > >generated by a covert transmitter. > > > >Tim > >-- > > > >Tim Johnson > > > >Technical Security Consultants Inc. > >PO Box 1295 > >Carrollton, GA 30112 > >770-836-4898 > >770-712-2164 Cell > > > >What you say in private is your business. Keeping it private is ours. > > > >Georgia License # PDC 002074 Technical Security Consultants Inc. > >Member INTELNET > > Espionage Research Institute > > Association of Former Office of Special Investigations > >Special Agents-Technical Agent > >http://www.dbugman.com > > > >This e-mail is intended for the use of the addressee(s) only and may > >contain privileged confidential, or proprietary information that is > >exempt from disclosure under law. If you have received this message > >in error, please inform us promptly by reply e-mail, then delete the > >e-mail and destroy any printed copy. > > > >Neither this information block, the typed name of the sender, or > >anything else in this message is intended to constitute an electronic > >signature for purposes of the Uniform Electronic Transactions Act or > >the Electronic Signatures in Global and National Commerce Act > >(E-Sign) unless a specific statement to the contrary is included in > >this message. > > > > > >[Non-text portions of this message have been removed] > > > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > >Yahoo! Groups Links > > > > > > > > 10912 From: Michael Puchol Date: Thu Feb 3, 2005 2:06am Subject: Re: RF PREAMPLIFIERS Hi Michael, I've had good experiences with Down East Microwave (http://www.downeastmicrowave.com) who made a few preamps with external power feed (you can also get them coax fed) to my specs. Best regards, Mike Michael Dever wrote: > Would anyone on the list care to recommend a manufacturer who can > supply small battery operated (or battery capable) RF pre-amplifiers > for the bands from say 10MHz up to say 6GHz? > > I want to attach them to or at least carry them with a handheld SA. > > Thanks in advance. > > Regards > Mike > > Michael J. Dever CPP > Dever Clark & Associates > GPO Box 1163 > Canberra ACT 2601 > Australia > Voice: +612 6254 5337 > Email: dca@b... > ************************************************************************ > ***** > This message is sent in strict confidence for the addressee only. > It may contain legally privileged information. The contents are not to > be disclosed to anyone other than the addressee. Unauthorised > recipients are requested to preserve this confidentiality and to advise > the sender immediately of any error in transmission. > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > > 10913 From: Date: Thu Feb 3, 2005 0:11am Subject: Re: RF PREAMPLIFIERS In a message dated 03/02/2005 02:38:32 GMT Standard Time, dca@b... writes: Would anyone on the list care to recommend a manufacturer who can supply small battery operated (or battery capable) RF pre-amplifiers for the bands from say 10MHz up to say 6GHz? I want to attach them to or at least carry them with a handheld SA. Thanks in advance. Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> What would our lives be like without music, dance, and theater? Donate or volunteer in the arts today at Network for Good! _Click Here!_ (http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM) --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links Mike a few years back I had the same requirement.I eventually built my own using a fairly easily obtainable chip from Mini-Circuits a US company,but available in surface mount only so you would need a steady hand with the soldering iron.My needs were up to 6 Ghz but was able to settle for 3Ghz for this particular application.The final product by necessity utilised double sided copper board and and with all the grounding and bonding was a bit of a work of art it worked well and was rated kHz to 1 Gig with a 24 db gain [usable to 3 gig].If you want to build your own I am sure I can dig out all the details. Meanwhile a number of companies supply them ready made I noticed an Anritsu model on ebay recently and Watson make a fairly limited device to 1.2Ghz Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10914 From: contranl Date: Thu Feb 3, 2005 7:50am Subject: Re: RF PREAMPLIFIERS . I also recommend Minicircuits http://www.minicircuits.com/ represented in Australia by: http://www.clarke.com.au/ They have all the right parts to make such filters lowpass,highpass,when combined they become bandpass or bandblocks. If you dont use additional amplifiers you may have a loss of 1~3dB's in the wanted range but without the need for power supply. One of the advantages of using filters at the input of receivers is that you could apply some extra amplification without overloading that receiver. so you may consider using some extra amplification. Minicircuits have some very tiny amplifiers they are what they call "unconditionally stable" wich means that they are not to sensitive to hobby-style manufacturing ...you don't need very complicated calculations or special equipment to make for example a 3 Ghz amplifier. Have a look at their very tiny amps (MAR/ERA)...all battery operatable. (3/5/7 Volts) Best of all they are VERY cheap. A good idea would be to have a universal filter-bank-box housing various filters for different frequencies. with the help of switches or small cables you could configure such a box to filter or block those ranges that you want. (allthough above 2 ghz it would be better to have separate filters) I have made some of these filter-boxes and could make more on demand. Tetrascanner 10915 From: nunimeyer Date: Thu Feb 3, 2005 9:53am Subject: oscor opc software....ughhhhh!! Ok guys I have kept my mouth shut about this for a while now and I just have to tell people the real deal about this. The sw is basically a database for keeping signals and traces you have collected on previous sweeps( when it doesn't crash your pc and lose everything anyway!)...thats where it ends!!! Don't believe their hype about the sw can do this and that..IT can NOT!..one thing it will do is crash your pc a few times and you gotta uninstall and reinstall it a few times,lol.. I am sure I am not the only one who feels this way about it, but I guess I am the first one to openly say it. When you prompt the sw to show diff between peak and freindly the sw just shows a blank screen about 7 out of 10 times..real reason is because the sw has major bugs..but if you call REI they will say its the pc's fault..hmm whatever you say..from what I hear the sw has bugs on their pc's as well so it basically boils down to REI shipping something that totally doesn't work...hey guys wake up and fix the problem!..BOTTOM LINE REI IS A GOOD COMPANY WITH SOME GOOD PRODUCTS BUT THEY DROPPED THE BALL ON THE OPC SW. 10916 From: Tim Johnson Date: Thu Feb 3, 2005 7:59am Subject: iPods and Ilisten Aren't those iPod's by Apple just about the neatest thing that's come along in years. Anywhere from 4 to multi bunch of gig of memory for storing thousands and thousands of your favorite tunes. It would take you from now till way past then to listen to all of them, even if you did nothing but listen full time, were you to max it out with tunes. I, personally, don't think I have thousands of favorite tunes, but how would I know unless I listened. Something that MIGHT be worth listening to would be what goes on in places I'm not normally privy to, such as rest rooms, break rooms, locker rooms, board rooms, offices, conference rooms or anywhere else I can't get to whenever i want to be there. How would I do that???? I'd probably buy an iPod and the ITalk attachment (for $39.95) and do the hide thingy. That would give you thousands of hours of conversation. They're small and powerful (and getting smaller and more powerful). Almost everyone has them. They're not questioned like cell phones, cameras and audio recorders are (after all, they are just playback units for music, aren't they?). You see them in offices, attached to speakers so that the occupant can listen, and listen, and listen while he/she works (I haven't seen them in meeting or board rooms yet, but it is just a matter of time before they replace the CD player that is already there. So, the next time you see one, think about where it is going or where it has been. Did I mention that with PodLock by Micromat, Inc. you can even create a secret drive that keeps sensitive data (surreptitious recordings, maybe?) away from prying eyes. And it is all right out in plain view. Just lay it on a desk or table, along with the headphones and almost no one is going to question it. Just something to think about. Tim Apologies for any cross postings. -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10917 From: contranl Date: Thu Feb 3, 2005 11:31am Subject: Elektor this month features lots of wireless stuff. . Elektor (magazine) this month is a special on wireless they have articles on: RFID-detector, a complete circuit with discription how to build it,this one works on the most popular freq of 13.56 mhz Transmitter-modules that don't need batteries but use electricity from piezo-crystals or solar-panels. A (simple) frequency-spectrum chart with some details on who and what is where. Wireless connectivity (ism.wlan.wman.bluetooth etc) Construct a dipole antenna for DVBT (digital video at 800 mhz) Construct a wireless mic /module at ISM-band frequencies (860 mhz) Vhf antenna-amplifier (FM-broadcast band) Wifi-detectors (thos keyhangers that will detect 2.4 ghz data sigs) Not very shocking but not bad either ...for one if the biggest electronics magazines in the world ...never have they paid so much attention to wireless, i hope they will continue like this. Tetrascanner 10918 From: joe joe Date: Thu Feb 3, 2005 11:33am Subject: Re: oscor opc software....ughhhhh!! very well said, rei come on dudes fix your stuff, you guys have made some fine products so continue on --- nunimeyer wrote: > > > Ok guys I have kept my mouth shut about this for a > while now and I > just have to tell people the real deal about this. > The sw is > basically a database for keeping signals and traces > you have > collected on previous sweeps( when it doesn't crash > your pc and lose > everything anyway!)...thats where it ends!!! Don't > believe their > hype about the sw can do this and that..IT can > NOT!..one thing it > will do is crash your pc a few times and you gotta > uninstall and > reinstall it a few times,lol.. I am sure I am not > the only one who > feels this way about it, but I guess I am the first > one to openly > say it. When you prompt the sw to show diff between > peak and > freindly the sw just shows a blank screen about 7 > out of 10 > times..real reason is because the sw has major > bugs..but if you call > REI they will say its the pc's fault..hmm whatever > you say..from > what I hear the sw has bugs on their pc's as well so > it basically > boils down to REI shipping something that totally > doesn't work...hey > guys wake up and fix the problem!..BOTTOM LINE REI > IS A GOOD COMPANY > WITH SOME GOOD PRODUCTS BUT THEY DROPPED THE BALL ON > THE OPC SW. > > > > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10919 From: Tim Johnson Date: Thu Feb 3, 2005 11:23am Subject: Bugging This is a one time post to all my lists, etc as there is some pretty interesting information pertaining to eavesdropping. If you'd like to be on the list permanently, let me know. Kiwi computer spy-gear may be used by Australian police Stuff.co.nz - New Zealand ... Australia has made changes to state and federal laws expanding covert police surveillance, particularly computer and electronic eavesdropping. ... Ex-FX Exec Sentenced in Wiretapping Case Multichannel News (subscription) - New York,NY,USA Former Fox Cable Networks Group publicity executive Randolph Steven Webster has been sentenced to three years of probation and ordered to pay $22,607 in ... Ex-Sonera CEO charged with bugging phones: report Investor's Business Daily (subscription) - USA By Madeleine Acey. LONDON (CBS.MW) - The former chief executive of Finnish telecoms carrier Sonera is to be charged with illegally ... House ethics panel to probe complaint about McDermott Seattle Times - Seattle,WA,USA ... against McDermott. Boehner sued McDermott, charging that the eight-term lawmaker had violated state and federal wiretapping laws. In ... Ambrosia's new WireTap Pro records any audio on a Mac Graphic Exchange News - Toronto,ON,Canada WireTap Pro, which features a simple, appliance-like user interface, allows users to record audio from any running application, as well as from any microphone ... Wire Tap, Ambrosia for sound Macworld UK - UK By Macworld staff. Ambrosia Software has released WireTap Pro, a well-featured solution that lets Mac users record audio from almost any source. ... Snoop Mommy is proud to spy on her kids Fort Worth Star Telegram (subscription) - Fort Worth,TX,USA ... And in this era where lax parenting is a common complaint, how can a parent govern a child when wiretap laws reign supreme and a court's reach creeps into the ... Mom's eavesdropping violated Privacy Act, state Supreme Court ... Seattle Times - Seattle,WA,USA The state Supreme Court has ruled that the Privacy Act prohibits a parent from eavesdropping on a child's phone conversations. The ... Sen. Roach seeks to shield parents from privacy rule King County Journal Newspapers - King County,WA,USA ... The ACLU is considering submitting legislation of its own, Hoenig said, ``to make clear parents shouldn't get in trouble for eavesdropping.''. ... Michigan wi-fi hacker jailed for nine years The Register - London,England,UK ... they modified a proprietary piece of software called "tcpcredit" that Lowe's uses to process credit card transactions, building in a virtual wiretap that would ... Families are easy prey for internet snoopers Telegraph.co.uk - London,England,UK ... Some families are so vulnerable to electronic eavesdropping that anyone parked in the street could read every e-mail sent or received. ... New bugging device found in UN offices CBC News - Canada The "sophisticated" bugging device, which experts believe was made in Russia or Eastern Europe about three or four years ago, was planted in a room next to a ... United Nations failed to find who planted listening device KTRE - Lufkin,TX,USA ... could've been overheard. They say top officials have security that includes electromagnetic waves to thwart eavesdropping systems. Mitterrand's phone bugging trial begins Washington Times - Washington,DC,USA Paris, France, Nov. 15 (UPI) -- France focused Monday on the opening of a trial of 12 of the late President Francois Mitterand's aides for phone-tapping. ... Man sues county over jail eavesdropping on talks with lawyer Access North Georgia - Gainesville,GA,USA ... filed suit Thursday against Athens-Clarke County and several county officials, claiming his constitutional rights were violated by eavesdropping on jailhouse ... Printed ads defend Kroll Miami Herald (subscription) - Miami,FL,USA ... Police investigating Kroll seized computers, documents and electronic eavesdropping equipment in five cities in raids they named ''Operation Jackal.'' Five ... -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10920 From: Date: Thu Feb 3, 2005 2:40pm Subject: Re: oscor opc software....ughhhhh!! Genlemen, It seems to me that OSCOR software was developed for Windows 3.0 and was never redesigned since then. Apart from software some other features either do not work as claimed or useleless in today¥s environment, e.g. AM video reception. Who ever saw a surveillance video running AM last 20 years? OSCOR cannot FM (I tried myself). Probably it was not a bad system for the 80s albeit not better than swiss made 1974 model XY-Mini-Spy-Detector (bench made but 100% based on top quality CEI and Watkins Johnson modules this system also used AF correlation method BEFORE REI revolutionary reinvented it). But irony is that for all practical purposes there is no competition to OSCOR today. A professional TSCM specialist does not need OSCOR: even a cheap hobby class receiver and an analog spectrum analyzer will help much more. But there a maybe a few professionals in this business, overwhelming majority are PIs (best case) or amateurs. Look at theit "credentials" on their websites: their "education" is limited to some 2hours to 2days course or apprenticeship. Some of them have B.Sc or evem M.Sc but not in Electronics or related fiels. They need OSCOR. And for this purpose it is good enough. And be I on REI board I would hesitate with redesign of the system: it could be a zero return investment. Regards, A.W. joe joe wrote: > > >very well said, rei come on dudes fix your stuff, you >guys have made some fine products so continue on >--- nunimeyer wrote: > >> >> >> Ok guys I have kept my mouth shut about this for a >> while now and I >> just have to tell people the real deal about this. >> The sw is >> basically a database for keeping signals and traces >> you have >> collected on previous sweeps( when it doesn't crash >> your pc and lose >> everything anyway!)...thats where it ends!!! Don't >> believe their >> hype about the sw can do this and that..IT can >> NOT!..one thing it >> will do is crash your pc a few times and you gotta >> uninstall and >> reinstall it a few times,lol.. I am sure I am not >> the only one who >> feels this way about it, but I guess I am the first >> one to openly >> say it. When you prompt the sw to show diff between >> peak and >> freindly the sw just shows a blank screen about 7 >> out of 10 >> times..real reason is because the sw has major >> bugs..but if you call >> REI they will say its the pc's fault..hmm whatever >> you say..from >> what I hear the sw has bugs on their pc's as well so >> it basically >> boils down to REI shipping something that totally >> doesn't work...hey >> guys wake up and fix the problem!..BOTTOM LINE REI >> IS A GOOD COMPANY >> WITH SOME GOOD PRODUCTS BUT THEY DROPPED THE BALL ON >> THE OPC SW. >> >> >> >> >> >> >> > > > > >__________________________________ >Do you Yahoo!? >The all-new My Yahoo! - What will yours do? >http://my.yahoo.com > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp From: Tim Johnson Date: Thu Feb 3, 2005 8:27pm Subject: Job announcement TSCM/Physical Security I was asked to give this broad dissemination. If you know of someone who fits the qualifications, please pass it on. thanks, Tim Tim, Just wanted to advise you and your group of a USAJOBS announcement out for TSCM (Physical Security types). The positions (2) are located in Arlington ,VA for DEA. The jobs are a good mix of tech, physical security design, and project management among other things. Worldwide mission and 7-10 days month travel required. The positions are Physical Security Specailist, 0080-GS 13/14 and are located on http://jobsearch.usajobs.opm.gov/jobsearch.asp?q=TSCM&lid=&jbf571=&salmin=&salmax=&paygrademin=&paygrademax=&FedEmp=Y&sort=rv&vw=d&brd=3876&ss=0&FedPub=Y&SUBMIT1.x=80&SUBMIT1.y=18 They close on 02/16/2005. I would very much appreciate if you would pass this item along to your readers. They are a very talented bunch whom we may be interested in hiring. Thanks alot Tim, Good Luck. Mike Doherty, Acting Unit Chief, DEA Security Programs -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10922 From: Thomas Jones Date: Fri Feb 4, 2005 9:26am Subject: REI comments on OPC Software Gentleman, Before I discuss the issues, I want to apologize for any frustrations that customers may have experienced using OPC 5.0 BETA. The situation is this, the new 5.0 OPC software was developed with the main goal of providing a new methodology using trace analysis to better address sophisticated transmitters such as Burst and Hoppers. This required many changes to both hardware and software, but to summarize: 1. Increasing communication bandwidth to allow 120,000 data points of trace data to be almost transparently transferred to the PC for trace analysis. (Previous versions transferred 256 data points through a serial port and only displayed resolution equivalent the OSCOR display.) 2. Completely new development of software methodology and graphics displays to address this new data. 3. Significantly decreasing OSCOR sweep time to address time varying threats. This resulted in a completely new re-write of the OPC software. In our excitement to get these new capabilities out, as a company we made a large mistake in releasing this software as a BETA version. But the biggest mistake is that we released it too early in the BETA process. Again, we are sorry for any customers that have been frustrated by this mistake. However, to make the assumption that this is the end of the story is completely wrong. I don't know who nunimeyer@y... is, and I can only apologize that you saw a very early version. We have been working diligently to fix the early bugs and have already added valuable additional features recommended by our customers. We have already released the production version of the software, and we will be releasing an update to our production version in two weeks. Furthermore, on the comments posted by "Tensor66B@n...". The modern OPC 5.0 is developed for all modern PC operating systems. The Modern OSCOR can certainly demodulate FM video. The very first version of OSCOR with video demodulation only did standard NTSC, PAL, and SECAM. However, this was replaced years ago with an upgraded video TFT monitor and demodulation circuitry that allows control of video AM or FM, Positive or Negative synch pulse, and of course NTSC, PAL, and SECAM format. The final point, is that we are always improving our equipment to address the modern threat. If you have a concern about a function or feature, please contact us. We will continue to work hard to keep the OSCOR current. I hope that the customers above that made comment will contact us immediately so that we can update your equipment and software. Regards, Tom Jones REI General Manager 10923 From: joe joe Date: Fri Feb 4, 2005 9:37am Subject: Re: REI comments on OPC Software well i seen the software about 2 weeks ago, did a new version come out since then? --- Thomas Jones wrote: > > Gentleman, > > Before I discuss the issues, I want to apologize for > any frustrations > that customers may have experienced using OPC 5.0 > BETA. > > The situation is this, the new 5.0 OPC software was > developed with the > main goal of providing a new methodology using trace > analysis to better > address sophisticated transmitters such as Burst and > Hoppers. This > required many changes to both hardware and software, > but to summarize: > 1. Increasing communication bandwidth to allow > 120,000 data points of > trace data to be almost transparently transferred to > the PC for trace > analysis. (Previous versions transferred 256 data > points through a > serial port and only displayed resolution equivalent > the OSCOR display.) > 2. Completely new development of software > methodology and graphics > displays to address this new data. > 3. Significantly decreasing OSCOR sweep time to > address time varying > threats. > This resulted in a completely new re-write of the > OPC software. > > In our excitement to get these new capabilities out, > as a company we > made a large mistake in releasing this software as a > BETA version. But > the biggest mistake is that we released it too early > in the BETA > process. Again, we are sorry for any customers that > have been frustrated > by this mistake. > > However, to make the assumption that this is the end > of the story is > completely wrong. I don't know who > nunimeyer@y... is, and I can > only apologize that you saw a very early version. We > have been working > diligently to fix the early bugs and have already > added valuable > additional features recommended by our customers. We > have already > released the production version of the software, and > we will be > releasing an update to our production version in two > weeks. > > Furthermore, on the comments posted by > "Tensor66B@n...". The > modern OPC 5.0 is developed for all modern PC > operating systems. The > Modern OSCOR can certainly demodulate FM video. The > very first version > of OSCOR with video demodulation only did standard > NTSC, PAL, and SECAM. > However, this was replaced years ago with an > upgraded video TFT monitor > and demodulation circuitry that allows control of > video AM or FM, > Positive or Negative synch pulse, and of course > NTSC, PAL, and SECAM > format. > > The final point, is that we are always improving our > equipment to > address the modern threat. If you have a concern > about a function or > feature, please contact us. We will continue to work > hard to keep the > OSCOR current. I hope that the customers above that > made comment will > contact us immediately so that we can update your > equipment and > software. > > Regards, > Tom Jones > REI General Manager > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10924 From: Nalesnik, Matthew Date: Fri Feb 4, 2005 9:39am Subject: RE: REI comments on OPC Software Now that's what I'm talkin' about... someone who tries to 'square up'! A lot of companies would just blow you off, or as JMA so eloquently elaborated upon the other day, "blow smoke up your ass". Cheers to you, Tom Jones, if you hold true to your word. -----Original Message----- From: Thomas Jones [mailto:Tom@r...] Sent: Friday, February 04, 2005 10:26 AM Subject: [TSCM-L] REI comments on OPC Software Gentleman, Before I discuss the issues, I want to apologize for any frustrations that customers may have experienced using OPC 5.0 BETA. The situation is this, the new 5.0 OPC software was developed with the main goal of providing a new methodology using trace analysis to better address sophisticated transmitters such as Burst and Hoppers. This required many changes to both hardware and software, but to summarize: 1. Increasing communication bandwidth to allow 120,000 data points of trace data to be almost transparently transferred to the PC for trace analysis. (Previous versions transferred 256 data points through a serial port and only displayed resolution equivalent the OSCOR display.) 2. Completely new development of software methodology and graphics displays to address this new data. 3. Significantly decreasing OSCOR sweep time to address time varying threats. This resulted in a completely new re-write of the OPC software. In our excitement to get these new capabilities out, as a company we made a large mistake in releasing this software as a BETA version. But the biggest mistake is that we released it too early in the BETA process. Again, we are sorry for any customers that have been frustrated by this mistake. However, to make the assumption that this is the end of the story is completely wrong. I don't know who nunimeyer@y... is, and I can only apologize that you saw a very early version. We have been working diligently to fix the early bugs and have already added valuable additional features recommended by our customers. We have already released the production version of the software, and we will be releasing an update to our production version in two weeks. Furthermore, on the comments posted by "Tensor66B@n...". The modern OPC 5.0 is developed for all modern PC operating systems. The Modern OSCOR can certainly demodulate FM video. The very first version of OSCOR with video demodulation only did standard NTSC, PAL, and SECAM. However, this was replaced years ago with an upgraded video TFT monitor and demodulation circuitry that allows control of video AM or FM, Positive or Negative synch pulse, and of course NTSC, PAL, and SECAM format. The final point, is that we are always improving our equipment to address the modern threat. If you have a concern about a function or feature, please contact us. We will continue to work hard to keep the OSCOR current. I hope that the customers above that made comment will contact us immediately so that we can update your equipment and software. Regards, Tom Jones REI General Manager ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 10925 From: contranl Date: Fri Feb 4, 2005 0:36pm Subject: Parallel wire data-pick-up technique ? . There seems to be a technique where you run a cable in parallel with a "victim" cable, you would then be able to pick up whatever data is running through this victim-cable. Although similar...this is not the famous "Van Eck" trick wich targets radiation from CRT-monitors...and restores the screen by adding newly generated sync-signals. It's similar to picking up sound on a wire Obviously you would be able to inductively or capacitively pick up radiation from any cable...you would then need somekind of circuit wich converts this back to data...next you would need some software wich formats the resulting datastream to something readable..i could imagine that standard software could do that,for example fax-spying software could be used to read any fax-messages going over such a cable... It seems all very simple,so why have i never read about this ? all i've ever seen is very small piece of video: http://www.tetrascanner.com/gsm-scanners.html under imsi-catcher there's a video describing some research work by the BSI (German in government institute for security in IT) At the beginning they show (very shortly) this "parallel technique" A complete network could be compromised like this. Anyone now more about this ? How long piece of wire would you need ? Screened cables (most of them) no problem ? What would be the minimum distance between radiating and pick-up cable and would it be possible to use this with a wall in between ? What would be needed as a "front end" before it goes into a (decoding)computer? Possibly data could be stored on a little data-logging device instead of feeding it directly to a PC ...such a logger could be empty-ed every once in a while (wireless,dial-up..etc) or send all data live. Tetrascanner 10926 From: James M. Atkinson Date: Fri Feb 4, 2005 1:07pm Subject: More Posts Dissappearing A review of the moderator logs today, reflect that someone at Yahoo is quietly deleting posts from the archive again. Looks like three more posts were deleted in the past few days, but two of these posts were ones that someone had gotten Yahoo to delete a few days before, and were reposts. The third missing message simply indicated that two messages were missing. It seems that someone is really upset by the postings, and is doing back flips to not only remove the original postings, but the reposts, and then to delete any messages concerning the deletion of the messages that were deleted. Oh well, it should be interesting to see how long it takes them to have THIS message deleted from the archives. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10927 From: Date: Fri Feb 4, 2005 3:05pm Subject: Re: REI comments on OPC Software The Group; I am just going to give you my reflection and use of the OPC software that has been mentioned in a few of the messages on the list. In November of 2004 I updated my Oscar to the latest OPC update 5 from REI at their Algood Tennessee location. The ability to save traces and use the overlapping capabilities with different colors for archival usage sounded good for me. I put this to use in early December and again on a six inspection for a client that closes down for the holiday period. The program worked as advertised and maybe I was lucky but my sony vaio pentium III kept operating all the the six day sweep and two overnight runs without locking up on me. It is also loaded on a new HP laptop and so far has been working well with no glitches. The ability to be able to save and also to export to a printer has been a great addition to my wanting to have a hard copy of the frequencies, traces with all peaks for future comparison is good. As I said this is how the software has been operating for me and I hope it continues to do so. Also my relationship with the people at REI has been a good one. In the past I have had questions, and a few glitches in either the Oscar or one of my CPM700 units they are always quick to respond and have been able to either diagnose the problem or perform a quick turn around if a fix is needed. I believe we as TSCM professionals have a friend in Tom Jones and REI, They are known world wide for their expertise in this field. Their staff from Tom on down take our problems very seriously. If there is a problem I am certain that REI will step up to the plate and will find an answer. That is all I have, just my two cents worth.. Bill Rhoads In a message dated 2/4/2005 10:37:11 AM Eastern Standard Time, joe joe writes: > > >well i seen the software about 2 weeks ago, did a new >version come out since then? >--- Thomas Jones wrote: > >> >> Gentleman, >> >> Before I discuss the issues, I want to apologize for >> any frustrations >> that customers may have experienced using OPC 5.0 >> BETA. >> >> The situation is this, the new 5.0 OPC software was >> developed with the >> main goal of providing a new methodology using trace >> analysis to better >> address sophisticated transmitters such as Burst and >> Hoppers. This >> required many changes to both hardware and software, >> but to summarize: >> 1. Increasing communication bandwidth to allow >> 120,000 data points of >> trace data to be almost transparently transferred to >> the PC for trace >> analysis. (Previous versions transferred 256 data >> points through a >> serial port and only displayed resolution equivalent >> the OSCOR display.) >> 2. Completely new development of software >> methodology and graphics >> displays to address this new data. >> 3. Significantly decreasing OSCOR sweep time to >> address time varying >> threats. >> This resulted in a completely new re-write of the >> OPC software. >> >> In our excitement to get these new capabilities out, >> as a company we >> made a large mistake in releasing this software as a >> BETA version. But >> the biggest mistake is that we released it too early >> in the BETA >> process. Again, we are sorry for any customers that >> have been frustrated >> by this mistake. >> >> However, to make the assumption that this is the end >> of the story is >> completely wrong. I don't know who >> nunimeyer@y... is, and I can >> only apologize that you saw a very early version. We >> have been working >> diligently to fix the early bugs and have already >> added valuable >> additional features recommended by our customers. We >> have already >> released the production version of the software, and >> we will be >> releasing an update to our production version in two >> weeks. >> >> Furthermore, on the comments posted by >> "Tensor66B@n...". The >> modern OPC 5.0 is developed for all modern PC >> operating systems. The >> Modern OSCOR can certainly demodulate FM video. The >> very first version >> of OSCOR with video demodulation only did standard >> NTSC, PAL, and SECAM. >> However, this was replaced years ago with an >> upgraded video TFT monitor >> and demodulation circuitry that allows control of >> video AM or FM, >> Positive or Negative synch pulse, and of course >> NTSC, PAL, and SECAM >> format. >> >> The final point, is that we are always improving our >> equipment to >> address the modern threat. If you have a concern >> about a function or >> feature, please contact us. We will continue to work >> hard to keep the >> OSCOR current. I hope that the customers above that >> made comment will >> contact us immediately so that we can update your >> equipment and >> software. >> >> Regards, >> Tom Jones >> REI General Manager >> >> >> >> >> >> > > >__________________________________________________ >Do You Yahoo!? >Tired of spam? Yahoo! Mail has the best spam protection around >http://mail.yahoo.com > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > 10928 From: kondrak Date: Fri Feb 4, 2005 4:09pm Subject: Re: More Posts Dissappearing Be advised this msg will be spread far and wide, to alert others of the actions... At 14:07 2/4/2005, you wrote: >A review of the moderator logs today, reflect that someone at Yahoo is >quietly deleting posts from the archive again. > >Looks like three more posts were deleted in the past few days, but two of >these posts were ones that someone had gotten Yahoo to delete a few days >before, and were reposts. The third missing message simply indicated that >two messages were missing. > >It seems that someone is really upset by the postings, and is doing back >flips to not only remove the original postings, but the reposts, and then >to delete any messages concerning the deletion of the messages that were >deleted. > >Oh well, it should be interesting to see how long it takes them to have >THIS message deleted from the archives. > >-jma > > > >---------------------------------------------------------------------------------------------------- >We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. >---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com >---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and >Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. >---------------------------------------------------------------------------------------------------- > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > 10929 From: Hawkspirit Date: Fri Feb 4, 2005 5:56pm Subject: Oscor I did a sweep in the past few years in which I detected a burst bug sending out short duration pulse bursts. After the client saw my results he hired a second sweep team to come in and confirm my findings. They brought an Oscor and it would not receive and display this short pulse wave transmission. Missed the boat completely! Roger HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Date: Thu, 03 Feb 2005 15:40:48 -0500 From: Tensor66B@n... Subject: Re: oscor opc software....ughhhhh!! Genlemen, It seems to me that OSCOR software was developed for Windows 3.0 and was never redesigned since then. Apart from software some other features either do not work as claimed or useleless in today¥s environment, e.g. AM video reception. Who ever saw a surveillance video running AM last 20 years? OSCOR cannot FM (I tried myself). Probably it was not a bad system for the 80s albeit not better than swiss made 1974 model XY-Mini-Spy-Detector (bench made but 100% based on top quality CEI and Watkins Johnson modules this system also used AF correlation method BEFORE REI revolutionary reinvented it). But irony is that for all practical purposes there is no competition to OSCOR today. A professional TSCM specialist does not need OSCOR: even a cheap hobby class receiver and an analog spectrum analyzer will help much more. But there a maybe a few professionals in this business, overwhelming majority are PIs (best case) or amateurs. Look at theit "credentials" on their websites: their "education" is limited to some 2hours to 2days course or apprenticeship. Some of them have B.Sc or evem M.Sc but not in Electronics or related fiels. They need OSCOR. And for this purpose it is good enough. And be I on REI board I would hesitate with redesign of the system: it could be a zero return investment. Regards, A.W. -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 [Non-text portions of this message have been removed] 10930 From: joe joe Date: Fri Feb 4, 2005 8:10pm Subject: Re: Oscor i did a test with the oscor and a spectrum analyzer and both catch burst trans...as long as you do a long enough sweep the oscor works very well, i don't knock their equipment , all i spoke of was their opc software --- Hawkspirit wrote: > > > I did a sweep in the past few years in which I > detected a burst bug sending > out short duration pulse bursts. After the client > saw my results he hired a > second sweep team to come in and confirm my > findings. They brought an Oscor > and it would not receive and display this short > pulse wave transmission. > Missed the boat completely! > > Roger > > HYPERLINK > "http://www.bugsweeps.com/"www.bugsweeps.com > > > > Date: Thu, 03 Feb 2005 15:40:48 -0500 > > From: Tensor66B@n... > > Subject: Re: oscor opc software....ughhhhh!! > > > > > > Genlemen, > > > > It seems to me that OSCOR software was developed for > Windows 3.0 > > and was never redesigned since then. Apart from > software some other > > features either do not work as claimed or useleless > in today¥s > > environment, e.g. AM video reception. Who ever saw a > surveillance > > video running AM last 20 years? OSCOR cannot FM (I > tried myself). > > Probably it was not a bad system for the 80s albeit > not better > > than swiss made 1974 model XY-Mini-Spy-Detector > (bench made but 100% based > > on top quality CEI and Watkins Johnson modules this > system also > > used AF correlation method BEFORE REI revolutionary > reinvented it). > > > > But irony is that for all practical purposes there > is no competition > > to OSCOR today. A professional TSCM specialist does > not need > > OSCOR: even a cheap hobby class receiver and an > analog spectrum analyzer > > will help much more. But there a maybe a few > professionals in this > > business, overwhelming majority are PIs (best case) > or amateurs. > > Look at theit "credentials" on their websites: their > "education" > > is limited to some 2hours to 2days course or > apprenticeship. Some of > > them have B.Sc or evem M.Sc but not in Electronics > or related > > fiels. > > > > They need OSCOR. And for this purpose it is good > enough. And be I on REI > board I would hesitate with redesign of the system: > it could be a zero > > return investment. > > > > Regards, > > A.W. > > > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.5 - Release > Date: 2/3/2005 > > > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 10931 From: joe joe Date: Fri Feb 4, 2005 8:12pm Subject: Re: REI comments on OPC Software BGR that is fine..i do agree that they do have good products..i never said they didn't but, on the opc software they have a problem..i have spoken to a few people from the REI classes and they have told me the same, i am glad it is working out for you, but as they say they are in beta mode so they DO know there are flaws in it, that is all i was stating, when there is an update and it WORKS i will gladly say they did a great job on it,truth is truth --- BGR101@a... wrote: > The Group; > > I am just going to give you my reflection and use of > the OPC software that has been mentioned in a few of > the messages on the list. > > In November of 2004 I updated my Oscar to the latest > OPC update 5 from REI at their Algood Tennessee > location. The ability to save traces and use the > overlapping capabilities with different colors for > archival usage sounded good for me. > > I put this to use in early December and again on a > six inspection for a client that closes down for the > holiday period. The program worked as advertised > and maybe I was lucky but my sony vaio pentium III > kept operating all the the six day sweep and two > overnight runs without locking up on me. It is also > loaded on a new HP laptop and so far has been > working well with no glitches. > > The ability to be able to save and also to export to > a printer has been a great addition to my wanting to > have a hard copy of the frequencies, traces with all > peaks for future comparison is good. > > As I said this is how the software has been > operating for me and I hope it continues to do so. > Also my relationship with the people at REI has been > a good one. In the past I have had questions, and a > few glitches in either the Oscar or one of my CPM700 > units they are always quick to respond and have been > able to either diagnose the problem or perform a > quick turn around if a fix is needed. > > I believe we as TSCM professionals have a friend in > Tom Jones and REI, They are known world wide for > their expertise in this field. Their staff from Tom > on down take our problems very seriously. If there > is a problem I am certain that REI will step up to > the plate and will find an answer. > > That is all I have, just my two cents worth.. > > Bill Rhoads > > > > In a message dated 2/4/2005 10:37:11 AM Eastern > Standard Time, joe joe > writes: > > > > > > >well i seen the software about 2 weeks ago, did a > new > >version come out since then? > >--- Thomas Jones > wrote: > > > >> > >> Gentleman, > >> > >> Before I discuss the issues, I want to apologize > for > >> any frustrations > >> that customers may have experienced using OPC 5.0 > >> BETA. > >> > >> The situation is this, the new 5.0 OPC software > was > >> developed with the > >> main goal of providing a new methodology using > trace > >> analysis to better > >> address sophisticated transmitters such as Burst > and > >> Hoppers. This > >> required many changes to both hardware and > software, > >> but to summarize: > >> 1. Increasing communication bandwidth to allow > >> 120,000 data points of > >> trace data to be almost transparently transferred > to > >> the PC for trace > >> analysis. (Previous versions transferred 256 data > >> points through a > >> serial port and only displayed resolution > equivalent > >> the OSCOR display.) > >> 2. Completely new development of software > >> methodology and graphics > >> displays to address this new data. > >> 3. Significantly decreasing OSCOR sweep time to > >> address time varying > >> threats. > >> This resulted in a completely new re-write of the > >> OPC software. > >> > >> In our excitement to get these new capabilities > out, > >> as a company we > >> made a large mistake in releasing this software > as a > >> BETA version. But > >> the biggest mistake is that we released it too > early > >> in the BETA > >> process. Again, we are sorry for any customers > that > >> have been frustrated > >> by this mistake. > >> > >> However, to make the assumption that this is the > end > >> of the story is > >> completely wrong. I don't know who > >> nunimeyer@y... is, and I can > >> only apologize that you saw a very early version. > We > >> have been working > >> diligently to fix the early bugs and have already > >> added valuable > >> additional features recommended by our customers. > We > >> have already > >> released the production version of the software, > and > >> we will be > >> releasing an update to our production version in > two > >> weeks. > >> > >> Furthermore, on the comments posted by > >> "Tensor66B@n...". The > >> modern OPC 5.0 is developed for all modern PC > >> operating systems. The > >> Modern OSCOR can certainly demodulate FM video. > The > >> very first version > >> of OSCOR with video demodulation only did > standard > >> NTSC, PAL, and SECAM. > >> However, this was replaced years ago with an > >> upgraded video TFT monitor > >> and demodulation circuitry that allows control of > >> video AM or FM, > >> Positive or Negative synch pulse, and of course > >> NTSC, PAL, and SECAM > >> format. > >> > >> The final point, is that we are always improving > our > >> equipment to > >> address the modern threat. If you have a concern > >> about a function or > >> feature, please contact us. We will continue to > work > >> hard to keep the > >> OSCOR current. I hope that the customers above > that > >> made comment will > >> contact us immediately so that we can update your > >> equipment and > >> software. > >> > >> Regards, > >> Tom Jones > >> REI General Manager > >> > >> > >> > >> > >> > >> > > > > > >__________________________________________________ > >Do You Yahoo!? > >Tired of spam? Yahoo! Mail has the best spam > protection around > >http://mail.yahoo.com > > > > > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > === message truncated === __________________________________ Do you Yahoo!? The all-new My Yahoo! - What will yours do? http://my.yahoo.com 10932 From: Gregory Hicks Date: Fri Feb 4, 2005 1:13pm Subject: Re: More Posts Dissappearing Jim: Just out of curiousity, what are the messages that are disappearing? Is there anyone at Yahoo you could complain to? That is *not* supposed to happen... Just a different thought: Are list members allowed to modify the archives? If so, you might want to change that... Oh well. Sorry! Regards, Gregory Hicks > To: TSCM-L > From: "James M. Atkinson" > Date: Fri, 04 Feb 2005 14:07:49 -0500 > Subject: [TSCM-L] More Posts Dissappearing > > > > A review of the moderator logs today, reflect that someone at Yahoo is > quietly deleting posts from the archive again. > > Looks like three more posts were deleted in the past few days, but two of > these posts were ones that someone had gotten Yahoo to delete a few days > before, and were reposts. The third missing message simply indicated that > two messages were missing. > > It seems that someone is really upset by the postings, and is doing back > flips to not only remove the original postings, but the reposts, and then > to delete any messages concerning the deletion of the messages that were > deleted. > > Oh well, it should be interesting to see how long it takes them to have > THIS message deleted from the archives. > > -jma > > > > -------------------------------------------------------------------------------- -------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------------------- -------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------------------- -------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------------------- -------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > ------------------------------------------------------------------- Gregory Hicks | Principal Systems Engineer Cadence Design Systems | Direct: 408.576.3609 555 River Oaks Pkwy M/S 6B1 | Fax: 408.894.3400 San Jose, CA 95134 | Internet: ghicks@c... I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton 10933 From: Agent Carrion Date: Fri Feb 4, 2005 3:22pm Subject: Re: Parallel wire data-pick-up technique ? This is such an interesting post! This is why I joined this group! ;-) --- contranl wrote: > > . > > There seems to be a technique where you run a cable > in parallel > with a "victim" cable, you would then be able to > pick up whatever > data is running through this victim-cable. > > Although similar...this is not the famous "Van Eck" > trick wich > targets radiation from CRT-monitors...and restores > the screen by > adding newly generated sync-signals. > > It's similar to picking up sound on a wire > > Obviously you would be able to inductively or > capacitively pick up > radiation from any cable...you would then need > somekind of circuit > wich converts this back to data...next you would > need some software > wich formats the resulting datastream to something > readable..i could > imagine that standard software could do that,for > example fax-spying > software could be used to read any fax-messages > going over such a > cable... > > It seems all very simple,so why have i never read > about this ? > all i've ever seen is very small piece of video: > > http://www.tetrascanner.com/gsm-scanners.html > > under imsi-catcher there's a video describing some > research work by > the BSI (German in government institute for security > in IT) > At the beginning they show (very shortly) this > "parallel technique" > > A complete network could be compromised like this. > > Anyone now more about this ? > How long piece of wire would you need ? > Screened cables (most of them) no problem ? > What would be the minimum distance between radiating > and pick-up > cable and would it be possible to use this with a > wall in between ? > > What would be needed as a "front end" before it goes > into a > (decoding)computer? > > Possibly data could be stored on a little > data-logging device instead > of feeding it directly to a PC ...such a logger > could be empty-ed > every once in a while (wireless,dial-up..etc) or > send all data live. > > > Tetrascanner > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com 10934 From: savanted1© Date: Fri Feb 4, 2005 0:22pm Subject: TSCM News The 2005 Identity Fraud Survey Report has been release by the Better Business Bureau, and it contains some interesting findings. "Computer crimes accounted for just 11.6 percent of all known-cause identity fraud in 2004; and half of these digitally-driven crimes stem from spyware, software the computer user unknowingly installs to make ads pop-up when the consumer is online. Consumers can protect their financial data by using updated spyware, virus and firewall protection software and not responding to bogus "phishing" emails that request personal data." http://www.bbb.org/alerts/article.asp?ID=565 Savanted1Æ Mr. Garrett Hord __|__ -@--@--(_)--@--X-- savanted1@y... savanted1@h... savanted1@n... Group home page: http://groups.yahoo.com/group/TICSAStudy Group email address: TICSAStudy@yahoogroups.com Innovations At The Speed Of A ThoughtÆ You Cannot Do Today's Work With Yesterday's SkillsÆ It Is Wise To Educate A Child Than To Raise An AdultÆ ================================================== This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10935 From: J.Evert Date: Fri Feb 4, 2005 6:15pm Subject: Re: oscor opc software I upgraded my Oscor to the 5.0 in June and have been using the software since late July when the test version came out. I have been completely satisfied with the software and the new 5.0 Oscor. The initial version had some small bugs, and I expected this as it was a beta version and I was asked by rei to report any problems so they could fix any discovered bugs in the software. I never had any problems with my computer crashing, and I have been using the software repeatedly for over five months now. I believe the current software version is the 3rd release, each release fixing small problems of previous versions. From my personal experience with rei, they have been extremely professional and courteous, and willing to do more than any other company I have dealt with to satisfy their customers. I find it hard to believe that they would simply blame it on your computer unless your computer was truly the problem. Although you may not have signed your post for other reasons, by not signing it you raise credibility issues when you are complaining about a companies product in a public manner. If I know REI, I would bet that they have been trying to contact you since you posted your initial complaint in order to assist you, Please let us know how the situation turns out. Jeff Evert Arizona Technical Security 10936 From: Michael Jordan Date: Fri Feb 4, 2005 11:44am Subject: Re: iPods and Ilisten Hey Bubba Timbo! Only an Apple stevejobber salesman would hype the ipod. They represent the biggest consumer scam since head cheese. The PC market has many more devices which are smaller and less expensive with comparable storage capability. Creative, Rio, PNY etc. with more in the market every day. If you want to bug public bathrooms why not just hang out in the stalls with the door shut? Interesting that you use the term 'privy' which in Georgia means the outhouse. I find it hard to believe that you get paid for hanging out in bathrooms, of course there is the train station privy in Plains where Zell Miller gets his choicest intelligence. On Thu, 3 Feb 2005 08:59:56 -0500, Tim Johnson wrote: > > Aren't those iPod's by Apple just about the neatest thing that's come > along in years. Anywhere from 4 to multi bunch of gig of memory for > storing thousands and thousands of your favorite tunes. It would take > you from now till way past then to listen to all of them, even if you > did nothing but listen full time, were you to max it out with tunes. > > I, personally, don't think I have thousands of favorite tunes, but > how would I know unless I listened. > > Something that MIGHT be worth listening to would be what goes on in > places I'm not normally privy to, such as rest rooms, break rooms, > locker rooms, board rooms, offices, conference rooms or anywhere else > I can't get to whenever i want to be there. > > How would I do that???? > > I'd probably buy an iPod and the ITalk attachment (for $39.95) and do > the hide thingy. That would give you thousands of hours of > conversation. They're small and powerful (and getting smaller and > more powerful). Almost everyone has them. They're not questioned like > cell phones, cameras and audio recorders are (after all, they are > just playback units for music, aren't they?). > > You see them in offices, attached to speakers so that the occupant > can listen, and listen, and listen while he/she works (I haven't seen > them in meeting or board rooms yet, but it is just a matter of time > before they replace the CD player that is already there. > > So, the next time you see one, think about where it is going or where > it has been. > > Did I mention that with PodLock by Micromat, Inc. you can even create > a secret drive that keeps sensitive data (surreptitious recordings, > maybe?) away from prying eyes. > > And it is all right out in plain view. Just lay it on a desk or > table, along with the headphones and almost no one is going to > question it. > > Just something to think about. > > Tim > > Apologies for any cross postings. > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it private is ours. > > Georgia License # PDC 002074 Technical Security Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the addressee(s) only and may > contain privileged confidential, or proprietary information that is > exempt from disclosure under law. If you have received this message > in error, please inform us promptly by reply e-mail, then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of the sender, or > anything else in this message is intended to constitute an electronic > signature for purposes of the Uniform Electronic Transactions Act or > the Electronic Signatures in Global and National Commerce Act > (E-Sign) unless a specific statement to the contrary is included in > this message. > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > > ________________________________ > Yahoo! Groups Links > > To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. -- Michael Jordan apollotomorrow@g... http://www.transbay.net/~ballgame/ http://apollotomorrow.blogspot.com http://starjockey.blogspot.com http://joshuaproject.blogspot.com 10937 From: joe joe Date: Fri Feb 4, 2005 11:13pm Subject: Re: Re: oscor opc software look,REI has admitted it has a problem, so i think some people should stop making excuses for it and saying how wonderful it is, i spoke with someone that was at the school a few weeks ago and he confirmed to me that AT THE SCHOOL it was bugging out,THE PC AT THE SCHOOL CRASHED TOO,( are you calling him a liar thomas?) so please enough of the excuses or saying how great it is for you, thomas i personally could care less because i don't use the software but don't proclaim it to be so great when it is not, like i said when it is fixed and when enough people i know that use it say it is good, i will do a total retraction --- "J.Evert" wrote: > > > I upgraded my Oscor to the 5.0 in June and have been > using the > software since late July when the test version came > out. I have > been completely satisfied with the software and the > new 5.0 Oscor. > The initial version had some small bugs, and I > expected this as it > was a beta version and I was asked by rei to report > any problems so > they could fix any discovered bugs in the software. > I never had > any problems with my computer crashing, and I have > been using the > software repeatedly for over five months now. I > believe the current > software version is the 3rd release, each release > fixing small > problems of previous versions. > > From my personal experience with rei, they have been > extremely > professional and courteous, and willing to do more > than any other > company I have dealt with to satisfy their > customers. I find it > hard to believe that they would simply blame it on > your computer > unless your computer was truly the problem. > > Although you may not have signed your post for other > reasons, by not > signing it you raise credibility issues when you are > complaining > about a companies product in a public manner. > > If I know REI, I would bet that they have been > trying to contact you > since you posted your initial complaint in order to > assist you, > Please let us know how the situation turns out. > > > Jeff Evert > Arizona Technical Security > > > > > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10938 From: Tim Johnson Date: Fri Feb 4, 2005 11:58pm Subject: Re: iPods and Ilisten Michael, If you'll read it carefully you won't find an endorsement of the iPod. Some would call my initial comments "tongue-in-cheek". The rest of the comment had to do with places those who have been around the business for any length of time have found devices. Yes!! in restrooms, break rooms, and etc. What i was tryinjg to do (and apparently it went WAAAAAY over your head) was to point out the iPod could be used for something other than what it was designed for. Something the professional TSCMers needed to be made aware of so that their clients can be briefed as to the threat. In fact, if it still escapes you as to what the post was made for, I'll be glad to take your call and explain it is smaller words than i used in the post. Or, I'm sure, any of the others who do TSCM for a profession will be glad to do it for me. That's what we are here for.....to educate and explain and exchange ideas. As for privy, having been raised in Georgia (probably a long time before you was born) I am intimate with the word. but, it is also the term used to describe what used to be a very influential group of people who were advisors to the British Sovereign, known as Her Majesty's Most Honorable Privy Council. So, you see, it has at least three different meanings, two of which aren't associated with a** holes or defecation. Beyond that, if you need any additional education in eavesdropping, intelligence gathering or snooping, let us know on the forum. We'll do our best to educate you, even with your learning disability. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10939 From: Date: Fri Feb 4, 2005 10:28pm Subject: Re: Oscor In a message dated 04/02/2005 23:59:37 GMT Standard Time, hawkspirit@e... writes: I did a sweep in the past few years in which I detected a burst bug sending out short duration pulse bursts. After the client saw my results he hired a second sweep team to come in and confirm my findings. They brought an Oscor and it would not receive and display this short pulse wave transmission. Missed the boat completely! Roger HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com Roger I take it that you used a Spectrum Analyser on your original sweep when you detected the Burst device Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) [Non-text portions of this message have been removed] 10941 From: Michael Dever Date: Sat Feb 5, 2005 5:56am Subject: Re: Oscor Speaking of 'burst bugs' - what level of threat do you believe they belong at? That is; professional/amateur, etc. Regards Mike On 05 Feb 2005, at 20:28, DEMTEC@A... wrote: > > > > In a message dated 04/02/2005 23:59:37 GMT Standard Time, > hawkspirit@e... writes: > > > > > I did a sweep in the past few years in which I detected a burst bug > sending > out short duration pulse bursts. After the client saw my results he > hired a > second sweep team to come in and confirm my findings. They brought an > Oscor > and it would not receive and display this short pulse wave > transmission. > Missed the boat completely! > > Roger > > HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > > > > > > > Roger I take it that you used a Spectrum Analyser on your original > sweep > when you detected the Burst device > Regards Dave > > David McGauley > TSCM [Technical Surveillance and Countermeasures] > Electronic Surveillance and Sweep Specialist > Electrical/Electronics Engineer ex Police > Demtec House > Ormskirk > Lancs L390HF > UK > 01695558544 > 07866206112 > demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 10942 From: joe joe Date: Sat Feb 5, 2005 5:59am Subject: Re: Oscor right now my personal opinion is that an amateur with some ham radio experience can do the job pretty good --- Michael Dever wrote: > Speaking of 'burst bugs' - what level of threat do > you believe they > belong at? > > That is; professional/amateur, etc. > > Regards > Mike > > On 05 Feb 2005, at 20:28, DEMTEC@A... wrote: > > > > > > > > > In a message dated 04/02/2005 23:59:37 GMT > Standard Time, > > hawkspirit@e... writes: > > > > > > > > > > I did a sweep in the past few years in which I > detected a burst bug > > sending > > out short duration pulse bursts. After the client > saw my results he > > hired a > > second sweep team to come in and confirm my > findings. They brought an > > Oscor > > and it would not receive and display this short > pulse wave > > transmission. > > Missed the boat completely! > > > > Roger > > > > HYPERLINK > "http://www.bugsweeps.com/"www.bugsweeps.com > > > > > > > > > > > > > > Roger I take it that you used a Spectrum Analyser > on your original > > sweep > > when you detected the Burst device > > Regards Dave > > > > David McGauley > > TSCM [Technical Surveillance and Countermeasures] > > Electronic Surveillance and Sweep Specialist > > Electrical/Electronics Engineer ex Police > > Demtec House > > Ormskirk > > Lancs L390HF > > UK > > 01695558544 > > 07866206112 > > demtec@a..._ www.demtec.co.uk_ > (http://www.demtec.co.uk/) > > > > > > > > > > [Non-text portions of this message have been > removed] > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > > Michael J. Dever CPP > Dever Clark & Associates > GPO Box 1163 > Canberra ACT 2601 > Australia > Voice: +612 6254 5337 > Email: dca@b... > ************************************************************************ > > ***** > This message is sent in strict confidence for the > addressee only. > It may contain legally privileged information. The > contents are not to > be disclosed to anyone other than the addressee. > Unauthorised > recipients are requested to preserve this > confidentiality and to advise > the sender immediately of any error in transmission. > > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo 10943 From: Agent Geiger Date: Sat Feb 5, 2005 10:45am Subject: Re: More Posts Dissappearing What is the content of the messages? --- Gregory Hicks wrote: > > Jim: > > Just out of curiousity, what are the messages that > are disappearing? > > Is there anyone at Yahoo you could complain to? > That is *not* supposed > to happen... > > Just a different thought: Are list members allowed > to modify the > archives? If so, you might want to change that... > > Oh well. Sorry! > > Regards, > Gregory Hicks > > > To: TSCM-L > > From: "James M. Atkinson" > > Date: Fri, 04 Feb 2005 14:07:49 -0500 > > Subject: [TSCM-L] More Posts Dissappearing > > > > > > > > A review of the moderator logs today, reflect that > someone at Yahoo is > > quietly deleting posts from the archive again. > > > > Looks like three more posts were deleted in the > past few days, but two of > > these posts were ones that someone had gotten > Yahoo to delete a few days > > before, and were reposts. The third missing > message simply indicated that > > two messages were missing. > > > > It seems that someone is really upset by the > postings, and is doing back > > flips to not only remove the original postings, > but the reposts, and then > > to delete any messages concerning the deletion of > the messages that were > > deleted. > > > > Oh well, it should be interesting to see how long > it takes them to have > > THIS message deleted from the archives. > > > > -jma > > > > > > > > > -------------------------------------------------------------------------------- > -------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, > and Real Wiretappers. > > > -------------------------------------------------------------------------------- > -------------------- > > James M. Atkinson > Phone: (978) 381-9111 > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > > > -------------------------------------------------------------------------------- > -------------------- > > World Class, Professional, Ethical, and > Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > > > -------------------------------------------------------------------------------- > -------------------- > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list > visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > > > =================================================== > TSKS > > Yahoo! Groups Links > > > > > > > > > > > > > > > > ------------------------------------------------------------------- > Gregory Hicks | Principal > Systems Engineer > Cadence Design Systems | Direct: > 408.576.3609 > 555 River Oaks Pkwy M/S 6B1 | Fax: > 408.894.3400 > San Jose, CA 95134 | Internet: > ghicks@c... > > I am perfectly capable of learning from my mistakes. > I will surely > learn a great deal today. > > "A democracy is a sheep and two wolves deciding on > what to have for > lunch. Freedom is a well armed sheep contesting the > results of the > decision." - Benjamin Franklin > > "The best we can hope for concerning the people at > large is that they > be properly armed." --Alexander Hamilton > > > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10944 From: G P Date: Sat Feb 5, 2005 10:50am Subject: Re: Parallel wire data-pick-up technique ? Hi Tetra There is a decent amount of public research pertaining to TEMPEST out there, although not from the U.S. Best place to get started is the unofficial TEMPEST Information page: http://www.eskimo.com/~joelm/tempest.html Markus Kuhn's paper is a great resource, as are the Turkish National Institute of of Electronics and Cryptology papers ("Information Extraction from the Radiation of VDUs by Pattern Recognition Methods", and "Signal Processing Applications for Information Extraction from the Radiation of VDUs"). For sniffing serial links for ambient comms, dig around for an older document called "TEMPEST in a Teapot". It talks about sniffing serial links in the fashion you described circa 1993, and includes some excellent resources for shielding and the like. Processor noise can also be used for picking up interesting tidbits like key material used in crypto processors, the process is referred to as side channel cryptanalysis and has been used for a wide variety of attacks, including timing attacks against smart cards and other neato things like watching the power rail on embedded devices for spikes to determine key information. To demodulate up to 2400 bps modem traffic, grab an older US Robotics Courier HST modem, it has an undocumented test mode that turns off the transmit carrier and allows you to throw it inline with any modem connection (or decent quality recording of a modem connection), up to 2400 bps speeds - ATO is used to demodulate the originating tones, ATA for the receiving side once the modem is in that special test mode. Greg --- contranl wrote: > > > . > > There seems to be a technique where you run a cable > in parallel > with a "victim" cable, you would then be able to > pick up whatever > data is running through this victim-cable. > > Although similar...this is not the famous "Van Eck" > trick wich > targets radiation from CRT-monitors...and restores > the screen by > adding newly generated sync-signals. > > It's similar to picking up sound on a wire > > Obviously you would be able to inductively or > capacitively pick up > radiation from any cable...you would then need > somekind of circuit > wich converts this back to data...next you would > need some software > wich formats the resulting datastream to something > readable..i could > imagine that standard software could do that,for > example fax-spying > software could be used to read any fax-messages > going over such a > cable... > > It seems all very simple,so why have i never read > about this ? > all i've ever seen is very small piece of video: > > http://www.tetrascanner.com/gsm-scanners.html > > under imsi-catcher there's a video describing some > research work by > the BSI (German in government institute for security > in IT) > At the beginning they show (very shortly) this > "parallel technique" > > A complete network could be compromised like this. > > Anyone now more about this ? > How long piece of wire would you need ? > Screened cables (most of them) no problem ? > What would be the minimum distance between radiating > and pick-up > cable and would it be possible to use this with a > wall in between ? > > What would be needed as a "front end" before it goes > into a > (decoding)computer? > > Possibly data could be stored on a little > data-logging device instead > of feeding it directly to a PC ...such a logger > could be empty-ed > every once in a while (wireless,dial-up..etc) or > send all data live. > > > Tetrascanner > > > > > > ------------------------ Yahoo! Groups Sponsor > --------------------~--> > Has someone you know been affected by illness or > disease? > Network for Good is THE place to support health > awareness efforts! > http://us.click.yahoo.com/Rcy2bD/UOnJAA/cosFAA/UBhwlB/TM > --------------------------------------------------------------------~-> > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts > acquire speed, > the hands acquire shaking, the shaking is a > warning. > It is by caffeine alone I set my mind in motion. > =================================================== > TSKS > Yahoo! Groups Links > > > TSCM-L-unsubscribe@yahoogroups.com > > > > > > 10945 From: contranl Date: Sat Feb 5, 2005 2:05pm Subject: Re: More Posts Dissappearing . Those that can remove messages(archive),links,files,photos are: 1) The moderator(s) 2) The writer of the message (if he's still member) 3) Yahoo 4) Someone else who has stolen 1 of above identities or has managed to become a member again (using the same id) I have some groups myself..sometime ago all links and files and messages were gone...but back again after my complaint...to my question of what happened i never got a personal answer,just some prefabricated general apologies. You have to insist in asking Yahoo if they removed the message or not i suppose in the end they will give you an answer...depending on what they say you can start to think about what else might be going on. I know you can add things to a Yahoo-group wich they not intended. (inserting HTML-code where you should put plain text) As far as i know this can only be done by the moderators because they only have acess to those fields where you could do this. I just removed my previous last (unimportant)message on this group to see what happens...as expected i could remove it and now there is 1 number(10940)missing from the ordered row. (useless experiment..sorry) Tetrascanner 10946 From: Brian Varine Date: Sat Feb 5, 2005 9:28am Subject: 0wn3d by an iPod For those wondering what other nefarious uses an iPod could be used for, I suggest attending CanSecWest, they are going to have a breifing on hacking with iPods and other Firewire utilities. Firewire/i.Link is well known as a way for connecting video devices or external hard-disks to computers. One little known fact is that the Firewire protocol also allows to read and write physical memory on connected machines without further software support. This can be leveraged to escalate privileges or to spy on connected machines. We will present some fun software using FireWire to do things to computers which shouldn't happen. 0wn3d by an iPod: http://www.cansecwest.com/speakers.html 10947 From: Tim Johnson Date: Sat Feb 5, 2005 3:47pm Subject: Regarding the hoopla about the OSCOR Software Being a lowly Mac user, we don't have near the problems with crashing that PC users do.....but it happens occasionally. to reduce even further the possibility of it happening, I periodically run Norton Disk Doctor and Norton Utilities to De-fragment the disk. When I do have an incompatibility, I will run Conflict Catcher and determine which program is causing the problem. With all that said, and knowing Jeff Evert, I'd say that he is using a computer that is pretty much dedicated to running the OSCOR program and for handling his TSCM related activity, and nothing else. By keeping the unnecessary programs off his computer, her doesn't have the problems of conflicts between one program causing another to crash or hangup. What it boils down to is.....maybe it isn't just the OSCOR software's problem; As for the problems at the school, has that been verified by actually speaking with someone who attended the school and had it happen to them.....or is it a case of he said she said he said it happened. Try getting the after the sale service they provide from any other equipment sales organization. Never happen. But then again, they are interested in customer satisfaction, at least for this customer they have been. Regarding the software, I'll be able to speak from experience in a month or so as I'm scheduled for the basic REI class later on this month. While there, I'm going to have them install the program on my brand new Dell Laptop that will be dedicated to nothing but TSCM , OSCOR and a couple of other programs for operating and setting up TSCM related equipment and have them educate me on how to use it properly. Being somewhat limited in my knowledge of TSCM and computers, they may have to take an extra day or two to pound it into my head. And finally, shame on REI for releasing BETA programs in an effort to help people who have purchased their equipment and want to use it to it's maximum capabilities. You give some people something for free and they will complain about the time it takes to download it and set it up. (Do it right the first time and you won't have to do it again). Ooooops, one other "and finally" ..... wouldn't it be great if they wrote a program for Mac users. But then, they'd never know if it was working or not as they'd never hear from us again. Tim Johnson -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10948 From: joe joe Date: Sat Feb 5, 2005 7:01pm Subject: Re: Regarding the hoopla about the OSCOR Software Tim i have heard of you and i do respect what you have to say but if you read my post carfully i said that a freind of mine was at the school a few weeks ago and he himself told me personally he doesn't think too much of the software because of the reasons stated( it crashed on their own pc not his laptop), also from what i understand the software is not free you pay for it when you upgrade to version 5.0, so yes they should be ashamed of giving a BETA version, as i have said before, and i have also posted that if Thomas says it is not true( that it crashed and had problems) he is calling one of the people that was in HIS company's class a liar, like i have posted numerous times my freind said all the products are great just the software that needs help --- Tim Johnson wrote: > > Being a lowly Mac user, we don't have near the > problems with crashing > that PC users do.....but it happens occasionally. to > reduce even > further the possibility of it happening, I > periodically run Norton > Disk Doctor and Norton Utilities to De-fragment the > disk. When I do > have an incompatibility, I will run Conflict Catcher > and determine > which program is causing the problem. > > With all that said, and knowing Jeff Evert, I'd say > that he is using > a computer that is pretty much dedicated to running > the OSCOR program > and for handling his TSCM related activity, and > nothing else. By > keeping the unnecessary programs off his computer, > her doesn't have > the problems of conflicts between one program > causing another to > crash or hangup. What it boils down to is.....maybe > it isn't just the > OSCOR software's problem; > > As for the problems at the school, has that been > verified by actually > speaking with someone who attended the school and > had it happen to > them.....or is it a case of he said she said he said > it happened. Try > getting the after the sale service they provide from > any other > equipment sales organization. Never happen. But then > again, they are > interested in customer satisfaction, at least for > this customer they > have been. > > Regarding the software, I'll be able to speak from > experience in a > month or so as I'm scheduled for the basic REI class > later on this > month. While there, I'm going to have them install > the program on my > brand new Dell Laptop that will be dedicated to > nothing but TSCM , > OSCOR and a couple of other programs for operating > and setting up > TSCM related equipment and have them educate me on > how to use it > properly. Being somewhat limited in my knowledge of > TSCM and > computers, they may have to take an extra day or two > to pound it into > my head. > > And finally, shame on REI for releasing BETA > programs in an effort to > help people who have purchased their equipment and > want to use it to > it's maximum capabilities. You give some people > something for free > and they will complain about the time it takes to > download it and set > it up. (Do it right the first time and you won't > have to do it again). > > Ooooops, one other "and finally" ..... wouldn't it > be great if they > wrote a program for Mac users. But then, they'd > never know if it was > working or not as they'd never hear from us again. > > > Tim Johnson > > > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > > > __________________________________ Do you Yahoo!? All your favorites on one personal page ñ Try My Yahoo! http://my.yahoo.com 10949 From: Tim Johnson Date: Sat Feb 5, 2005 7:34pm Subject: Re: 0wn3d by an iPod Brian, Don't you know you are going to get into trouble by praising iPod's. But, now that you've done it, thanks for the heads up. Once a bucket of worms is turned over, it usually takes a bigger bucket to get them back into. All kinds of things the iPod can be used for when folks start talking about them. Anyone else have any good ideas. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10950 From: Tim Johnson Date: Sat Feb 5, 2005 8:11pm Subject: Re: Regarding the hoopla about the OSCOR Software I didn't have you post in front of me. i had deleted it and was responding from memory....something that gets evasive when you become a senior citizen. I was only trying to come up with some reasons why the program might have crashed. I'm sure that if there are serious problems, the Beta system would not have been released. As for the REI computer crashing, was it all of them, or just one. A computer person will probably explain it much better than i can, but each computer operates slightly differently than it's brethren. Heck, I can't even get it to work on my computer at all, but that's because I'm trying to run it with Virtual PC. I still think that I will eventually get to operate on my Macintosh, but i want to be sure I understand how it works first. I could already be using it, but then, I'd probably have to unlearn some nasty procedures. Seldom can you get something to work properly by using just the manual provided. As for paying, I believe it is available on the REI web site as a free download. i may be wrong, and if so, someone please correct me. I downloaded it shortly after I received my brand new Dell PC Laptop a week or two ago. But, like I said, that may not be the entire program. At any rate, I'll find out at the end of the month. And, rest assured that if I have any problems with the program crashing, etc., once I have been educated top it's use, I'll most definitely pass the word on. Heck, If i DON"T have any problems, I'll let you folks know. In the meantime, give the folks at REI feedback so they know what problems you are experiencing. It's good for the liver to vent here, but if you don't explain in detail to the engineers and technicians what problems you are experiencing, they aren't going to get fixed. As an example, I was having a problem with my OSCOR not saving data when I set it on AUTO. I'd have to unseat the program chip, reseat it and restart to get it to work. I let them know and I received new chips for both my OSCOR's about two days later. Apparently, there was a problem with the one chip. I saved it and am going to give it to them to run some tests on when I go up. Was it their fault it didn't work? YES. But was it intentional. NO. That particular chip decided to be a renegade. All the rest apparently worked exactly as they were programmed to do. Maybe the same thing happened to the computer? Maybe? As for the rest of your post, you should use some care in your choice of words. I doubt seriously that Tom actually called anyone a liar. I think that passion has clouded judgement and possibly caused different interpretations of statements. If, in fact, there was a failure, Tom may not be fully aware of the circumstances. If your friend who had a problem had contacted Tom, I think the results would have been different. BTW, if your friend is having problems with the software, he can operate the equipment without it until the problems have been fixed. It would be interesting to have input from other users of the OSCOR and the associated software to find out how many are experiencing problems and how many are satisfied with the Beta product. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10951 From: joe joe Date: Sat Feb 5, 2005 11:52pm Subject: Re: Regarding the hoopla about the OSCOR Software my freind won't come here and post about anything, he is not into that but he has left REI with many comments when he was there, THOMAS knows there are problems, so maybe he should just stop making excuses since he knew there were problems and just fix them, oh and by the way my buddy told me that a it wasn't an isolated case with his pc problem either --- Tim Johnson wrote: > > I didn't have you post in front of me. i had deleted > it and was > responding from memory....something that gets > evasive when you become > a senior citizen. I was only trying to come up with > some reasons why > the program might have crashed. I'm sure that if > there are serious > problems, the Beta system would not have been > released. As for the > REI computer crashing, was it all of them, or just > one. A computer > person will probably explain it much better than i > can, but each > computer operates slightly differently than it's > brethren. > > Heck, I can't even get it to work on my computer at > all, but that's > because I'm trying to run it with Virtual PC. > I still think > that I will eventually get to operate on my > Macintosh, but i want to > be sure I understand how it works first. I could > already be using it, > but then, I'd probably have to unlearn some nasty > procedures. Seldom > can you get something to work properly by using just > the manual > provided. > > As for paying, I believe it is available on the REI > web site as a > free download. i may be wrong, and if so, someone > please correct me. > I downloaded it shortly after I received my brand > new Dell PC Laptop > a week or two ago. But, like I said, that may not be > the entire > program. At any rate, I'll find out at the end of > the month. > > And, rest assured that if I have any problems with > the program > crashing, etc., once I have been educated top it's > use, I'll most > definitely pass the word on. Heck, If i DON"T have > any problems, I'll > let you folks know. > > In the meantime, give the folks at REI feedback so > they know what > problems you are experiencing. It's good for the > liver to vent here, > but if you don't explain in detail to the engineers > and technicians > what problems you are experiencing, they aren't > going to get fixed. > > As an example, I was having a problem with my OSCOR > not saving data > when I set it on AUTO. I'd have to unseat the > program chip, reseat it > and restart to get it to work. I let them know and I > received new > chips for both my OSCOR's about two days later. > Apparently, there was > a problem with the one chip. I saved it and am going > to give it to > them to run some tests on when I go up. Was it their > fault it didn't > work? YES. But was it intentional. NO. That > particular chip decided > to be a renegade. All the rest apparently worked > exactly as they were > programmed to do. Maybe the same thing happened to > the computer? > Maybe? > > As for the rest of your post, you should use some > care in your choice > of words. I doubt seriously that Tom actually called > anyone a liar. I > think that passion has clouded judgement and > possibly caused > different interpretations of statements. If, in > fact, there was a > failure, Tom may not be fully aware of the > circumstances. If your > friend who had a problem had contacted Tom, I think > the results would > have been different. > > BTW, if your friend is having problems with the > software, he can > operate the equipment without it until the problems > have been fixed. > It would be interesting to have input from other > users of the OSCOR > and the associated software to find out how many are > experiencing > problems and how many are satisfied with the Beta > product. > > Tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > > > From: L A Date: Tue Feb 4, 2003 1:05pm Subject: Delta Squad's prosecutor sues; http://webpublisher.lexisnexis.com/index.asp?layout=story&gid=790000479&cid=1410002341&did=47V1-CXK0-00D6-K3MR-00000-00&b=s Delta Squad's prosecutor sues; The sheriff and two workers are accused of using a restricted database to; gather personal information. Copyright 2003 Sarasota Herald-Tribune Co. Sarasota Herald-Tribune...02/01/2003 KELLY CRAMER, kelly.cramer@h... The U.S. attorney who prosecuted six members of the Manatee County Sheriff's Office is suing Sheriff Charlie Wells and two of his employees, claiming they used a restricted state database to gather personal information about him. Federal prosecutor Jeffrey Del Fuoco filed the lawsuit Friday in U.S. District Court. Del Fuoco led a corruption investigation into the sheriff's Delta Squad, an anti-drug unit. In the end, five members of the squad and another former deputy were sent to federal prison. In his lawsuit, Del Fuoco accuses employees at the Sheriff's Office of getting information such as his address and Social Security number in order to retaliate against him for putting their colleagues in prison. Del Fuoco's lawyer, Craig Huffman, said the prosecutor suspects deputies may have been planning to plant drugs in Del Fuoco's home or car. "This was the modus operandi of the Delta Squad," Huffman said. "They carried insurance and their insurance was crack cocaine." Lola Foy, an crime analyst with the Sheriff's Office, pulled Del Fuoco's license plate and driver's license information two days after the last former deputy was sentenced June 4, 2001. Del Fuoco said in the lawsuit that he never drove his personal car in Manatee County. Nothing ever happened to Del Fuoco, but he wants to send a message that prosecutors who go after corrupt cops won't be intimidated, Huffman said. Sheriff's Office spokesman Dave Bristow said Del Fuoco's theory is outrageous. Sheriff Wells could not be reached for comment Friday. The Florida Department of Law Enforcement discovered Foy's search in November as part of a routine check agents sometimes perform on federal prosecutors. FDLE agents and the sheriff's investigators interviewed Foy in November and December, and she told them she couldn't remember who, if anyone, asked her to do the search, according to a sheriff's report. "I would only utilize any information I have obtained from any source in a lawful matter," Foy said in a written statement. The burden is on the Sheriff's Office to prove that, Huffman said. Huffman said the U.S. attorney's office as well as the FDLE may be conducting criminal investigations into Foy's research. Congress passed a law in 1994 that criminalized obtaining driver's license information for personal use after Rebecca Schaeffer, an actress on the sitcom "My Sister Sam," was killed by a stalker in 1989. The stalker got her home address from driver's license information. The investigation into the Delta Squad was never officially closed. Del Fuoco said in 2001 that he would be looking into how far up the ranks the corruption went. There has been no public activity on the case since. Del Fuoco would not prosecute any new charges in the case because he no longer works in the public corruption unit. He moved to the major crimes division last year. Steve Cole, spokesman for the U.S. Attorney's Office, told the Tampa Tribune he couldn't comment on Del Fuoco's lawsuit. Wells designed the Delta unit to stop crack cocaine dealing. The Delta agents' tactics, which included planting evidence and stealing money during traffic stops, forced local prosecutors to drop more than 100 Delta drug cases involving 67 defendants. Michael Fetcher of the Tampa Tribune contributed to this report. ===== L. Altman Caliber Investigation Agency (NYC) cia1.bravepages.com cia@i... Ph# 1-718-318-2214 Fax 1-718-318-2866 Newsletters: http://cia1.bravepages.com/nwsltr/Archives.html __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6874 From: wes mooty Date: Tue Feb 4, 2003 9:13pm Subject: g.p.s. hideing places could anyone offer any advice where on a truck or car a g.p.s. tracking device mite be hidden.....preferable a 2001 f 150 ford pick up....or how to test and see if one mite be attached to ones truck...thanks in advance.. 6875 From: Carl A. Clauson Date: Mon Feb 3, 2003 4:38am Subject: Institute for Security Technology Studies Here is a request for help. If any of you are able to provide assistance, I will leave it up to you. Carl Clauson Editor PISA News! Come visit at: www.pisa.gen.va.us ************************************************************** Institute for Security Technology Studies Gap Analysis Project Request for Input ************************************************************** The following is a request from Kevin O'Shea of the Institute for Security Technology Studies at Dartmouth. For more information, please contact Mr. O'Shea at: Kevin O'Shea Technical Analysis Group Cyber Attack Investigative Tools: Gap Analysis Project Institute for Security Technology Studies 45 Lyme Road Hanover, NH 03755 gapanalysis2003@i... 603-646-0700 -------------------------------------------------------------- My name is Kevin O'Shea and I am a researcher with the Technical Analysis Group at the Institute for Security Technology Studies at Dartmouth College. We are looking for assistance from you and your organization in identifying existing tools and technologies for investigating cyber attacks for our Gap Analysis project. The Institute for Security Technology Studies was created in early 2000 with the mission to serve as a center for counter terrorism technology research, development, and evaluation, with a particular focus on cyber-security and critical information infrastructure. Additional information can be found at http://www.ists.dartmouth.edu The Technical Analysis Group is developing a research and development agenda for law enforcement tools and technologies for investigating cyber attacks. We recently finished the first step of the project; a national Needs Assessment where we asked law enforcement about the technological impediments they face when responding to and investigating cyber attacks. The findings have been published and can be downloaded at: http://www.ists.dartmouth.edu/TAG/lena.htm We are now moving onto the next phase of the project, the Gap Analysis, where we will gather and catalog the available tools, and match them up against the perceived needs of the cyber attack investigators. The results will illustrate where additional research and development should be conducted. Additional information regarding the Gap Analysis project can be found at: http://www.ists.dartmouth.edu/TAG/gap_analysis.htm Submit a Solution ----------------- If you have developed or used a tool which assists in the investigation of cyber attacks, we ask that you visit our "Submit a Solution" page to provide a detailed description of the functionality of the tool and which Law Enforcement specific impediment(s) the tool addresses. The "Submit a Solution" page can be found at the following URL: http://www.ists.dartmouth.edu/TAG/subtool/register.htm The Investigative Research for Infrastructure Assurance group here at ISTS has initiated a project to examine training programs for cyber attack investigators. Details on the project and contact information on how to become involved can be found at: http://www.ists.dartmouth.edu/IRIA/projects/d_letraining.htm Please feel free to forward this email to anyone you believe would have information to contribute to the project. We thank you for helping us with this national effort, and we look forward to working together in the future. Sincerely, Kevin O'Shea -------------------------------------------------------------- The JUSTNETNews Mailing List is maintained by the National Law Enforcement and Corrections Technology Center. Regular postings include the weekly Law Enforcement and Corrections Technology News Summary and announcements from NLECTC and the National Institute of Justice Office of Science and Technology (NIJ/OS&T). To SUBSCRIBE, use the online form at: http://www.nlectc.org/justnetnews/nlectc_subscribe.asp OR send a plain-text email containing only the message "join JUSTNETNews firstname lastname" (without quotes) to the address listmanager@n.... 6876 From: kondrak Date: Wed Feb 5, 2003 6:29pm Subject: Re: Stop telemarketers They are not Dual-Tone freqs. The be-boo-be tones are discreete. Look at them on a scope. At 08:56 2/3/03 -0600, you wrote: >The main thing I see that is wrong with those tones is that our DTMF tones >are two frequencies per tone, not one (thus Dual Tone Multi-Frequency >designation). Do you know the second tone for the three tones you >mentioned? > >Sgt. Kirk Sewell >Illinois State Police, Technical Investigations >500 Iles Park Place, Suite 300 >Springfield, IL 62718 >(217)524-6079 > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6877 From: Steve Uhrig Date: Wed Feb 5, 2003 7:32pm Subject: Re: TSCM strategy, evaluation & contrtol On 3 Feb 2003 at 5:09, Romeo Mabasa wrote: > We're currently developing the above mentioned things and need your > input. We were given a budget and we need ways to improve on it. You're asking for work product from a small number of competent people who have spent entire careers and thousands of hours developing their skills. The proper thing to do is to hire a consultant and pay his rate to advise you and work with you to develop your plans. That will, by far, be the best use of your budget. You're not likely to get a good reception asking people to give away their work product. There may be as many as 15 or 20 people on this list who would qualify to consult with you. Ask for references. Reword your request, acknowledging you are willing to pay for the fruits of a man's labor, which he uses to feed his family, and you may get a few responses. Not everything on the web is free. What is free is usually worth what you pay for it, if that. Persons on this list are responsible for millions of dollars' worth of information security. That is not freebies. Try again with a differently worded request and you may get some offers. This is a valid place to seek such services. Many of us provide them, but as a cost. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6878 From: Charles P. Date: Wed Feb 5, 2003 11:44pm Subject: Re: Stop telemarketers The three tones are often known as SIT tones (Special Information Tones). They are used by the phone company to indicated a line that is not in service or some other line situations (Vacant Code/ Intercept/ Reorder/ and No Circuit). Some telemarketing computer systems are sensitive to the tones and will knock your number off of their list when they hear it. A friend of mine in NJ said it made a big difference in the number of telemarketing calls at his residence. But it depends on the equipment used by the caller. The units have been available for a number of years but have seen a recent increase in popularity due partly to the p.i.t.a. telemarketers and partly to marketing by Radio Shack and others. Charles Charles Patterson Global Communications Tarrytown, NY charles@t... ----- Original Message ----- From: "Gregory Horton" To: Sent: Monday, February 03, 2003 1:02 AM Subject: [TSCM-L] Stop telemarketers > Received this e-mail from a pal. Is this on the up and up? > > Subject: No Telemarket > > > > K. Alan Carlton, Professional Home & Building Inspection Consultant, > Fort Worth, Texas 817 572-3300 > Amateur Radio Operator N5GKY > > YES, YOU CAN STOP TELEMARKETERS ' annoying calls, or at least slow them > down: Those 3 familiar tones courtesy of Ma-Bell will do the trick. > > Most Telemarketers use what is called Predictive Dialers, which are PCs > with software that dials ever number in a phone exchange until it gets > lucky. Now you can use their own technology against them, and it's > legal. Here is how their system works: the dialer calls your number, > you answer, and you have probably notice the line appears dead after you > said, "Hello". What their computer is doing is listening for a short > burst of audio, your "HELLO", followed by a period of silence. With > this heard, it will log your phone number as valid and transfer the call > to an available telemarketer, the reason for the delay before someone > comes on line. > > Now, if their computer receives a long audio burst (an answering > machine) " Hello, this is Alan Carlton", then it will disconnect, but it > will log you phone number as valid, for a later call-back. Oh Lovely! > Some are even capable of detecting Fax tones and will even transmit a > fax trying to sell selling something you're probably are not interested > in. However, do not answer, or when you do answer the phone, or if fax > tones are detected, or if it detects an answering machine, in all four > (4) cases IT LOGS YOUR NUMBER AS A GOOD PHONE NUMBER FOR FUTURE CALL- > BACK --- PLUS THE COMPANY IS ALSO SELLING THESE VERIFIED VALID NUMBERS > LIST TO OTHER TELEMARKETERS. > > A SIMPLE WAY TO STAY OFF THE LIST IS TO USE THEIR OWN TECHNOLOGY AGAINST > THEM. > > The predictive dialer's software also looks for NON-valid phone numbers, > and there is a simple way you can make your phone number appear invalid > to the telemarketers' computers, thus they do not call back and > accumulate no database, at least with your number, to sell other > Telemarketers. > > Here is how to do it: If you call a number that has been disconnected > or is no longer in service you will hear 3 short tones, > "doo...dah...dee", thanks to Ma-Bell. Each time you Refresh this page > you should hear, "doo...dah...dee". The actual frequency of these > tones are 985.2 Hz, 1370.6 Hz, and 1776.7 Hz. Guess what the > telemarketers' software does when it detects these 3 tones at the > beginning of your outgoing message? It thinks it has reached a line > that is disconnected or is no longer in service. So, it disconnects and > does not log your phone number as a working number. BINGO! > > NOW record these onto you outgoing message or voice mail announcement, > and start exterminating telemarketers. Try this example, but use your > own name, "doo...dah...dee, Hello, This is Alan Carlton". It must be at > the beginning of your announcement to work. You may have to explain it > to you friends, but they will soon have it on theirs' too. > > > > > [Non-text portions of this message have been removed] > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 6879 From: Date: Wed Feb 5, 2003 7:22pm Subject: Re: Re: TSCM strategy, evaluation & contrtol In a message dated 2/5/2003 5:34:24 PM Pacific Standard Time, steve@s... writes: > Persons on this list are responsible for millions of dollars' worth > of information security. You meant many Billions didn't you. …minence grise, Being an ex in this business is like being an ex-marine, ex-biker, ex-Mafia member, or an ex-homosexual. [Non-text portions of this message have been removed] 6880 From: Andrus Aaslaid Date: Thu Feb 6, 2003 2:20am Subject: GSM vehicle tracking Hello All! I have been following this list for several years and although have not had much opportunity to contribute back (mostly because of feeling small and unimportant after reading the posts from number of gentelman here :)), I do enjoy a lot the skills and proffessionalism found here! After being envolved as owner and member of the board for five years in electronics design company (www.artecdesign.ee), I am now happy to announce my envolvement with another company, more relevant to this list - Oskando O‹. The sole business of Oskando is GSM-based vehicle tracking and remote telemetry systems, as well as other GSM-based industrial devices. If any information is needed, please visit http://www.oskando.ee/eng Best Regards, Andrus. -- Andrus Aaslaid O‹ Oskando Phone: +372 673 7300 Fax: +372 673 7301 Direct: +372 50 28018 andrus.aaslaid@o... http://www.oskando.ee 6881 From: Times Enemy Date: Wed Feb 5, 2003 2:25pm Subject: Re: g.p.s. hideing places greets. > could anyone offer any advice where on a truck or car a g.p.s. > tracking device mite be hidden.....preferable a 2001 f 150 ford pick > up....or how to test and see if one mite be attached to ones > truck...thanks in advance.. Kind of an interesting question. But then, if a surge of 2001 F150 trucks start to vanish in your area ... well ... Phrack (Volume 0x0b, Issue 0x3c, Phile #0x0d of 0x10) had a nice article on a nifty device for making an alleged GPS jammer. I'm including this, along with a portion of the text .... Also, in this text are various frequencies and such which could prove useful if you were to do some scanning or such of a vehicle. --- included snippet ---[ 2 - Why? The onslaught of cheap GPS based navigation (or hidden tracking devices) over the past few years has made it necessary for the typical citizen to take up the fine art of electronic warfare. Several companies[2] now sell "hidden" GPS based tracking devices which mount inside or underneath your vehicle. Some transmit the coordinates, via cellular phone, of your vehicle's present and/or past locations for weeks at a time without battery changes or court orders! Vehicle rental companies have been known to use GPS tracking devices to verify you don't speed or abuse their rental vehicles. The unsuspecting renter is often faced with these hidden abuse "fees" after returning the rental vehicle. --- z end of z snippet ciao .times enemy 6882 From: Date: Wed Feb 5, 2003 11:17am Subject: Stop Telemarketers with S.I.T. Tone (Special Information Tone) Disconnet You can get the SIT Tone off of www.sandman.com/tmstop.html and record it in front of your outgoing message on your answering system, I did this last year and it worked to some extent and then I ended up buying their device because I was still getting telemarketing calls, so now when I pick up the phone it plays the SIT and the predictive dialing computer thinks that it has reached a disconnected telephone line and removes my phone number from their data base. Also available at Radio Shack. ¬ ¬ ¬ ¬ ¬ ¬ > > Telemarketer Stopper!‚Ñ¢ IMPORTANT NOTICE:The FBI has developed new technology to fight the Taliban and find Bin Ladin, using telecommunications...CLICK HERE FOR MORE INFORMATIONfrom Sector Eight¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ ¬ from Mike Sandman...Chicago's Telecom Expert The Telemarketer Stopper!‚Ñ¢ MakesTelemarketers & Bill Collectors ThinkYour Phone Line Doesn't Exist! Within a week, you'll be able to sit down and eat dinner, without being disturbed by Telemarketers!Click here to hear a SIT tone. (45K)Put it in front of one or all your phones (and your answering machine), and it will play a SIT (Special Information Tone) whenever you or your answering machine answers your line. The SIT tone is the short "doo-doo-doo" sound you hear when you dial a disconnected number - before the recording says the line is disconnected.Telemarketers and Bill Collectors often use Predictive Dialers to dial outgoing calls. These are computers that keep dialing phone numbers on a list until they reach a live person. The Predictive Dialer then transfers that call to the first live operator. That's why you hear silence for a while before someone gets on the line, when you answer the phone sometimes. Some of them are bold enough to play a little recording asking you to "Please hold on for an important call!" Right.Telemarketers and Bill Collectors don't want to pay their operators to dial the phone and listen to busy signals and answering machines, so they have a computer do it for them. The Predictive Dialer is programmed to hang up if it hears a SIT tone, since it knows the line is disconnected. It doesn't listen to what's said after the SIT tone, since it doesn't understand words. The Telemarketer or Bill Collector often takes that number out of their database too, so it won't be called again!The Telemarketer Stopper!‚Ñ¢ plays the SIT tone when you answer the phone. If it's a Predictive Dialer - the line will go dead. If it's a human, they'll hear the SIT tone and then hear you say "Hello" to answer the phone. Generally speaking, humans will ask you what that tone was, but they won't hang up. If you have an answering machine, delay your message for about 1.5 seconds to give the SIT tone time to play before you say "Hi, this is xxx..." The SIT tone will only be heard when you answer phones that are hooked up after the Telemarketer Stopper!‚Ñ¢ There's an "IN" and an "OUT" jack - and it's line powered. If you want it to do play the SIT tone automatically when you answer any phone in the house or business, it needs to be connected where the line comes in before any phones or the phone system.Our customers keep calling us with the same remarkable stories...""It took about a week, but nobody's calling us at dinner time anymore!""We had a bill collector calling us every day for something we didn't owe (it was the phone company). We put the Telemarketer Stopper!‚Ñ¢ on the line, and the calls stopped after only one day! Then the calls started coming in on our other line (we don't even give out that number). We got another Telemarketer Stopper!‚Ñ¢ and put it on that line, and the calls stopped in one day again! It's amazing!"It worked in our own house! Donna was on every suckers list there is. We couldn't sit down at dinner time without the phone ringing like crazy. We couldn't sleep late on Saturdays. I finally put one in front of our phone system at the house, and after a week - the calls totally stopped! Get your own Telemarketer Stopper!‚Ñ¢ Today! Only $34.95! 30 Day Moneyback GuaranteeDealer Pricing Available IMPORTANT NEWS... Sorry, this version of the Telemarketer Stopper!‚Ñ¢ has been discontinued due to a Patent dispute. A new version should be ready soon, but it'll be a little more expensive - and will require programming to avoid any legal trouble.It will start life as a programmable speed dialer, and will require some simple programming from a DTMF phone to make it generate a SIT tone (or any other tone you want) when the line is answered (or at any other time). That will get around the Patent claims, but it will require a little more effort on your part to install it.We've found that when our customer decides to buy the Telemarketer Stopper!‚Ñ¢, they're upset enough to do whatever it takes to get rid of the jerks that are bothering them, so we're going to make this new device.Check with our office at 630-980-7710, to see if it's available now.Part Number: CID6D¬ ¬ ¬ CallSaver: Disconnects a Phone Line that's Left Off Hook!If your child or pet has ever knocked a phone off the hook, and nobody could call you all day, CallSaver will hang up the phone for you!If your modem locked up and nobody could call you all day, CallSaver will hang up the phone for you!If your mother or grandmother has ever knocked their phone off the hook, and you couldn't call them all day, CallSaver will hang up the phone for them! It's like having someone checking your phone line for you, all the time! CallSaver disconnects the line when it hears the loud beep-beep-beep that the phone company uses to tell you to hang up your phone when you've left it off hook (called a "Howler"). The built-in ringer will alert you if you have a call while your phone has been automatically disconnected. When you finally hang up your phone, the CallSaver reconnects it automatically, and waits for the next time! CallSaver installs easily in front of a single phone, or you can install it in front of all of the phones or a phone system in the home or office (just make sure you can hear the built-in ringer which reminds you to hang up the line).Also works in front of phone systems, when the phone company doesn't provide a CPC Signal (Calling party Control) to release the call from hold or drop the voice mail when the outside party hangs up. CallSaver disconnects the line, which will cause the phone system to drop the line so it's ready for the next call (all happens automatically). Complete with A/C Adapter and Built-in Ringer Part Number: WAL3R¬ ¬ ¬ Price: $29.95¬ ¬ 630-980-7710 Copyright ¬© 2001 Mike Sandman Enterprises [Non-text portions of this message have been removed] 6883 From: info gathering Date: Wed Feb 5, 2003 10:21am Subject: RE: g.p.s. hideing places Hello Wes, A possible good hiding place might be right under the dashboard and close to your front windshield. Make sure that you place the antenna close to the top of the dashboard so that there is very little plastic between your antenna and the outside of the dashboard, as well make sure that the area your antenna is under is exposed to as much of your front windshield as possible in order to get a signal. The GPS signal can travel through the windshield no problem but the thickness of the plastic dashboard may hinder the signal. You'll have to test it due to different antennas being more sensative to the GPS signal than others. Try it and let me know if it works. Thanks Thorsten Kemper Electronic Engineering Consultant www.spaceleaf.com ---------- Original Message ---------------------------------- From: "wes mooty " Date: Wed, 05 Feb 2003 03:13:18 -0000 >could anyone offer any advice where on a truck or car a g.p.s. >tracking device mite be hidden.....preferable a 2001 f 150 ford pick >up....or how to test and see if one mite be attached to ones >truck...thanks in advance.. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6884 From: Steve Uhrig Date: Thu Feb 6, 2003 4:52pm Subject: Butt set to test POTS/ASDL without knocking out the ASDL portion of the circuit. Worth the read for the technical info if nothing else. Anyone wanting one can get it through me if you don't have an account with Tessco. http://www.tessco.com/knowledgetools/twj/new/news_88 Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6885 From: Date: Thu Feb 6, 2003 4:05am Subject: stalking by satellite worries experts MILWAUKEE (Feb. 6) - Connie Adams found it impossible to escape her ex-boyfriend. He would follow her as she drove to work or ran errands. He would inexplicably pull up next to her at stoplights and once tried to run her off the highway, authorities said. When he showed up at a bar she was visiting for the first time, on a date, Adams began to suspect Paul Seidler wasn't operating on instinct alone. He wasn't - Seidler had installed a satellite tracking device in Adams' car, according to police in Kenosha, Wis., 30 miles south of Milwaukee. ''He told me no matter where I went or what I did, he would know where I was,'' Adams testified at a recent court hearing. Police say Adams' case and several others across the country herald an incipient danger - high-tech stalking. Just as the global satellite positioning system can help save lives, so can its abuse endanger them, advocates of stalking victims say. ''As technology advances, it's going to be almost impossible for victims to flee and get to safety,'' said Cindy Southworth, director of technology at the National Network to End Domestic Violence in Washington. In the Adams case, Seidler pleaded innocent last month to felony counts of stalking, recklessly endangering safety, burglary and a misdemeanor count of disorderly conduct. His trial is pending. Adams does not want to speak to reporters about the case, said Susan Karaskiewicz, a Kenosha County prosecutor. Police say Seidler put a global positioning tracking device between the radiator and grill of Adams' car. Such gadgets use a constellation of Defense Department satellites to pinpoint location and can send their coordinates via cellular networks to wireless handsets or computers. Trucking companies use GPS systems to track of hazardous cargo and monitor drivers. Corrections authorities use them to monitor sex offenders. Hikers, boaters and motorists use GPS devices to keep from getting lost. GPS technology is also being built into cell phones to help emergency dispatchers find 911 callers. They're also being used to prevent car theft. Southworth trains victims advocates, law enforcement and prosecutors on stalkers' use of the technology, which she says is only just beginning to be abused. The Stalking Resource Center at the National Center for Victims of Crime has found at least one other case of a GPS system being used to stalk a victim. In it, a Colorado appeals court in July upheld Robert Sullivan's conviction for stalking his ex-wife and installing a GPS device in her car to track her movements. GPS is not the first technology to be misused by stalkers, who have also employed the Internet, microchip-sized cameras and even caller identification, said Southworth, though it is the most dangerous to date. Just as she once taught victims how to block caller ID when they use the phone, Southworth now suggests victims occasionally check under their car's hood. Police are also finding GPS devices useful. Marla Wagner, sales manager at L.A.S. Systems, the same McHenry, Ill.-based company that made Seidler's device, said the company has sold GPS systems to about 10 police departments during the last year. The Kenosha Police Department is also buying a system from L.A.S. Systems. Tracy Bahm, the Stalking Resource Center's director, said some states are working to update their stalking statutes to include the high-tech variety. The center typically advises states to keep their statutes broad enough to include technologies that don't yet exist. ''As society and technology evolve, stalkers will always find new ways to harass their victims,'' Bahm said. AP-NY-02-06-03 0202EST [Non-text portions of this message have been removed] 6886 From: Ocean Group Date: Thu Feb 6, 2003 11:04am Subject: Shuttle Article...Interesting... PRAVDA 18:12 2003-02-05 Authoritative Opinion: NASA Specialists Watched Columbia Start and Made Mistakes Editorial office of PRAVDA.Ru appealed to Senior Research Fellow at the U.S. Air Force Base (Eglin, Florida), former NASA member and former Soviet scientist Alexander Bolonkin for comments on the Columbia shuttle tragedy. - The death of seven astronauts (Husband, McCool, Ramon, Brown, Anderson, Clark and Chawla) shocked not only America. National mourning was also declared in Israel, as one of the perished was the first Israeli astronaut in the space crew. The catastrophe is also a tragedy for India, as an astronaut American of Indian origin, Chawla, was member of the crew as well. As soon as the demise of the shuttle was reported, several versions of the tragedy immediately arose, including the suggestion of a diversion, as Texas residents said they saw explosion of the shuttle. At present, when we know that temperature in the shuttle's left wing, and then inside the craft, suddenly rose several minutes before the catastrophe, the main version of the tragedy says that a thermal protection tile of the rocket's fuel tank was lost during liftoff, then it hit the nose of the left-wing heat-resisting covering and destroyed it. This was observed at the liftoff moment, but NASA specialists decided that the damage was insignificant and couldn't hamper return of the shuttle. Butt they were mistaken. As my experience shows, majority of NASA employees are engineers working there right after graduation from institutes or under the patronage of some influential persons. What is more, NASA's success is achieved not due to the greatness of the personnel, but because of US's large-scale financing of space explorations (it is 30 times more than total financing of the rest countries of the world spent on space exploration). But what could they do? It is impossible to repair a spaceship in the space. The flight program provides for no going out into the space and for no equipment necessary for repairing. The only thing that the astronauts realized was that the damage was considerable and they would be inevitably burnt down at approaching the Earth. Could any attempts be made to turn the spaceship back during the liftoff? But it took time to get information concerning damages on the shuttle and to analyze it; within this period of time the rocket already passed through the dense atmospheric bed, and the spaceship would have inevitably heated up during its return. By the way, contrary to the narrow-minded opinion introduced by journalists, spaceships get warm not because of friction on the air, but because they compress the air in front of them and the air may reach the temperature of about 2000 degrees. The tragedy occurred basically through the fault of the company Lockheed Martin, the producer of the thermal protection coating. Companies usually employ lower-paid uneducated emigrants for simple operations, it is frequent that technology compliance is neglected at that. Five Shuttles performed 113 space flights since the moment their exploitation started (April 1981), the Columbia shuttle made over 30 flights and it was the first spaceship of this series. Many defects were discovered over the exploitation period. But catastrophes never occurred when the shuttle got back from the space. The shuttle of Challenger also blew up during its liftoff in January 1986 and killed seven astronauts. Subcontractor of the Lockheed Martin company, Thiokol, was declared one of the party at fault of the catastrophe. Unlike Americans, all Soviet cosmonauts (Komarov on April 23, 1967; Dobrovolsky, Volkov and Patsayev on June 30, 1971) died when they were getting back to the Earth. The Communist party central committee was guilty of Komarov's death, as it categorically demanded that a space flight must be performed by May 1, the International Labour Day, although the spaceship was unfinished. The other three astronauts probably died because of the imperfection of the spaceship construction and the demand of the Communist party central committee to place three cosmonauts into a cockpit designed for one man. The shuttle has a thermal coating consisting of 24192 tiles and 3254 flexible isolation mats. The coating protects the shuttle from aerodynamic heating at orbiting and during descending. This coating is different on different areas and depends upon the thermal load of each sector. A composite of carbon and graphite with the heat resistance of up to 1650 degrees is the most heat-resistant material, it is used in the shuttle's fore body and in the front edge of wings. Fiber glass tiles protect the flank surfaces where the temperature may reach 650 degrees. Quartz fiber mats and felt mats guarantee thermal insulation of the shuttle from red-hot and vaporable tiles. The tiles are replaced after every flight. Probably, bad junction resulted in detachment of the tiles during the liftoff and during vibration. The fragment that crashed to the left wing of the shuttle at the 80th second of the flight weighed about one kilogram. Breaking of the fuel tank isolation occurred with this shuttle even earlier, in 1992. But damages were insignificant that time, that is why no tragedy occurred. What a pity that NASA didn't pay special attention to the problem! Many facts prove the version saying that the catastrophe occurred because of damages in the thermal insulation. Sensors of the hydraulic system burnt down in the shuttle's left wing several minutes before the catastrophe, pressure transducers burnt down in the chassis, then the temperature in the middle trunk suddenly increased. It is highly likely that hot gases penetrated there. The shuttle started losing its path and the airborne computer attempted to adjust the path. But the high temperature didn't reach the crew immediately, as the astronauts reported no temperature increase. The shuttle was destroyed instantly. The demises of the two shuttles of the five ones (Challenger and Columbia) will seriously undermine the US Space Exploration program and especially the program of the International Space Station. Supply of the International Space Station with essential goods and saving of the astronauts in emergency situations are to become a real problem because of this loss. I worked in NASA when a life-saving craft X-33 was developed and I observed its tests. However, this program is not completed yet, and it is not clear when it will be finished. Some time ago NASA budget was curtailed. The NASA leadership fired five members of the Aerospace Security Council and two consultants for their criticism. One more employee left the service himself as he disagreed with the NASA leadership's position. Unfortunately, the practice of persecution of people criticizing the agency's programs and policy is widely used in NASA. Space exploration inevitably entails victims. Such is the way of any progress, and humanity must pay this price if we want to become masters of the nature and live better and longer. And this price is insignificant as compared with human losses in wars, or as a result of diseases, crimes and terrorism. The knowledge we obtain, science, new technologies have radically changed our life and turned us into masters of the Earth. It is actually very important to learn the lessons of every catastrophe, try to avoid making the same mistakes, to reduce the number of human victims; we must always remember those heroes who sacrificed their lives for the sake of new knowledge and for progress of humanity. I am sure that Americans will never forget the heroes of the space, take care of their families and children. It's a pity that Russia, former Soviet republics never commemorate anniversaries of astronauts' deaths. When cosmonauts were officially spoken about, only the dates of their flights are mentioned, but nobody ever says how the flights ended. The above mentioned Soviet cosmonauts died because of the Communist party central committee that pursued new records. Twenty one cosmonauts tragically died over the whole period of the space era. In order to reduce the death probability among cosmonauts, I offer to equip shuttles with a small thermal protection cockpit with a parachute so that astronauts could take shelter there in emergency situations. The size and weight of shuttles allow to build in such cockpits. Picture: Alexander Bolonkin Alexander Bolonkin Doctor of Technical Science, Former NASA senior research fellow Special to PRAVDA.Ru USA Translated by Maria Gousseva 6887 From: Thomas Habets Date: Fri Feb 7, 2003 9:08am Subject: Re: Shuttle Article...Interesting... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This is the worst article on the subject I've seen yet. See comments below. (there are other minor flaws I chose not to comment on) On Thursday 06 February 2003 18:04, Ocean Group wrote: > the main > version of the tragedy says that a thermal protection tile of the rocket's > fuel tank was lost during liftoff, then it hit the nose of the left-wing > heat-resisting covering and destroyed it. The NASA version is that FOAM came off and smashed against the wing. A thermal protection tile would NEVER break apart like in the video seen on CNN and such (would it? I'm not a rocket scientist. But they did say it was foam). > This was observed at the liftoff > moment, but NASA specialists decided that the damage was insignificant and > couldn't hamper return of the shuttle. Butt they were mistaken. How does this person know this? NASA *still* says this wasn't the cause. - ------ Shuttle program manager Ronald Dittemore told reporters today they were, in effect, mistaken if they assumed from previous briefings the Columbia disaster investigation was focused primarily on the possibility foam debris from the ship's external tank triggered the orbiter's destruction during entry Saturday [... ] "As I mentioned before, we're trying to find the missing link and as you focus your attention on the debris, we're focusing our attention on what we didn't see. We believe there's something else. And that's why we're doing a fault tree analysis and that's why we're investigating every area. Right now, it just doesn't make sense to us that a piece of (foam) debris could be the root cause of the loss of Columbia and its crew. It's got to be another reason." [...] "So it's something else. It's something else." - ------- http://www.spaceflightnow.com/shuttle/sts107/030205foam/ http://www.spaceflightnow.com/shuttle/sts107/status.html > As my > experience shows, majority of NASA employees are engineers working there > right after graduation from institutes or under the patronage of some > influential persons. This is just nasty. If I remember correctly about 80% of the people working on the Apollo program were under 30, and all three Apollo 11 astronauts were exactly 30. As a man under 30 myself, I take offense to this comment. Yes, It'd be great if they all were thousand-year-old wisards, but this is insulting. I don't know, maybe I'm reading too much into this. > What is more, NASA's success is achieved not due to > the greatness of the personnel, but because of US's large-scale financing > of space explorations (it is 30 times more than total financing of the rest > countries of the world spent on space exploration). Now money sends people into space? Bah. > The only thing that the astronauts > realized was that the damage was considerable and they would be inevitably > burnt down at approaching the Earth. Uhm... then why was everyone so surprised? > The tragedy occurred basically through the fault of the company Lockheed > Martin, Thank you. Now everyone can drop their investigations. This person obviously knows what caused the accident. Shut down NASA too, this person can probably send people to Mars as well. What is it with the tradition of first finding someone to blame, and then finding out what happened? > Breaking of > the fuel tank isolation occurred with this shuttle even earlier, in 1992. > But damages were insignificant that time, that is why no tragedy occurred. > What a pity that NASA didn't pay special attention to the problem! I'm sure they ignored it. They sure paid attention to it when foam came off the fuel tank last time, which was two trips ago for Columbia. - --------- typedef struct me_s { char name[] = { "Thomas Habets" }; char email[] = { "thomas@h..." }; char kernel[] = { "Linux 2.4" }; char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; } me_t; -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O CiJGbTPdjZyRH2FYe0wz51I= =jAYM -----END PGP SIGNATURE----- 6888 From: Matt Paulsen Date: Fri Feb 7, 2003 9:10pm Subject: RE: Shuttle Article...Interesting... FUD. Just factor in who's agenda you're reading from. ------ >This is the worst article on the subject I've seen yet. See comments below. >(there are other minor flaws I chose not to comment on) 6889 From: Matt Paulsen Date: Fri Feb 7, 2003 9:28pm Subject: new pacific northwest group to begin meeting and emailing There is a new group forming for Pacific Northwest area medical services to discuss infosec/warfare, bioterrorism/counterterrorism response/avoidance, etc. technical services/attacks/defenses/etc. Region of coverage is OR, WA, ID, northern CA. Currently there are 16 area organizations and the list is growing quickly. Most likely this group will begin presentations at the local infragard chapters and other appropriate locations when things start drumming up as well as applying these results nationally, regionally and locally through various federal/state/local authorities along with coordinated efforts with private and public commercial and/or non-profit organizations. If you have an interest in understanding/attending and directing these non-strategic meetings to discuss tactical implementations of applied technologies please contact me offline and I will review and forward to appropriate contacts to talk about it with you. You must be a full time employee for a state/federal/regional government relating to disaster service - planning/avoidance/etc. - ie: VA, FBI, DoE, DoD, etc., commercial or non-profit organization that relates to medical services - hospitals that service critical care/emergency care, patient transit services - ambulatory, flight, JHACO employees, etc. and/or emergency response services - fire & rescue/police/etc., or national disaster planning / avoidance - DoD, VA, homeland security, etc, and actively work as a chief security officer, network supervisor/security supervisor, disaster planning coordinator or other appropriately termed title, and control the direction of technology within your organization, not just implement it. Thanks for your time. Matt 6890 From: Date: Fri Feb 7, 2003 7:07pm Subject: Re: Shuttle Article...Interesting... are you Swedish? (re: your email addy)... that might explain your willingness to believe what the government tells us. if the government is found to be at fault, the cause will likely be classified and sealed. they will prepare something false to tell the media. of course, the media is the worse source for reliable information. this Russian scientist is in a good position to tell his opinion - he worked at NASA, knows the politics and government coverups, plus he is a Russian in Russia, not likely to be thrown in a US jail for exposing a coverup. he has a very strong nation behind him as well. i know the Lockheed part about hiring imigrants for cheap pay is true. see: http://www.lockheedmartin.com/spotlight/minority_employer.html hee hee, they make slavery sound like a virtue :) On Fri, 7 Feb 2003 4:08pm, Thomas Habets wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > This is the worst article on the subject I've seen yet. See comments > below. > (there are other minor flaws I chose not to comment on) > > On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > the main > > version of the tragedy says that a thermal protection tile of the > rocket's > > fuel tank was lost during liftoff, then it hit the nose of the > left-wing > > heat-resisting covering and destroyed it. > > The NASA version is that FOAM came off and smashed against the wing. > A thermal protection tile would NEVER break apart like in the video seen > on > CNN and such (would it? I'm not a rocket scientist. But they did say it > was > foam). > > > This was observed at the liftoff > > moment, but NASA specialists decided that the damage was insignificant > and > > couldn't hamper return of the shuttle. Butt they were mistaken. > > How does this person know this? NASA *still* says this wasn't the cause. > - ------ > Shuttle program manager Ronald Dittemore told reporters today they were, > in > effect, mistaken if they assumed from previous briefings the Columbia > disaster investigation was focused primarily on the possibility foam > debris > from the ship's external tank triggered the orbiter's destruction during > entry Saturday [... ] > "As I mentioned before, we're trying to find the missing link and as you > focus your attention on the debris, we're focusing our attention on what > we > didn't see. We believe there's something else. And that's why we're doing > a > fault tree analysis and that's why we're investigating every area. Right > now, > it just doesn't make sense to us that a piece of (foam) debris could be > the > root cause of the loss of Columbia and its crew. It's got to be another > reason." > [...] > "So it's something else. It's something else." > - ------- > http://www.spaceflightnow.com/shuttle/sts107/030205foam/ > http://www.spaceflightnow.com/shuttle/sts107/status.html > > > As my > > experience shows, majority of NASA employees are engineers working > there > > right after graduation from institutes or under the patronage of some > > influential persons. > > This is just nasty. If I remember correctly about 80% of the people > working > on the Apollo program were under 30, and all three Apollo 11 astronauts > were > exactly 30. As a man under 30 myself, I take offense to this comment. > Yes, > It'd be great if they all were thousand-year-old wisards, but this is > insulting. I don't know, maybe I'm reading too much into this. > > > What is more, NASA's success is achieved not due to > > the greatness of the personnel, but because of US's large-scale > financing > > of space explorations (it is 30 times more than total financing of the > rest > > countries of the world spent on space exploration). > > Now money sends people into space? Bah. > > > The only thing that the astronauts > > realized was that the damage was considerable and they would be > inevitably > > burnt down at approaching the Earth. > > Uhm... then why was everyone so surprised? > > > The tragedy occurred basically through the fault of the company > Lockheed > > Martin, > > Thank you. Now everyone can drop their investigations. This person > obviously > knows what caused the accident. Shut down NASA too, this person can > probably > send people to Mars as well. > > What is it with the tradition of first finding someone to blame, and then > finding out what happened? > > > Breaking of > > the fuel tank isolation occurred with this shuttle even earlier, in > 1992. > > But damages were insignificant that time, that is why no tragedy > occurred. > > What a pity that NASA didn't pay special attention to the problem! > > I'm sure they ignored it. > They sure paid attention to it when foam came off the fuel tank last > time, > which was two trips ago for Columbia. > > - --------- > typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > } me_t; > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O > CiJGbTPdjZyRH2FYe0wz51I= > =jAYM > -----END PGP SIGNATURE----- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > 6891 From: infospy Date: Sat Feb 8, 2003 8:20am Subject: Re: Shuttle Article...Interesting... Anyone that watched the first news conference from NASA, and then listened to the news casters, had to wonder if they were at the same meeting. \ JMHO ----- Original Message ----- From: "Thomas Habets" To: "Ocean Group" ; "TSCM Group" Sent: Friday, February 07, 2003 9:08 AM Subject: Re: [TSCM-L] Shuttle Article...Interesting... > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > This is the worst article on the subject I've seen yet. See comments below. > (there are other minor flaws I chose not to comment on) > > On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > the main > > version of the tragedy says that a thermal protection tile of the rocket's > > fuel tank was lost during liftoff, then it hit the nose of the left-wing > > heat-resisting covering and destroyed it. > > The NASA version is that FOAM came off and smashed against the wing. > A thermal protection tile would NEVER break apart like in the video seen on > CNN and such (would it? I'm not a rocket scientist. But they did say it was > foam). > > > This was observed at the liftoff > > moment, but NASA specialists decided that the damage was insignificant and > > couldn't hamper return of the shuttle. Butt they were mistaken. > > How does this person know this? NASA *still* says this wasn't the cause. > - ------ > Shuttle program manager Ronald Dittemore told reporters today they were, in > effect, mistaken if they assumed from previous briefings the Columbia > disaster investigation was focused primarily on the possibility foam debris > from the ship's external tank triggered the orbiter's destruction during > entry Saturday [... ] > "As I mentioned before, we're trying to find the missing link and as you > focus your attention on the debris, we're focusing our attention on what we > didn't see. We believe there's something else. And that's why we're doing a > fault tree analysis and that's why we're investigating every area. Right now, > it just doesn't make sense to us that a piece of (foam) debris could be the > root cause of the loss of Columbia and its crew. It's got to be another > reason." > [...] > "So it's something else. It's something else." > - ------- > http://www.spaceflightnow.com/shuttle/sts107/030205foam/ > http://www.spaceflightnow.com/shuttle/sts107/status.html > > > As my > > experience shows, majority of NASA employees are engineers working there > > right after graduation from institutes or under the patronage of some > > influential persons. > > This is just nasty. If I remember correctly about 80% of the people working > on the Apollo program were under 30, and all three Apollo 11 astronauts were > exactly 30. As a man under 30 myself, I take offense to this comment. Yes, > It'd be great if they all were thousand-year-old wisards, but this is > insulting. I don't know, maybe I'm reading too much into this. > > > What is more, NASA's success is achieved not due to > > the greatness of the personnel, but because of US's large-scale financing > > of space explorations (it is 30 times more than total financing of the rest > > countries of the world spent on space exploration). > > Now money sends people into space? Bah. > > > The only thing that the astronauts > > realized was that the damage was considerable and they would be inevitably > > burnt down at approaching the Earth. > > Uhm... then why was everyone so surprised? > > > The tragedy occurred basically through the fault of the company Lockheed > > Martin, > > Thank you. Now everyone can drop their investigations. This person obviously > knows what caused the accident. Shut down NASA too, this person can probably > send people to Mars as well. > > What is it with the tradition of first finding someone to blame, and then > finding out what happened? > > > Breaking of > > the fuel tank isolation occurred with this shuttle even earlier, in 1992. > > But damages were insignificant that time, that is why no tragedy occurred. > > What a pity that NASA didn't pay special attention to the problem! > > I'm sure they ignored it. > They sure paid attention to it when foam came off the fuel tank last time, > which was two trips ago for Columbia. > > - --------- > typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > } me_t; > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O > CiJGbTPdjZyRH2FYe0wz51I= > =jAYM > -----END PGP SIGNATURE----- > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6892 From: Ocean Group Date: Sat Feb 8, 2003 8:29am Subject: RE: Shuttle Article...Interesting... Good point...to be honest I think I'd rather wait for the official NASA explanation. The article was also translated so some liberties could have been taken. But there's too many technical inaccuracies in the article for the author that maintains he knows something about it all. Regards Vance Deran Ocean Group, Technical Security Division, Ireland. ____________________________________________________________________ Message: 2 Date: Fri, 7 Feb 2003 19:10:22 -0800 From: "Matt Paulsen" Subject: RE: Shuttle Article...Interesting... FUD. Just factor in who's agenda you're reading from. ------ >This is the worst article on the subject I've seen yet. See comments below. >(there are other minor flaws I chose not to comment on) ________________________________________________________________________ 6893 From: A.Lizard Date: Sat Feb 8, 2003 3:18pm Subject: YOU may have an affected computer Note: for the kind of info most of us will be most interested in, google for the Gary Headlee site referenced in the article. While I generally wouldn't post a computer story to this list, any of us might have an affected computer and the great majority of us are capable of doing the indicated repair, if this is done before the motherboard power filter caps blow up. Also note that some motherboard manufacturers are trying to handle this problem via legal threats made against anyone who discusses their defective products. I'd like to know who those manufacturers are so that I will NEVER buy any of their products. A.Lizard http://www.spectrum.ieee.org/WEBONLY/resource/feb03/ncap.html Thu 06 Feb 03 17:52 1600 GMT Home >>News & Analysis FAULTS & FAILURES Leaking Capacitors Muck up Motherboards Finger-pointing and fury as manufacturers try to dodge blame It has all the elements of a good thriller: a stolen secret formula, bungled corporate espionage, untraceable goods, and lone wolves saving the little guy from the misdeeds of multinational corporations. In this case, a mistake in the stolen formulation of the electrolyte in a capacitor has wrecked hundreds of PCs and may wreck still more in what is an industrywide problem. Aluminum electrolytic capacitors with a low equivalent series resistance (ESR) are high-capacitance components that generally serve to smooth out the power supply to chips. Throughout 2002, they have been breaking open and failing in certain desktop PCs. Motherboard and PC makers contacted by IEEE Spectrum have stopped using the faulty parts, but because the parts can fail over a period of several months, more such failures are expected. So far, the only motherboard maker to admit to the problem is ABIT Computer Corp. (Taipei), and the only major PC maker to acknowledge being affected is IBM Corp. But the problem is likely to be more widespread. Indeed, those who have repaired the damaged boards say that they have encountered crippled motherboards from Micro-Star International, ASUSTek Computer, Gigabyte Technology, and others. For Gary Headlee, who repairs electronics in Midvale, Utah, the trouble surfaced at the end of 2001, when users of PCs with ABIT motherboards began to complain of leaking capacitors. Headlee's solution was to replace all the low-ESR aluminum electrolytic capacitors of 1000 microfarads or over. By last summer he was receiving as many as 10 broken boards through the mail every day, and he estimates he has fixed 1200 boards so far. At about the same time, Carey Holzman, who builds and sells custom PCs, noticed the identical problem in non-ABIT computers he had sold and others he was asked to repair [see photo]. In 12 years of PC repair, "I've never seen anything like it," says Holzman, owner of Computer Performance Specialists (Glendale, Ariz.). It is clear now that a faulty electrolyte is to blame for the burst capacitors. The mystery is: where did it come from and which manufacturers used it? Citing Japanese sources, initial reports claimed that major Taiwanese capacitor firms, including the island's market leaders, Lelon Electronics Corp. and Luxon Electronics Corp., had turned out faulty products. But both companies have denied the accusations. Most of the leaking capacitors pulled from bad boards in the United States, according to repair people, were labeled Tayeh, not a brand affiliated with known capacitor makers. Many others were unmarked. Some, however, did bear the trademarks of Taiwanese passive components firms such as Jackcon Capacitor Electronics Co. (Taipei). Jackcon claims that it has been out of the motherboard market for two years but received some complaints from U.S. consumers in 2002. John Ko, its managing director, blames the motherboard design and remains confident in the quality of Jackcon products. According to Ko, the company's low-ESR capacitors passed quality tests at the Industrial Technology Research Institute (Hsinchu, Taiwan), a nonprofit R&D organization partly funded by the Ministry of Economic Affairs (Taipei), which is also often the source of Taiwanese firms' electrolyte formulas. What happened? The origins of the motherboard malaise seem a lesson in how not to commit corporate espionage. A well-placed source in Taiwan, who did not wish to be identified, largely confirmed for Spectrum accounts published in the United States that were based on sources in the Japanese electronics industry. According to the source, a scientist stole the formula for an electrolyte from his employer in Japan and began using it himself at the Chinese branch of a Taiwanese electrolyte manufacturer. He or his colleagues then sold the formula to an electrolyte maker in Taiwan, which began producing it for Taiwanese and possibly other capacitor firms. Unfortunately, the formula as sold was incomplete. "It didn't have the right additives," says Dennis Zogbi, publisher of Passive Component Industry magazine (Cary, N.C.), which broke the story last fall. According to Zogbi's sources, the capacitors made from the formula become unstable when charged, generating hydrogen gas, bursting, and letting the electrolyte leak onto the circuit board. Zogbi cites tests by Japanese manufacturers that indicate the capacitor's lifetimes are half or less of the 4000 hours of continuous ripple current they are rated for. Electronics makers are ordinarily very careful about capacitor quality. "The large volumes of passive content in any electronic device means that you have that many more chances for a product to fail," says Zogbi, who also runs The Paumanok Group (Cary, N.C.), a market analysis firm focused on the passive components industry. Electronics firms generally supply their manufacturers with a list of parts and materials they can use from suppliers whose quality they trust. Zogbi suspects that, in an effort to cut costs, contract manufacturers used dodgy component sources that were not on the approved list. Major Taiwanese capacitor makers have vigorously denied having made any bad components, but the crisis has had a chilling effect on the island's whole industry, which produces 30 percent of the world's aluminum electrolytic capacitors. "Many buyers refused to maintain their relationship with Taiwanese firms," says Francis Tsai, spokesman for Luxon Electronics (Taipei), the second-largest aluminum electrolytic capacitor maker in Taiwan. ABIT, which is arguably the hardest hit, now is going to Japan for its capacitors. Exploding capacitors blow the lid off a case of intellectual property theft in the electronics industry The effect on Lien Yan (Taichung, Taiwan), the company accused of buying the stolen formula and selling the faulty electrolyte, has been just as devastating. The firm has vehemently denied the accusations, but it has lost 30 percent of its orders since the problems came to light, says C.H. Lee, a manager at Lien Yan. The company normally produces more than 60 tons of electrolyte monthly for customers in Taiwan, China, and Japan. Currently, Lee says, orders are only from small local firms. Lien Yan and Taiwanese capacitor makers claim they are the victims of a smear campaign by Japanese competitors who are saying that all Taiwanese capacitor makers are tainted. The price ratio of Japanese products to Taiwanese was about four to one, according to Lee, and Japanese firms may be trying to win back lost market share. Lien Yan's Lee says that Japanese customers who stopped buying from his company even showed the firm internal documents written in Japanese that state that any relationship with Lien Yan would lead to boycotts on the part of the Japanese firm's customers. (The notices often misspelled Lien Yan as "Lein Yan" or "Lenyan.") "After checking all names of [capacitor] companies accused by Japanese companies, we discovered that almost all had never purchased our products," Lien Yan said in a statement. Soldering in silence While Taiwanese passives makers are trying to shore up relations with their customers, some of the computer firms affected are doing the same. ABIT says it will replace or fix defective boards its customers send it. IBM says it alerted those customers it believes are most likely to be affected and is handling repairs under warranty. Other manufacturers have been less helpful. As Gary Headlee's capacitor replacement side business grew, he began receiving damaged boards built by other companies besides ABIT. But when he posted the list of other boards on his Web site, he received letters from lawyers representing two manufacturers, prompting him to pull the posting. Carey Holzman, as a builder of custom PCs, has been trying to raise awareness about the defects since last spring. He thinks manufacturers should be more public about the problem and issue a recall. "Main board replacement is a big job. It's a huge amount of downtime for the user," he says. Failures can also occur after the warranty has expired, he points out. "The manufacturers should do the right thing." ≠Yu-Tzu Chiu (Taipei) & Samuel K. Moore PHOTO: CAREY HOLZMAN Home | Search | Table of Contents | IEEE Job Site | Advertising | Top Copyright | Terms & Conditions | Privacy & Security | Subscription Problems | Contact URL: http://www.spectrum.ieee.org (Modified: 31 January 2003) ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They who would give up an essential liberty for temporary security, deserve neither liberty or security." Benjamin Franklin Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 7.0.3 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 6894 From: infospy Date: Fri Feb 7, 2003 9:12pm Subject: Re: Shuttle Article...Interesting... I'm not any kind of specialist in this field. However "Thiokol," was not "declared one of the party at fault of the catastrophe". Thiokol manufactured the product. Thiokol notified NASA before the liftoff that it was out of bounds. >the main version of the tragedy says that a thermal protection tile of the >rocket's fuel tank was lost during liftoff, then it hit the nose of the left->wing heat-resisting covering and destroyed it. I do not believe the fuel tank has any tiles on it. It's covered with a Styrofoam type material. Other things in this report don't ring right with me. If it had not been authored by person with such a background I would look at as "trolling" on some news group. I'll wait for the report form them that know (?) before I decide. Howard Phillips N.E.W. Security Service ----- Original Message ----- From: "Thomas Habets" To: "Ocean Group" ; "TSCM Group" Sent: Friday, February 07, 2003 9:08 AM Subject: Re: [TSCM-L] Shuttle Article...Interesting... > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > This is the worst article on the subject I've seen yet. See comments below. > (there are other minor flaws I chose not to comment on) > > On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > the main > > version of the tragedy says that a thermal protection tile of the rocket's > > fuel tank was lost during liftoff, then it hit the nose of the left-wing > > heat-resisting covering and destroyed it. > > The NASA version is that FOAM came off and smashed against the wing. > A thermal protection tile would NEVER break apart like in the video seen on > CNN and such (would it? I'm not a rocket scientist. But they did say it was > foam). > > > This was observed at the liftoff > > moment, but NASA specialists decided that the damage was insignificant and > > couldn't hamper return of the shuttle. Butt they were mistaken. > > How does this person know this? NASA *still* says this wasn't the cause. > - ------ > Shuttle program manager Ronald Dittemore told reporters today they were, in > effect, mistaken if they assumed from previous briefings the Columbia > disaster investigation was focused primarily on the possibility foam debris > from the ship's external tank triggered the orbiter's destruction during > entry Saturday [... ] > "As I mentioned before, we're trying to find the missing link and as you > focus your attention on the debris, we're focusing our attention on what we > didn't see. We believe there's something else. And that's why we're doing a > fault tree analysis and that's why we're investigating every area. Right now, > it just doesn't make sense to us that a piece of (foam) debris could be the > root cause of the loss of Columbia and its crew. It's got to be another > reason." > [...] > "So it's something else. It's something else." > - ------- > http://www.spaceflightnow.com/shuttle/sts107/030205foam/ > http://www.spaceflightnow.com/shuttle/sts107/status.html > > > As my > > experience shows, majority of NASA employees are engineers working there > > right after graduation from institutes or under the patronage of some > > influential persons. > > This is just nasty. If I remember correctly about 80% of the people working > on the Apollo program were under 30, and all three Apollo 11 astronauts were > exactly 30. As a man under 30 myself, I take offense to this comment. Yes, > It'd be great if they all were thousand-year-old wisards, but this is > insulting. I don't know, maybe I'm reading too much into this. > > > What is more, NASA's success is achieved not due to > > the greatness of the personnel, but because of US's large-scale financing > > of space explorations (it is 30 times more than total financing of the rest > > countries of the world spent on space exploration). > > Now money sends people into space? Bah. > > > The only thing that the astronauts > > realized was that the damage was considerable and they would be inevitably > > burnt down at approaching the Earth. > > Uhm... then why was everyone so surprised? > > > The tragedy occurred basically through the fault of the company Lockheed > > Martin, > > Thank you. Now everyone can drop their investigations. This person obviously > knows what caused the accident. Shut down NASA too, this person can probably > send people to Mars as well. > > What is it with the tradition of first finding someone to blame, and then > finding out what happened? > > > Breaking of > > the fuel tank isolation occurred with this shuttle even earlier, in 1992. > > But damages were insignificant that time, that is why no tragedy occurred. > > What a pity that NASA didn't pay special attention to the problem! > > I'm sure they ignored it. > They sure paid attention to it when foam came off the fuel tank last time, > which was two trips ago for Columbia. > > - --------- > typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > } me_t; > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O > CiJGbTPdjZyRH2FYe0wz51I= > =jAYM > -----END PGP SIGNATURE----- > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6895 From: A.Lizard Date: Sat Feb 8, 2003 4:35pm Subject: Re: Shuttle Article...Interesting... At 11:19 AM 2/8/03 +0000, you wrote: Personally, I prefer the Pravda piece to the tribute articles that talk about the bravery of the astronauts and not the failure of will at a national level that put them into an ancient deathtrap to begin with. At least they're willing to suggest that there may be an organizational / management problems. There is NOTHING sacred about NASA. The most important question to ask about the shuttle disaster is: WHY are we putting people into space in a Shuttle older than the average public transit bus? If the politicians and the public aren't willing to spend the cash to buy safer replacements based on current technology, the government has no right to ask people, no matter how brave, dedicated, and willing to spend their lives to make up the difference. If we aren't ready to build better space transportation than a shuttle designed around the best 1970s technology, the manned space program should be shut down and nations willing to spend the money to buy the talent needed to make a manned space program work right should take over the lead. However, the competition is already at work, China's already planning a manned space venture. It may well be that when you can buy tickets at your local travel agency for a vacation or your next job somewhere up there, the tickets will be printed in Chinese. Or in Indian. Or maybe the European Union will get its act together. While there are *no* safe forms of transportation, we've been putting people into orbit for over 40 years. How long was it between the Wright Brothers' first flight and the DC-3? Technology has moved a lot faster between 1960 and 2000 than it did between 1963 and 2003. A ride into earth orbit should be comparable in safety to a commercial airliner ride. Perhaps if NASA were using vehicles based on 40 years experience with orbital transportation and not 10, orbital flights would in fact be safe and routine. The place for the present Shuttle fleet is in the National Air & Space Museum, not in the air. Kids should see the shuttles besides Mercury and Gemini and Apollo and wonder at the bravery of people who actually would climb into those things and fly them into space. BTW, space.com says that the Feds are planning to keep the Shuttle fleet in use until 2025. So we can look forward to either our astronauts returning to earth in carbonized chunks or the public shutting down the space program. Allegations of NASA program mismanagement from ex-insiders: Dian Hardison http://www.counterpunch.org/hardison02012003.html Don Nelson http://www.observer.co.uk/international/story/0,6903,887236,00.html An interesting upper atmosphere electrical discharge phenomena that's the dark horse candidate for proximate cause of shuttle destruction: http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2003/02/07/MN200326.DTL While the investigation should certainly continue to improve the safety of aviation (the Shuttle broke up in the upper atmosphere), I think we *all* know the primary cause and who's to blame. A.Lizard >Message: 1 > Date: Fri, 7 Feb 2003 16:08:16 +0100 > From: Thomas Habets >Subject: Re: Shuttle Article...Interesting... > >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > > >This is the worst article on the subject I've seen yet. See comments below. >(there are other minor flaws I chose not to comment on) > >On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > the main > > version of the tragedy says that a thermal protection tile of the rocket's > > fuel tank was lost during liftoff, then it hit the nose of the left-wing > > heat-resisting covering and destroyed it. > >The NASA version is that FOAM came off and smashed against the wing. >A thermal protection tile would NEVER break apart like in the video seen on >CNN and such (would it? I'm not a rocket scientist. But they did say it was >foam). > > > This was observed at the liftoff > > moment, but NASA specialists decided that the damage was insignificant and > > couldn't hamper return of the shuttle. Butt they were mistaken. > >How does this person know this? NASA *still* says this wasn't the cause. >- ------ >Shuttle program manager Ronald Dittemore told reporters today they were, in >effect, mistaken if they assumed from previous briefings the Columbia >disaster investigation was focused primarily on the possibility foam debris >from the ship's external tank triggered the orbiter's destruction during >entry Saturday [... ] >"As I mentioned before, we're trying to find the missing link and as you >focus your attention on the debris, we're focusing our attention on what we >didn't see. We believe there's something else. And that's why we're doing a >fault tree analysis and that's why we're investigating every area. Right now, >it just doesn't make sense to us that a piece of (foam) debris could be the >root cause of the loss of Columbia and its crew. It's got to be another >reason." >[...] >"So it's something else. It's something else." >- ------- >http://www.spaceflightnow.com/shuttle/sts107/030205foam/ >http://www.spaceflightnow.com/shuttle/sts107/status.html > > > As my > > experience shows, majority of NASA employees are engineers working there > > right after graduation from institutes or under the patronage of some > > influential persons. > >This is just nasty. If I remember correctly about 80% of the people working >on the Apollo program were under 30, and all three Apollo 11 astronauts were >exactly 30. As a man under 30 myself, I take offense to this comment. Yes, >It'd be great if they all were thousand-year-old wisards, but this is >insulting. I don't know, maybe I'm reading too much into this. > > > What is more, NASA's success is achieved not due to > > the greatness of the personnel, but because of US's large-scale financing > > of space explorations (it is 30 times more than total financing of the rest > > countries of the world spent on space exploration). > >Now money sends people into space? Bah. > > > The only thing that the astronauts > > realized was that the damage was considerable and they would be inevitably > > burnt down at approaching the Earth. > >Uhm... then why was everyone so surprised? > > > The tragedy occurred basically through the fault of the company Lockheed > > Martin, > >Thank you. Now everyone can drop their investigations. This person obviously >knows what caused the accident. Shut down NASA too, this person can probably >send people to Mars as well. > >What is it with the tradition of first finding someone to blame, and then >finding out what happened? > > > Breaking of > > the fuel tank isolation occurred with this shuttle even earlier, in 1992. > > But damages were insignificant that time, that is why no tragedy occurred. > > What a pity that NASA didn't pay special attention to the problem! > >I'm sure they ignored it. >They sure paid attention to it when foam came off the fuel tank last time, >which was two trips ago for Columbia. > >- --------- >typedef struct me_s { > char name[] = { "Thomas Habets" }; > char email[] = { "thomas@h..." }; > char kernel[] = { "Linux 2.4" }; > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; >} me_t; > >-----BEGIN PGP SIGNATURE----- >Version: GnuPG v1.0.6 (GNU/Linux) >Comment: For info see http://www.gnupg.org > >iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O >CiJGbTPdjZyRH2FYe0wz51I= >=jAYM >-----END PGP SIGNATURE----- > ************************************************************************ member The Internet Society (ISOC), The HTML Writers Guild. "They who would give up an essential liberty for temporary security, deserve neither liberty or security." Benjamin Franklin Personal Website http://www.ecis.com/~alizard business Website http://reptilelabs.com backup address (if ALL else fails) alizard@C... PGP 7.0.3 key available by request,keyserver,or on my Web site Download PGP from http://www.pgpi.org for e-mail privacy. PGPfone v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ Disaster prep info: http://www.ecis.com/~alizard/y2k.html ************************************************************************ 6896 From: Andre Holmes <1ach@g...> Date: Sun Feb 9, 2003 11:04am Subject: Carolines Modulation Curves! - Ross Revenge Greetings I was tuning my SA and ran across some modulations that I never seen before, so I started surveying some mod-schemes heres a start of my search. ANDRE HOLMES http://www.rossrevenge.co.uk/tx/scope.htm [Non-text portions of this message have been removed] 6897 From: Mitch D Date: Sat Feb 8, 2003 0:01pm Subject: Organic Antenna Interesting site about research done by a "HAM" on using a tree for a vhf/uhf antenna. http://www.qsl.net/kf4bwg/ __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com 6898 From: Michael Puchol Date: Mon Feb 10, 2003 1:38am Subject: Re: Shuttle Article...Interesting... (off-topic) I recommend to those interested reading these two documents: http://www.nasa.gov/formedia/MP_risk_tiles_1994.pdf and http://spaceflight.nasa.gov/shuttle/investigation/tps_safety.pdf which cover the risk and risk management in the ceramic tiles which protect the shuttle from reentry heat. In my oppinion, the piece of foam (carbon reinforced, bear this in mind - this is not just simple styrofoam like we get in takeaway coffees) was large enough to cause one or more tiles to detach from the wing. The point of maximum aerodynamic stress for the shuttle during launch is at 60 seconds, and the piece of foam hit at 80 seconds, meaning that the shuttle was accelerating at an enormous rate. Not knowing the weight of the debris I can't calculate the impact force it would have hit with (although NASA stated that their engineers calculated that it wasn't enough to cause serious damage), but it would be an enourmous force in any case. Since the ceramic tiles are hard but extremely brittle (try it with a normal ceramic tile like the ones used to pave homes, they don't differ that much in strenght as those in the shuttle, a very light impact will crack them), I cannot see how they still refuse to see the obvious. The Columbia (and other shuttles) have suffered from total or partial ceramic tile failure in past flight. It isn't so uncommon to be hit by debris, and not only coming from the shuttle, but space debris, for example. Another test you can do at home to see the difference in impact-bearing capacity by a structure under stress or not, is to grab a small lenght of thin plastic like from a rubbish bag or similar, hold each end in one hand, and leave it lax. Get someone to (gently) stab at it with a pointy object, like a screwdriver - it won't be easy to cut or break. Now, try applying tension to the plastic, pulling your hands away from each other - it will be cut in two by a gentle prod of the sharp object. The shuttle's surfaces 80 seconds after launch were in similar stress conditions as the tensed plastic. During reentry, it's not only heat but extreme aerodynamic forces that affect the shuttle, thus if we couple a few missing tiles with extreme heat capable of melting the underlying aluminium alloys, plus forces high enough to crush a damaged structure, a catastrophic failure doesn't seem too impossible under the circumstances. I do believe however that the mission profile was such that it didn't allow for a different course of action, such as travelling to the ISS to use as a lifeboat, or arranging for a spacewalk to fix the tiles (they didn't have either a MMS or spares and tools), which meant that they could only hope nothing happened. But it did. Spaceflight is risky, the extremes encountered in any mission are only overcome by excellent engineering, and better manufacturing processes - the best that can be done is analyze the problem, determine it's cause, and fix it, finger pointing and told-you-so won't acomplish anything. Regards, and sorry about the off-topic. Mike ----- Original Message ----- From: "infospy" To: "TSCM Group" Sent: Saturday, February 08, 2003 4:12 AM Subject: Re: [TSCM-L] Shuttle Article...Interesting... > I'm not any kind of specialist in this field. However "Thiokol," was not > "declared one of the party at fault of the catastrophe". Thiokol > manufactured the product. Thiokol notified NASA before the liftoff that it > was out of bounds. > > >the main version of the tragedy says that a thermal protection tile of the > >rocket's fuel tank was lost during liftoff, then it hit the nose of the > left->wing heat-resisting covering and destroyed it. > > I do not believe the fuel tank has any tiles on it. It's covered with a > Styrofoam type material. > > Other things in this report don't ring right with me. If it had not been > authored by person with such a background I would look at as "trolling" on > some news group. > > I'll wait for the report form them that know (?) before I decide. > > Howard Phillips > N.E.W. Security Service > > > ----- Original Message ----- > From: "Thomas Habets" > To: "Ocean Group" ; "TSCM Group" > Sent: Friday, February 07, 2003 9:08 AM > Subject: Re: [TSCM-L] Shuttle Article...Interesting... > > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA1 > > > > > > This is the worst article on the subject I've seen yet. See comments > below. > > (there are other minor flaws I chose not to comment on) > > > > On Thursday 06 February 2003 18:04, Ocean Group wrote: > > > > > the main > > > version of the tragedy says that a thermal protection tile of the > rocket's > > > fuel tank was lost during liftoff, then it hit the nose of the left-wing > > > heat-resisting covering and destroyed it. > > > > The NASA version is that FOAM came off and smashed against the wing. > > A thermal protection tile would NEVER break apart like in the video seen > on > > CNN and such (would it? I'm not a rocket scientist. But they did say it > was > > foam). > > > > > This was observed at the liftoff > > > moment, but NASA specialists decided that the damage was insignificant > and > > > couldn't hamper return of the shuttle. Butt they were mistaken. > > > > How does this person know this? NASA *still* says this wasn't the cause. > > - ------ > > Shuttle program manager Ronald Dittemore told reporters today they were, > in > > effect, mistaken if they assumed from previous briefings the Columbia > > disaster investigation was focused primarily on the possibility foam > debris > > from the ship's external tank triggered the orbiter's destruction during > > entry Saturday [... ] > > "As I mentioned before, we're trying to find the missing link and as you > > focus your attention on the debris, we're focusing our attention on what > we > > didn't see. We believe there's something else. And that's why we're doing > a > > fault tree analysis and that's why we're investigating every area. Right > now, > > it just doesn't make sense to us that a piece of (foam) debris could be > the > > root cause of the loss of Columbia and its crew. It's got to be another > > reason." > > [...] > > "So it's something else. It's something else." > > - ------- > > http://www.spaceflightnow.com/shuttle/sts107/030205foam/ > > http://www.spaceflightnow.com/shuttle/sts107/status.html > > > > > As my > > > experience shows, majority of NASA employees are engineers working there > > > right after graduation from institutes or under the patronage of some > > > influential persons. > > > > This is just nasty. If I remember correctly about 80% of the people > working > > on the Apollo program were under 30, and all three Apollo 11 astronauts > were > > exactly 30. As a man under 30 myself, I take offense to this comment. Yes, > > It'd be great if they all were thousand-year-old wisards, but this is > > insulting. I don't know, maybe I'm reading too much into this. > > > > > What is more, NASA's success is achieved not due to > > > the greatness of the personnel, but because of US's large-scale > financing > > > of space explorations (it is 30 times more than total financing of the > rest > > > countries of the world spent on space exploration). > > > > Now money sends people into space? Bah. > > > > > The only thing that the astronauts > > > realized was that the damage was considerable and they would be > inevitably > > > burnt down at approaching the Earth. > > > > Uhm... then why was everyone so surprised? > > > > > The tragedy occurred basically through the fault of the company Lockheed > > > Martin, > > > > Thank you. Now everyone can drop their investigations. This person > obviously > > knows what caused the accident. Shut down NASA too, this person can > probably > > send people to Mars as well. > > > > What is it with the tradition of first finding someone to blame, and then > > finding out what happened? > > > > > Breaking of > > > the fuel tank isolation occurred with this shuttle even earlier, in > 1992. > > > But damages were insignificant that time, that is why no tragedy > occurred. > > > What a pity that NASA didn't pay special attention to the problem! > > > > I'm sure they ignored it. > > They sure paid attention to it when foam came off the fuel tank last time, > > which was two trips ago for Columbia. > > > > - --------- > > typedef struct me_s { > > char name[] = { "Thomas Habets" }; > > char email[] = { "thomas@h..." }; > > char kernel[] = { "Linux 2.4" }; > > char *pgpKey[] = { "http://www.habets.pp.se/pubkey.txt" }; > > char pgp[] = { "A8A3 D1DD 4AE0 8467 7FDE 0945 286A E90A AD48 E854" }; > > char coolcmd[] = { "echo '. ./_&. ./_'>_;. ./_" }; > > } me_t; > > > > -----BEGIN PGP SIGNATURE----- > > Version: GnuPG v1.0.6 (GNU/Linux) > > Comment: For info see http://www.gnupg.org > > > > iD8DBQE+Q8vnKGrpCq1I6FQRArEnAKDEPuaBs3CzeVeKXl6EDnx7OWVWMACgz7/O > > CiJGbTPdjZyRH2FYe0wz51I= > > =jAYM > > -----END PGP SIGNATURE----- > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6899 From: Steve Uhrig Date: Mon Feb 10, 2003 9:59am Subject: Re: Unknown modulation On 9 Feb 2003 at 12:04, Andre Holmes wrote: > I was tuning my SA and ran across some modulations that I never seen > before, so I started surveying some mod-schemes heres a start of my > search. Do you live near: 1)An AM radio broadcast station? 2)A ham radio operator (within a block or two?). You frequently can identify them by towers and large directional antennas. 3)A CB operator maybe running illegal high power? Or within a few hundred feet of one running legal power? What you have described from the other website is signals from a pure textbook AM transmitter. I listed above the most likely sources, but there can be others. Do you hear anything when you try to demodulate the signal? That will tell you for sure what it is. If it sounds like Donald Duck, it's single sideband which most likely would be CB or amateur (ham). What you are seeing is the 'modulation envelope'. Straight out of the textbook. Extremely unlikely to be hostile transmissions. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6900 From: Steve Uhrig Date: Mon Feb 10, 2003 11:23am Subject: Lunatic on this list - AONN Back in late December, the following lunatic posted the below message to this list: =========== AccessOneNetworkNorthwest AONNRecords Date: Thu Dec 26, 2002 1:12 pm Subject: Op We have formed a new multiagency CT task force which is currently open only to active U.S. government personnel. If you are qualified and would like to get involved please call 206.666.8070. There is always someone in our office 247, therefore you may call at any time. Also, the TSCM moderator has been contacted and provided the Congressional summary in .pdf format for those interested. I can't guarantee that the file will be provided to you by the list owner, as we simply thought that we would at least try to make it available in that way. This project involves the highest conceivable level of what the TSCM group exercises. =========== This person, who falsely claimed to be a government agent and representing a government agency, had called my office asking for some information I perceived as sensitive, and he didn't seem legit. Neither did his website. I made a contact report to the local FBI field office near him, and he was quietly taken down. Here are some details: http://news.com.com/2100-1023-983384.html This gentleman still is trying to pry sensitive information out of certain members of this list. Those members tend to be among the more savvy, and are not being fooled. If Robert Taylor or anyone claiming to represent DSIN or AONN contacts you, be aware the person and agency is fraudulent. It would not be wise to discuss anything of substance with him. Mr. Taylor has been removed from this list, but he may have changed his profile and resubscribed. We don't know and don't care. He's been exposed as a con artist. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6901 From: William Knowles Date: Mon Feb 10, 2003 11:51am Subject: AONN, R.L. Taylor III bio and photo Hello all! The new site for AONN since their .gov was pulled is this... http://www.dsispecialaccess.net/ I understand that any time someone had a question about AONN, they would shoot off a 122 page .PDF file, I would love a copy if anyone recieved this from them. Robert L. Taylor or R.L. Taylor is quite a character, with a bio the reads like its off the cDc's webpage... http://www.flash.net/~manniac/corp2.htm [...] What many folks don't realize is this is the same kid who in 1977 was in a special program for 2 year olds to learn Franklin computer architecture at Everett High School and similar programs at other institutions of academia. This is the same kid who subsequently began to design supercomputers at age 2 and a half, had his whole school curriculum and grading system faked, and whose father is a sociologist, military investigations retired, and mother a communications intelligence officer retired supposedly. This kid is no geek. This is the same track star, gymnast, marksman, video game champion who confidential sources indicate was somehow granted an assassination clearance. This is the same kid who when everyone else seemed to be sleeping, predicted within two weeks prior to September 11, 2001, that an attack would soon take place; the same kid who in a recent press release, expressed to the Bush Administration as well as reporters... [...] There's also a brief bio that's a little more tamer than above with a picture at: http://www.pcnetexpress.com/PCNE_HR/robertt_p.html Additional links on Robert L. Taylor III http://www.manhunt.com/features/html/89.shtml http://www.infoworld.com/article/03/02/07/HNmysterysite_1.html You have to wonder how long he thought he could have pulled this caper off before getting caught. Cheers! William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 6902 From: kondrak Date: Mon Feb 10, 2003 4:21pm Subject: Re: Re: Unknown modulation I believe the tipoff is the 135% negative modulation. Its broadcast AM. Ot someone trying awfully hard to sound broadcast, er.."quality".. At 10:59 2/10/03 -0500, you wrote: >On 9 Feb 2003 at 12:04, Andre Holmes wrote: > > > I was tuning my SA and ran across some modulations that I never seen > > before, so I started surveying some mod-schemes heres a start of my > > search. > >Do you live near: > >1) An AM radio broadcast station? > >2) A ham radio operator (within a block or two?). You frequently can >identify them by towers and large directional antennas. > >3) A CB operator maybe running illegal high power? Or within a few >hundred feet of one running legal power? > >What you have described from the other website is signals from a pure >textbook AM transmitter. I listed above the most likely sources, but >there can be others. > >Do you hear anything when you try to demodulate the signal? That will >tell you for sure what it is. If it sounds like Donald Duck, it's >single sideband which most likely would be CB or amateur (ham). > >What you are seeing is the 'modulation envelope'. Straight out of the >textbook. > >Extremely unlikely to be hostile transmissions. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS From: Marty Kaiser Date: Wed Feb 6, 2002 10:35am Subject: Fw: History in the making Hi Gang HISTORY IN THE MAKING IMMEDIATELY download and save this file... then read it. http://www.martykaiser.com/fbi1~1.htm Marty [Non-text portions of this message have been removed] 4744 From: Aimee Farr Date: Wed Feb 6, 2002 5:35pm Subject: "electricity effects on satellites" [Uhm, can anybody tell me what they mean by "study electricity effects on satellites?" ~Aimee] 2002-02-06 18:07 MSK - COURT TURNS SPY CASE BACK MOSCOW - The trial of a Siberian physicist accused of spying for China was adjourned Wednesday and the case returned to the prosecution to allow them to conduct further investigations, his lawyer said. Prosecutors made the request last week, saying the move was an attempt to avoid "judicial mistakes" in their case against Valentin Danilov. But Danilov's lawyer, Yelena Yevmenova, claimed the request was merely an attempt by prosecutors to drag out the case. Danilov, who worked at Krasnoyarsk Technical University, has already spent a year in jail facing charges of selling secrets to a Chinese company and of misappropriating money. The charges involve a contract the university signed with the company for constructing a test platform to study electricity effects on satellites. The scientist contends he did not violate any laws because the information he provided was no longer considered classified and had already been published in scientific journals. He also dismisses the charges of misappropriating money. Danilov was not in court Wednesday when the decision to hand the case back to prosecutors was announced. The trial had been put on hold Tuesday when Danilov's jailers said they could not bring the 53-year-old to court because he was suffering a high fever and flu-like symptoms. The court reconvened Wednesday despite Danilov's absence, Yevmenova said. Human rights advocates say the case is part of a wave of spy trials intended to discourage Russian researchers from working with foreigners. - AP 4745 From: Al Arango Date: Wed Feb 6, 2002 4:11pm Subject: Re: Fw: Steve, The COMSEC C3I Story -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Here is the filing: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/srchnum.htm&r=1&f=G&l=50&s1='5,142,560'.WKU.&OS=PN/5,142,560&RS=PN/5,142,560 At 11:05 PM 2/6/2002 +0200, Steve Whitehead wrote: >Received this on my e-mail tonight. I think the list discussed this device a >while back. > >Steve Whitehead >E-mail : sceptre@m... >TSCM Services URL : http://www.tscm.co.za > >----- Original Message ----- >From: "COMSEC" >To: >Sent: Wednesday, February 06, 2002 6:48 PM >Subject: Steve, The COMSEC C3I Story > > > > INVENT A PRODUCT, Change a Industry, Shake up the World! > > How the Hunted Became the Hunter > > > > The story HOW I invented and patented the COMSEC C3I TM > > United States Patent #5,142,560, a telecommunications > > security device that detects wiretapping, surveillance, > > espionage previously undetectable. > > > > The Chicago Commodities Exchanges were the target of a US > > Government undercover investigation during 1988-1989. I was > > a Foreign Exchange Floor Trader at the Chicago Mercantile > > Exchange during that time. I had a gut instinct that my > > telephones were being wiretapped. I was right, you just > > can't say enough about gut instinct. > > > > I have friends and acquaintances that are top tier criminal > > defense attorneys. I went to these friends to ask what they > > thought the likelihood was that my telephones could be > > wiretapped. They pretty much all agreed that unless there > > was millions of dollars involved, sensational newspaper > > headlines and coverage or unless I was dealing with the > > wrong people, the likelihood of my telephones being > > wiretapped were extremely unlikely. > > > > The Attorney General of the United States came to > > Chicago, IL 3 months later to announce the indictments of > > 47 commodities traders for various offenses. The 2 year > > undercover government investigation of the Chicago > > commodities markets happened to include the trading pit I > > traded in. > > > > Furthermore, the FBI had an undercover agent working in the > > trading pit I traded in. There were millions of dollars > > involved. On the day the Government decided to announce the > > indictments there was a huge news media circus with > > accompanied news headlines about the 47 indicted commodity > > traders. > > > > The day the indictments were announced everything came > > together. At this point I knew I was on to something. > > I called the people who teach the government how to wiretap > > and how to detect wiretapping. They all told me it was > > impossible to detect these wiretaps because of the way they > > are engineered. They told me these wiretaps are > > "electronically isolated" to prevent detection. I was told > > that "it wasn't possible to detect these wiretaps." > > > > Next, I went to the Chicago Library Patent Depository. > > I read and researched all I could find on wiretapping. I > > read all the patents on wiretapping equipment and > > wiretapping detection equipment. I found what I thought was > > the possible means to detect undetectable wiretapping and > > started to construct a device to detect these wiretaps. > > > > Success > > > > I could now detect and confirm the governments > > "undetectable" wiretapping/surveillance. The government was > > not amused. At this point the government decided to flex > > its muscle. The Government assigned a federal agent to an > > electronic parts store where I bought components for the new > > invention. > > > > For a period of 3 weeks I couldn't buy a newspaper without > > a boy scout coming up to the counter to document how I > > bought anything. I was wiretapped, followed, photographed > > and now the government decided to set up physical > > surveillance at a electronics part store where I purchased > > parts for the prototype of the new invention. > > > > I was now ready to complete my Patent Application to be > > filed with the Department of Commerce Commissioner of > > Patents and Trademarks. I warned a Patent Attorney I was > > working with at the time that there could be some blow back. > > He assured me he had been through this before and that > > there wasn't anything to be concerned about. > > > > During this period of around the clock physical surveillance > > I went to the Patent Attorney's home unannounced. When I got > > there he was leaving with my Patent Application in hand. > > He didn't look well. He told me that "he had to go to a > > meeting." The next day he returned my Patent Application, > > and he told me he couldn't help me anymore and never charged > > me for his work up to that time. > > > > There is much more to the story, how I determined there was > > an undercover Government Agent, listening in on his > > communications over a cordless telephone with a scanner, > > running his work car's license plates through Illinois > > Department of Motor Vehicles to find out his car was > > registered to a Chicago Bear's Football player, etc. > > > > I completed my Patent Application in September 1990 and was > > awarded Patent #5,142,560 in September 1992. > > > > On December 17,2001 FOX News reported that the US Government > > has been wiretapped by Foreign Intelligence and others using > > the US National Wiretapping System. There is currently a > > on-going National Security investigation across the United > > States concerning the US National Wiretapping System being > > used against the United States by Foreign Intelligence and > > others. > > > > "The problem: according to classified law enforcement > > documents obtained by Fox News, the bad guys had the cops' > > beepers, cell phones, even home phones under surveillance. > > Some who did get caught admitted to having hundreds of > > numbers and using them to avoid arrest. > > > > "This compromised law enforcement communications between > > LAPD detectives and other assigned law enforcement officers > > working various aspects of the case. The organization > > discovered communications between organized crime > > intelligence division detectives, the FBI and the Secret > > Service." > > > > Shock spread from the DEA to the FBI in Washington, and then > > the CIA. An investigation of the problem, according to law > > enforcement documents, concluded, "The organization has > > apparent extensive access to database systems to identify > > pertinent personal and biographical information." > > > > When investigators tried to find out where the information > > might have come from, they looked at Amdocs, a publicly > > traded firm based in Israel. Amdocs generates billing data > > for virtually every call in America, and they do credit > > checks. The company denies any leaks, but investigators > > still fear that the firm's data is getting into the wrong > > hands. > > > > When investigators checked their own wiretapping system for > > leaks, they grew concerned about potential vulnerabilities > > in the computers that intercept, record and store the > > wiretapped calls." [FOX News Carl Cameron Investigates] > > > > "The worst penetrations are believed to be in the State > > Department. But others say the supposedly secure telephone > > systems in the White House, Defense Department and Justice > > Department may have been compromised as well. The problem > > for FBI agents in the famed Division 5, however, isn't just > > what they have uncovered, which is substantial, but what > > they don't know yet." [Insight] > > > > Email me to request a collection of news reports about the > > hottest Federal Government investigation in Washington, DC > > today. A unbelievable look inside Government wiretapping > > and how it will impact you. > > > > > > The COMSEC C3I detects legal and illegal wiretapping > > previously undetectable. Full background and product > > reviews are available on our web site: > > > > > > We are registered with the Department of Defense and the > > General Services Agency Information Technology Service. > > > > To receive additional information and Special Offers for > > Subscribers Only reply to this email with "Subscribe" in the > > Subject Line. > > > > PRIVACY STATEMENT: We will not distribute your address to > > anyone. Period. > > > > Reach me at the following address. > > > > > > Mark J. Neer > > President > > Communications Security > > Tel: 281.586.2034 > > Fax: 281.754.4047 > > Email: > > Internet: > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3 iQA/AwUBPGGp+1AWwP1+SxuBEQImuwCfeftFVzMg/lTijJcKWe8lJcrJCDcAoOy4 t5AkBJZOz42PxUMG7VXQAod9 =aGDg -----END PGP SIGNATURE----- 4746 From: James M. Atkinson Date: Wed Feb 6, 2002 8:19pm Subject: Re: Fw: Steve, The COMSEC C3I Story The funny thing is that this "method of detecting eavesdropping devices" has been around since the 1950's. It was inappropriate for the patent office to award any kind of patent on this issue as the method was, and is common knowledge. Once you get past of the hype, hyperbole, marketing spin, and bovine feces all the product seems to due is monitor impedance changes in a line, which as we know is something you can do with a five dollar circuit and a cheap oscilloscope. A decent Time Domain Reflectometer and FXT/NXT Cross Talk Analyzer would be far more appropriate, but then snake oil is probably far more profitable. The way the guy rambles on about grand government conspiracies is a potential indicator that perhaps the poor fellow should be spending his money on medical intervention or aluminium foil hats. Professional eavesdropper lean toward high impedance devices, and as such the methods claimed in the patent would be virtually useless for finding such devices. What next, a 1-900 line where you call call Ms. Cleo so she can read tarot card to tell if your line is tapped? Sad, really sad, -jma >>------------------------------------------------------------------------ >>United States Patent5,142,560 >>NeerAugust 25, 1992 >>------------------------------------------------------------------------ >>Wiretap detector and telephone loop monitor >>Abstract >> >>A novel method and improved system for the continuous detection >>monitoring of authorized/unauthorized connections/disconnections >>including loop bridging wiretapping equipment capable of monitoring >>recording voice and/or data communications on the subscriber's >>local telephone loop. In operation the detector monitor displays >>electrical changes in impedance condition and characteristics on >>the subscriber's local telephone loop to detect and monitor >>signaling, switching equipment and telephone lines >>connecting/disconnecting anywhere on the loop including the central >>exchange before, during and after the completion of a telephone >>call continuously. >>------------------------------------------------------------------------ >>Inventors:Neer; Mark J. (835 Locust, Winnetka, IL 60093) >>Appl. No.:587413 >>Filed:September 25, 1990 >> >>Current U.S. Class:379/7; 379/21; 379/30 >>Intern'l Class:H04M 001/68 >>Field of Search:379/7,21,29,30,39,35 >>------------------------------------------------------------------------ >>References Cited [Referenced By] >>------------------------------------------------------------------------ >>U.S. Patent Documents >>1834992Dec., 1931Almquist379/21. >>4658099Apr., 1987Frazer379/7. >>4680783Jul., 1987Boeckmann379/7. >>4760592Jul., 1988Hensley379/7. >>Foreign Patent Documents >>58-143659Aug., 1983JP379/7. >>Primary Examiner: Schreyer; Stafford D. >>------------------------------------------------------------------------ >>Claims >>------------------------------------------------------------------------ >> >>I claim: >>1. An apparatus for detecting the connecting and the disconnecting >>of an additional telephone line onto the subscriber's telephone >>loop for the purpose of listening and/or recording, the telephone >>loop connecting a subscriber with at least one telephone to a >>central exchange and having a generally constant electrical >>impedance, comprising: >>(a) a capacitive element for detecting changes to said generally >>constant electrical impedance; >>(b) display means cooperating with and connected to said capacitive >>element for visually showing that a change has been detected by >>said capacitive element; and >>(c) means for connecting the apparatus to the telephone loop. >>2. The apparatus of claim 1, wherein said capacitive element is a >>capacitor connected in series to the telephone loop. >>3. The apparatus of claim 1, wherein said display means is a LED. >>4. The apparatus of claim 1, wherein said means to connect >>comprises a quick connect/disconnect line and jack. >>5. An apparatus for continuously monitoring changes in impedance >>caused by the connecting or the disconnecting of an additional >>impedance source to a telephone loop connecting a subscriber with >>at least one telephone to a central exchange and having a generally >>constant electrical impedance, comprising: >>(a) a capacitive element for detecting changes to the generally >>constant electrical impedance; >>(b) an isolation transformer having primary and secondary windings, >>said primary windings being connected to said capacitive element; >>(c) display means connected to said secondary windings for visually >>showing that a change has been detected by said capacitive element; >>and >>(d) means for connecting the apparatus to the telephone loop. >>6. The apparatus of claim 5, wherein said capacitive element is a >>capacitor connected in series to the telephone loop. >>7. The apparatus of claim 5, wherein said display means is a LED. >>8. The apparatus of claim 5, wherein said means to connect >>comprises a quick connect/disconnect line and jack. >>9. The apparatus of claim 1 wherein said means for connecting the >>apparatus to the telephone loop additionally includes a switching >>mechanism connected in series with said capacitive element to the >>telephone loop. >>10. The apparatus of claim 9, wherein said display means comprises >>an easily removable/replaceable LED mounted in a socket assembly. >>11. The apparatus of claim 5 wherein said means for connecting the >>apparatus to the telephone loop additionally includes a switching >>mechanism connected in series with said capacitive element to the >>telephone loop. >>12. The apparatus of claim 11, wherein said display means comprises >>an easily removable/replaceable LED mounted in a socket assembly. >>------------------------------------------------------------------------ >>Description >>------------------------------------------------------------------------ >> >>BACKGROUND >>1. Field of Invention >>This invention relates to the detection monitoring of >>authorized/unauthorized connections/disconnections including loop >>bridging wiretapping equipment on the subscriber's local telephone >>loops where electrical changes in loop impedance condition and >>characteristics occur because of the connections/disconnections of >>the briding equipment. >>2. Description of Prior Art >>There are many devices available that have been developed for both >>legal and illegal wiretapping of telephone communications. A very >>common type of wiretapping consists of a bridging device that >>creates a remote extension or drawn loop by connecting an >>additional telephone line on the subscriber's telephone loop and >>routing it to an observation monitoring location. This loop >>bridging wiretapping technique will cause a change in loop >>impedance condition and characteristics depending on how the >>tapping is completed. >>In the prior art, wiretap detectors exist that utilize >>microcomputers and processors, various meters, signal generators, >>tone generators, etc., that detect wiretapping equipment connected >>to a telephone line but are either simple voltage meters that are >>ineffective, limited, detachable and defeatable, too expensive >>and/or complicated equipment that is burdensome and obtrusive to >>use on a continuous basis or must be installed on a clean line only. >>OBJECTS AND ADVANTAGES >>This invention presents a new device, method and system that >>displays connections and disconnections anywhere on the >>subscriber's local telephone loop including the central exchange of >>the telephone company before, during and after the completion of a >>call on a continuous basis. Each telephone call produces a >>signature or pattern of connections and disconnections. This >>invention present the first continuous display of normal/abnormal >>telephone loop electrical changes in impedance condition and >>characterization activity resulting from signaling, switching and >>wiretapping monitoring equipment connecting/disconnecting. >>The present invention is easy to use, highly reliable, >>undetectable, small, portable, and discreet which presents a novel >>method and an improved system for detecting monitoring >>authorized/unauthorized connections/disconnections including >>wiretapping monitoring recording equipment which overcome all of >>the above mentioned disadvantages of the previously known devices. >>It is the object of this invention to show how >>authorized/unauthorized connections/disconnections including loop >>bridging wiretapping equipment can be detected and monitored on the >>subscriber's loop by subscriber's telephone terminal(s) equipped >>with said invention. >>DRAWING FIGURES >>FIG. 1 is a diagram of a local telephone system. >>FIG. 2 is a diagram of the wiretap detector and telephone loop >>monitor in alternate forms, in accordance with the present >>invention. >>FIG. 3 is a diagram of the preferred assembled invention in >>accordance with the present invention. >>FIG. 4 is a diagram of the detector monitor display socket assembly. >>REFERENCE NUMERALS IN DRAWINGS >>10 local telephone central exchange >>20 subscriber's local telephone loop >>30 subscriber's residence telephone terminal(s) >>40 capacitive element >>50 detector monitor display assembly >>60 isolation transformer >>70 switching mechanism >>80 modular telephone line >>90 modular telephone line jack >>100 modular telephone interface housing >>DESCRIPTION OF INVENTION >>This invention presents a novel method and improved system that >>detects and monitors authorized/unauthorized >>connections/disconnections including loop bridging wiretapping >>equipment that causes electrical changes in impedance condition and >>characteristics on the subscriber's local telephone loop to detect >>signaling, switching equipment and telephone lines >>connecting/disconnecting anywhere on the loop including the central >>exchange continuously. >>By continuously monitoring the subscriber's telephone loop >>impedance condition and characteristics, it is possible to detect >>normal as well as abnormal connections and disconnections. >>Connections and disconnections effect changes in impedance >>characteristics on the subscriber's telephone loop and are the >>indication of wiretapping monitoring equipment connecting/ >>disconnecting. By detecting connections/disconnections it is >>possible to determine authorized/unauthorized >>connections/disconnections including wiretapping equipment on the >>loop. The proposed method and system comprises of monitoring the >>device's display to establish a normal signature or pattern of >>telephone loop characteristics from an abnormal signature or >>pattern resulting from additional extensions, either at the >>subscriber's residence or remotely connecting/disconnecting on the >>telephone loop. >>OPERATION OF THE PREFERRED EMBODIMENT >>Further objects and advantages of said invention will become >>apparent from a consideration of the drawings and ensuing operation >>of it. Each of the elements included therein can assume several >>different forms, all of which would be well known to those skilled >>in the art, and it only be required that they perform the functions >>set forth herein after. >>Referring first to the diagram of FIG. 1, it should be noted that >>FIG. 1 details a local telephone system. As seen in FIG. 1, a local >>telephone system comprising of the telephone company's central >>exchange 10 a subscriber's local telephone loop 20 and a >>subscriber's residence telephone terminal(s) 30. >>Referring to FIG. 2, there are four presented embodiments of said >>invention, embodiment 2 is the preferred embodiment. As seen in >>FIG. 2, embodiment 1 comprising capacitive element 40 detector >>monitor display assembly 50. >>As seen in FIG. 2, preferred embodiment 2 comprising capacitive >>element 40 isolation transformer 60 display assembly 50. >>As seen in FIG. 2, embodiment 3 comprising capacitive element 40 >>display element 50 switching mechanism 70. >>As seen in FIG. 2, embodiment 4 comprising capacitive element 40 >>isolation transformer 60 display assembly 50 switching mechanism 70. >>As seen in preferred embodiment 2, side one of the capacitive >>element 40 is connected to either the Tip or Ring side of the >>subscriber's telephone loop 20. Side two of the capacitive element >>40 is connected in series to the isolation transformer 60 primary's >>side one. The isolation transformer 60 primary's side two is then >>connected to the alternate side of the subscriber's telephone loop >>20. The isolation transformer 60 secondary is connected to the >>display assembly 50. >>Once the detector monitor is connected to the loop 20 the device >>continuously detects and monitors electrical changes in impedance >>condition and characteristics on the loop 20 reporting each >>authorized/unauthorized connections/disconnections, as well as >>tampering and changes in loop signature pattern characteristics. >>SUMMARY, RAMIFICATIONS, AND SCOPE >>Each connection and disconnection on the subscriber's local >>telephone loop creates electrical changes in loop impedance >>condition and characteristics. Each telephone call creates a series >>of normal connections and disconnections on the loop, the device's >>display creates a signature or pattern. The system comprises of >>monitoring the device's display to each cell. By detecting >>electrical changes on the loop it is possible to establish a normal >>pattern of loop activity from an abnormal one. >>The preferred method and system comprises of connecting and >>monitoring the display assembly to establish a normal signature or >>pattern of loop impedance conditions and characteristics from an >>abnormal one resulting from additional connections/disconnections >>and tampering on the loop. >>The device detects and monitors authorized/unauthorized connections >>and disconnections before, during and after the completion of a >>call on a continuous basis. >>It would be obvious to those skilled in the art that numerous >>identifications could be made to the method and system of the >>present invention without departing from the spirit of the >>invention, which shall be limited only by the scope of the claims >>appended hereto. >>* * * * * >>------------------------------------------------------------------------ At 11:05 PM +0200 2/6/02, Steve Whitehead wrote: >Received this on my e-mail tonight. I think the list discussed this device a >while back. > >Steve Whitehead >E-mail : sceptre@m... >TSCM Services URL : http://www.tscm.co.za > >----- Original Message ----- >From: "COMSEC" >To: >Sent: Wednesday, February 06, 2002 6:48 PM >Subject: Steve, The COMSEC C3I Story > > >> INVENT A PRODUCT, Change a Industry, Shake up the World! >> How the Hunted Became the Hunter >> >> The story HOW I invented and patented the COMSEC C3I TM > > United States Patent #5,142,560, a telecommunications >> security device that detects wiretapping, surveillance, >> espionage previously undetectable. >> >> The Chicago Commodities Exchanges were the target of a US >> Government undercover investigation during 1988-1989. I was >> a Foreign Exchange Floor Trader at the Chicago Mercantile >> Exchange during that time. I had a gut instinct that my >> telephones were being wiretapped. I was right, you just >> can't say enough about gut instinct. >> >> I have friends and acquaintances that are top tier criminal >> defense attorneys. I went to these friends to ask what they >> thought the likelihood was that my telephones could be >> wiretapped. They pretty much all agreed that unless there >> was millions of dollars involved, sensational newspaper >> headlines and coverage or unless I was dealing with the >> wrong people, the likelihood of my telephones being >> wiretapped were extremely unlikely. >> >> The Attorney General of the United States came to >> Chicago, IL 3 months later to announce the indictments of >> 47 commodities traders for various offenses. The 2 year >> undercover government investigation of the Chicago >> commodities markets happened to include the trading pit I >> traded in. >> >> Furthermore, the FBI had an undercover agent working in the >> trading pit I traded in. There were millions of dollars >> involved. On the day the Government decided to announce the >> indictments there was a huge news media circus with >> accompanied news headlines about the 47 indicted commodity >> traders. >> >> The day the indictments were announced everything came >> together. At this point I knew I was on to something. >> I called the people who teach the government how to wiretap >> and how to detect wiretapping. They all told me it was >> impossible to detect these wiretaps because of the way they >> are engineered. They told me these wiretaps are >> "electronically isolated" to prevent detection. I was told >> that "it wasn't possible to detect these wiretaps." >> >> Next, I went to the Chicago Library Patent Depository. >> I read and researched all I could find on wiretapping. I >> read all the patents on wiretapping equipment and >> wiretapping detection equipment. I found what I thought was > > the possible means to detect undetectable wiretapping and >> started to construct a device to detect these wiretaps. >> >> Success >> >> I could now detect and confirm the governments >> "undetectable" wiretapping/surveillance. The government was >> not amused. At this point the government decided to flex >> its muscle. The Government assigned a federal agent to an >> electronic parts store where I bought components for the new >> invention. >> >> For a period of 3 weeks I couldn't buy a newspaper without >> a boy scout coming up to the counter to document how I >> bought anything. I was wiretapped, followed, photographed >> and now the government decided to set up physical >> surveillance at a electronics part store where I purchased >> parts for the prototype of the new invention. > > >> I was now ready to complete my Patent Application to be >> filed with the Department of Commerce Commissioner of >> Patents and Trademarks. I warned a Patent Attorney I was >> working with at the time that there could be some blow back. >> He assured me he had been through this before and that >> there wasn't anything to be concerned about. >> >> During this period of around the clock physical surveillance >> I went to the Patent Attorney's home unannounced. When I got >> there he was leaving with my Patent Application in hand. >> He didn't look well. He told me that "he had to go to a >> meeting." The next day he returned my Patent Application, >> and he told me he couldn't help me anymore and never charged >> me for his work up to that time. >> >> There is much more to the story, how I determined there was >> an undercover Government Agent, listening in on his >> communications over a cordless telephone with a scanner, >> running his work car's license plates through Illinois >> Department of Motor Vehicles to find out his car was >> registered to a Chicago Bear's Football player, etc. >> >> I completed my Patent Application in September 1990 and was >> awarded Patent #5,142,560 in September 1992. >> >> On December 17,2001 FOX News reported that the US Government >> has been wiretapped by Foreign Intelligence and others using >> the US National Wiretapping System. There is currently a >> on-going National Security investigation across the United >> States concerning the US National Wiretapping System being >> used against the United States by Foreign Intelligence and >> others. >> >> "The problem: according to classified law enforcement >> documents obtained by Fox News, the bad guys had the cops' >> beepers, cell phones, even home phones under surveillance. >> Some who did get caught admitted to having hundreds of >> numbers and using them to avoid arrest. >> >> "This compromised law enforcement communications between >> LAPD detectives and other assigned law enforcement officers >> working various aspects of the case. The organization >> discovered communications between organized crime >> intelligence division detectives, the FBI and the Secret >> Service." >> >> Shock spread from the DEA to the FBI in Washington, and then >> the CIA. An investigation of the problem, according to law >> enforcement documents, concluded, "The organization has >> apparent extensive access to database systems to identify >> pertinent personal and biographical information." >> >> When investigators tried to find out where the information >> might have come from, they looked at Amdocs, a publicly >> traded firm based in Israel. Amdocs generates billing data >> for virtually every call in America, and they do credit >> checks. The company denies any leaks, but investigators >> still fear that the firm's data is getting into the wrong >> hands. >> >> When investigators checked their own wiretapping system for >> leaks, they grew concerned about potential vulnerabilities >> in the computers that intercept, record and store the >> wiretapped calls." [FOX News Carl Cameron Investigates] >> >> "The worst penetrations are believed to be in the State >> Department. But others say the supposedly secure telephone >> systems in the White House, Defense Department and Justice >> Department may have been compromised as well. The problem >> for FBI agents in the famed Division 5, however, isn't just > > what they have uncovered, which is substantial, but what >> they don't know yet." [Insight] >> >> Email me to request a collection of news reports about the >> hottest Federal Government investigation in Washington, DC >> today. A unbelievable look inside Government wiretapping >> and how it will impact you. >> >> >> The COMSEC C3I detects legal and illegal wiretapping >> previously undetectable. Full background and product >> reviews are available on our web site: >> >> >> We are registered with the Department of Defense and the >> General Services Agency Information Technology Service. >> >> To receive additional information and Special Offers for >> Subscribers Only reply to this email with "Subscribe" in the > > Subject Line. >> >> PRIVACY STATEMENT: We will not distribute your address to >> anyone. Period. >> >> Reach me at the following address. >> >> >> Mark J. Neer >> President >> Communications Security >> Tel: 281.586.2034 >> Fax: 281.754.4047 >> Email: >> Internet: >> > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4747 From: William Knowles Date: Wed Feb 6, 2002 8:43pm Subject: Re: Fw: Steve, The COMSEC C3I Story On Wed, 6 Feb 2002, James M. Atkinson wrote: Ssssshhhhhhh! > What next, a 1-900 line where you call call Ms. Cleo so she can read > tarot card to tell if your line is tapped? You just described my next .com idea that I was going to IPO! I think I need a Chicago area TSCM professional to sweep my office. - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4748 From: Kevin D. Murray Date: Wed Feb 6, 2002 8:50pm Subject: The COMSEC C3I Story Gentlemen/women, It is time to put this to rest. This is not worth your valuable time and efforts. The C3I is a simple circuit with a few basic parts which essentially indicates voltage reversals on a telephone line. The unit I tested in 1992 is still here. If anyone would like photos or a schematic please contact me privately. If anyone would like to buy it, it comes with the Brooklyn Bridge at no extra charge. Kevin -- Kevin D. Murray - CPP, CFE, BCFE MURRAY ASSOCIATES Counterespionage Consultants to Business & Government Eavesdropping Detection Specialists www.spybusters.com "James M. Atkinson" wrote: > The funny thing is that this "method of detecting eavesdropping > devices" has been around since the 1950's. It was inappropriate for > the patent office to award any kind of patent on this issue as the > method was, and is common knowledge. > > Once you get past of the hype, hyperbole, marketing spin, and bovine > feces all the product seems to due is monitor impedance changes in a > line, which as we know is something you can do with a five dollar > circuit and a cheap oscilloscope. > > A decent Time Domain Reflectometer and FXT/NXT Cross Talk Analyzer > would be far more appropriate, but then snake oil is probably far > more profitable. > > The way the guy rambles on about grand government conspiracies is a > potential indicator that perhaps the poor fellow should be spending > his money on medical intervention or aluminium foil hats. > > Professional eavesdropper lean toward high impedance devices, and as > such the methods claimed in the patent would be virtually useless for > finding such devices. > > What next, a 1-900 line where you call call Ms. Cleo so she can read > tarot card to tell if your line is tapped? > > Sad, really sad, > > -jma > > >>-- > --------------------------------------------------------------------- > >>United States Patent 5,142,560 > >>Neer August 25, 1992 > >>--------------------- > -------------------------------------------------- > >>Wiretap detector and telephone loop monitor > >>Abstract > >> > >>A novel method and improved system for the continuous detection > >>monitoring of authorized/unauthorized connections/disconnections > >>including loop bridging wiretapping equipment capable of monitoring > >>recording voice and/or data communications on the subscriber's > >>local telephone loop. In operation the detector monitor displays > >>electrical changes in impedance condition and characteristics on > >>the subscriber's local telephone loop to detect and monitor > >>signaling, switching equipment and telephone lines > >>connecting/disconnecting anywhere on the loop including the central > >>exchange before, during and after the completion of a telephone > >>call continuously. > >>------------------ > ----------------------------------------------------- > >>Inventors: Neer; Mark J. (835 Locust, Winnetka, IL 60093) > >>Appl. No.: 587413 > >>Filed: September 25, 1990 > >> > >>Current U.S. Class: 379/7; 379/21; 379/30 > >>Intern'l Class: H04M 001/68 > >>Field of Search: 379/7,21,29,30,39,35 > >>------------------------------------------ > ----------------------------- > >>References Cited [Referenced By] > >>-------------------------------- > --------------------------------------- > >>U.S. Patent Documents > >>1834992 Dec., 1931 Almquist 379/21. > >>4658099 Apr., 1987 Frazer 379/7. > >>4680783 Jul., 1987 Boeckmann 379/7. > >>4760592 Jul., 1988 Hensley 379/7. > >>Foreign Patent Documents > >>58-143659 Aug., 1983 JP 379/7. > >>Primary Examiner: Schreyer; Stafford D. > >>--------------------------------------- > -------------------------------- > >>Claims > >>------ > ----------------------------------------------------------------- > >> > >>I claim: > >>1. An apparatus for detecting the connecting and the disconnecting > >>of an additional telephone line onto the subscriber's telephone > >>loop for the purpose of listening and/or recording, the telephone > >>loop connecting a subscriber with at least one telephone to a > >>central exchange and having a generally constant electrical > >>impedance, comprising: > >>(a) a capacitive element for detecting changes to said generally > >>constant electrical impedance; > >>(b) display means cooperating with and connected to said capacitive > >>element for visually showing that a change has been detected by > >>said capacitive element; and > >>(c) means for connecting the apparatus to the telephone loop. > >>2. The apparatus of claim 1, wherein said capacitive element is a > >>capacitor connected in series to the telephone loop. > >>3. The apparatus of claim 1, wherein said display means is a LED. > >>4. The apparatus of claim 1, wherein said means to connect > >>comprises a quick connect/disconnect line and jack. > >>5. An apparatus for continuously monitoring changes in impedance > >>caused by the connecting or the disconnecting of an additional > >>impedance source to a telephone loop connecting a subscriber with > >>at least one telephone to a central exchange and having a generally > >>constant electrical impedance, comprising: > >>(a) a capacitive element for detecting changes to the generally > >>constant electrical impedance; > >>(b) an isolation transformer having primary and secondary windings, > >>said primary windings being connected to said capacitive element; > >>(c) display means connected to said secondary windings for visually > >>showing that a change has been detected by said capacitive element; > >>and > >>(d) means for connecting the apparatus to the telephone loop. > >>6. The apparatus of claim 5, wherein said capacitive element is a > >>capacitor connected in series to the telephone loop. > >>7. The apparatus of claim 5, wherein said display means is a LED. > >>8. The apparatus of claim 5, wherein said means to connect > >>comprises a quick connect/disconnect line and jack. > >>9. The apparatus of claim 1 wherein said means for connecting the > >>apparatus to the telephone loop additionally includes a switching > >>mechanism connected in series with said capacitive element to the > >>telephone loop. > >>10. The apparatus of claim 9, wherein said display means comprises > >>an easily removable/replaceable LED mounted in a socket assembly. > >>11. The apparatus of claim 5 wherein said means for connecting the > >>apparatus to the telephone loop additionally includes a switching > >>mechanism connected in series with said capacitive element to the > >>telephone loop. > >>12. The apparatus of claim 11, wherein said display means comprises > >>an easily removable/replaceable LED mounted in a socket assembly. > >>----------------------------------------------------------------- > ------ > >>Description > >>----------- > ------------------------------------------------------------ > >> > >>BACKGROUND > >>1. Field of Invention > >>This invention relates to the detection monitoring of > >>authorized/unauthorized connections/disconnections including loop > >>bridging wiretapping equipment on the subscriber's local telephone > >>loops where electrical changes in loop impedance condition and > >>characteristics occur because of the connections/disconnections of > >>the briding equipment. > >>2. Description of Prior Art > >>There are many devices available that have been developed for both > >>legal and illegal wiretapping of telephone communications. A very > >>common type of wiretapping consists of a bridging device that > >>creates a remote extension or drawn loop by connecting an > >>additional telephone line on the subscriber's telephone loop and > >>routing it to an observation monitoring location. This loop > >>bridging wiretapping technique will cause a change in loop > >>impedance condition and characteristics depending on how the > >>tapping is completed. > >>In the prior art, wiretap detectors exist that utilize > >>microcomputers and processors, various meters, signal generators, > >>tone generators, etc., that detect wiretapping equipment connected > >>to a telephone line but are either simple voltage meters that are > >>ineffective, limited, detachable and defeatable, too expensive > >>and/or complicated equipment that is burdensome and obtrusive to > >>use on a continuous basis or must be installed on a clean line only. > > >>OBJECTS AND ADVANTAGES > >>This invention presents a new device, method and system that > >>displays connections and disconnections anywhere on the > >>subscriber's local telephone loop including the central exchange of > >>the telephone company before, during and after the completion of a > >>call on a continuous basis. Each telephone call produces a > >>signature or pattern of connections and disconnections. This > >>invention present the first continuous display of normal/abnormal > >>telephone loop electrical changes in impedance condition and > >>characterization activity resulting from signaling, switching and > >>wiretapping monitoring equipment connecting/disconnecting. > >>The present invention is easy to use, highly reliable, > >>undetectable, small, portable, and discreet which presents a novel > >>method and an improved system for detecting monitoring > >>authorized/unauthorized connections/disconnections including > >>wiretapping monitoring recording equipment which overcome all of > >>the above mentioned disadvantages of the previously known devices. > >>It is the object of this invention to show how > >>authorized/unauthorized connections/disconnections including loop > >>bridging wiretapping equipment can be detected and monitored on the > >>subscriber's loop by subscriber's telephone terminal(s) equipped > >>with said invention. > >>DRAWING FIGURES > >>FIG. 1 is a diagram of a local telephone system. > >>FIG. 2 is a diagram of the wiretap detector and telephone loop > >>monitor in alternate forms, in accordance with the present > >>invention. > >>FIG. 3 is a diagram of the preferred assembled invention in > >>accordance with the present invention. > >>FIG. 4 is a diagram of the detector monitor display socket assembly. > > >>REFERENCE NUMERALS IN DRAWINGS > >>10 local telephone central exchange > >>20 subscriber's local telephone loop > >>30 subscriber's residence telephone terminal(s) > >>40 capacitive element > >>50 detector monitor display assembly > >>60 isolation transformer > >>70 switching mechanism > >>80 modular telephone line > >>90 modular telephone line jack > >>100 modular telephone interface housing > >>DESCRIPTION OF INVENTION > >>This invention presents a novel method and improved system that > >>detects and monitors authorized/unauthorized > >>connections/disconnections including loop bridging wiretapping > >>equipment that causes electrical changes in impedance condition and > >>characteristics on the subscriber's local telephone loop to detect > >>signaling, switching equipment and telephone lines > >>connecting/disconnecting anywhere on the loop including the central > >>exchange continuously. > >>By continuously monitoring the subscriber's telephone loop > >>impedance condition and characteristics, it is possible to detect > >>normal as well as abnormal connections and disconnections. > >>Connections and disconnections effect changes in impedance > >>characteristics on the subscriber's telephone loop and are the > >>indication of wiretapping monitoring equipment connecting/ > >>disconnecting. By detecting connections/disconnections it is > >>possible to determine authorized/unauthorized > >>connections/disconnections including wiretapping equipment on the > >>loop. The proposed method and system comprises of monitoring the > >>device's display to establish a normal signature or pattern of > >>telephone loop characteristics from an abnormal signature or > >>pattern resulting from additional extensions, either at the > >>subscriber's residence or remotely connecting/disconnecting on the > >>telephone loop. > >>OPERATION OF THE PREFERRED EMBODIMENT > >>Further objects and advantages of said invention will become > >>apparent from a consideration of the drawings and ensuing operation > >>of it. Each of the elements included therein can assume several > >>different forms, all of which would be well known to those skilled > >>in the art, and it only be required that they perform the functions > >>set forth herein after. > >>Referring first to the diagram of FIG. 1, it should be noted that > >>FIG. 1 details a local telephone system. As seen in FIG. 1, a local > >>telephone system comprising of the telephone company's central > >>exchange 10 a subscriber's local telephone loop 20 and a > >>subscriber's residence telephone terminal(s) 30. > >>Referring to FIG. 2, there are four presented embodiments of said > >>invention, embodiment 2 is the preferred embodiment. As seen in > >>FIG. 2, embodiment 1 comprising capacitive element 40 detector > >>monitor display assembly 50. > >>As seen in FIG. 2, preferred embodiment 2 comprising capacitive > >>element 40 isolation transformer 60 display assembly 50. > >>As seen in FIG. 2, embodiment 3 comprising capacitive element 40 > >>display element 50 switching mechanism 70. > >>As seen in FIG. 2, embodiment 4 comprising capacitive element 40 > >>isolation transformer 60 display assembly 50 switching mechanism 70. > > >>As seen in preferred embodiment 2, side one of the capacitive > >>element 40 is connected to either the Tip or Ring side of the > >>subscriber's telephone loop 20. Side two of the capacitive element > >>40 is connected in series to the isolation transformer 60 primary's > >>side one. The isolation transformer 60 primary's side two is then > >>connected to the alternate side of the subscriber's telephone loop > >>20. The isolation transformer 60 secondary is connected to the > >>display assembly 50. > >>Once the detector monitor is connected to the loop 20 the device > >>continuously detects and monitors electrical changes in impedance > >>condition and characteristics on the loop 20 reporting each > >>authorized/unauthorized connections/disconnections, as well as > >>tampering and changes in loop signature pattern characteristics. > >>SUMMARY, RAMIFICATIONS, AND SCOPE > >>Each connection and disconnection on the subscriber's local > >>telephone loop creates electrical changes in loop impedance > >>condition and characteristics. Each telephone call creates a series > >>of normal connections and disconnections on the loop, the device's > >>display creates a signature or pattern. The system comprises of > >>monitoring the device's display to each cell. By detecting > >>electrical changes on the loop it is possible to establish a normal > >>pattern of loop activity from an abnormal one. > >>The preferred method and system comprises of connecting and > >>monitoring the display assembly to establish a normal signature or > >>pattern of loop impedance conditions and characteristics from an > >>abnormal one resulting from additional connections/disconnections > >>and tampering on the loop. > >>The device detects and monitors authorized/unauthorized connections > >>and disconnections before, during and after the completion of a > >>call on a continuous basis. > >>It would be obvious to those skilled in the art that numerous > >>identifications could be made to the method and system of the > >>present invention without departing from the spirit of the > >>invention, which shall be limited only by the scope of the claims > >>appended hereto. > >>* * * * * > >>--------- > -------------------------------------------------------------- > > At 11:05 PM +0200 2/6/02, Steve Whitehead wrote: > >Received this on my e-mail tonight. I think the list discussed this > device a > >while back. > > > >Steve Whitehead > >E-mail : sceptre@m... > >TSCM Services URL : http://www.tscm.co.za > > > >----- Original Message ----- > >From: "COMSEC" > >To: > >Sent: Wednesday, February 06, 2002 6:48 PM > >Subject: Steve, The COMSEC C3I Story > > > > > >> INVENT A PRODUCT, Change a Industry, Shake up the World! > >> How the Hunted Became the Hunter > >> > >> The story HOW I invented and patented the COMSEC C3I TM > > > United States Patent #5,142,560, a telecommunications > >> security device that detects wiretapping, surveillance, > >> espionage previously undetectable. > >> > >> The Chicago Commodities Exchanges were the target of a US > >> Government undercover investigation during 1988-1989. I was > >> a Foreign Exchange Floor Trader at the Chicago Mercantile > >> Exchange during that time. I had a gut instinct that my > >> telephones were being wiretapped. I was right, you just > >> can't say enough about gut instinct. > >> > >> I have friends and acquaintances that are top tier criminal > >> defense attorneys. I went to these friends to ask what they > >> thought the likelihood was that my telephones could be > >> wiretapped. They pretty much all agreed that unless there > >> was millions of dollars involved, sensational newspaper > >> headlines and coverage or unless I was dealing with the > >> wrong people, the likelihood of my telephones being > >> wiretapped were extremely unlikely. > >> > >> The Attorney General of the United States came to > >> Chicago, IL 3 months later to announce the indictments of > >> 47 commodities traders for various offenses. The 2 year > >> undercover government investigation of the Chicago > >> commodities markets happened to include the trading pit I > >> traded in. > >> > >> Furthermore, the FBI had an undercover agent working in the > >> trading pit I traded in. There were millions of dollars > >> involved. On the day the Government decided to announce the > >> indictments there was a huge news media circus with > >> accompanied news headlines about the 47 indicted commodity > >> traders. > >> > >> The day the indictments were announced everything came > >> together. At this point I knew I was on to something. > >> I called the people who teach the government how to wiretap > >> and how to detect wiretapping. They all told me it was > >> impossible to detect these wiretaps because of the way they > >> are engineered. They told me these wiretaps are > >> "electronically isolated" to prevent detection. I was told > >> that "it wasn't possible to detect these wiretaps." > >> > >> Next, I went to the Chicago Library Patent Depository. > >> I read and researched all I could find on wiretapping. I > >> read all the patents on wiretapping equipment and > >> wiretapping detection equipment. I found what I thought was > > > the possible means to detect undetectable wiretapping and > >> started to construct a device to detect these wiretaps. > >> > >> Success > >> > >> I could now detect and confirm the governments > >> "undetectable" wiretapping/surveillance. The government was > >> not amused. At this point the government decided to flex > >> its muscle. The Government assigned a federal agent to an > >> electronic parts store where I bought components for the new > >> invention. > >> > >> For a period of 3 weeks I couldn't buy a newspaper without > >> a boy scout coming up to the counter to document how I > >> bought anything. I was wiretapped, followed, photographed > >> and now the government decided to set up physical > >> surveillance at a electronics part store where I purchased > >> parts for the prototype of the new invention. > > > > >> I was now ready to complete my Patent Application to be > >> filed with the Department of Commerce Commissioner of > >> Patents and Trademarks. I warned a Patent Attorney I was > >> working with at the time that there could be some blow back. > >> He assured me he had been through this before and that > >> there wasn't anything to be concerned about. > >> > >> During this period of around the clock physical surveillance > >> I went to the Patent Attorney's home unannounced. When I got > >> there he was leaving with my Patent Application in hand. > >> He didn't look well. He told me that "he had to go to a > >> meeting." The next day he returned my Patent Application, > >> and he told me he couldn't help me anymore and never charged > >> me for his work up to that time. > >> > >> There is much more to the story, how I determined there was > >> an undercover Government Agent, listening in on his > >> communications over a cordless telephone with a scanner, > >> running his work car's license plates through Illinois > >> Department of Motor Vehicles to find out his car was > >> registered to a Chicago Bear's Football player, etc. > >> > >> I completed my Patent Application in September 1990 and was > >> awarded Patent #5,142,560 in September 1992. > >> > >> On December 17,2001 FOX News reported that the US Government > >> has been wiretapped by Foreign Intelligence and others using > >> the US National Wiretapping System. There is currently a > >> on-going National Security investigation across the United > >> States concerning the US National Wiretapping System being > >> used against the United States by Foreign Intelligence and > >> others. > >> > >> "The problem: according to classified law enforcement > >> documents obtained by Fox News, the bad guys had the cops' > >> beepers, cell phones, even home phones under surveillance. > >> Some who did get caught admitted to having hundreds of > >> numbers and using them to avoid arrest. > >> > >> "This compromised law enforcement communications between > >> LAPD detectives and other assigned law enforcement officers > >> working various aspects of the case. The organization > >> discovered communications between organized crime > >> intelligence division detectives, the FBI and the Secret > >> Service." > >> > >> Shock spread from the DEA to the FBI in Washington, and then > >> the CIA. An investigation of the problem, according to law > >> enforcement documents, concluded, "The organization has > >> apparent extensive access to database systems to identify > >> pertinent personal and biographical information." > >> > >> When investigators tried to find out where the information > >> might have come from, they looked at Amdocs, a publicly > >> traded firm based in Israel. Amdocs generates billing data > >> for virtually every call in America, and they do credit > >> checks. The company denies any leaks, but investigators > >> still fear that the firm's data is getting into the wrong > >> hands. > >> > >> When investigators checked their own wiretapping system for > >> leaks, they grew concerned about potential vulnerabilities > >> in the computers that intercept, record and store the > >> wiretapped calls." [FOX News Carl Cameron Investigates] > >> > >> "The worst penetrations are believed to be in the State > >> Department. But others say the supposedly secure telephone > >> systems in the White House, Defense Department and Justice > >> Department may have been compromised as well. The problem > >> for FBI agents in the famed Division 5, however, isn't just > > > what they have uncovered, which is substantial, but what > >> they don't know yet." [Insight] > >> > >> Email me to request a collection of news reports about the > >> hottest Federal Government investigation in Washington, DC > >> today. A unbelievable look inside Government wiretapping > >> and how it will impact you. > >> > >> > >> The COMSEC C3I detects legal and illegal wiretapping > >> previously undetectable. Full background and product > >> reviews are available on our web site: > >> > >> > >> We are registered with the Department of Defense and the > >> General Services Agency Information Technology Service. > >> > >> To receive additional information and Special Offers for > >> Subscribers Only reply to this email with "Subscribe" in the > > > Subject Line. > >> > >> PRIVACY STATEMENT: We will not distribute your address to > >> anyone. Period. > >> > >> Reach me at the following address. > >> > >> > >> Mark J. Neer > >> President > >> Communications Security > >> Tel: 281.586.2034 > >> Fax: 281.754.4047 > >> Email: > >> Internet: > >> > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== TSKS > > > >Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > -- > > -- > ----------------------------------------------------------------------------------------------- > > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > --------------------------------------------------------------------- > ---------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > > ------------------------------------------------------------------------------------------------- > > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > > -------------------------------------------------------------------------------------------------- > > ------------------------ Yahoo! Groups Sponsor > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ 4749 From: Dora Furlong Date: Wed Feb 6, 2002 8:51pm Subject: Re: Microsoft's Really Hidden Files: A New Look At Forensics (v2.6) For those interested in this and what is going on with their computers, or a particular program take a look at FileMon from sysinternals. http://www.sysinternals.com/ntw2k/source/filemon.shtml Company's description: Filemon monitors and displays file system activity on a system in real-time. Its advanced capabilities make it a powerful tool for exploring the way Windows works, seeing how applications use the files and DLLs, or tracking down problems in system or application file configurations. Filemon's timestamping feature will show you precisely when every open, read, write or delete, happens, and its status column tells you the outcome. Filemon is so easy to use that you'll be an expert within minutes. It begins monitoring when you start it, and its output window can be saved to a file for off-line viewing. It has full search capability, and if you find that you're getting information overload, simply set up one or more filters. Filemon works on NT 4.0, Windows 2000, Windows XP, Windows XP 64-bit Edition, Windows 95, Windows 98 and Windows ME. Sysinternals also has a version of Filemon for Linux. -->Dora Furlong On Wed, 6 Feb 2002, James M. Atkinson wrote: > > Microsoft's Really Hidden Files: A New Look At Forensics (v2.6) > By The Riddler > November 3, 2001 > (v2.0 finished May 16, 2001; v1.0 finished June 11, 2000) > > Written with Windows 9x in mind, but not limited to. > > DISCLAIMER: > > I will not be liable for any damage or lost information, whether due to > reader's error, or any other reason. > > SUMMARY: > > There are folders on your computer that Microsoft has tried hard to keep > secret. Within these folders you will find two major things: Microsoft > Internet Explorer has not been clearing your browsing history after you have > instructed it to do so, and Microsoft's Outlook Express has not been deleting > your e-mail correspondence after you've erased them from your Deleted Items > bin. (This also includes all incoming and outgoing file attachments.) And > believe me, that's not even the half of it. > > When I say these files are hidden well, I really mean it. If you don't have > any knowledge of DOS then don't plan on finding these files on your own. I > say this because these files/folders won't be displayed in Windows Explorer at > all -- only DOS. (Even after you have enabled Windows Explorer to "show all > files.") And to top it off, the only way to find them in DOS is if you knew > the exact location of them. Basically, what I'm saying is if you didn't know > the files existed then the chances of you running across them is slim to > slimmer. > > It's interesting to note that Microsoft does not explain this behavior > adequately at all. Just try searching on microsoft.com. > > FORWARD: > > I know there are some people out there that are already aware of some of the > things I mention. I also know that most people are not. The purpose of this > tutorial is teach people what is really going on with Microsoft's products and > how to take control of their privacy again. This tutorial was written by me, > so if you see a mistake somewhere then it is my mistake, and I apologize. > > Thanks for reading. > > INDEX: > > 1) DEFINITIONS > 1.1) Ancronyms > 2) SEEING IS BELEIVING > 3) HOW TO ERASE THE FILES ASAP > 3.1) If You Have Ever Used Microsoft Internet Explorer > 3.2) Clearing Your Registry > 3.3) Slack files > 3.4) Keeping Microsoft's Products > 4) STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES (For the savvy.) > 5) HOW MICROSOFT DOES IT > 6) +S MEANS [S]ECRET NOT [S]YSTEM. > 7) A LOOK AT OUTLOOK > 8) THE TRUTH ABOUT FIND FAST > 8.1) Removing Find Fast > 9) CONTACT INFORMATION AND PGP BLOCKS > 9.1) Recommended reading > 10) SPECIAL THANKS > 11) REFERENCES > > Coming in version 3.0: > > ˘ pstores.exe > ˘ Related Windows Tricks. > ˘ Looking back on the NSA-Key. > ˘ Researching the [Microsoft Update] button. > ˘ Why the temp folders aren't intended to be temporary at all. > ˘ What's with Outlook Express's .dbx database files? > ˘ Win2K support. > > > 1.0. DEFINITIONS > > I) A "really hidden" file/folder is one that cannot be seen in Windows > Explorer after enabling it to "show all files," and cannot be seen in MS-DOS > after receiving a proper directory listing from root. > > a) There is at least one loophole to enable Windows Explorer to see them. > b) There is at least one loophole to enable MS-DOS to see them. > > II) Distinguishes "really hidden" file/folders from just plain +h[idden] ones, > such as your "MSDOS.SYS" or "Sysbckup" folder. > > III) Distinguishes from certain "other" intended hidden files, such as a file > with a name with high ascii characters (eg, "YÎÔ®o"). > > (Interesting to note that Microsoft has disabled the "Find: Files or Folders" > from searching through one of these folders.) > > > 1.1. ANCRONYMS > > DOS = Disk Operating System aka MS-DOS > MSIE = Microsoft Internet Explorer > TIF = Temporary Internet Files (folder) > HD = Hard Drive > OS = Operating System > FYI = For Your Information > > > 2. SEEING IS BELEIVING > > No. Enabling Windows Explorer to "show all files" does not show the files in > mention. No. DOS does not list the files after receiving a proper directory > listing from root. And yes. Microsoft intentionally disabled the "Find" > utility from searching through one of the folders. > > Oh, but that's not all. > > Just from one of these files I would be able to tell you which web sites you > previously visited, what types of things you search for in search engines, and > probably gather your ethnicity, religion, and sexual preference. Needless to > say one can build quite a profile on you from these files. It has the > potential to expose and humiliate -- putting your marriage, friendship, and > corporation at risk. Here's one good example of the forensic capabilities.. > > "I've been reading your article as I have a problem with an employee of mine. > He has been using the works pc for the internet and using it to chat and look > at porn sites. He was then deleting the cookies and history in order to cover > his tracks. A friend of mine pointed me in the direction of this site and > your article. I have found it to be incredibly useful,..." > > --Concerned Boss, 8/24/01 > > One more thing. They contain your browsing history at ALL times. Even after > you have instructed Microsoft Internet Explorer to clear your history/cache. > And so the saying goes, "seeing is believing..." > > To see for yourself simply do as you would normally do to clear your browsing > history. Go to Internet Options under your Control Panel. Click on the > [Clear History] and [Delete Files] buttons. (Make sure to include all offline > content.) > > So, has your browsing history been cleared? One would think so... > > Skipping the to chase here. These are the names and locations of the "really > hidden files:" > > c:\windows\history\history.ie5\index.dat > c:\windows\tempor~1\content.ie5\index.dat > > If you have upgraded MSIE several times, they might have alternative names of > mm256.dat and mm2048.dat, and may also be located here: > > c:\windows\tempor~1\ > c:\windows\history\ > > Not to mention the other alternative locations under: > > c:\windows\profiles\%user%\... > c:\windows\application data\... > c:\windows\local settings\... > c:\windows\temp\... > c:\temp\... > > FYI, there are a couple other index.dat files that get hidden as well, but > they are seemingly not very important. > > > 3.0. HOW TO ERASE THE FILES ASAP > > Step by step information on how to erase these files as soon as possible. > This section is recommended for the non-savvy. Further explanation can be > found in Section 4.0. Please note that following these next steps will erase > all your internet cache and cookies files. If you use the offline content > feature with MSIE, it will remove this as well. It will not erase your > bookmarks. > > > 3.1. IF YOU HAVE EVER USED MICROSOFT INTERNET EXPLORER > > 1) Shut your computer down, and turn it back on. > 2) While your computer is booting keep pressing the [F8] key until you are > given an option screen. > 3) Choose "Command Prompt Only." This will take you to real DOS mode. ME > users must use a bootdisk to get into real DOS mode. > 4) When your computer is done booting, you will have a C:\> followed by a > blinking cursor. Type in this hitting enter after each line (sans > parenthesis): > > C:\WINDOWS\SMARTDRV (Loads smartdrive to speed things up.) > CD\ > DELTREE/Y TEMP (This line removes temporary files.) > CD WINDOWS > DELTREE/Y COOKIES (This line removes cookies.) > DELTREE/Y TEMP (This removes temporary files.) > DELTREE/Y HISTORY (This line removes your browsing history.) > DELTREE/Y TEMPOR~1 (This line removes your internet cache.) > > (If this last line doesn't work then type this:) > > CD\WINDOWS\APPLIC~1 > DELTREE/Y TEMPOR~1 > > (If this doesn't work then type this:) > > CD\WINDOWS\LOCALS~1 > DELTREE/Y TEMPOR~1 > > (If this still does not work, and you are sure you are using MSIE 5.x, then > feel free to e-mail me. If you have profiles turned on, then it is likely > located under \windows\profiles\%user%\, while older versions of MSIE keep > them under \windows\content\.) > > This last one will take a ridiculous amount of time to process. The reason it > takes so incredibly long is because there is a TON of useless cache stored > on your HD. > > 5) Immediately stop using Microsoft Internet Explorer and go with any of the > alternative browsers out there. Netscape 4.7x from netscape.net, mozilla from > mozilla.org, or opera from opera.com. > > FYI, Windows re-creates the index.dat files automatically when you reboot your > machine so don't be surprised when you see them again. They should at least > be cleared of your browsing history. > > > 3.2. CLEARING YOUR REGISTRY > > It was once believed that the registry is the central database of Windows that > stores and maintains the OS configuration information. Well, this is wrong. > Apparently it also maintains a bunch of other information that has absolutely > nothing to do with the configuration. I won't get into the other stuff but > for one, your Typed URLs are stored in the registry. > > HKEY_USERS/Default/Software/Microsoft/Internet Explorer/TypedURLs/ > HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/TypedURLs/ > > These "Typed URLs" come from MSIE's autocomplete feature. It records all URLs > that you've typed in manually in order to save you some time filling out the > address field. By typing "ama" the autocomplete feature might bring up > "amazon.com" for you. Although, I find it annoying, some people prefer this > feature. One thing is for sure however -- it's an obvious privacy risk. You > wouldn't want a guest to type "ama" and have it autocomplete to > "amaturemudwrestlers.com" now would you? > > You can clear your Typed URLs out of your registry by doing going to your > Control Panel > Internet Options > Content > [AutoComplete] > and finally > [Clear Forms]. If you feel the AutoComplete feature is a privacy risk, then > uncheck the appropriate boxes here. > > FYI, this section has nothing to do with "really hidden files." It was added > so people can completely clear their browsing history before having to ditch > Microsoft Internet Explorer. > > > 3.3. SLACK FILES > > As you may already know, deleting files only deletes the references to them. > They are in fact still sitting there on your HD and can still be recovered by > a very motivated person. > > ˘ BCWipe is a nice program that will clear these files. (www.bcwipe.com). > ˘ For you DOS buffs, there's a freeware file wiper on simtel.net that I use. > (www.simtel.net/pub/dl/45631.shtml). > ˘ If you are using PGP then there is a "Freespace Wipe" option under PGPtools. > ˘ The newer versions of Norton Utilities has a nice filewiping utility. > ˘ You might want to check out Evidence Eliminator's 30 day trial. This is > probably the best program as far as your privacy goes. > (www.evidence-eliminator.com) > > > 3.4. KEEPING MICROSOFT'S PRODUCTS > > If your work environment forces you to use Microsoft Internet Explorer then I > strongly recommend that you talk your boss into checking out one of these > programs: > > ˘ PurgeIE (www.aandrc.com/purgeie) > ˘ Cache and Cookie Cleaner for IE (www.webroot.com/washie.htm) > ˘ Anonymizer Window Washer (www.anonymizer.com/anonwash) > > These programs automate the process for you, and is far better then having to > ad 'deltree/y' lines to your autoexec. > > AND if your work environment forces you to use Outlook or Outlook Express then > you should get in the habit of compacting your mailboxes. > > You can do this by going to File > Folder > Compact All if you have Outlook > Express. > > or > > Tools > Options > Other tab > [Auto Archive] if you have Outlook. Make sure > to set things up here. > > > 4.0. STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES > > This next section is intended for the savvy user. > > The most important files to be paying attention to are your "index.dat" files. > These are database files that reference your history, cache and cookies. The > first thing you should know is that the index.dat files is that they don't > exist in less you know they do. They second thing you should know about them > is that some will *not* get cleared after deleting your history and cache. > > The result: > > A log of your browsing history hidden away on your computer after you thought > you cleared it. > > To view these files, follow these steps: > > In MSIE 5.x, you can skip this first step by opening MSIE and going to Tools > > Internet Options > [Settings] > [View Files]. Now write down the names of > your alphanumeric folders on a piece of paper. If you can't see any > alphanumeric folders then start with step 1 here: > > 1) First, drop to a DOS box and type this at prompt (in all lower-case) to > bring up Windows Explorer under the correct directory... > > c:\windows\explorer /e,c:\windows\tempor~1\content.ie5\ > > You see all those alphanumeric names listed under "content.ie5?" (left-hand > side.) That's Microsoft's idea of making this project as hard as possible. > Actually, these are your alphanumeric folders that was created to keep your > cache. Write these names down on a piece of paper. (They should look > something like this: 6YQ2GSWF, QRM7KL3F, U7YHQKI4, 7YMZ516U, etc...) If you > click on any of the alphanumeric folders then nothing will be displayed. Not > because there aren't any files here, but because Windows Explorer has lied to > you. If you want to view the contents of these alphanumeric folders you will > have to do so in DOS. (Actually, this is not always true. *Sometimes* > Windows Explorer will display the contents of the alphanumeric folders -- but > mostly it won't. I can't explain this.) > > 2) Then you must restart in MS-DOS mode. (Start > Shutdown > Restart in > MS-DOS mode. ME users use a bootdisk.) > > Note that you must restart to DOS because windows has locked down some of the > files and they can only be accessed in real DOS mode. > > 3) Type this in at prompt: > > CD\WINDOWS\TEMPOR~1\CONTENT.IE5 > CD %alphanumeric% > (replace the "%alphanumeric%" with the first name that you just wrote down) > > DIR/P > > The cache files you are now looking at are directly responsible for the > mysterious erosion of HD space you may have been noticing. One thing > particularly interesting is the ability to view some your old e-mail if you > happen to have a hotmail account. (Oddly, I've only been able to retreive > hotmail e-mail, and not e-mail from my other web-based e-mail accounts. Send > me your experiences with this.) To see them for yourself you must first copy > them into another directory and THEN open them with your browser. Don't ask > me why this works. > > A note about these files: These are your cache files that help speed up > your internet browsing. It is quite normal to use this cache system, as every > major browser does. On the other hand. It isn't normal for some cache files > to be left behind after you have instructed your browser to erase it. > > 5) Type this in: > > CD\WINDOWS\TEMPOR~1\CONTENT.IE5 > EDIT /75 INDEX.DAT > > You will be brought to a blue screen with a bunch of binary. > > 6) Press and hold the [Page Down] button until you start seeing lists of URLs. > These are all the sites that you've ever visited as well as a brief > description of each. You'll notice it records everything you've searched for > in a search engine in plain text, in addition to the URL. > > 7) When you get done searching around you can go to File > Exit. If you don't > have mouse support in DOS then use the [ALT] and [Arrow] keys. > > 8) Next you'll probably want to erase these files by typing this: > > C:\WINDOWS\SMARTDRV > CD\WINDOWS > DELTREE/Y TEMPOR~1 > > (replace "cd\windows" with the location of your TIF folder if different.) > > This will take a seriously long time to process. Even with smartdrive loaded. > > 9) Then check out the contents of your History folder by typing this: > > CD\WINDOWS\HISTORY\HISTORY.IE5 > EDIT /75 INDEX.DAT > > You will be brought to a blue screen with more binary. > > 10) Press and hold the [Page Down] button until you start seeing lists of URLS > again. > > This is another database of the sites you've visited. > > 11) And if you're still with me type this: > > CD\WINDOWS\HISTORY > > 12) If you see any mmXXXX.dat files here then check them out (and delete > them.) Then... > > CD\WINDOWS\HISTORY\HISTORY.IE5 > CD MSHIST~1 > EDIT /75 INDEX.DAT > > More URLs from your internet history. Note, there are probably other mshist~x > folders here so you can repeat these steps for every occurence if you please. > > 13) By now you'll probably want to type in this: > > CD\WINDOWS > DELTREE/Y HISTORY > > > 5.0. HOW MICROSOFT DOES IT > > How does Microsoft make these folders/files invisible to DOS? > > The only thing Microsoft had to do to make the folders/files invisible to a > directory listing is to set them +s[ystem]. That's it. As soon as the dir/s > command hits a system folder, it renders the command useless (unlike normal > folders.) A more detailed explanation is given in Section 6. > > So how does Microsoft make these folders/files invisible to Windows Explorer? > > The "desktop.ini" is a standard text file that can be added to any folder to > customize certain aspects of the folder's behavior. In these cases, Microsoft > utilized the desktop.ini file to make these files invisible. Invisible to > Windows Explorer and even to the "Find: Files or Folders" utility (so you > wouldn't be able to perform searches in these folders!) All that Microsoft > had to do was create a desktop.ini file with certain CLSID tags and the > folders would disappear like magic. > > To show you exactly what's going on: > > Found in the c:\windows\temporary internet files\desktop.ini and the > c:\windows\temporary internet files\content.ie5\desktop.ini contains this > text: > > [.ShellClassInfo] > UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933} > > Found in the c:\windows\history\desktop.ini and the > c:\windows\history\history.ie5\desktop.ini contains this text: > > [.ShellClassInfo] > UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933} > CLSID={FF393560-C2A7-11CF-BFF4-444553540000} > > The UICLSID line cloaks the folder in Windows Explorer. The CLSID line > disables the "Find" utility from searching through the folder. (Additionally, > it gives a folder the appearance of the "History" folder.) > > To see for yourself, you can simply erase the desktop.ini files. You'll see > that it will instantly give Windows Explorer proper viewing functionality > again, and the "Find" utility proper searching capabilities again. Problem > solved right? Actually, no. As it turns out, the desktop.ini files get > reconstructed every single time you restart your computer. Nice one, Slick. > > Luckily there is a loophole which will keep Windows from hiding these folders. > You can manually edit the desktop.ini's and remove everything except for the > "[.ShellClassInfo]" line. This will trick windows into thinking they have > still covered their tracks, and wininet won't think to reconstruct them. > > I can't stress how ridiculous it is that Windows actually makes sure the files > are hidden on every single boot. No other files or folders get this kind of > special treatment. So what's the agenda here? > > > 6.0. +S MEANS [S]ECRET NOT [S]YSTEM > > Executing the "dir/a/s" command from root *should* be the correct command to > display all files in all subdirectories in DOS. However, doing so will not > display the index.dat files. This is because when DOS tries to get a list of > the subdirectories of any +s[ystem] directory it hits a brick wall. No files > or folders will be listed within any system directory. Not only does this > defeat the whole purpose of the "/s" switch in the first place, but I'd say it > looks like Microsoft took extra precautions to keep people from finding the > files. Remember. The only thing you need to do to obscure a file in DOS is > to mark the parent directory +s[ystem]. > > I was told by a few people that this was due to a very old DOS bug that dates > back many years. Fine. I can accept that. A bug it is. > > But, would you consider your Temporary Internet Files to be "system files?" > It would seem that your TIF folder appears to be marked +s[ystem] for no good > reason at all. Just because. Same with your history folder. You may not > agree, but I tend to think that Microsoft marked the folders as +s[ystem] > solely to hide any directory recursal from DOS. > > In case you didn't understand, here's a small experiment that will show you > what I mean... > > Since the content.ie5 and history.ie5 subfolders are both located within a > +s[ystem] folder, we will run the experiment with them. The proper command to > locate them *should* be this: > > CD\ > DIR *.IE5 /as/s > > The problem is that you will receive a "No files found" error message. > > Since we already know there is a content.ie5 subfolder located here, why is > it giving me the "no files found" message? > > But there is a way to get around this brick wall. That is, once you are > inside the system directory, then it no longer has an effect on the dir > listings. For example, if you enter the system folder first, and THEN try to > find any +s[ystem] directories you can see them just fine: > > CD\WINDOWS\TEMPOR~1 > DIR *.IE5 /as/s > > 1 folder(s) found. > > Now you will get a "1 folder(s) found." message. (But only after you knew the > exact location.) > > In other words, if you didn't know the files existed then finding them would > be almost impossible. > > And, by the way. To see the "bug" in progress... > > CD\ > DIR *.IE5 /a/s > > It will echo "no files found." > > Now, just take away the system attributes from the parent directory... > > CD\WINDOWS > ATTRIB -S TEMPOR~1 > > And retry the test... > > CD\ > DIR *.IE5 /a/s > > It will echo "1 folder(s) found." > > > 7.0. A LOOK AT OUTLOOK EXPRESS > > Would you think twice about what you said if you knew it was being recorded? > E-mail correspondence leaves a permanent record of everything you've said -- > even after you've told Outlook Express to erase it. You are given a false > sense of security sense you've erased it twice, so surely it must be gone. > The first time Outlook simply moves it to your "Deleted Items" folder. The > second time you erase it Outlook simply "pretends" it is gone. The truth is > your messages are still being retained in the database files on your HD. > (As with your e-mail attachments.) > > For earlier versions of Outlook Express, they will be located in either of > the following folder: > > c:\program files\internet mail and news\%user%\mail\*.mbx > c:\windows\application data\microsoft\outlook\mail\*.mbx > > At this point you have two choices. > > a) Get in the habit of compacting your folders all the time. > b) Backup, print-out, or import the data into another e-mail client such as > Eudora and then delete the mbx files (and thus all your e-mail correspondence) > by typing this: > > cd\progra~1\intern~1\%user%\mail > deltree/y mail > > or > > cd\windows\applic~1\micros~1\outloo~1\ > deltree/y mail > > *Typing in the above commands will kill all your e-mail correspondence. Do > not follow those steps in less you have already exported your e-mail and > address book! > > If you have a newer version of Outlook or Outlook Express the databases are > located elsewhere. Look for .dbx and .pst file extensions. These databases > are five times as creepy, and I strongly recommend you take at the files. > > Just from my outbox.dbx file I was able to view some of my old browsing > history, bring up previously-visited websites in html format, and even read > ancient e-mail from my Eudora client (read: EUDORA). > > Again, don't take my word for it. See for yourself and THEN tell me what you > think Slick Willy is up to here. > > > 8.0. THE TRUTH ABOUT FIND FAST > > Have you ever wondered what that "Find Fast" program was under your control > panel? Here's a hint: It has absolutely nothing to do with the "Find" > utility located under the [Start] menu. Just to clear up any confusion before > going on, Oblivion adequately explains Find Fast here: > > "In any version of Word after 95, choose File Open and you'll get the Office > App Open dialog. Instead of just a space for the file name, there are text > boxes for file name, files of type, text or property & last modified. These > are search criteria you can use to find one or more files. There is also an > "Advanced" button that opens a dedicated search dialog with more options. > When you use either of these dialogs to perform a search, that search process > uses the indexes built by Find Fast." > > --Oblivion > > But what would you say if I told you that Find Fast was scanning every single > file on your hard drive? Did you know that in Office 95, the Find Fast > Indexer had an "exclusion list" comprised of .exe, .swp, .dll and other > extensions, but the feature was eliminated? If you were a programmer would > you program Find Fast to index every single file, or just the ones with Office > extensions? > > FYI, If you have ever had problems with scandisk or defrag restarting due to > disk writes, it is because Find Fast was indexing your hard drive in the > background. It loads every time you start your computer up. > > Now here is a good example of the lengths Microsoft has gone through to keep > people from finding out Find Fast is constantly scanning and indexing their > hard drives. (Always good to have an alibi.) Here's a snippet taken from > microsoft.com: > > "When you specify the type of documents to index in the Create Index dialog > box, Find Fast includes the document types that are listed in the following > table. > > Document type File name extension > ------------- ------------------- > > MS Office and Web Documents All the Microsoft Excel, Microsoft > PowerPoint, Microsoft > Project, and Microsoft Word document types > listed in this table. Microsoft Binder > (.odb, .obt) and Microsoft Access (.mdb) > files. Note that in .mdb files, only > document properties are indexed. > > Word documents .doc (document), > .dot (template), .ht* (Hypertext Markup > Language document), .txt (text file), .rtf > (Rich Text Format) files, Excel workbooks > .xl* files > > PowerPoint .ppt (presentation), .pot (template), .pps > (auto-running presentation) files > > Microsoft Project files .mpp, .mpw, .mpt, .mpx, .mpd files > > All files *.* files" > > > Did you get that last part? "All files?" Find Fast indexes Office Documents, > Web documents, Word Documents, Power Point files, Project files, and (oh I > forgot) EVERY SINGLE other file on your computer. > > Actually, the good news is that this isn't necessarily true. In another > statement Microsoft claims that if Find Fast deems the file "unreadable" then > the file will not be included in the index. For example, your command.com > probably wouldn't get indexed because it doesn't have a lot of plain text -- > mostly binary. > > But, back to the bad news. Every single file that has legible text is going > to be included in the Find Fast database. Do you understand the implication > here? ALL TEXT SAVED TO YOUR HARD DRIVE IS INDEXED. The forensic > capabilities are enormous, folks. Don't forget "all text" also means > previously-visited webpages from your cache. See for yourself... > > 1) Open up a DOS window and type... > 2) CD\ > 3) DIR FF*.* /AH (This will bring up a list of the find fast databases.) > 4) EDIT /75 %ff% (insert %ff% with any of the names that were listed.) > > Notice the incredible amount of disk accesses to your cache and history > folders? Why do we need two indexes? > > > 8.1. REMOVING THE FIND FAST PROGRAM > > You can remove Find Fast using your Office CD, but I recommend you do it > manually... > > 1) Reboot your computer in MS-DOS Mode. > 2) Delete the findfast.cpl file from c:\windows\system\. > 3) Delete the shortcut (.lnk) under c:\windows\start menu\programs\startup\. > 4) Delete the findfast.exe file from c:\progra~1\micros~1\office\. > 5) Important to delete the find fast databases (c:\ff*.*). > 6) You can also safely delete FFNT.exe, FFSetup.dll, FFService.dll, and > FFast_bb.dll if you have them. > > Feel free to check out the ffastlog.txt (which is the Find Fast error log). > It's a +h[idden] file under c:\windows\system\. > > > 9. CONTACT INFO AND PGP BLOCKS > > This tutorial is being updated all the time. If you have any useful input, or > if you see a mistake somewhere, then please e-mail me so I can compile it into > future versions. You will be able to find the most recent version of this > tutorial at fuckmicrosoft.com. I am not affiliated with the site. > > My e-mail address is located at the end of this note. Please let me know > where you heard about this tutorial in your message. If you have something > important to say to me, then please use encryption. My public key blocks are > located below. Be suspicious if you send me an encrypted message but never > get a reply. > > Thanks for reading, > > -- The Riddler > theriddler@f... > > My 2.6.2 block is no longer valid because my secring was nuked. When I > created another keyring with another version of PGP, it read my "SET PGPPATH=" > line and copied a new ring over my old one. No backups were made. Moral of > the story: Backup your keys. > > My PGP 2.6.3 Block: > > -----BEGIN PGP PUBLIC KEY BLOCK----- > Version: 2.6.3a > Comment: Compatible with PGP 2.6.x > > mQCNAzvVzqgAAAEEANT+lnfVk79zr/eYkLHs+euTg/JBSQXmUWB5dMxv4Vvv4Xes > CnaNrv5Udi3hfABKb1tq41N6kPJ/n/Qz/vSW52Z4wg+Q+ZGGoITIJ1p8bDOceb2Q > EsMsY7kzCHqkBF0N53TuVt+ywhVncN+CqecVvhuQ4RXUOVUvru7gGcd76OVxAAUR > tAt0aGUgcmlkZGxlcokAlQMFEDvVzqju4BnHe+jlcQEBC14EAM3Th47aEChB0GAf > 5xGlLPQnrj6zyf5uovj12PEFnCOwcEhDDAuq4Ito7Keb22DqwlJDNChIM7xLx8bZ > d9VaMpkirFzgvFmGu5eNGp18rR9EyIVY/tTdWlRcsUL/nw2XNXxw51tHE7M/O1fp > Un4qIcG0CfAQ1QCUfqOwTWbFH/Wy > =muLu > -----END PGP PUBLIC KEY BLOCK----- > > My GPG 1.0.6 Block: > > -----BEGIN PGP PUBLIC KEY BLOCK----- > Version: GnuPG v1.0.6 (MingW32) > > mQGhBDu3TSERBACO0Fx9pjMULe6qLQwOgfvdnQconLOMyftZdp9+ZX6t29ebJ/Z5 > qQOJ9ce9Xr6Lj4u+M9VDx1FK5ueoD45bUAy0HAvYDV/HEu2vCRimpbreDky/U88a > XL59Pe8qwnmfUzYc/LnH86VCr4lPmpbz6/adXj44xE6EwkhFcq6BD4isCwCg8zZO > Hk9+KEKOyPHIFWq7TUA/JdUD/jWtNrGZ0tfSAS0WDiBifsBr1HW7n2IMDFX1anqC > DN0ToM5IFWGDkOh1NUvP0RvyrnNuBOP/oWxkPLR0nVvifETF0iG9o+kfitC9NmJn > QP/iw4WhCoHRCc5wqnAAXQC9j8JdodQ8E5VnfnNGkttgWz7mNzBongrIoTdfVdtf > o5NwA/d/lwMhGE0HNXnXOgRBcPjGD0LsR8pFoSP/HJ9Hu3zms2cbQqN2O/f99H2G > s9mXR7uvicu9SbKoTwFkptLVbOQIhvBnw0fTlZGrUsaiw4vzt99PffTKq1FPIpQe > K7HcnUK2+ZSVs5PxGiDckobJEjBssSw9Lg5RSNMy9H7s9jv3tAt0aGUgcmlkZGxl > cohXBBMRAgAXBQI7t00iBQsHCgMEAxUDAgMWAgECF4AACgkQ/bqXDRMV1MxyMgCc > CH2uO/f46JgQ0pspQxi7IBv0yNQAn11ebXHbZGuADwuBun1EnQCJb8VIuQINBDu3 > UOAQCADKG2mf/FW3kuSAGoFmIMBm4l6m0O7denwUIpZP2jxeNTLmLW6ntGglHP++ > wEQpHjKTJfXoSHZH0euuXVZ9hOVdf1+PuRNy0DzrDDiKX7fdQ6eSbw+heSWc0kOF > AB1j3pcovG4K2+bK66039kQLIT3kNUZgh9DdMZjIFzBg90aQnaEm5LLMkv1FNVZP > YehZm3RRIpLAX5vkJJbUA/VVh/FXDG5f21iAGDHgSdKsLW2JNDAWe6/rY0GV5dgx > C0gsqBn1rxNNDyG+z6nFCQtohL/x5zdTzedLQBjIlao91mSWhBsyxiX8mjhvGO97 > o6zVUG5KHBKGmvWMqlyOsGY9VSbDAAMGCADIaFAcE+ADY3ku9Fy0NIlJhbj578YY > xpsE6KvZI1OqbHSoBnN06A3Mpxp4QRBXlr9eRRl+zMTQl1VcVWkahZYNapOqq6L3 > wHBmf9psggCBxqQdI9n5zxnlkphb50J7G9UevB/IGzlW2fe7WMWjo2GegIvGHVWr > qeZgyaNf/CyMtihAX3O86rpqakq//nJvQ9MPcp/Brr9KT2NxBlpBm6xWY35IL5FG > dZ2hpHaO1TC6bdmWUPhvzmSVtD9f0AnnJEgVc03vBz7xJrc1IEa1DeRdfFNvkoch > +mNjc+fBAIQrVMCQ33u+yP/DWSdThrhxz1tAGWV7SlwxVyg6JPRQJ+moiEYEGBEC > AAYFAju3UOAACgkQ/bqXDRMV1MwVnACfaGrJRv2lgWHQbQWwv55t2cT+QWEAnA/n > ckswjlC9aNcBkcFl7X1SX8JX > =pFTK > -----END PGP PUBLIC KEY BLOCK----- > > > 9.1. RECOMMENDED READING > > http://www.theregister.co.uk/content/4/18002.html > http://www.findarticles.com/m0CGN/3741/55695355/p1/article.jhtml > http://www.mobtown.org/news/archive/msg00492.html > http://194.159.40.109/05069801.htm > http://www.yarbles.demon.co.uk/mssniff.html > http://www.macintouch.com/o98security.html > http://www.theregister.co.uk/content/archive/3079.html > http://www.fsm.nl/ward/ > http://slashdot.org > http://www.peacefire.org > http://stopcarnivore.org > http://nomorefakenews.com > http://grc.com/steve.htm#project-x > > > 10. SPECIAL THANKS (and no thanks) > > This version I want to give special thanks to Concerned Boss, Oblivion, and > the F-Prot virus scanner. > > I also want to take this time to show my dissatisfaction to the New Zealand > Herald. Although partly flattering, it was more disgusting to see a newspaper > try to take credit for my work. > > > 11. REFERENCES > > http://support.microsoft.com/support/kb/articles/Q137/1/13.asp > http://support.microsoft.com/support/kb/articles/Q136/3/86.asp > http://support.microsoft.com/support/kb/articles/Q169/5/31.ASP > http://support.microsoft.com/support/kb/articles/Q141/0/12.asp > http://support.microsoft.com/support/kb/articles/Q205/2/89.ASP > http://support.microsoft.com/support/kb/articles/Q166/3/02.ASP > http://www.insecure.org/sploits/Internet.explorer.web.usage.logs.html > http://www.parascope.com/cgi-bin/psforum.pl/topic=matrix&disc=514&mmark=all > http://www.hackers.com/bulletin/ > http://slashdot.org/articles/00/05/11/173257.shtml > http://peacefire.org > > COPYRIGHT INFORMATION > > This article has been under the protection of copyright laws the moment it was > fixed in a tangible form. In less otherwise agreed, this article may only be > distributed as a whole and without modification. Thank you. > -- > > -------------------------------------------------------------------------------------------------- > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com > -------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > -------------------------------------------------------------------------------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > "The universe is full of magical things patiently waiting for our wits to grow sharper." Eden Phillpotts 4750 From: Larry Malmberg Date: Thu Feb 7, 2002 9:27am Subject: Computer Key Stroke Anti Logging This is not an endorsement, just FYI. http://www.anti-keyloggers.com/ Larry Larry Malmberg Investigations and Security 638 North "D" Street San Bernardino, CA 92401-1110 800-655-4549 or 909-383-8565 FAX 909-383-8566 P.I. 15211, P.P.O. 12466 www.larrypi.com Just because you are paranoid doesn't mean someone is not following you! 4751 From: James M. Atkinson Date: Thu Feb 7, 2002 10:05am Subject: Subscriber Update - We Now have 1205 Subscribers I just thought the list membership would like to know that we now have 1205 solid subscribers to this forum. Our actual numbers are a little bit higher as at any particular moment a dozen or so subscribers are in bounce status (in reality, right now we have 1223 subscribers). The list grows by about 25+ people per month, with roughly 35-45 people joining, and 10-15 people leaving each month. The list is dedicated to TSCM, is completely free, has no dues, has open membership, and exists for the sole purpose of improving the industry and "raising the bar". For the most part the list has been good at staying on relevant topics, but I invite the membership to periodically post humor to give us a chuckle, or pearl of wisdom to help us all think. News articles relative to espionage or counter-espionage is also welcome as list postings, as are white papers, technical materials, etc. For Sale, and "Looking to Buy" notices are also welcome; but tread carefully as I take a dim view of people trying to SPAM via the list. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4752 From: A Grudko Date: Thu Feb 7, 2002 10:58am Subject: Anti-keylogger In my mail today Spy vs Spy vs Spy (?) I'm more than dubious of any device that claims to be able to detect "UNKNOWN" threats. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time - Original Message - The Anti-keylogger is the FIRST product of its kind in the world that can > provide every computer with virtual protection against all types of > unauthorized keystroke monitoring programs, both KNOWN and UNKNOWN. > Product includes powerful intellectual analyzer, which allows to > detect and deactivate all keystroke monitoring programs probably > running on your system. > > http://www.anti-keyloggers.com 4753 From: Date: Thu Feb 7, 2002 8:16am Subject: Re: Anti-keylogger In a message dated 2/7/02 11:02:26 AM Pacific Standard Time, agrudko@i... writes: << I'm more than dubious of any device that claims to be able to detect "UNKNOWN" threats. >> we have unknown threats on this list 4754 From: James M. Atkinson Date: Thu Feb 7, 2002 1:07pm Subject: Ms. Cleo's Bug Sweeping 900 Hotline That's not a bad idea. How about simply pulling the caller ID record available when you call a 900 number, feeding it to a PC that in turn calls the 800# for the MLT (Metallic Loop Test) facility, which in turn strobes the line with a TDR and reads back the phone number, cable number, pair number, address, distances, voltages, etc to the caller. This way the caller could check their lines daily for any kind of voltage, current, impedance, or length related issues. The computer (at the 900 #) could store the results of all of their tests and let them know that everything was the same as previous checks. It could make someone an overnight millionaire (until they got indicted). The biggest problem is that it would miss 85-90% of actual eavesdropping devices. -jma At 10:50 AM -0600 2/7/02, John McCain wrote: >I know..... Jim, you just hit upon the REAL moneymaker. We'll let >you (but share the profits with the list:-) set up a 900 line with >a voice response voltmeter on it. When they call (after being on >hold for about 5 minutes loor so istening to how great the system >is, it reads back the line voltage (of your line naturally). The >voltages will vary a little, so they get different numbers most of >the time. Then, the recording tells them that this is a normal line >voltage, so there is probably not a tap on the line. Of course, it >follows that with an announcement that they need to call back weekly >to insure that no one has installed a tap on the line THIS week. >Invite them to call from Pay phones, friend's phones, etc. to make >sure that they can talk to them without being worried about taps >there. > >Might be more profitable than Ms. Cleo! >Cheers, >JohnM -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4755 From: James M. Atkinson Date: Thu Feb 7, 2002 5:39pm Subject: How Do These people Survive [Note: This came in from another list member, a bit of urban legends, but funny -jma] -jma Recently, when I went to McDonald's I saw on the menu that you could have an order of 6, 9 or 12 Chicken McNuggets. I asked for a half dozen nuggets. "We don't have half dozen nuggets", said the teenager at the counter. "You don't?" I replied. "We only have six, nine, or twelve," was the reply. "So I can't order a half-dozen nuggets, but I can order six?" "That's right." So I shook my head and ordered six McNuggets. The paragraph above doesn't amaze me because of what happened couple of months ago: I was checking out at the local Foodland with just a few items and the lady behind me put her things on the belt close to mine. I picked up one of those "Dividers" that they keep by the cash register and placed it between our things so they wouldn't get mixed. After the girl had scanned all of my items, she picked up the "Divider" looking it all over for the bar code so she could scan it. Not finding the bar code she said to me "Do you know how much this is?" and I said to her "I've changed my mind, I don't think I'll buy that today". She said "OK" and I paid her for the things and left. She had no clue to what had just happened.... A lady at work was seen putting a credit card into her floppy drive and pulling it out very quickly. When inquired as to what she was doing. She said she was shopping on the Internet and they kept asking for a credit card number, so she was using the ATM "thingy". I recently saw a distraught young lady weeping beside her car. Do you need some help?" I asked. She replied, "I knew I should have replaced the battery to this remote door unlocker. Now I can't get into my car. Do you think they (pointing to a distant convenient store) would have a battery to fit this?" "Hmmm, I dunno. Do you have an alarm too?" I asked. "No, just this remote thingy," she answered, handing it and the car keys to me. As I took the key and manually unlocked the door, I replied, "Why don't you drive over there and check about the batteries it's a long walk. Several years ago, we had an intern who was none too swift. One day she was typing and turned to a secretary and said, "I'm almost out of typing paper. What do I do?" "Just use copier machine paper," the secretary told her. With that, the intern took her last remaining blank piece of paper, put it on the photocopier and proceeded to make five blank"copies. I was in a car dealership a while ago, when a large motor home was towed into the garage. The front of the vehicle was in dire need of repair and the whole thing generally looked like an extra in "Twister". I asked the manager what had happened. He told me that the driver had set the "cruise control" and then went in the back to make a sandwich. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4756 From: Andre Holmes <1ach@v...> Date: Thu Feb 7, 2002 11:44am Subject: Optoelectronics Hi listies I have come across so information that maybe important to owners of such equipment. The Optoelectronics 3000A is no longer available do to parts shortage also the Micro line was infected as well. Andre Holmes [Non-text portions of this message have been removed] 4757 From: MaxS Date: Thu Feb 7, 2002 10:50am Subject: RE: Bible citation in Digest Number 851 Dear community member: Allow one comment from past East Block to this interesting topic: "The 10 Commandments of Counterintelligence" It'll be begin with >> in text. ">> Yes, but US president" I think that usage of BIBLE in politics and business should be or must be discussed with experts. Any piece of information without context is irrelevant. If it would support only some argument it must be precise, not some "half-random" work. I think lots of Universities in US are prepared enough to consult BIBLE usage. Especially for politics and Intelligence. What about or http://www.metanexus.net or some proved by AGENCIES ... . Sincerely, Martin KOCIAN Czech Republic Message: 2 Date: Tue, 5 Feb 2002 22:39:22 -0500 From: "James M. Atkinson" Subject: The 10 Commandments of Counterintelligence The 10 Commandments of Counterintelligence BY James M. Olson This article appeared in Studies of Intelligence, Unclassified Edition, Fall-Winter 2001, No.11, published by the CIA's Center for the Study of Intelligence. The Center seeks to promote study, debate, and understanding of the role of intelligence in the American system of government. Mr. Olson served in the Central Intelligence Agency's Directorate of Operations and is presently on the faculty of the George Bush School of Government and Public Service at Texas A&M University. "O that thou hadst hearkened to my commandments! Then had thy peace been as a river, and thy righteousness as the waves of the sea." Isaiah 48:18 >> Yes,but US president has made oath on BIBLE with Headline "One Nation" >> and also announced/declared in his state-of-the-union speech >> to Congress on Jan 29th "an axis of evil" threatens the peace. >> So, you should use Isaiah 49:26 to go in line with Mr.Bush and >> according BIBLE suggestion in Isaiah 48:18. "And I will make those maltreating you eat their own flesh; and as with the sweet wine they will become drunk with their own blood. ...." Isaiah 49:26 >> End of comment The need for counterintelligence (CI) has not gone away, nor is it likely to. The end of the Cold War has not even meant an end to the CI threat from the former Soviet Union. The foreign intelligence service of the new democratic Russia, the Sluzhba Vneshney Razvedki Rossii (SVRR), has remained active against us. It was the SVRR that took over the handling of Aldrich Ames from its predecessor, the KGB, in 1991. It was the SVRR that ran CIA officer Harold James Nicholson against us from 1994 to 1996. It was the SVRR that was handling FBI special agent Earl Pitts when he was arrested for espionage in 1996. It was the SVRR that planted a listening device in a conference room of the State Department in Washington in the summer of 1999. And it was the SVRR that was handling FBI special agent Robert Hanssen when he was arrested on charges of espionage in February 2001. The Russians are not alone. There have been serious, well-publicized concerns about Chinese espionage in the United States. The Department of Energy significantly increased security at its national laboratories in response to allegations that China had stolen US nuclear weapons secrets. Paul Redmond, the former Associate Deputy Director of Operations for Counterintelligence at the CIA, told the House Permanent Select Committee on Intelligence in early 2000 that a total of at least 41 countries are trying to spy on the United States. Besides mentioning Russia, China, and Cuba, he also cited several "friends," including France, Greece, Indonesia, Israel, the Philippines, South Korea, and Taiwan. He warned of a pervasive CI threat to the United States. The United States, as the world's only remaining superpower, will be the constant target of jealousies, resentments, rivalries, and challenges to its economic well-being, security, and leadership in the world. This inevitably means that the United States will be the target of large-scale foreign espionage. A Choice Assignment When I joined the CIA, one of my first interim assignments was with the old CI Staff. I found it fascinating. I was assigned to write a history of the Rote Kapelle, the Soviet espionage network in Nazi-occupied Western Europe during World War II. With its expanded computer power, NSA was breaking out the actual messages sent between the NKVD center in Moscow and the clandestine radios of the various cells in Western Europe. Incredibly, these messages came to me. There I was, a brand new junior officer, literally the first person in the CIA to see the day-to-day traffic from these life-and-death operations. I was deeply affected by the fear, heroism, and drama in these messages. Above all, I felt privileged to have been given such an opportunity. Building on an earlier study of the Rote Kapelle by the CI Staff, I completed a draft several months later that incorporated the new material. To my great surprise, this study was well received by my immediate superiors, and I was told that I was to be rewarded with a personal interview and congratulations from James Jesus Angleton, the legendary head of the CI Staff from 1954 to 1974. Angleton's office was on the second floor of the Original Headquarters Building. I was first ushered into an outer office, where Angleton's aides briefed me on how to conduct myself. And then I went alone into the inner sanctum. The room was dark, the curtains were drawn, and there was just one small lamp on Angleton's desk. I later heard that Angleton had eye trouble and that the light hurt his eyes, but I was convinced the real reason for the semidarkness was to add to his mystique. It certainly worked on me! I nervously briefed Angleton on my study, and he listened without interrupting, just nodding from time to time. When I finished, he methodically attacked every one of my conclusions. Didn't I know the traffic was a deception? Hadn't it occurred to me that Leopold Trepper, the leader of the Rote Kapelle, was a German double? He went on and on, getting further and further out. Even I, as a brand new officer, could tell that this great mind, this CI genius, had lost it. I thought he was around the bend. It was one of the most bizarre experiences of my career. When the meeting was over, I was glad to get out of there, and I vowed to myself that I would never go anywhere near CI again. I did not keep that vow. In my overseas assignments with the Agency, I found myself drawn toward Soviet CI operations. Nothing seemed to quicken my pulse more, and I was delighted when I was called back to Headquarters in 1989 to join the new Counterintelligence Center (CIC) as Ted Price's deputy. When Ted moved upstairs in early 1991 to become the Associate Deputy Director for Operations, I was named chief of the Center. Today, many years after that initial disagreeable encounter with CI, I find it hard to believe that it is actually my picture on the wall of the CIC conference room at CIA Headquarters, where the photos of all former CIA counterintelligence chiefs are displayed. There I am, number seven in a row that begins with Angleton. So, after a career that ended up being far more CI-oriented than I could ever have imagined, I would like to offer some personal observations in the form of "The 10 Commandments of Counterintelligence." I have chosen the form of commandments because I believe the basic rules of CI are immutable and should be scrupulously followed. In my view, it makes little difference whether the adversary is the Russians, the Cubans, the East Germans, the Chinese, or someone else. It likewise makes little difference whether we are talking about good CI practices in 1985 or in 2005. Unfortunately, as I watch US CI today, I am increasingly concerned that the principles I consider fundamental to effective CI are not being followed as carefully and consistently as they should be. These commandments were not handed down to me from a mountaintop, and I make no claim that they are inspired or even definitive. They are simply the culmination, for what they are worth, of my experience. They are intended primarily for my fellow practitioners in CI today, but also for any younger officers in the Intelligence Community (IC) who might someday want to join us. The First Commandment: Be Offensive CI that is passive and defensive will fail. We cannot hunker down in a defensive mode and wait for things to happen. I believe we are spending far too much money on fences, safes, alarms, and other purely defensive measures to protect our secrets. That is not how we have been hurt in recent years. Spies have hurt us. Our CI mindset should be relentlessly offensive. We need to go after our CI adversaries. Aggressive double agent (DA) operations are essential to any CI program, but not the predictable, hackneyed kind we have so often pursued. We need to push our bright and imaginative people to produce clever new scenarios for controlled operations, and we need more of them. The opposition services should be kept constantly off guard so that they never suspect that we have actually controlled the operations they believe they initiated from the beginning. When the requirements, modus operandi, and personality objectives of the DA operation have been achieved, we should in a greater number of cases pitch the opposition case officer. If only one out of 10 or 20 of these recruitments takes, it is worth it. And CI professionals, of course, should not rely exclusively on their own efforts. They should constantly prod their HUMINT colleagues to identify, target, and recruit officers from the opposition intelligence services. The key to CI success is penetration. For every American spy, there are several members of the opposition service who know who he or she is. No matter what it takes, we have to have penetrations. We should operate aggressively against the nontraditional as well as the traditional adversaries. How many examples do we need of operations against Americans by so-called friendly countries to convince us that the old intelligence adage is correct: there are friendly nations, but no friendly intelligence services? If we suspect for whatever reason that the operatives of a foreign intelligence service, friend or foe, are operating against us, we should test them. We should dress up an enticing morsel, made to order for that specific target, and send it by them. If they take it, we have learned something we needed to know, and we have an operation. If they reject it, as true friends should, we have learned something, too. In either event, because we are testing a "friend," plausible deniability has to be strictly preserved. Every foreign service is a potential nontraditional adversary; no service should get a lifetime pass from US offensive CI operations. The Second Commandment: Honor Your Professionals It has been true for years, to varying degrees throughout the IC, that CI professionals have not been favored, to the extent they deserved, with promotions, assignments, awards, praise, esteem, or other recognition. The truth is that CI officers are not popular. They are not always welcome when they walk in. They usually bring bad news. They are easy marks to criticize when things go wrong. Their successes are their failures. If they catch a spy, they are roasted for having taken so long. If they are not catching anyone, why not? What have they done with all that money they spent on CI? It is no-win. For much of my career, many of our best people avoided becoming CI specialists. CI was not prestigious. It had a bad reputation. It was not fast track. It did not lead to promotions or good assignments. Angleton left a distasteful legacy that for years discredited the CI profession. Ted Price did more than anyone else in the Agency to reverse that trend and to rehabilitate CI as a respected professional discipline. Nevertheless, that battle is still not completely won. We have to do more to get our CI people promoted, recognized, and respected so that our best young officers will be attracted to follow us into what we know is a noble profession and where the need is so great. The Third Commandment: Own the Street This is so fundamental to CI, but it is probably the least followed of the commandments. Any CI program worthy of the name has to be able to engage the opposition on the street, the field of play for espionage. And when we do go to the street, we have to be the best service there. If we are beaten on the street, it is worse than not having been there at all. For years, we virtually conceded the streets of the world's capitals, including the major espionage centers, to the KGB, the GRU, and the East European services because we either did not know how to do it or we were not willing to pay the price for a thoroughly professional, reliable, full-time, local surveillance capability. Opposition intelligence officers have to be watched, known meeting areas have to be observed, and, when an operation goes down-often on short notice- undetectable surveillance has to cover it, identify the participants, and obtain evidence. This capability is expensive-selection, training, vehicles, photo gear, video, radios, safe apartments, observation posts, and on and on-but, if we do not have it, we will be a second-rate CI service and will not break the major cases. The Fourth Commandment: Know Your History I am very discouraged when I talk to young CI officers today to find how little they know about the history of American CI. CI is a difficult and dangerous discipline. Many good, well-meaning CI people have gone wrong and made horrendous mistakes. Their failures in most cases are well documented, but the lessons are lost if our officers do not read the CI literature. I find it inconceivable that any CI practitioner today could ply his or her trade without an in-depth knowledge of the Angleton era. Have our officers read Mangold? Have they read Legend and Wilderness of Mirrors? Do they know the Loginov case, HONETOL, MHCHAOS, Nosenko, Pollard, and Shadrin? Are they familiar with Aspillaga and the Cuban DA debacle? Have they examined our mistakes in the Ames and Howard cases? Are they staying current with recent releases like The Mitrokhin Archive and The Haunted Wood? I believe it is an indispensable part of the formation of any American CI officer-and certainly a professional obligation-to study the CI failures of the past, to reflect on them, and to make sure they are not repeated. The many CI courses being offered now are a positive step, but there will never be a substitute for a personal commitment on the part of our CI professionals to read their history, usually on their own time at home. The Fifth Commandment: Do Not Ignore Analysis Analysis has too often been the stepchild of CI. Throughout the CI community, we have fairly consistently understaffed it. We have sometimes tried to make it up as we go along. We have tried to do it on the cheap. Generally speaking, operators make bad analysts. We are different kinds of people. Operators are actors, doers, movers and shakers; we are quick, maybe a little impulsive, maybe a little "cowboy." Our best times are away from our desks. We love the street. Research and analysis is really not our thing-and when we have tried to do it, we have not been good at it. True analysts are different. They love it. They are more cerebral, patient, and sedentary. They find things we could not. They write better. A lot of CI programs in the past have tried to make operators double as their own analysts. As a result, in the United States, CI analysis historically has been the weakest part of the business. Professional CI analysts have been undervalued and under appreciated. A good CI program will recruit and train true analysts in sizable numbers. I do not think it would be excessive as a rule of thumb in a top notch CI service to be evenly divided between operators and analysts. Very few of our US CI agencies come anywhere close to that ratio. Wonderful things happen when good analysts in sufficient numbers pore over our DA reports, presence lists, SIGINT, audio and teltap transcripts, maps, travel data, and surveillance reports. They find the clues, make the connections, and focus our efforts in the areas that will be most productive. Many parts of the US CI community have gotten the message and have incorporated trained analysts into their operations, but others have not. Across the board, we still have serious shortfalls in good, solid CI analysis. The Sixth Commandment: Do Not Be Parochial More harm probably has been done to US CI over the years by interagency sniping and obstruction than by our enemies. I remember when the CIA and the FBI did not even talk to each other-and both had disdain for the military services. It is no wonder that CI was a shambles and that some incredibly damaging spies went uncovered for so long. Occasionally in my career, I encountered instances of sarcasm or outright bad mouthing of other US Government agencies by my officers. That kind of attitude and cynicism infected our junior officers and got in the way of cooperation. These comments often were intended to flaunt our supposed "superiority" by demeaning the capabilities of the other organizations. I dealt with these situations by telling the officers to "knock it off," and I would encourage other CI supervisors around the community to do the same. CI is so difficult, even in the best of circumstances, that the only way to do it is together. We should not let personalities, or jealousies, or turf battles get in the way of our common mission. Our colleagues in our sister services are as dedicated, professional, hardworking, and patriotic as we are, and they deserve our respect and cooperation. The best people I have known in my career have been CI people, regardless of their organizational affiliation. So let's be collegial. The Seventh Commandment: Train Your People CI is a distinct discipline and an acquired skill. It is not automatically infused in us when we get our wings as case officers. It is not just a matter of applying logic and common sense to operations, but is instead a highly specialized way of seeing things and analyzing them. CI has to be learned. I do not know how many times in my career I have heard, "No, we do not really need a separate CI section. We are all CI officers; we'll do our own CI." That is a recipe for compromise and failure. There is no substitute for a professional CI officer, and only extensive, regular, and specialized CI training can produce them. Such training is expensive, so whenever possible we should do it on a community basis to avoid duplication and to ensure quality. CI is a conglomerate of several disciplines and skills. A typical operation, for example, might include analysts, surveillance specialists, case officers, technical experts, and DA specialists. Each area requires its own specialized training curriculum. It takes a long time to develop CI specialists, and that means a sustained investment in CI training. We are getting better, but we are not there yet. The Eighth Commandment: Do Not Be Shoved Aside There are people in the intelligence business and other groups in the US Government who do not particularly like CI officers. CI officers have a mixed reputation. We see problems everywhere. We can be overzealous. We get in the way of operations. We cause headaches. We are the original "black hatters." Case officers want their operations to be bona fide. Senior operations managers do not want to believe that their operations are controlled or penetrated by the opposition. There is a natural human tendency on the part of both case officers and senior operations managers to resist outside CI scrutiny. They believe that they are practicing good CI themselves and do not welcome being second-guessed or told how to run their operations by so-called CI specialists who are not directly involved in the operations. I have seen far more examples or this in my CI career than I care to remember. By the same token, defense and intelligence contractors and bureaucrats running sensitive US Government programs have too often tended to minimize CI threats and to resist professional CI intervention. CI officers, in their view, stir up problems and overreact to them. Their "successes" in preventing CI problems are invisible and impossible to measure, but their whistle blowing when problems are uncovered generate tremendous heat. It is not surprising that they are often viewed as a net nuisance. When necessary, a CI service has to impose itself on the organizations and groups it is assigned to protect. A CI professional who is locked out or invited in only when it is convenient to the host cannot do his job. My advice to my CI colleagues has always been this: "If you are blocked by some senior, obtuse, anti-CI officer, go around him or through him by going to higher management. And document all instances of denied access, lack of cooperation, or other obstruction to carrying out your CI mission. If not, when something goes wrong, as it likely will in that kind of situation, you in CI will take the blame." The Ninth Commandment: Do Not Stay Too Long CI is a hazardous profession. There should be warning signs on the walls: "A steady diet of CI can be dangerous to your health." I do not believe anyone should make an entire, uninterrupted career of CI. We all who work in CI have seen it: the old CI hand who has gotten a bit spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling pray eventually to creeping paranoia, distortion, warping, and overzealousness in one's thinking. It is precisely these traits that led to some of the worst CI disasters in our history. Angleton and his coterie sadly succumbed, with devastating results. Others in the CIA and elsewhere have as well. The danger is always there. My wife, who was working at the CIA when I met her, was well acquainted with this reputation of CI and the stories about its practitioners. When I was serving overseas and received the cable offering me the position as Ted Price's deputy in the new Counterintelligence Center, I discussed it with her that evening at home. Her response, I thought was right on the mark: "Okay, but do not stay too long." Sensible and productive CI needs lots of ventilation and fresh thinking. There should be constant flowthrough. Non-CI officers should be brought in regularly on rotational tours. I also believe it is imperative that a good CI service build in rotational assignments periodically outside CI for its CI specialists. They should go spend two or three years with the operators or with the other groups they are charged to protect. They will come back refreshed, smarter, and less likely to fall into the nether world of professional CI: the school of doublethink, the us-against-them mindset, the nothing-is-what-it-seems syndrome, the wilderness of mirrors. The Tenth Commandment: Never Give Up The tenth and last commandment is the most important. What if the Ames mole hunters had quit after eight years instead of going into the ninth? What if, in my own experience, we had discontinued a certain surveillance operation after five months instead of continuing into the sixth? CI history is full of such examples. The FBI is making cases against Americans today that involved espionage committed in the 1960s and 1970s. The Army's Foreign Counterintelligence Activity is doing the same. The name of the game in CI is persistence. CI officers who are not patient need not apply. There is no statute of limitations for espionage, and we should not create one by our own inaction. Traitors should know that they will never be safe and will never have a peaceful night's sleep. I applauded my CI colleagues in the FBI when I read not long ago of their arrest in Florida of a former US Army Reserve colonel for alleged espionage against the United States many years earlier. They obviously never gave up. If we keep a CI investigation alive and stay on it, the next defector, the next penetration, the next tip, the next surveillance, or the next clue will break it for us. If there were ever to be a mascot for US counterintelligence, it should be the pit bull. In Conclusion These are my 10 commandments of CI. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as an Intelligence Community we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics, or even the priorities. What we should agree on, however, is that strong CI has to be a national priority. Recent news reports from Los Alamos, Washington, and elsewhere have again underscored the continuing need for CI vigilance. 01/31/2002 -- ---------------------------------------------------------------------------- ---------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. ---------------------------------------------------------------------------- ---------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ---------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------- ------------------------ ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4758 From: Dragos Ruiu Date: Thu Feb 7, 2002 11:02am Subject: Re: "electricity effects on satellites" On Wed, 6 Feb 2002 17:35:54 -0600 "Aimee Farr" wrote: > [Uhm, can anybody tell me what they mean by "study electricity effects on > satellites?" ~Aimee] > From my limited understanding, electrical circuits on a satellite are quite complex due to the lack of a ground plane. The Space Station is apparently encountering difficulties in this area and the need for some erm... sophisticated systems to deal with solar panel driven power, the need not to fry humans inside etc... :) Proper management of charged particles in space is more complicated than on big, friendly, electron sink planets. --dr -- Requisite Commercial Content and Disclaimers: http://cansecwest.com CanSecWest Network Security Training Conference - Vancouver B.C. - May 1-3 2002 OpenSnort IDS Sensors: http://www.sourcefire.com 4759 From: DrPepper Date: Fri Feb 8, 2002 9:16am Subject: Re: Optoelectronics Please tell us just HOW the line was "infected"? Andre Holmes wrote: > Hi listies > > . > > The Optoelectronics 3000A is no longer available do to parts shortage also the Micro line was infected as well. > > Andre Holmes 4760 From: A Grudko Date: Fri Feb 8, 2002 10:41am Subject: Re: Anti-keylogger - Original Message - From: > << I'm more than dubious of any device that claims to be able to detect >>> "UNKNOWN" threats. >> > > we have unknown threats on this list Ah, but can this miracle program detect them? Looks like Cyber Snake Oil to me. Friday evening here on the lake, the sun about to dip below the mountains, a chilled glass of wine in hand as the temperature drops to 24C in the shack. Hell, it's good to be a TSCMer in Africa. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4761 From: Matthew Paulsen Date: Fri Feb 8, 2002 1:22pm Subject: RE: Optoelectronics Perhaps he meant affected. His english may be limited (ESL) as others are on this list. -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: Friday, February 08, 2002 7:16 AM To: Andre Holmes Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Optoelectronics Please tell us just HOW the line was "infected"? Andre Holmes wrote: > Hi listies > > . > > The Optoelectronics 3000A is no longer available do to parts shortage also the Micro line was infected as well. > > Andre Holmes Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4762 From: kirk Date: Fri Feb 8, 2002 11:29am Subject: Re: Optoelectronics I think Mr. Holmes meant affected, not "infected". Makes more sense that way. ---------- Original Message ---------------------------------- From: DrPepper Date: Fri, 08 Feb 2002 07:16:01 -0800 >Please tell us just HOW the line was "infected"? > >Andre Holmes wrote: > >> Hi listies >> >> . >> >> The Optoelectronics 3000A is no longer available do to parts shortage also the Micro line was infected as well. >> >> Andre Holmes > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 4763 From: tek492p Date: Sat Feb 9, 2002 1:34am Subject: Re: Fw: Steve, The COMSEC C3I Story --- In TSCM-L@y..., "Steve Whitehead" wrote: > Received this on my e-mail tonight. I think the list discussed this device a > while back. > > > > > The story HOW I invented and patented the COMSEC C3I TM > > United States Patent #5,142,560, a telecommunications > > security device that detects wiretapping, surveillance, > > espionage previously undetectable. > > I have seen this device in Spy Shop catalogs. Jack Lindauer Intertect TSCM services Los Angeles, California (818) 831-0515 4764 From: Hawkspirit Date: Sat Feb 9, 2002 10:49am Subject: Change an Industry INVENT A PRODUCT, Change a Industry, Shake up the World! > How the Hunted Became the Hunter > > The story HOW I invented and patented the COMSEC C3I TM > United States Patent #5,142,560, a telecommunications > security device that detects wiretapping, surveillance, > espionage previously undetectable. How did I manage to miss a "change a industry" of this magnitude? Could someone explain this change for me? Man! Here I thought I was staying on top of things. Roger Tolces www.bugsweeps.com 4765 From: A Grudko Date: Sat Feb 9, 2002 3:10am Subject: Re: Fw: History in the making - Original Message - From: Marty Kaiser > HISTORY IN THE MAKING > IMMEDIATELY download and save this file... then read it. I read Marty's piece with great interest. None of what he describes surprises me. I was gratified to see that his work bench looks like mine :-) . Hang in there Marty. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4766 From: Aimee Farr Date: Sat Feb 9, 2002 0:14pm Subject: "LIVE from...." [For those of you that counsel celebs/execs/politicios. Note: "Broadcast live on cable news networks." From yahoo news, I lost the link. ~Aimee] Taiwan Charges Ex-Mayor in Sex Video Scandal Thu Feb 7, 5:30 AM ET By Alice Hung TAIPEI (Reuters) - Taiwan prosecutors Thursday charged a former mayor with invading his estranged girlfriend's privacy by secretly filming her making love in the island's most gripping sex scandal. Prosecutors indicted Tsai Jen-chien, 49, former mayor of the northern high-tech city of Hsinchu, and recommended a one-year sentence on charges of violating the island's privacy law. Chu Mei-feng, 35, a TV reporter-turned politician, became one of the best known women in the Chinese speaking world after a tabloid magazine gave away video discs showing her having sex with a married man at her home. Chu's close friend, Kuo Yu-ling, 44, a spiritual teacher, installed the hidden camera with Tsai's help, prosecutor Chen Hon-da told a news conference, which was broadcast live by several cable news networks. The prosecutor said an envious Kuo needed money to send her daughter to school abroad and sold the footage to a tabloid magazine, which mass-produced the sex videos and gave away them free to readers. Kuo was charged with violating the privacy law, undermining public morality, theft and forgery and Scoop magazine president Shen Yeh was charged with violating the privacy law. Prosecutors sought a four-year sentence for Kuo, who is in court custody, and 26 months for Shen. His magazine has defended itself, arguing that the people have the right to know. "Kuo Yu-ling and Tsai Jen-chien were (Chu's) most trusted friend and lover. But they monitored her most private love life after their relations soured," the prosecutor said. "It's the most serious offence against privacy," Chen said. OFFICE, CAR BUGGED Prosecutors also found eavesdropping devices and surveillance cameras in Chu's car and office. Tsai had appointed Chu director of Hsinchu's municipal department of cultural affairs. Tsai, who had been questioned by prosecutors but not detained, and the magazine publisher could not be reached for comment. In Taiwan, defendants are not necessarily taken into custody until after a judge delivers a guilty verdict. Tsai, a member of President Chen Shui-bian's independence-leaning Democratic Progressive Party, lost a re-election bid in last December's mayoral elections. His affair with Chu, of the tiny pro-reunification New Party, had been the talk of town. The couple was once touted as the "golden boy and jade girl" of Taiwan politics. The scandal has sparked a heated debate on morality and fears of Taiwan becoming an Orwellian society with big brother watching you all the time, especially among celebrities. The cabinet's Government Information Office seized thousands of copies of the magazine and accompanying VCDs. The Chinese-language weekly has called the seizure "preposterous" and said the discs were not pornography but a move to "restore the face of the truth." Despite the seizure, pirated VCDs have been widely circulated in Taiwan, China and the United States. Chu did not deny she was the woman in the VCDs and has apologized to the public. She was not available for comment after the indictment, but told reporters late Wednesday after a vacation in Thailand that she wanted to do more good in the future. "If the society will accept me again, I want to do more good deeds," the Central News Agency quoted Chu as saying. Chu's new book revealing her relationships with several men, including Tsai, will soon hit local bookshelves. 4767 From: James M. Atkinson Date: Sat Feb 9, 2002 6:03pm Subject: Axis of "Somewhat Evil" "In Speech, Bush Calls Iraq, Iran and North Korea 'Axis of Evil" -- N.Y. Times, 1/30/02 Angered by snubbing, Libya, China, Syria form axis of "just as evil"; Cuba, Sudan, Serbia Form Axis of "Somewhat Evil"; other nations start similar clubs Beijing (SatireWire.com) - Bitter after being snubbed for membership in the "Axis of Evil," Libya, China, and Syria today announced they had formed the "Axis of Just as Evil," which they said would be way eviler than that stupid Iran-Iraq-North Korea axis President Bush warned of his State of the Union address. Axis of Evil members, however, immediately dismissed the new axis as having, for starters, a really dumb name. "Right. They are Just as Evil... in their dreams!" declared North Korean leader Kim Jong-il. "Everybody knows we're the best evils... best at being evil... we're the best." Diplomats from Syria denied they were jealous over being excluded, although they conceded they did ask if they could join the Axis of Evil. "They told us it was full," said Syrian President Bashar al-Assad. "An Axis can't have more than three countries," explained Iraqi President Saddam Hussein. "This is not my rule, it's tradition. In World War II you had Germany, Italy, and Japan in the evil Axis. So you can only have three. And a secret handshake. Ours is wicked cool." THE AXIS PANDEMIC International reaction to Bush's Axis of Evil declaration was swift, as within minutes, France surrendered. Elsewhere, peer-conscious nations rushed to gain triumvirate status in what became a game of geopolitical chairs. Cuba, Sudan, and Serbia said they had formed the Axis of Somewhat Evil, forcing Somalia to join with Uganda and Myanmar in the Axis of Occasionally Evil, while Bulgaria, Indonesia and Russia established the Axis of Not So Much Evil Really As Just Generally Disagreeable. With the criteria suddenly expanded and all the desirable clubs filling up, Sierra Leone, El Salvador, and Rwanda applied to be called the Axis of Countries That Aren't the Worst But Certainly Won't Be Asked to Host the Olympics; Canada, Mexico, and Australia formed the Axis of Nations That Are Actually Quite Nice But Secretly Have Nasty Thoughts About America, while Spain, Scotland, and New Zealand established the Axis of Countries That Be Allowed to Ask Sheep to Wear Lipstick. "That's not a threat, really, just something we like to do," said Scottish Executive First Minister Jack McConnell. While wondering if the other nations of the world weren't perhaps making fun of him, a cautious Bush granted approval for most axes, although he rejected the establishment of the Axis of Countries Whose Names End in "Guay," accusing one of its members of filing a false application. Officials from Paraguay, Uruguay, and Chadguay denied the charges. Israel, meanwhile, insisted it didn't want to join any Axis, but privately, world leaders said that's only because no one asked them. Copyright © 2002, SatireWire. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4768 From: James M. Atkinson Date: Sat Feb 9, 2002 6:14pm Subject: Re: Change an Industry At 8:49 AM -0800 2/9/02, Hawkspirit wrote: >INVENT A PRODUCT, Change a Industry, Shake up the World! > > How the Hunted Became the Hunter > > > > The story HOW I invented and patented the COMSEC C3I TM > > United States Patent #5,142,560, a telecommunications > > security device that detects wiretapping, surveillance, > > espionage previously undetectable. > >How did I manage to miss a "change a industry" of this magnitude? Could >someone explain this change for me? Man! Here I thought I was staying on >top of things. > >Roger Tolces >www.bugsweeps.com Har, Personally I thought the article should have more appropriately been called "How the Hunted Became a Delusionary Paranoid." -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4769 From: John Savage Date: Sun Feb 10, 2002 9:03am Subject: MLPIA (Maine Licensed Private Investigators Association) Good Morning: I do not apologize for sending this invitation to all the groups simultaneously.Why? Because we want to attract all you professionals to the new PI group"The MLPIA Network." We want to make history up here in Maine, and we believe that we are well on our way. We are on our way to becoming the mostinformative and respected PI group in the industry. The "MLPIA Network," along with the mother group "MLPIA" represents Maine's professional, licensed and bonded Private Investigators and Private Investigator Assistants. The MLPIA Network also was formed by professional investigators in Maine for the advancement, education, networking and representation of Maine's best! We are bonded, insured professionals. Many in our group have FBI, LEO, Military and related private industry experience. Included in this new and exciting PI group are the likes of John Grogan, "The Investigators Little Black Book" author Robert Scott, NHLI and NECOSIA president John Healy, Kelly Riddle, and the soon-to-be member and publisher of PI Magazine Bob Mackowiak. This is just the beginning! You won't believe the people that are showing great interest in making this the ultimate sourceof information! In Maine, Private Investigators and Private Investigator Assistants are licensed by the Maine Department of Public Safety and overseen directly by the Maine State Police. We are the only licensed entity to enjoy that level of scrutiny, We would not have it any other way. We serve our clients with the highest level of professionalism. Our members subscribe to a strict code of ethics. The MLPIA Network offers timely educational seminars and takes a strong, proactive role in legislative issues affecting our members, clients and fellow professionals. Everybody's knowledge and experience would be a tremendous addition to the MLPIA Network, and we hope that we would be a tremendous addition to your networking capabilities also. The members of the MLPI Network are as professionalas you'll find anywhere. Many of you are on a list of invitations that haven't been sent out yet. Why? This isbecause "Yahoo Groups" only allows 100 invites per day, so this list willtake acouple weeks to form. I thought I would get this unilateral invitation out to the individualsthat want to get on this group as soon as possible. "First come...firstserve." But no need to worry, those of you that are qualified will make it into the group. In conclusion, many of you that subscribe now, will receive another invitation in your mailbox to join our group. Just delete it if you know you already are a MLPIA group member. Once youhave subscribed, please introduce yourself to the group including your signature line. Any additional questions that you would like answered, please direct your questions to either Allan Goodman, President of the MLPIA at Aeglis@a... or if he can't get right back to you, email me...John Savage at iseeu@m... and I'll direct you to thesource of the information you need. SUBSCRIBE BELOW... Sincerely and Respectfully, John Lee Savage P.O. Box 634 Old Orchard Beach, ME 04064 TEL: 207-286-3945 FAX: 781-723-2551 ******************************************* Licensed by the Maine Department of Public Safety (Lic #373) ******************************************* Maine Notary Public ******************************************* National Association of Investigative Specialists (NAIS) ******************************************* Maine Licensed Private Investigators Association (MLPIA) www.mlpia.org ******************************************* MLPIA Internet Committee ******************************************* Assistant to Allan Goodman ******************************************* Subscribe: http://groups.yahoo.com/group/MLPIA-Network/ The Officers and Directors of the MLPIA 2002 are: Alan Goodman - President Paul Benjamin - Vice-president Kathy Metcalf - Treasurer Howard Leavitt - Sgt. At Arms Doug Calderbank - Director Myron Bradbury - Director Mark Metcalf - Director Corey Emmons - Director Roland Jandreau - Director Joe LaLiberte - Director Rose Mary Cyr - past President Distinguished Members: Gordon McCleary - Editor of the Maine P.I. View Cheryl Culbert - Legislative Liaison Ray Peters - Ethics Committee Chairman John Sullivan - Advisory Committee John Savage - Internet Committee --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.323 / Virus Database: 180 - Release Date: 2/8/02 4770 From: Ray Van Staden Date: Sat Feb 10, 2001 11:49am Subject: TSCM ZIMBABWE Is any group member aware of someone with TSCM equipment in Zimbabwe? Please contact me privately at raymond@v... or on the numbers below. Raymond --- From the desk of Raymond van Staden Van Staden and Associates cc P.O. Box 1150 Amanzimtoti 4125 South Africa Tel: +27 31 916-1262 Fax: +27 31 916-1263 Email: raymond@v... Internet: http://www.vanstaden.co.za [Non-text portions of this message have been removed] 4771 From: Date: Sun Feb 10, 2002 9:59am Subject: U.S. & China Resume Large-Scale Intelligence Sharing Newsweek: U.S. & China Resume Large-Scale Intelligence-Sharing Not Seen Since Cold War Cooperation Chinese Move Two Secret 'Listening Posts' From Coast Near Taiwan to Afghan Border to Intercept Al Qaeda Communication NEW YORK, Feb. 10 /PRNewswire/ -- China and the U.S. have resumed intelligence cooperation on a scale not seen since they joined hands against the Soviets during the Cold War, sources tell Newsweek in the February 18 issue (on newsstands Monday, February 11). After the terrorist attacks on September 11, Chinese authorities moved two of their secret electronic "listening posts" from the coast near Taiwan to the northwest China-Afghan border region, ostensibly to share the resulting intelligence with the U.S., reports Beijing Bureau Chief Melinda Liu. The stations are designed to intercept microwave and radio communications from possible Al Qaeda extremists within range of the border area. (Photo: http://www.newscom.com/cgi-bin/prnh/20020210/HSSU001 ) Since Sept. 11, relations with China have been on the upswing, Liu reports. Chinese President Jiang Zemin was one of the first foreign leaders to phone President George W. Bush offering condolences. And all this comes only 10 months after Beijing's leaders were denouncing the American "bully" and following the American EP-3 surveillance plane that was clipped by a Chinese jet over Hainan Island. President Bush has also reached out to Jiang, initiating phone calls to the Chinese leader on at least four occasions since Sept. 11. One call came right before Washington announced that it was abrogating the anti-ballistic missile treaty. China was not at all happy about the move, but Jiang was pleased, at least, that Bush had conferred with him ahead of time. "Some Americans used to say China was their enemy," says a senior Chinese Foreign Ministry official. "But now they know ... the real enemy is terrorism." (Article below. Read Newsweek's news releases at http://www.Newsweek.MSNBC.com. Click "Pressroom.") Beijing's Latest Look China is making nice ahead of a Bush visit this month. A glimpse behind the charm offensive. By Melinda Liu Some Americans know Li Zhao-Xing, Beijing's former ambassador to Washington, for his stern lectures on Chinese sovereignty. But Li -- now deputy foreign minister -- has, in his own way, found religion. In Washington last week, before a lunch gathering of the U.S.-China Business Council, Li recalled how he had come across a Bible in his hotel room and began reading it. He noted a passage quoting Jesus: ``I am the Alpha and the Omega, the first and the last.'' As forks halted midbite and quizzical looks darted around the room, Li quipped: ``I am not the Alpha or Omega, but something in between.'' Why is a staunch communist like Li quoting from the Christian holy book? Chinese authorities believe that President George W. Bush, due to visit China on Feb. 21 and 22, has a bit of an obsession with Bibles. When the American crew of a downed EP-3 reconnaissance plane was detained in China in April, Bush worried about whether the detained American personnel had access to Scripture. And this month the U.S. Embassy protested the three-year prison sentence given to a Chinese Christian for smuggling Bibles. So if it takes a few Biblical quotes to make nice, so be it. ``It's part of Beijing's charm offensive,'' said James Lilley, former U.S. ambassador to Beijing. ``The hectoring and lecturing are gone. Relations are on an upswing.'' Only 10 months ago, Beijing's leaders were denouncing the American ``bully.'' Tensions ran especially high after a Chinese jet clipped the EP-3 over Hainan Island. So what has changed? September 11 -- and the American military response -- must have had a sobering effect. Jiang Zemin was one of the first foreign lead-ers to phone Bush offering condolences. And Bush has reached out to Jiang, initiating phone calls to the Chinese leader on at least four occasions since 9-11. One call came right before Washington announced that it was abrogating its antiballistic-missile treaty with Russia. China was not happy with the decision, but Jiang was pleased, at least, that Bush conferred with him. ``Some Americans used to say China was their enemy,'' says a senior Chinese Foreign Ministry official. ``But now they know ... the real enemy is terrorism.'' Beijing and Washington have resumed intelligence cooperation on a scale not seen since they joined hands against the Soviets during the cold war, sources close to the administration tell Newsweek. After September 11, Chinese authorities moved two of their secret electronic ``listening posts'' from the coast near Taiwan to the northwestern China-Afghan border region, ostensibly to share the resulting intelligence with the United States, Newsweek has learned. The stations are designed to intercept microwave and radio communications, and could pick up Qaeda extremists chattering within range of the border area. (The facilities could also be used to conduct electronic surveillance on American aircraft dropping smart bombs over Afghanistan.) Even before 9-11, Beijing was on a pro-Western course, winning its bid for the 2008 Olympics and fighting for acceptance in the WTO (which it finally joined in December). In both cases, China has to perform well and make good impressions to reap real benefits. If the Chinese leadership turns xenophobic now, an Olympic flop or a hemorrhage of foreign investment could cripple the economy and even threaten the regime. But it's taking a different tack: China has embraced Afghan interim leader Hamid Karzai, for instance. One of Karzai's first foreign trips was to Beijing. None of the warming signs means that Sino-U.S. differences have melted away. In particular, China's ambiguous stand on weapons proliferation - especially its export of sensitive technologies to countries such as Pakistan and Iran -- has emerged as ``a make-or-break issue'' in bilateral relations, says U.S. Ambassador to China Clark Randt. One Sinologist likens the Sino-U.S. relationship to a stream flowing over large rocks. ``The stones are fundamental disagreements, such as Taiwan, proliferation and human rights,'' he says. ``After September 11, the water level rose to cover the rocks. Eventually, the water will recede again.'' And Biblical diplomacy alone cannot prevent that. With Paul Mooney in Beijing SOURCE Newsweek CO: Newsweek ST: New York, China IN: PUB MAG SU: 02/10/2002 11:45 EST http://www.prnewswire.com 4772 From: James M. Atkinson Date: Sun Feb 10, 2002 5:07pm Subject: New U.S. Government Agency *****Government Agencies***** Almost 150 years ago, President Lincoln found it necessary to hire a private investigator, Mr. Alan Pinkerton. He was actually the beginning of the Secret Service. Since that time federal police authority has grown to a large number of agencies - FBI, CIA, INS, IRS, DEA, BATF, SS, ATF, etc. Now Congress is considering a proposal for another agency: the "Federal Air Transportation Airport Security Service." Can't you see it now, the new service in their black outfits with their initials in large white letters across their backs? F.A.T.A.S.S. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- From: Tim Johnson Date: Sun Feb 6, 2005 8:21am Subject: Re: Regarding the hoopla about the OSCOR Software Maybe your friend should step forward and make his case himself. Or stop complaining. Secondhand information is hearsay at best and is questionable when one is trying to gather information for any purpose, whether it be for a criminal investigation or a civil problem. At this point, it is an uncivil problem.....you are able to cast your friends stones and he/she is protected by a veil of secrecy. Reading between the lines, I'd venture to say that your friend is relatively new in the business and attended the school in an effort to learn how to operate the equipment and to brush up on the basics. If it were important, I could probably find out his/her name with little problem as i had a friend attend the most recent class and probably had an acquaintance attend the class before that (another friend attended the advanced class back in the summer). I'm sure they would remember anyone who had a computer problem as it would have disrupted the teaching process. Then again, if your friend doesn't want to identify himself/herself here, then he/she probably went in as James Bond by using an alias. Does he/she have the background that would make operating, and most importantly, understanding what is going on with the equipment? I have about a dozen sweeps behind me now and am still learning something every time i go out. But, I go out with the attitude that I'm going to learn something new on each job. At least, when I stay awake, I do. When I feel that I've learned all there is to know about TSCM, I'll be ready to retire. After all Those who can do. Those who can't teach. Those who can do neither administrate. At this point your friend sounds very much like a soft mouthed administrator. Before you jump down my throat, I'm just a bystander trying to find out what might have caused a problem. But unless your friend comes out of the closet and personally states his case, I'm considering the subject closed and will only post to factual comments from this point on. As I'm sure most of the other TSCMers will probably do. And, I'd look closely at my friendship if I was you; a real friend doesn't subject a friend to possible ridicule or use them to bitch about something; they thank their friend for supporting them in their publicly stated problem. Remember the words of Albert Camus....Those who write clearly have readers, those who write obscurely have commentators. So far, we have only been able to comment on your writings (in the stead of your "friend"). Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10953 From: joe joe Date: Sun Feb 6, 2005 9:18am Subject: Re: Regarding the hoopla about the OSCOR Software uhh first off Tim my freind is not a newcomer and was familiar with the equipment( it is funny because you said you will be attending a class soon, are you a newcomer?), secondly i belive he has told REI when he was there, and third of all i believe he will email Thomas, either today or tomorrow , maybe you should stop hanging off the nuts of REI..it doesn't suit anyone to be a nuthugger!..if you continue responding to this i will continue, so squash it now --- Tim Johnson wrote: > Maybe your friend should step forward and make his > case himself. Or > stop complaining. Secondhand information is hearsay > at best and is > questionable when one is trying to gather > information for any > purpose, whether it be for a criminal investigation > or a civil > problem. At this point, it is an uncivil > problem.....you are able to > cast your friends stones and he/she is protected by > a veil of secrecy. > > Reading between the lines, I'd venture to say that > your friend is > relatively new in the business and attended the > school in an effort > to learn how to operate the equipment and to brush > up on the basics. > If it were important, I could probably find out > his/her name with > little problem as i had a friend attend the most > recent class and > probably had an acquaintance attend the class before > that (another > friend attended the advanced class back in the > summer). I'm sure they > would remember anyone who had a computer problem as > it would have > disrupted the teaching process. Then again, if your > friend doesn't > want to identify himself/herself here, then he/she > probably went in > as James Bond by using an alias. Does he/she have > the background > that would make operating, and most importantly, > understanding what > is going on with the equipment? I have about a dozen > sweeps behind me > now and am still learning something every time i go > out. But, I go > out with the attitude that I'm going to learn > something new on each > job. At least, when I stay awake, I do. When > I feel that I've > learned all there is to know about TSCM, I'll be > ready to retire. > After all > Those who can do. > Those who can't teach. > Those who can do neither administrate. > > At this point your friend sounds very much like a > soft mouthed administrator. > > Before you jump down my throat, I'm just a bystander > trying to find > out what might have caused a problem. But unless > your friend comes > out of the closet and personally states his case, > I'm considering the > subject closed and will only post to factual > comments from this point > on. As I'm sure most of the other TSCMers will > probably do. > > And, I'd look closely at my friendship if I was you; > a real friend > doesn't subject a friend to possible ridicule or use > them to bitch > about something; they thank their friend for > supporting them in their > publicly stated problem. Remember the words of > Albert Camus....Those > who write clearly have readers, those who write > obscurely have > commentators. So far, we have only been able to > comment on your > writings (in the stead of your "friend"). > > Tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10954 From: Tim Johnson Date: Sun Feb 6, 2005 9:57am Subject: Re: Regarding the hoopla about the OSCOR Software MY, My. Such language. But, you should look carefully at what you wrote. I don't think I have touted REI in any way; nothing about their equipment being superior to, or inferior to others. I have only suggested there is a lack of communication on the part of your friend. As for the "nuthugging", stand back and look at what you are doing. Your friend is totally protected by you from any effort to educate him or to assist him with his problem. He's letting you take my small amount of input while everyone else is reading our missives and chuckling about one of us being only partially armed (could be me, hmmmm). I'm just doing what you are doing, responding from a point of ignorance to a possible problem. If I knew more perhaps i could respond to problems rather than to your and your "friends" mudslinging. Step up, state the problem and ask for assistance; even with the animosity your friend has probably generated within REI, I doubt that they are the kind to hold it against him. They're professionals; professionals seek assistance to a problem. I'm trying to help find a solution to a problem (as I'm sure REI will do). You and your "friend" are hiding the problem. But, maybe my responses have had the desired effect. Your friend should have taken the problem to the source in the beginning rather than having you act as his mouthpiece. If your friend has a problem it can't be fixed until he addresses it in such a way as to have it looked at step by step. It is better that he contact REI directly than to cry in the dark. Maybe now, something can be done about it. And yes, I'm a relative newcomer. I try to get as much training as I can as i know my limitations. And, I'll be attending their advanced classes if i can sneak a rubber check in on them when they aren't looking. My attitude is that once I stop learning, I'm of no use to anyone anymore. I hope I never reach the point of a lot of people I know in this business that feel they have seen it all and there is nothing more to learn. And, if I run into a problem I've found it is better to address it with the people involved rather than run around crying about something they aren't aware of. I'm unhappy; they're unaware and everyone else has to listen to complaining. Speaking of newcomers, are you a debugger or just a mouthpiece? So far, you haven't been speaking from a position of experience (at least, from my limited point of view) , just relaying hearsay from your "friend". Do you have the experience with computers, software and the OSCOR to be able to discuss the problem with him and try to find out what the problem is? What you (he/she) should be doing is posting the problems encountered, step by step, and asking those on the TSCM-L list if they have had the same problem and what, if anything, they did to clear it up. With that said, be careful with your response. People no longer have any doubts as to whether I'm a fool or not. They know it for a fact. You may still have them wondering. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10955 From: joe joe Date: Sun Feb 6, 2005 10:08am Subject: Re: Regarding the hoopla about the OSCOR Software hey Tim you attacked the kind of freinds i keep, that was a low blow so i reacted, yes i do protect my freinds if needed but this is not the case you attacked me, so just stop, as for REI they DO know there are problems and it is up to them to fix them, not for you to come here and judge the kinds of freinds people keep, my buddy will contact REI like i said, and if you do know some people that were in the class in the last few weeks ask them they might have been there when those problems arose at their facility and then all speculation of " is the software bugged or not" could be laid to rest, until you get that info from your aquintances that were there stop it, REI are giving out a software that is basically in beta testing because it has software flaws to it, and this is MY opinion NOT my freinds , although he may say worse thanks --- Tim Johnson wrote: > MY, My. Such language. But, you should look > carefully at what you > wrote. I don't think I have touted REI in any way; > nothing about > their equipment being superior to, or inferior to > others. I have only > suggested there is a lack of communication on the > part of your > friend. As for the "nuthugging", stand back and look > at what you are > doing. Your friend is totally protected by you from > any effort to > educate him or to assist him with his problem. He's > letting you take > my small amount of input while everyone else is > reading our missives > and chuckling about one of us being only partially > armed (could be > me, hmmmm). I'm just doing what you are doing, > responding from a > point of ignorance to a possible problem. If I knew > more perhaps i > could respond to problems rather than to your and > your "friends" > mudslinging. Step up, state the problem and ask for > assistance; even > with the animosity your friend has probably > generated within REI, I > doubt that they are the kind to hold it against him. > They're > professionals; professionals seek assistance to a > problem. I'm trying > to help find a solution to a problem (as I'm sure > REI will do). You > and your "friend" are hiding the problem. > > But, maybe my responses have had the desired effect. > Your friend > should have taken the problem to the source in the > beginning rather > than having you act as his mouthpiece. If your > friend has a problem > it can't be fixed until he addresses it in such a > way as to have it > looked at step by step. It is better that he contact > REI directly > than to cry in the dark. Maybe now, something can be > done about it. > > And yes, I'm a relative newcomer. I try to get as > much training as I > can as i know my limitations. And, I'll be attending > their advanced > classes if i can sneak a rubber check in on them > when they aren't > looking. My attitude is that once I stop learning, > I'm of no use to > anyone anymore. I hope I never reach the point of a > lot of people I > know in this business that feel they have seen it > all and there is > nothing more to learn. > > And, if I run into a problem I've found it is better > to address it > with the people involved rather than run around > crying about > something they aren't aware of. I'm unhappy; they're > unaware and > everyone else has to listen to complaining. > > Speaking of newcomers, are you a debugger or just a > mouthpiece? So > far, you haven't been speaking from a position of > experience (at > least, from my limited point of view) , just > relaying hearsay from > your "friend". Do you have the experience with > computers, software > and the OSCOR to be able to discuss the problem with > him and try to > find out what the problem is? What you (he/she) > should be doing is > posting the problems encountered, step by step, and > asking those on > the TSCM-L list if they have had the same problem > and what, if > anything, they did to clear it up. > > With that said, be careful with your response. > People no longer have > any doubts as to whether I'm a fool or not. They > know it for a fact. > You may still have them wondering. > > Tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail 10956 From: Tim Johnson Date: Sun Feb 6, 2005 11:30am Subject: Re: Regarding the hoopla about the OSCOR Software JOE JOE, You are letting your emotions get in the way of objectivity. You have to decide who your friends are. What you do for them is your business. My friend who attended the class responded very quickly to my inquiry. As there were two classes, which did your friend attend? There didn't seem to be any complaints in the first three day session consisting of about 15 people from across the globe. Mainly, the equipment was demonstrated on the last day and if there were concerns they were voiced one on one. In the 5 day session, there were fewer attendees. There was problems with the software on some of the computers. From my understanding, Chris called the software developer into the classroom and he took notes regarding the problems. I believe he told the attendees that the software was Beta, that they were experiencing problems with stability, and that REI is addressing the problems little by little as they arise and fixes are made. Apparently, discussions were very polite and REI's attitude was very correct and polite. One reason for your friends attitude may be one of communication. If your friend was an American, he may have an attitude problem; if he was from one of the foreign countries he might not have understood what was going on. And with that I'll go back to one of my original premises....if your friend doesn't like the software all the has to do it turn the computer off and wait patiently for a more stable version to come along. If his arm isn't in a sling i doubt that they forced him to download it or continue to use it. I've learned that if something works, even if it is only partially effective, it is better than the alternative of not having it at all. I'm sure REI is working to correct the problems. After all, they have a very good reputation that I'm sure they don't want to have tarnished. Heck, if your friend is unhappy with the 5.0 version, I'm sure REI would be glad to return him to his previous version. He has a choice, all he has to do is voice it. Now, joe joe, read the following very carefully: Beta program. Beta program. Free Beta program. Free Beta program. Betas testing. Beta testing. What that means is it is there for you to try out and to provide feedback on. It is in the development stage. Development means it probably has problems and the developers want to know what those are from the Beta testers. Beta testing is a good thing if you are willing to share any problems you encounter. Beta testing is a bad thing if you hide your candle (problems) under a bushel basked and cry in the dark. Share. Always share. I have known the people at REI for a good long time. I have always had the highest respect for their integrity and desire to make a product that is both useful, easy to operate and not a checkbook buster and to continually refine or improve on them. My only real complaint over the years I have been familiar with the OSCOR has been one in which the signal is presented digitally rather than in an analog mode. It is a point that we joke about when we run across each other and it wouldn't surprise me to have them one day contact me and say, We listened. We'd like for you to Beta test our analog display. I also consider some of them to be more than business acquaintances, but not quite closest of friends. We're still in the touchy-feel area. But, we are still working on it. Professionally, we support each other by me making comments on their equipment and them by listening and implementing my suggestions (if they aren't stupid to the point of being absurd). Anyhow, I'm glad your friend is going to approach the problem from a face-to-face point of view rather than having you sling arrows for him. If I can be of any little assistance in the future, (Nothing to do with computers or software) don't hesitate to contact me. And finally, your opinion has absolutely no weight in the matter unless you want to address the problem from a personal perspective. You have an opinion, as do I. And we both have a** holes, but they don't necessarily need to be made public. But, for what it is worth, I have enjoyed debating the problem with you. I hope you will take the time to re-read our correspondences and try to understand I haven't been attacking you specifically. It was your mysterious friend for not having the intestinal fortitude to personally voice his concerns. Most of the people on groups like this are there to try to help others when they are experiencing a problem. Well, most of them are. Some are just wanna-bee's, like me. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10957 From: Date: Sun Feb 6, 2005 11:06am Subject: Re: Oscor Gentlemen, I appreciate a prompt comment of REI concerning OSCOR. In some respect we are fortunate enough of hearing direct from the vendor. It could never happen be Siemens, Rockwel, Honeywell, Rohde&Schwarz etc. etc. involved. Their ignorance is well documented. However some REI statements are surprising. 1. They released beta version of software... THEY SOLD A PRODUCT WITH FAULT FUNCTIONALITY. That is. No matter what language we speak. 2. REI claims that OSCOR was designed for Burst transmission TSCM.... THE OSCOR IS NOT CAPABLE OF CATCHING BURST TRANSMISSIONS. As every serial sweep type receiver. Try to make a full sweep and note how long the receiver needs to complete it. In this regard OSCOR is not worse than, say Rockwell 95S1A or R&S EB200 or Cubic 3400 or any other serial sweep receiver. Probably OSCOR could catch a 15 minutes burst but not a 300 milliseconds as it would be the case with a hardware keystroke logger. Catching burst transmissions requires time domain receiver in combination with a powerful FFT analyzer, a system like Scenario Flex. 3. Regarding video. Video with 150 KHz bandwidth? Most probably REI engineers has forgotten Nyquist Theorem. I know Oscor was not designed to watching movies, but I also know that the receiver¥s bandwidth is not wide enough to lock into Frequency modulated video synchro signal. I am speaking of Oscor produced in 2004, not 1995. I could go further, but it is not my intention to insult REI, or OSCOR owners and Oscor lovers. The overall system performance is good for its price. If someone has $400,000.00 to invest in a different system, Oscor is not an option. But Oscor is worth its price and undoubtedly can help in TSCM work. No system can everything. Oscor is not an exeption. Regards, A.W. DEMTEC@A... wrote: > > > In a message dated 04/02/2005 23:59:37 GMT Standard Time, >hawkspirit@e... writes: > > > > >I did a sweep in the past few years in which I detected a burst bug sending >out short duration pulse bursts. After the client saw my results he hired a >second sweep team to come in and confirm my findings. They brought an Oscor >and it would not receive and display this short pulse wave transmission. >Missed the boat completely! > >Roger > >HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com > > > > > > >Roger I take it that you used a Spectrum Analyser on your original sweep >when you detected the Burst device >Regards Dave > >David McGauley >TSCM [Technical Surveillance and Countermeasures] >Electronic Surveillance and Sweep Specialist >Electrical/Electronics Engineer ex Police >Demtec House >Ormskirk >Lancs L390HF >UK >01695558544 >07866206112 >demtec@a..._ www.demtec.co.uk_ (http://www.demtec.co.uk/) > > > > >[Non-text portions of this message have been removed] > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > __________________________________________________________________ Switch to Netscape Internet Service. As low as $9.95 a month -- Sign up today at http://isp.netscape.com/register Netscape. Just the Net You Need. New! Netscape Toolbar for Internet Explorer Search from anywhere on the Web and block those annoying pop-ups. Download now at http://channels.netscape.com/ns/search/install.jsp 10958 From: joe joe Date: Sun Feb 6, 2005 11:44am Subject: Re: Regarding the hoopla about the OSCOR Software hey Tim i told you stop it because YOU are making this bigger than it is..my freind is an american but does NOT have an attitude, there you go again judging the people i have contact with, and yes my opinion counts in this matter because i do believe that it is not a good peice of software, again my opinion, if you don't like it you could object to it and that is fine but opinions is what makes america a wonderful place, we don't live in a communist country, like i said he will contact TOM so you could stop your ranting about freinds or anything else because it is getting rather childish, also i am glad that your freind that was in the second class told you there were problems, obviously he was honest( gee only you could have great freinds, haha) also if it is a beta than they shouldn't be selling it, end of story, don't say it is free because it is just added to the price of the upgrade, Tim again stop this bickering and i hope that my buddy and Tom fix this , so you really don't have to go out of your way to prove if the software has bugs or not, IT HAS BE PROVEN THERE ARE SO EVERYTHING CAN END RIGHT HERE! --- Tim Johnson wrote: > JOE JOE, > > You are letting your emotions get in the way of > objectivity. You have > to decide who your friends are. What you do for them > is your business. > > My friend who attended the class responded very > quickly to my > inquiry. As there were two classes, which did your > friend attend? > There didn't seem to be any complaints in the first > three day session > consisting of about 15 people from across the globe. > Mainly, the > equipment was demonstrated on the last day and if > there were concerns > they were voiced one on one. > > In the 5 day session, there were fewer attendees. > There was problems > with the software on some of the computers. From my > understanding, > Chris called the software developer into the > classroom and he took > notes regarding the problems. I believe he told the > attendees that > the software was Beta, that they were experiencing > problems with > stability, and that REI is addressing the problems > little by little > as they arise and fixes are made. Apparently, > discussions were very > polite and REI's attitude was very correct and > polite. > > One reason for your friends attitude may be one of > communication. If > your friend was an American, he may have an attitude > problem; if he > was from one of the foreign countries he might not > have understood > what was going on. > > And with that I'll go back to one of my original > premises....if your > friend doesn't like the software all the has to do > it turn the > computer off and wait patiently for a more stable > version to come > along. If his arm isn't in a sling i doubt that they > forced him to > download it or continue to use it. I've learned > that if something > works, even if it is only partially effective, it is > better than the > alternative of not having it at all. I'm sure REI > is working to > correct the problems. After all, they have a very > good reputation > that I'm sure they don't want to have tarnished. > > Heck, if your friend is unhappy with the 5.0 > version, I'm sure REI > would be glad to return him to his previous version. > He has a choice, > all he has to do is voice it. > > Now, joe joe, read the following very carefully: > > Beta program. Beta program. > Free Beta program. Free Beta program. > Betas testing. Beta testing. > > What that means is it is there for you to try out > and to provide > feedback on. It is in the development stage. > Development means it > probably has problems and the developers want to > know what those are > from the Beta testers. Beta testing is a good thing > if you are > willing to share any problems you encounter. Beta > testing is a bad > thing if you hide your > candle (problems) under a bushel basked and cry in > the dark. > > Share. Always share. > > I have known the people at REI for a good long time. > I have always > had the highest respect for their integrity and > desire to make a > product that is both useful, easy to operate and not > a checkbook > buster and to continually refine or improve on them. > My only real > complaint over the years I have been familiar with > the OSCOR has been > one in which the signal is presented digitally > rather than in an > analog mode. It is a point that we joke about when > we run across each > other and it wouldn't surprise me to have them one > day contact me and > say, We listened. We'd like for you to Beta test our > analog display. > I also consider some of them to be more than > business acquaintances, > but not quite closest of friends. We're still in the > touchy-feel > area. But, we are still working on it. > Professionally, we support > each other by me making comments on their equipment > and them by > listening and implementing my suggestions (if they > aren't stupid to > the point of being absurd). > > Anyhow, I'm glad your friend is going to approach > the problem from a > face-to-face point of view rather than having you > sling arrows for > him. If I can be of any little assistance in the > future, (Nothing to > do with computers or software) don't hesitate to > contact me. > > And finally, your opinion has absolutely no weight > in the matter > unless you want to address the problem from a > personal perspective. > You have an opinion, as do I. And we both have a** > holes, but they > don't necessarily need to be made public. But, for > what it is worth, > I have enjoyed debating the problem with you. I hope > you will take > the time to re-read our correspondences and try to > understand I > haven't been attacking you specifically. It was your > mysterious > friend for not having the intestinal fortitude to > personally voice > his concerns. Most of the people on groups like this > are there to try > to help others when they are experiencing a problem. > Well, most of > them are. Some are just wanna-bee's, like me. > > Tim > > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10959 From: joe joe Date: Sun Feb 6, 2005 11:50am Subject: Re: Oscor i do agree with you on certain aspects but as with any piece of hardware , when doing a sweep we must stay as long as possible to catch every signal and threat we can, example if you only stay 10 hours and the burst signal didn't fire then any peice of hardware wouldn't catch it( although other hardware could find it ex: non-lin, thermal, x-ray if you could paint all walls and objects, lol ), but if you stay 24 hours your chances would be much greater, including with the oscor --- Tensor66B@n... wrote: > > Gentlemen, > > I appreciate a prompt comment of REI concerning > OSCOR. In some respect we are fortunate enough of > hearing direct from the vendor. It could never > happen be Siemens, Rockwel, Honeywell, Rohde&Schwarz > etc. etc. involved. Their ignorance is well > documented. > > However some REI statements are surprising. > > 1. They released beta version of software... THEY > SOLD A PRODUCT WITH > FAULT FUNCTIONALITY. That is. No matter what > language we speak. > > 2. REI claims that OSCOR was designed for Burst > transmission TSCM.... > THE OSCOR IS NOT CAPABLE OF CATCHING BURST > TRANSMISSIONS. As every serial sweep type receiver. > Try to make a full sweep and note how long the > receiver needs to complete it. In this regard OSCOR > is not worse than, say Rockwell 95S1A or R&S EB200 > or Cubic 3400 or any other serial sweep receiver. > Probably OSCOR could catch a 15 minutes burst but > not a 300 milliseconds as it would be the case with > a hardware keystroke logger. Catching burst > transmissions requires time domain receiver in > combination with a powerful FFT analyzer, a system > like Scenario Flex. > > 3. Regarding video. Video with 150 KHz bandwidth? > Most probably > REI engineers has forgotten Nyquist Theorem. I know > Oscor was not designed to watching movies, but I > also know that the receiver¥s bandwidth is not > wide enough to lock into Frequency modulated video > synchro signal. > I am speaking of Oscor produced in 2004, not 1995. > > I could go further, but it is not my intention to > insult REI, or OSCOR > owners and Oscor lovers. The overall system > performance is good for > its price. If someone has $400,000.00 to invest in a > different system, > Oscor is not an option. But Oscor is worth its price > and > undoubtedly can help in TSCM work. No system can > everything. Oscor > is not an exeption. > > Regards, > A.W. > > > > DEMTEC@A... wrote: > > > > > > > > In a message dated 04/02/2005 23:59:37 GMT Standard > Time, > >hawkspirit@e... writes: > > > > > > > > > >I did a sweep in the past few years in which I > detected a burst bug sending > >out short duration pulse bursts. After the client > saw my results he hired a > >second sweep team to come in and confirm my > findings. They brought an Oscor > >and it would not receive and display this short > pulse wave transmission. > >Missed the boat completely! > > > >Roger > > > >HYPERLINK > "http://www.bugsweeps.com/"www.bugsweeps.com > > > > > > > > > > > > > >Roger I take it that you used a Spectrum Analyser > on your original sweep > >when you detected the Burst device > >Regards Dave > > > >David McGauley > >TSCM [Technical Surveillance and Countermeasures] > >Electronic Surveillance and Sweep Specialist > >Electrical/Electronics Engineer ex Police > >Demtec House > >Ormskirk > >Lancs L390HF > >UK > >01695558544 > >07866206112 > >demtec@a..._ www.demtec.co.uk_ > (http://www.demtec.co.uk/) > > > > > > > > > >[Non-text portions of this message have been > removed] > > > > > > > > > >======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is > strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts > acquire speed, > > the hands acquire shaking, the shaking is a > warning. > > It is by caffeine alone I set my mind in motion. > >=================================================== > TSKS > >Yahoo! Groups Links > > > > > > > > > > > > > > > > > > __________________________________________________________________ > Switch to Netscape Internet Service. > As low as $9.95 a month -- Sign up today at > http://isp.netscape.com/register > > Netscape. Just the Net You Need. > > New! Netscape Toolbar for Internet Explorer > Search from anywhere on the Web and block those > annoying pop-ups. > Download now at > http://channels.netscape.com/ns/search/install.jsp > > > > __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 10960 From: James M. Atkinson Date: Sun Feb 6, 2005 1:13pm Subject: List Statistics List membership has stabilized over 1230 active subscribers and due to it's size I really don't keep track of who is behind which Yahoo, Hotmail, AOL, or related accounts. The actual list membership is closer to 1300 members, but at any given moment at least 50-75 list members are bouncing for a variety of reasons, but half of these clear in 24-48 hours (1230 + 75/2 = 1268). Additionally, I know that a number of the list addresses are actually "exploders" where a post sent to that addresses is copied or exploded out to a number of additional (hidden) email addresses. One such exploder account has 130+ additional subscribers behind one such account, another exploder has 25+ subscribers behind another one in England, and so on. As close as I can tell we have at least a number or such accounts where the list goes to 300 exploded additional accounts (this gives use a subscriber base of something close to 1600 or so). Quite a few list members forward copies of the daily digest to others in their organizations via a hard copy format instead of an email version, and a number of subscribers include the daily posts in their in-house daily or weekly security briefings. As a rule a newsletter, magazine, or any piece of material is actually read by many times the actual number of subscribers, and very often it is said that this number is 3.5 to 4 times higher than the subscriber base. I know of a least 1300+ active and confirmed subscribers, but the actual number is much, much higher... and I suspect the list initially gets immediate distribution to closer to 2000 or more, but anyway you look at it the TSCM-L is the largest forum in the world for discussing TSCM, bug sweeping, wiretap detection, and related topics. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10961 From: James M. Atkinson Date: Sun Feb 6, 2005 1:50pm Subject: Re: Re: More Posts Dissappearing Yes, you are correct, the moderator can delete a posting from the archives, the original poster can delete a message, and Yahoo can delete a message, but this seems to be a case of someone contacting Yahoo, and then Yahoo deleting the message in a knee-jerk reaction instead of actually reading the message. Here is some details on the messages that have been deleted in the past month, they all involve one, single subject matter. The "customersupport " identity means they someone at cusotmer support ay Yahoo manually removed the message. 1/28/2005 11:00 am customersupport Deleted message #10505 1/28/2005 11:00 am customersupport Deleted message #10751 2/2/2005 7:01 pm customersupport Deleted message #10866 #10867 #10871 The funny part is that one of the messages that was deleted on 2/2/2005 was nothing more than a message that stated that several messages had been deleted, so not only is someone trying to get the original messages deleted, but they are try to cover their tracks by having messages about the deletion deleted, and then deleting those deletion of their deletions in hopes that they might be deleted (I have a headache). Suffice to say, all they are doing is drawing more attention to themselves and they are doing little more then continuing their prima donna games and abusive behavior that got them tossed off the list in the first place. Message 10505 was posted on 1/5 and you can clearly see the missing gap in the sequence. 10503 Re: looking for a tdr delta agenceadi Wed 1/5/2005 10504 Re: Digital Cell phone scanning James Greenwold Wed 1/5/2005 10506 Re: looking for a tdr J. Coote Thu 1/6/2005 10507 Re: Digital Cell phone scanning Ian Wraith ian_wraith Thu 1/6/2005 10508 Sweeps needed Hawkspirit dawn_star_7 Thu 1/6/2005 Message 10751 was posted on 1/24, and like the previous message there is a gap in the sequence 10749 Re: An apology Tech Sec Lab secureoffice Mon 1/24/2005 10750 Re: a good spectrum analyzer between 2 and 6ghz James M. Atkinson graniteislandgroup Mon 1/24/2005 10752 Re: Gentle Reminder Robert Motzer rcm7740 Mon 1/24/2005 10753 Re: FBI abandons Carnivore wiretap software L. F. Elia lfelia Mon 1/24/2005 10754 Editorial: Anatomy of a bank fraud WHEN DATES DON'T MATCH savanted1 savanted1 Mon 1/24/2005 Message 10866 was posted on 1/3 and there is a noticeable gap in the message sequence in this and the other missing posts in the archive. 10864 Technical Sweeps clive michaels ekim0332 Mon 1/31/2005 10865 Re: "Sound of Voices" ?????? LD C silkfreelander Mon 1/31/2005 10868 Re: "Sound of Voices" ?????? A Grudko damstuff2000 Tue 2/1/2005 10869 File - mission.txt TSCM-L@yahoogroups.com Tue 2/1/2005 At 03:05 PM 2/5/2005, contranl wrote: >. > >Those that can remove messages(archive),links,files,photos are: > >1) The moderator(s) >2) The writer of the message (if he's still member) >3) Yahoo >4) Someone else who has stolen 1 of above identities or has managed > to become a member again (using the same id) > >I have some groups myself..sometime ago all links and files and >messages were gone...but back again after my complaint...to my >question of what happened i never got a personal answer,just some >prefabricated general apologies. > >You have to insist in asking Yahoo if they removed the message or not >i suppose in the end they will give you an answer...depending on >what they say you can start to think about what else might be going >on. > >I know you can add things to a Yahoo-group wich they not intended. >(inserting HTML-code where you should put plain text) >As far as i know this can only be done by the moderators because >they only have acess to those fields where you could do this. > >I just removed my previous last (unimportant)message on this group >to see what happens...as expected i could remove it and now there is >1 number(10940)missing from the ordered row. >(useless experiment..sorry) > > >Tetrascanner ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- [Non-text portions of this message have been removed] 10962 From: James M. Atkinson Date: Sun Feb 6, 2005 2:44pm Subject: Stolen Equipment Alert A large quantity of TSCM equipment was stolen from someone a short time back, and it looks like it is starting to show up on E-Bay and other places. Looks like the thief sat on it for a while to let it cool off, but is trying to now trying to sell it off. The equipment includes a bunch of Kaiser phone equipment, audio amps, Scanlocks, spectrum analyzer, and some Riser Bond TDR's. If anybody offers to sell you this kind of equipment, you see it listed on E-Bay, or you see it being advertised for sale on a website somewhere please let me know privately and I will ensure the appropriate authorities are notified, and that you are put in touch with the victim so you can return their property. If you have recently purchased any ***Used*** gear, TDR's, or Scanlocks on E-Bay or through other sources you should hold onto your receipt, and start asking awkward questions as to where the equipment actually came from (the gear may be in the batch that was stolen). This is not a problem with new equipment, just with the used gear, or gear that was claimed to be "demo gear", refurbished, repaired, etc. Ask for serial numbers BEFORE you pay for the equipment, and ask questions as to whom the previous owner was... you may find that the equipment is indeed hot. If you buy any equipment be sure to use PayPal to send funds, or use a credit card but be sure not to sign any kind of "waiver" so that you can dispute the charge if the equipment ends up being stolen. Make sure that you get some kind of hard copy invoice for the equipment BEFORE you pay for it, and that you keep careful records. Please call or email me if you need any details, Please be careful folks, -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10963 From: contranl Date: Sun Feb 6, 2005 3:57pm Subject: Re: More Posts Dissappearing . Jim...to make a long story short Do you get a respons from Yahoo when you ask about this ? Tetrascanner 10964 From: James M. Atkinson Date: Sun Feb 6, 2005 4:11pm Subject: Re: Re: More Posts Dissappearing Yahoo claims that someone who identified themselves as a federal law enforcement officer contacted them and requested that the posts be removed. -jma At 04:57 PM 2/6/2005, contranl wrote: >Jim...to make a long story short > >Do you get a respons from Yahoo when you ask about this ? > > >Tetrascanner ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10965 From: A Grudko Date: Sun Feb 6, 2005 4:46pm Subject: RE: More Posts Dissappearing -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > A review of the moderator logs today, reflect that someone at Yahoo is quietly deleting posts from the archive again. James, PLEASE send me copies of the 2 posts that someone wants to see them go the way of Kenny Boy's Enron documents :-) Andy G South Africa ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 10966 From: A Grudko Date: Sun Feb 6, 2005 4:46pm Subject: RE: Re: "Breaking-In" to technical security -----Original Message----- From: wiggyyy2000 [mailto:wiggyyy2000@y...] > go on many PI's websites and the first thing they go on is cheaters or annys.. On websites maybe, but not in my experience. I've been a PI for 24 years and a long term member of various professional associations. I've also been President of the South African Council of Investigators for 10 of the past 12 years, which includes advising the SA government on the laws that now regulate the industry in this country. In addition I also belong to a number of serious US and UK PI yahoogroups and matrimonial work is probably not even 5% of of the discussion content. 'Cheaters' is regarded as a bad image presented by a tiny minority of PIs. I don't know what 'annys' is but I assume you mean 'Anny's'. > i am sure that is not all they are good for but that is where the majority of money comes from these days... I doubt that very much, but admit I have not seen any studies on it. I only get a handful of such enquiries a year, but circumstances may differ between countries. Contrary to what you appear to think, matrimonial assignments are the lowest paid type of PI work, with a few exceptions where large dollar settlements or disputes may arise. The few investigators that start off doing matrimonial work tend to be the less qualified ones and get out and into insurance, corporate and/or criminal work as quickly as possible. More experienced investigators, such as ex-police officers or intelligence staff usually bypass the keyhole peeping stage and go straight into the more serious arenas. > as to the fact of many PI groups using sub standard equipment and they themselves planting their own bugs I don't accept it as a fact as it is the opposite of my experience. > you are asking me to name names and I will NOT do that.. No, I am not and I doubt that you know any. > it is a known fact that quite a few have that practice and I have personally heard a very reliable person that has been in the tscm feild tell me about a scam concerning a PI [planting a bug] It is not a known fact to me. I carry out an average of 70 sweeps a year and always discuss my client's concerns in detail before the job and give a full written report afterwards. In 24 years I have only heard one first hand account of a PI being caught and named planting a bug during a sweep. On the other hand I have had a number of sceptical clients plant bugs prior to a sweep to test my abilities. My opinion is based on reality, not reality TV or urban legends. Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 10967 From: Maury Siskel Date: Sun Feb 6, 2005 4:44pm Subject: Added mystery -- Re: Re: More Posts Dissappearing Jim, when I tried to view a couple of your links to the deleted emails, Yahoo would not recognize my Yahoo password nor would it recognize me as a member of TSCM-L. Just an interesting further complication. I've used Yahoo email for years. Cheers, Maury James M. Atkinson wrote: >Yahoo claims that someone who identified themselves as a federal law enforcement officer contacted them and requested that the posts be removed. > >-jma > > >At 04:57 PM 2/6/2005, contranl wrote: > >--------- snipped -------- > 10968 From: Date: Sun Feb 6, 2005 11:16am Subject: Re: Re: More Posts Dissappearing Can you say BS! Guess Carnavor is up and working. [Non-text portions of this message have been removed] 10969 From: James M. Atkinson Date: Sun Feb 6, 2005 5:36pm Subject: Fallacious Arguments http://c2.com/cgi/wiki?FallaciousArguments Fallacious Argument: An argument that sometimes fools human reasoning, but is not logically valid. It is crucial to remember that reasoning from definitions and facts to conclusions is fundamentally different from reasoning about definitions. Before you can scientifically establish whether or not Foo is a Bar, you have to establish the meaning of the label Bar. A given term is associated with one or more definitions and one or more concepts. A definition is correct when it accurately represents a chosen concept. Definitions can be more or less formal, the more formal the better. Concepts are not correct or incorrect, but merely useful. Formal Fallacies (incorrectly constructed logical syllogisms) AntecedentAssumedFallacy (A is true because of B, but B is true because of A) [similar to CircularReasoning] ArgumentByAnalogy (A is like B; A has property P; therefore, B has property P) [similar to UndistributedMiddle? or CompositionFallacy?] BeggingTheQuestion (A hidden assumption supports the "proof" in process) CircularReasoning (A is because of B, which is because of C, which is because of A) PostHocErgoPropterHoc (A follows B so B causes A) CorrelationImpliesCausation (There is a demonstrated correlation between A and B, therefore A implies B) [same as PostHocErgoPropterHoc] NonSequitur? (Conclusion does not follow from the premises) FalseDichotomy is on the list below; DeleteWhenCooked Informal Fallacies (well-known) (These are fallacies you are likely to find in textbooks) AdHominem (The person saying P is biased or otherwise flawed, so P is false) AdVerecundiam (P is true because person/entity X has said so) ArgumentFromAuthority (quote someone famous) [equivalent to AdVerecundiam] ArgumentumAdBaculum (Argument from fear; "If you believe P, you'll suffer for it") ArgumentByTheMasses (aka ArgumentumAdPopulum; A is true because "everybody knows it is true") EquivocationFallacy (using a term with multiple definitions as if the definitions were equivalent when they are not) NoTrueScotsman (Assert that A conforms to B - redefine the identity of A until it does) RedHerring (A is true because of totally irrelevant B) StrawMan (a weak argument specifically put forth to be knocked down) ArgumentumAdInfinitum (aka ArgumentumAdNauseum?; A argues longer/more eloquently than B, so A's proposition must be true) ArgumentumAdIgnorantiam (if A can't imagine P to be true, it can't be true) DisproofByFallacy (aka AdLogicam; Argument has been made at some point for A through error X, therefore A must be false) ComplexQuestion? (A question contains an assertion assumed to be true, e.g. "Have you stopped beating your wife?") FalseDichotomy (aka BifurcationFallacy, ThisOrThatFallacy, ExcludedMiddle, FalseDilemma?; e.g. "You're either with us or you're with the terrorists.") Informal Fallacies (colloquial) (Most of these are variants of other fallacies or otherwise suggested by contributors) ArgumentFromIntimidation (see also ImmaturityArgument) [not the same as ArgumentumAdBaculum] AbsenceOfEvidenceIsNotEvidenceOfAbsence (We have never observed a proton decay, therefore it can never happen) AnonymousChoir (there are people out there who agree with me) ArgumentByGibberish (utter things that turn on the lower third) ArgumentByRepeatedAssertion (use "Saddam" and "Al Qaeda" together in the same sentence often enough and eventually they'll believe it, evidence or not) ArgumentFromSilence () AssumedAgreementFallacy (So-and-so agrees with me on X, so he probably agrees with me on Y too). AssumedScalabilityFallacy. (A works well as a small system; therefore it will work well as a large system. Or vice versa) AvoidingTheQuestion (The response to a question does not actually answer it). ConceptsOutOfContext (B pertains to A when B makes no sense in the context of this A) ConfusingTheoryAndPractice (practice of A > practice of B implies theory of A > theory of B or vice versa) DesertIslandFallacy (New technology B should be abandoned in favor of old technology A, because B will fail if you're ever stranded on a desert island) DisagreeByDistorting (assume an example would be, You want the government to assume restricted responsibility X, therefore you must be a totalitarian socialist) DogmaticFallacy evidence against some X is excluded by the UniverseOfDiscourse DuelingCredentials (I know more about X than you do, so I win) EveryoneHasHisOpinion (the opinion of a layperson is as good as that of an authority) EvidenceByBestCaseScenario (best case example may distract from problem domain) EvilOrStupid (If you don't agree with me, which one are you?) ExcerptionNotAbstraction (dogs are animals with four legs, so what about amputated dogs?) FailureToElucidate (Using terms more obscure than the primary point at issue) GordianReasoning (A is because of B, which is because of C, which is because of D... which is because of Y, which is because of Z, which is because of A) GrandConspiracy (asserting that the world is being manipulated by a cabal of some sort) IdontSufferFoolsLikeYou (Asserting that the opponent is unworthy of debate) IfItAintBrokeDontFixIt (Arguing that older things are better than the newer ones) IfItAintScottishItsCrap (The merits of X can be determined by some superficial attribute of X) IfItsWorseThanMineItsGarbage (If A some instance of B, so A > B) ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10970 From: taylortscm@y... Date: Sun Feb 6, 2005 7:36pm Subject: Re: Stolen Equipment Alert jim: thanx for this post as I do purchase about 200k in equipment every year . if you have serial#'s or any info such as area that theft occurred in and care to to let me know please reply privately dan taylor group ps watch some of the pi lists recently there was a post concerning several kaiser pieces including telephone analyzers and 1059's "James M. Atkinson" wrote: A large quantity of TSCM equipment was stolen from someone a short time back, and it looks like it is starting to show up on E-Bay and other places. Looks like the thief sat on it for a while to let it cool off, but is trying to now trying to sell it off. The equipment includes a bunch of Kaiser phone equipment, audio amps, Scanlocks, spectrum analyzer, and some Riser Bond TDR's. If anybody offers to sell you this kind of equipment, you see it listed on E-Bay, or you see it being advertised for sale on a website somewhere please let me know privately and I will ensure the appropriate authorities are notified, and that you are put in touch with the victim so you can return their property. If you have recently purchased any ***Used*** gear, TDR's, or Scanlocks on E-Bay or through other sources you should hold onto your receipt, and start asking awkward questions as to where the equipment actually came from (the gear may be in the batch that was stolen). This is not a problem with new equipment, just with the used gear, or gear that was claimed to be "demo gear", refurbished, repaired, etc. Ask for serial numbers BEFORE you pay for the equipment, and ask questions as to whom the previous owner was... you may find that the equipment is indeed hot. If you buy any equipment be sure to use PayPal to send funds, or use a credit card but be sure not to sign any kind of "waiver" so that you can dispute the charge if the equipment ends up being stolen. Make sure that you get some kind of hard copy invoice for the equipment BEFORE you pay for it, and that you keep careful records. Please call or email me if you need any details, Please be careful folks, -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS --------------------------------- Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. --------------------------------- Do you Yahoo!? Yahoo! Search presents - Jib Jab's 'Second Term' [Non-text portions of this message have been removed] 10971 From: littledog Date: Sun Feb 6, 2005 5:49pm Subject: Re: Added mystery -- Re: Re: More Posts Dissappearing I also have had a couple of my posts censured, these so called fed law enforcers have no respect for any of our rights and to speak the truth concerning their petty stupid abuses invites more than censure..littledog> -----Original Message----- > From: Maury Siskel [mailto:maurysis@e...] > Sent: Sunday, February 06, 2005, 3:25 PM > To: TSCM-L@yahoogroups.com > Subject: Added mystery -- Re: [TSCM-L] Re: More Posts Dissappearing > > > > Jim, when I tried to view a couple of your links to the deleted emails, > Yahoo would not recognize my Yahoo password nor would it recognize me as > a member of TSCM-L. Just an interesting further complication. I've used > Yahoo email for years. > Cheers, > Maury > > James M. Atkinson wrote: > > >Yahoo claims that someone who identified themselves as a federal law > enforcement officer contacted them and requested that the posts be removed. > > > >-jma > > > > > >At 04:57 PM 2/6/2005, contranl wrote: > > > >--------- snipped -------- > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > 10972 From: Riskbiz Date: Sun Feb 6, 2005 9:35pm Subject: RE: List Statistics Congratulations James. DK -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Sunday, February 06, 2005 12:13 PM To: TSCM-L Subject: [TSCM-L] List Statistics List membership has stabilized over 1230 active subscribers and due to it's size I really don't keep track of who is behind which Yahoo, Hotmail, AOL, or related accounts. The actual list membership is closer to 1300 members, but at any given moment at least 50-75 list members are bouncing for a variety of reasons, but half of these clear in 24-48 hours (1230 + 75/2 = 1268). Additionally, I know that a number of the list addresses are actually "exploders" where a post sent to that addresses is copied or exploded out to a number of additional (hidden) email addresses. One such exploder account has 130+ additional subscribers behind one such account, another exploder has 25+ subscribers behind another one in England, and so on. As close as I can tell we have at least a number or such accounts where the list goes to 300 exploded additional accounts (this gives use a subscriber base of something close to 1600 or so). Quite a few list members forward copies of the daily digest to others in their organizations via a hard copy format instead of an email version, and a number of subscribers include the daily posts in their in-house daily or weekly security briefings. As a rule a newsletter, magazine, or any piece of material is actually read by many times the actual number of subscribers, and very often it is said that this number is 3.5 to 4 times higher than the subscriber base. I know of a least 1300+ active and confirmed subscribers, but the actual number is much, much higher... and I suspect the list initially gets immediate distribution to closer to 2000 or more, but anyway you look at it the TSCM-L is the largest forum in the world for discussing TSCM, bug sweeping, wiretap detection, and related topics. -jma ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ------------------------ Yahoo! Groups Sponsor --------------------~--> What would our lives be like without music, dance, and theater? Donate or volunteer in the arts today at Network for Good! http://us.click.yahoo.com/Tcy2bD/SOnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 10973 From: The Price's Date: Sun Feb 6, 2005 10:27pm Subject: RE: Stolen Equipment Alert Hi JMA, Can you provide a bit more detail as I do not want to purchase anything stolen, and would like to assist the rightful owner if I come across these items. John -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: February 6, 2005 1:45 PM To: TSCM-L Subject: [TSCM-L] Stolen Equipment Alert A large quantity of TSCM equipment was stolen from someone a short time back, and it looks like it is starting to show up on E-Bay and other places. Looks like the thief sat on it for a while to let it cool off, but is trying to now trying to sell it off. The equipment includes a bunch of Kaiser phone equipment, audio amps, Scanlocks, spectrum analyzer, and some Riser Bond TDR's. If anybody offers to sell you this kind of equipment, you see it listed on E-Bay, or you see it being advertised for sale on a website somewhere please let me know privately and I will ensure the appropriate authorities are notified, and that you are put in touch with the victim so you can return their property. If you have recently purchased any ***Used*** gear, TDR's, or Scanlocks on E-Bay or through other sources you should hold onto your receipt, and start asking awkward questions as to where the equipment actually came from (the gear may be in the batch that was stolen). This is not a problem with new equipment, just with the used gear, or gear that was claimed to be "demo gear", refurbished, repaired, etc. Ask for serial numbers BEFORE you pay for the equipment, and ask questions as to whom the previous owner was... you may find that the equipment is indeed hot. If you buy any equipment be sure to use PayPal to send funds, or use a credit card but be sure not to sign any kind of "waiver" so that you can dispute the charge if the equipment ends up being stolen. Make sure that you get some kind of hard copy invoice for the equipment BEFORE you pay for it, and that you keep careful records. Please call or email me if you need any details, Please be careful folks, -jma -------------------------------------------------------------------------- -------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. -------------------------------------------------------------------------- -------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com -------------------------------------------------------------------------- -------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. -------------------------------------------------------------------------- -------------------------- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10974 From: James M. Atkinson Date: Mon Feb 7, 2005 7:13am Subject: IBM, Sony, Toshiba to unveil 'Cell' chip [This chip has some interesting applications in the area of TSCM equipment, and Signals Instelligence. -jma] IBM, Sony, Toshiba to unveil 'Cell' chip Seen competing with Intel, the 'supercomputer on a chip' will power small devices like the PS3. February 7, 2005: 7:10 AM EST SAN FRANCISCO (Reuters) - The highly anticipated microchip that will power the Sony PlayStation 3 video game system will be described in detail for the first time Monday by its developers, IBM, Sony Corp. and Toshiba Corp. Dubbed a "supercomputer on a chip," the Cell microprocessor has until now been long on ambition but short on specifics. At a technical conference here, the three electronics giants say they plan to disclose the inner workings of the chip, which is designed to run portable electronics, home entertainment devices and powerful computers. Aimed squarely at the "digital home" market highly sought-after by Intel Corp. (Research), the Cell initiative, which has been in development for more than three years, is viewed by some as a formidable, if fledgling, competitor to the world's largest chip maker. The Cell chip will appear in the PlayStation 3, the follow-on to Sony's (Research) successful video game console that is expected to be released next year. Cell will likely also be marketed as an ideal technology for televisions and supercomputers, and everything in between, said Kevin Krewell, the editor in chief of Microprocessor Report. Cell "promises to be a very exciting challenge to mainstream processors," Krewell wrote in a recent issue, naming it the best chip technology of 2004, remarkable if only for the fact that no one has actually seen the chip in action. According to released details, Cell is based on the core of IBM's (Research) existing Power processor line, which is used in desktop PCs made by Apple Computer Inc. (Research) Cell contains multiple cores, allowing it to perform like many chips in one. It is capable of "massive floating point processing, optimized for compute-intensive workloads and broadband rich media applications, including computer entertainment, movies and other forms of digital content," according to an earlier statement from the companies. Sony and IBM have called Cell a strong technology for high-powered workstations and supercomputers, with multiple Cell chips able to work as a cluster. "The supercomputer-like processing and performance of the Cell processor-based workstation is just the beginning of what we expect will be a wide range of powerful next-generation solutions resulting from our joint development efforts," Colin Parris, an IBM vice president, said in a November statement. If history is any lesson, Cell is by no means guaranteed to encroach on the most successful microprocessor technology to date, the so-called x86 architecture that is the mainstay of the PC world and the profit center for both Intel and Advanced Micro Devices Inc. (Research) Intel itself once aimed at pushing the x86 technology to the margins with a chip called Itanium it developed at great cost with Hewlett-Packard Co. (Research) After a cool market reception, the Itanium project drifted away from those grand expectations. Today, Itanium remains a niche product marketed primarily at the relatively limited segment of supercomputers and high-end servers. Find this article at: http://money.cnn.com/2005/02/07/technology/cell_chip.reut/index.htm?cnn=yes ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10975 From: James M. Atkinson Date: Mon Feb 7, 2005 7:51am Subject: Policing Video Voyeurs http://www.msnbc.msn.com/id/6919996/site/newsweek/ Policing Video Voyeurs The Feds join the battle against perverts with cameras By Kathryn Williams Newsweek Feb. 14 issue - In the summer of 2001, Jolene Jang was enjoying an outdoor festival in Seattle when she felt a creepy guy standing close behind her. He was reaching into her backpack. When she confronted him, the man started to run away, but Jang's boyfriend tackled him and held him until the police arrived. She figured that was the end of it. A few months later, a prosecutor called with unsettling news. The man wasn't just a pickpocket. He had been using a small digital video camera to take pictures up her skirt. Jang's assailant might have only wanted the pictures he took for himself. But those shots could have ended up on one of a growing number of voyeur Web sites that invite perverts to submit their secretly captured pictures of women in public bathrooms and locker rooms. A popular subgenre: "upskirt" shots of women getting out of cars or climbing stairs. Tiny cell phones with built-in digital cameras make it that much easier. "There's definitely a lot of people who think that upskirting≠'Oh, big deal'," Jang says. "People who don't understand the depths of it should think about their wives or their kids." Jang was especially upset because the man who photographed her wound up serving only 38 days. He was convicted under Washington state's voyeurism law, but the state Supreme Court overturned the verdict, ruling that because Jang was out in public when it happened, she had no reasonable expectation of privacy. Furious, Jang became an outspoken activist, and eventually the state rewrote the law to make the space under a person's clothes private even in a public place. Currently 44 states have some kind of statute that make video voyeurism a crime. But vague wording and First Amendment issues≠preserving legitimate surveillance activities, say, while banning prurient peeping≠make them difficult to enforce. A just-passed federal law could help sort out the problem. The statute makes it a crime to secretly photograph someone on federal property or military bases. The law itself won't do much to protect anyone but federal workers and soldiers, but the hope is that state lawmakers across the country will copy it. Video voyeurism first gained national attention back in 1998, when Susan Wilson discovered that her neighbor had been secretly videotaping her with cameras hidden in her Louisiana home. At the time, there were no laws to fit the crime. "When I found out that it wasn't against the law, I felt even more violated," she says. Wilson's case partly inspired the federal law, called the Video Voyeurism Prevention Act of 2004. Now Congress and statehouses nationwide are grappling with a larger dilemma: how to make a law that extends into tough-to-police cyberspace. Thinking of getting back at your ex-wife by posting those "intimate" pics she once let you take? Rep. Mark Green of Wisconsin will soon introduce a bill to make that a crime unless the person consents. That's welcome news to women like Susan Wilson and Jolene Jang, who say they're always on the lookout for prying electronic eyes. "I'm still wearing skirts," Jang says. "But I make sure that they're on the longer side." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10976 From: Tim Johnson Date: Mon Feb 7, 2005 8:13am Subject: IRISYS Thermal Imager Some of you may have heard of the Thermal Imager developed and sold by IRISYS (see http://www.irisys.co.uk/ for more information). I saw one demonstrated at a recent TSCM professional conference and it looked like a very inexpensive alternative to the $25,000.00 units (They are being sold on e-bay for around $2,000.00 by a representative here in the U.S). Before rushing out to buy one you should be aware that it is only supported by the older laptops with the serial interface. Many, if not most, of the newer laptops are not equipped with serial interface capabilities and it doesn't seem to work with the PCMCIA cards. If you are interested in this capability you can use a handheld "Palm Pilot" type display unit. I have been in contact with the dealer in the States and he contacted the company in the UK and the response was: I would not count on this capability any time soon. Best regards I'll keep trying and see if i can get my Palm Pilot i705 to recognize it.....no luck so far, but it might be because I'm trying to install it like I would software on a Mac. Mostly, I wanted to give you a heads up in the event you are looking at it. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 10977 From: Rob Muessel Date: Mon Feb 7, 2005 9:36am Subject: RE: IRISYS Thermal Imager TSCM application of thermal imaging is quite useful, but it must be done properly with proper equipment. The IRIS IRI1011 is not the tool to use. There are several specs that matter in thermal imaging and two critical ones are the size of the detector in pixels and the size of the image created by the device. The IRI1011 has a 16 x 16 pixel detector array yeilding 256 pixels. Its display is 96 x 96. This is not anywhere near the resolution required to detect the things we need to see. As an example of an adequate imager, look at the specs from Monroe Infrared Technologies HFIR http://www.monroeinfrared.com/ProdFiles/95_HFIR%20specs.pdf. Its detector, a microbolometer, is an array of 320x 240, creating 76,800 pixels. The display is a color video monitor. I've tested low res thermal imagers. They're fun to play with, but they don't do the job. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: Tim Johnson [mailto:dbugman@d...] Sent: Monday, February 07, 2005 9:13 AM To: Recipient List Suppressed: Cc: bob@t... Subject: [TSCM-L] IRISYS Thermal Imager Some of you may have heard of the Thermal Imager developed and sold by IRISYS (see http://www.irisys.co.uk/ for more information). I saw one demonstrated at a recent TSCM professional conference and it looked like a very inexpensive alternative to the $25,000.00 units (They are being sold on e-bay for around $2,000.00 by a representative here in the U.S). Before rushing out to buy one you should be aware that it is only supported by the older laptops with the serial interface. Many, if not most, of the newer laptops are not equipped with serial interface capabilities and it doesn't seem to work with the PCMCIA cards. If you are interested in this capability you can use a handheld "Palm Pilot" type display unit. I have been in contact with the dealer in the States and he contacted the company in the UK and the response was: I would not count on this capability any time soon. Best regards I'll keep trying and see if i can get my Palm Pilot i705 to recognize it.....no luck so far, but it might be because I'm trying to install it like I would software on a Mac. Mostly, I wanted to give you a heads up in the event you are looking at it. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10978 From: contranl Date: Mon Feb 7, 2005 10:48am Subject: Re: IRISYS Thermal Imager . Rob/Tim...just to be shure...you are saying that the Irisys units are not usable in TSCM. (since the price is right i like to know for shure) Lets for example look at the possibility to detect cameras, the idea is to see the temperature-difference between the camera-housing) or lens-opening and the surrounding surface/objects. When i understand it well this one will do that if there is a temperature-difference of at least 0.5 degrees (Celcius) (not shure if that is the between sensor-pixels) Since this unit does not have a lot of pixels,both in the sensor and display,it probably does not give you enough resolution for detecting cameras at big distances, for example when you would stand in the middle of a large room and scan the walls and ceilings. What if you get a little closer (for example 3 meters or less ) that would give you a little more work...still not usable ? lets say an average spy-camera housing would be 3 x 3 cm's, a standard lens opening 7 mm's,and a pinhole lens opening 2 mm's, As i understand a pinhole camera hidden in a plastic clock and looking trough a 2 mm hole ,would give a bigger "warmer" area then just the 2 mm hole.it would also warm up the surrounding area. Question 1) How close would you have to be to see them with this low-cost Irisys unit ? Question 2) Some time ago we discussed some units here that were based on optical reflection. (using a laserbeam-reflection to detect optical lenses) Seems to me that this low-cost IR-device is a better choice (for this kind of money) ? For your reference have a look at: http://www.spybusters.com/Infrared.html As you can see the IR-spots visible are not that small and i am not convinced that they would not show up on a Irisys Ok...a more expensive unit would be nice but not neccessary ? Thanks. Tetrascanner http://www.tetrascanner.com http://groups.yahoo.com/group/gsm-scanner http://groups.yahoo.com/group/traffic-cams 10979 From: contranl Date: Mon Feb 7, 2005 10:59am Subject: Anyone know this new Yahoo-group (Email-tracer) . Just got note of this new Yahoo group called Email-tracer http://groups.yahoo.com/group/emailtracer/ This is is what it's about: "This group is being set up for professional private investigators who trace Emails for clients or want to learn how to do it. I know you will like this resource" I have not checked it good yet ...anyone knows if they are OK and usefull ? Thanks Tetrascanner 10980 From: Tim Johnson Date: Mon Feb 7, 2005 11:03am Subject: Re: IRISYS Thermal Imager I'm going to see if i can get a USB to Serial cable to work with this. If not, I'll have my son configure it for my Palm Pilot when he comes in this weekend (he's the computer geek in the family, not me. I'm a Mac user) Once I get it operating, I'll do some evaluating and let you know what the results are. I got it mostly to play around with and also to see if it had any applications for TSCM. I didn't know it would only work on the Serial connector (which the new computers are being built without). tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10981 From: contranl Date: Mon Feb 7, 2005 2:28pm Subject: Re: Anyone know this new Yahoo-group (Email-tracer) . Funny they exist only one day...and already have 592 members...i am shure that is not possible. (unless they use some tricks as Jim mentioned before) So probably these are they good guys to talk to since they are "cheating" even before they've started :) Tetrascanner From: James M. Atkinson Date: Mon Feb 7, 2005 3:10pm Subject: TRADEMARKS OF A FOOL http://www.liberty.edu/Media/1214/Trademarks%20of%20a%20Fool.doc TRADEMARKS OF A FOOL The Book of Proverbs deals with many different topics that relate to every day life. It is clear from the very beginning that Solomon wants his son to be a wise son. In sharp contrast, he does not want his son to be a fool. A fool may be some who is intellectually bright, but when it comes to spiritual things they are very dull. When the word "fool" is used in Proverbs it usually means one that is empty headed, void of understanding, thick-headed and obstinate. The fool does not have a head problem as much as he has a heart problem. To help his son understand the ways of a fool, Solomon will throughout the book of Proverbs share insights about the life and the actions of a fool. Let's notice first how a fool lives. These are "10 TRADEMARKS of FOOL" 1. The fool rejects to the point of resisting instructions. Pr. 1:7 "The fear of the Lord is the beginning of knowledge, but fools despise wisdom and instruction" Prov. 18:2 says, "A fool has no delight in understanding, but in expressing his own heart." This rejection or attitude toward instruction is displayed toward the parents of a fool. Prov. 15:5 - "A fool despises his father's instructions." A child that is hardheaded has started down the path to being a fool. Furthermore this attitude of rejecting instruction is displayed when someone tries to correct the fool. Prov. 23:9 says, "Do not speak in the hearing of a fool. For he will despise the wisdom of your words." 2. The fool believes he is always right. Fools are very prideful. Prov. 12:15 says, "The way of a fool is right in his own eyes, but he who heeds counsel is wise." Fools are know -it - alls. You can't teach them a thing, much less try to tell them anything. They reject the counsel of others in favor of their own counsel. The fool needs to take notice of the advice given in Prov. 28:25 - 26. "He who is of a proud heart stirs up strife. But he who trusts in the Lord will be prospered. He who trusts in his own heart is a fool. But whoever walks wisely will be delivered." 3. Fools are rebellious and they rejoice in and about sins. Prov. 10:23 reveals that a fool loves to practice sin. "To do evil is like a sport to a fool. But a man of understanding has wisdom." Prov. 15:14 tells us that the fool feeds on foolishness. And they not only rejoice in sin, they mock at the guilt from sin. Prov. 14:9 says, "Fools mock at sin (guilt). Fools believe so strongly in practicing evil that Solomon tells us in Prov. 13:19, "it is an abomination to fools to depart from sin." They are good at saying evil is good and good is evil. Sin is just one big joke to the fool. 4. Fools are quick to run their mouth. Prov. 14:3 says, "In the mouth of a fool is a rod of pride, but the lips of the wise will preserve them." A fool is so conceited that he cannot hold his tongue. He is not only a know-it-all, he is a tell-it-all. To his own shame he will be quick to answer even before he hears the whole situation. See Prov. 18:13. Prov. 15:2 "The tongue of the wise uses knowledge rightly, but the mouth of fools pour forth foolishness." Twice in chapter 10 Solomon let's the fool know that his excessive talking is going to cause him to fall. Prov. 10:8,10 says, a prating, (talkative) fool will fall (or brought down to ruin) When it comes to controlling their tongue, the fool should pay close attention to Prov. 17:28 which says, "Even a fool is counted wise when he holds his peace. When he shuts his lips, he is considered perceptive." And all of us should take heed to Prov. 10:19 which says, "In the multitude of words sin is not lacking." 5. A fool is NOT someone to be trusted with responsibilities as they are very unreliable. Prov. 26:6 says, "He who sends a message by the hand of a fool cuts off his own feet and drinks violence." Prov. 26:8 says, "Like one who binds a stone in a sling is one who give honor to a fool." 6. A fool has a hard time controlling their rage. He is hot-tempered. Prov. 12:16 says, "A fool's wrath is known at once, but a prudent man covers his shame." Prov. 14:16-17a says, "A wise man fears and departs from evil. But a fool rages and is self-confident. A quick-tempered man acts foolishly. Prov. 14:29 says, "He who is slow to wrath has great understanding. But he who is impulsive exalts folly." Prov. 29:11 says, "A fool vents his feelings, but a wise man holds them back." You are going to know what is on a fool's mind, whether you want to or not. He will give you a piece of his mind even when he does not have any to spare. Has your temper every gotten you in trouble? 7. Fools resist correction. And like the scoffer, may retaliate with hatred toward you. Prov. 17:10 says, "Rebuke is more effective for a wise man than an hundred blows on a fool." Prov. 27:22 says, "Though you grind a fool in a mortar, grinding him like grain with a pestle you will not remove his folly from him." Because fools are so set in their ways, discipline that usually would change a person's behavior has very little effect on the fool. Prov. 9:7-9 says, "He who corrects a scoffer gets shame for himself. Do not correct a scoffer, lest he hate you; Rebuke a wise person and he will love you. Give instructions to a wise person and he will be still wiser. Teach a just man and he will increase in learning." You can tell a lot about your character by the way you respond to a rebuke or correction. 8. A fool will repeat his mistakes and return to his sins. Prov. 26:11 says, "As a dog returns to his own vomit, so a fool repeats his folly." The fool so despises instruction and is so stubborn that he fails to learn from his own mistakes. He returns and does the same thing over and over, getting the same results. 9. Fools are reckless with riches and possessions. Prov. 21:20 says, " In the house of the wise are stores of choice food and oil, but a foolish man devours all that he has. (NIV) Prov. 14:24 tells us, "The crown of the wise is their riches, but the foolishness of fools is (yields) folly." No wonder Prov. 19:10 says, "luxury is not fitting for a fool." 10. A fool's folly ruins his life. Prov. 19:3 says, "A man's own folly ruins his life, yet his heart rages against the Lord." (NIV) And not only does he ruin his own life, he ruins his parents life. Prov. 19:13 says, "A foolish son is the ruin of his father." Prov. 17:21 says, "He that has a scoffer for a son does so to his own sorrow, and the father of a fool has no joy." It does not get better it gets worse: Prov. 10:21 "The lips of the righteous feed many, but fool's die for lack of wisdom." Prov. 3:35 tells us that "the wise shall inherit glory, but shame shall be the legacy of fools." Prov. 11:29 says, "He who troubles his own house will inherit the wind. And the fool will be the servant to the wise of heart." Prov. 16:22 (NIV) teaches us that "Understanding is a fountain of life to those who have it, but folly brings punishment to fools." Prov. 19:29 (KJV) "Judgments are prepared for scorners and stripes for the back of fools." ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10983 From: James M. Atkinson Date: Mon Feb 7, 2005 3:47pm Subject: Re: IRISYS Thermal Imager Tim, The image resolution of the IRISYS systems is fine for figuring out which bus bar of a circuit break is overheating, or what part of a motor is overheating, but it lacks the sensitivity for TSCM work, and the resolution is so low that your going to end up spending hours chasing ghost readings, but even more dangerously such a system will create a certain level of blindness where you will not be able to find the slight anomalies you are looking for. An inexpensive hand-held infrared digital thermometer used at point-blank range will do just a good a job, but without the fancy color display. The bolometer of any thermal camera or imaging system is where all the money goes to in a thermal system with a typical "cheap" having a matrix that is 320*240, with a quarter degree resolution. An "expensive" imaging system can have a bolometer that is 640*480, and have a resolution of better than a tenth of a degree. A "premium" or high performance system bolometer can be 800*600, or even better but you have to watch out for units that interlace a 320*240 matrix to fake a higher resolution. A cheap, throw away $5 flashlight will find more bugs than a $5000 thermal imaging system. Thermal systems are expensive, and are very finicky little instruments that can really cause some headaches. -jma At 09:13 AM 2/7/2005, Tim Johnson wrote: >Some of you may have heard of the Thermal Imager developed and sold >by IRISYS (see http://www.irisys.co.uk/ for more information). I saw >one demonstrated at a recent TSCM professional conference and it >looked like a very inexpensive alternative to the $25,000.00 units >(They are being sold on e-bay for around $2,000.00 by a >representative here in the U.S). > >Before rushing out to buy one you should be aware that it is only >supported by the older laptops with the serial interface. Many, if >not most, of the newer laptops are not equipped with serial interface >capabilities and it doesn't seem to work with the PCMCIA cards. If >you are interested in this capability you can use a handheld "Palm >Pilot" type display unit. > >I have been in contact with the dealer in the States and he contacted >the company in the UK and the response was: > > >I would not count on this capability any time soon. > >Best regards > > >I'll keep trying and see if i can get my Palm Pilot i705 to recognize >it.....no luck so far, but it might be because I'm trying to install >it like I would software on a Mac. > >Mostly, I wanted to give you a heads up in the event you are looking at it. > >tim >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell > >What you say in private is your business. Keeping it private is ours. > >Georgia License # PDC 002074 Technical Security Consultants Inc. >Member INTELNET > Espionage Research Institute > Association of Former Office of Special Investigations >Special Agents-Technical Agent >http://www.dbugman.com > >This e-mail is intended for the use of the addressee(s) only and may >contain privileged confidential, or proprietary information that is >exempt from disclosure under law. If you have received this message >in error, please inform us promptly by reply e-mail, then delete the >e-mail and destroy any printed copy. > >Neither this information block, the typed name of the sender, or >anything else in this message is intended to constitute an electronic >signature for purposes of the Uniform Electronic Transactions Act or >the Electronic Signatures in Global and National Commerce Act >(E-Sign) unless a specific statement to the contrary is included in >this message. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. >=================================================== TSKS >Yahoo! Groups Links > > > > ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10984 From: Tim Johnson Date: Mon Feb 7, 2005 4:12pm Subject: Re: TRADEMARKS OF A FOOL James, It's your group and you can post whatever you want, but why not start another Yahoo group for the religious articles. This wasn't the forum for it. Tim Johnson Born a Baptist, raised a Protestant, married to a Catholic and my religious beliefs are my own ands personal. I would hope that you would keep your beliefs to yourself. Hopefully, I won't get bounced for my comment and view. Tim Johnson -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10985 From: Tim Johnson Date: Mon Feb 7, 2005 4:21pm Subject: Re: IRISYS Thermal Imager Thanks for the info. I bought it just to play around with and to see what its capabilities are. It was interesting to see someone place their palm on a table for 2 seconds and to then have the image displayed (we didn't try for time, just for the image, so I have no idea how long it would have been visible. Once (IF) I get it to interface with the Dell PC (without a serial port) I'll do some testing and let the folks on TSCM-L know what the results are. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10986 From: Tim Johnson Date: Mon Feb 7, 2005 4:25pm Subject: Another question on Thermal Imagers I received the following from a member of my private e-mail list and was wondering if any of you have any info you would like to share. tim I'd be interested to know if anyone on your list has tried the MX-1 mini thermal imager. It sells new for about $7,000 and a couple models have sold on Ebay for about $5,000. It appears to be very small, moderately ruggedized (sold to the military), and best of all runs for 7 hours on 2 lithium AA's. What I'd like to know though is how good is the picture? Is it sufficient for TSCM work and able to focus in close range or is it only satisfactory for surveillance and outdoor applications? For those that aren't familiar with this model, here's a link: http://www.nvec-night-vision.com/products/pdf/mx1.pdf -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10987 From: Rob Muessel Date: Mon Feb 7, 2005 4:31pm Subject: RE: Re: IRISYS Thermal Imager If you want to try to detect chip cameras, it might work, but the resolution is so poor that you may not discern the camera from the background if it is placed close to another warm object. Personaly, I'd save my money. I can't see investing in equipment that only does a part of the job and may really give you a false sense of security. Strikes me as a waste. Used Raytheon PalmIR units come on the market once in a while. They should be priced in the US$6-8000 range and will out perform these low-res units by an exponential factor. -- -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 www.tscmtech.com USA -----Original Message----- From: contranl [mailto:contranl@y...] Sent: Monday, February 07, 2005 11:48 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: IRISYS Thermal Imager . Rob/Tim...just to be shure...you are saying that the Irisys units are not usable in TSCM. (since the price is right i like to know for shure) Lets for example look at the possibility to detect cameras, the idea is to see the temperature-difference between the camera-housing) or lens-opening and the surrounding surface/objects. When i understand it well this one will do that if there is a temperature-difference of at least 0.5 degrees (Celcius) (not shure if that is the between sensor-pixels) Since this unit does not have a lot of pixels,both in the sensor and display,it probably does not give you enough resolution for detecting cameras at big distances, for example when you would stand in the middle of a large room and scan the walls and ceilings. What if you get a little closer (for example 3 meters or less ) that would give you a little more work...still not usable ? lets say an average spy-camera housing would be 3 x 3 cm's, a standard lens opening 7 mm's,and a pinhole lens opening 2 mm's, As i understand a pinhole camera hidden in a plastic clock and looking trough a 2 mm hole ,would give a bigger "warmer" area then just the 2 mm hole.it would also warm up the surrounding area. Question 1) How close would you have to be to see them with this low-cost Irisys unit ? Question 2) Some time ago we discussed some units here that were based on optical reflection. (using a laserbeam-reflection to detect optical lenses) Seems to me that this low-cost IR-device is a better choice (for this kind of money) ? For your reference have a look at: http://www.spybusters.com/Infrared.html As you can see the IR-spots visible are not that small and i am not convinced that they would not show up on a Irisys Ok...a more expensive unit would be nice but not neccessary ? Thanks. Tetrascanner http://www.tetrascanner.com http://groups.yahoo.com/group/gsm-scanner http://groups.yahoo.com/group/traffic-cams ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS ---------------------------------------------------------------------------- -- Yahoo! Groups Links a.. To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ b.. To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 10988 From: joe joe Date: Mon Feb 7, 2005 4:34pm Subject: Re: Another question on Thermal Imagers always look for thermal resolution 0.1 degrees celsius or better at 30 degrees celsius object tempurature on the specs of a camera and then you could have something useful for tscm --- Tim Johnson wrote: > I received the following from a member of my private > e-mail list and > was wondering if any of you have any info you would > like to share. > > tim > > > > I'd be interested to know if anyone on your list > has tried the MX-1 > mini thermal imager. It sells new for about $7,000 > and a couple > models have sold on Ebay for about $5,000. It > appears to be very > small, moderately ruggedized (sold to the military), > and best of all > runs for 7 hours on 2 lithium AA's. What I'd like to > know though is > how good is the picture? Is it sufficient for TSCM > work and able to > focus in close range or is it only satisfactory for > surveillance and > outdoor applications? > > For those that aren't familiar with this model, > here's a link: > > http://www.nvec-night-vision.com/products/pdf/mx1.pdf > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10989 From: joe joe Date: Mon Feb 7, 2005 4:36pm Subject: RE: Re: IRISYS Thermal Imager yes and the flir 470 is good also --- Rob Muessel wrote: > If you want to try to detect chip cameras, it might > work, but the resolution > is so poor that you may not discern the camera from > the background if it is > placed close to another warm object. > > Personaly, I'd save my money. I can't see investing > in equipment that only > does a part of the job and may really give you a > false sense of security. > Strikes me as a waste. Used Raytheon PalmIR units > come on the market once > in a while. They should be priced in the US$6-8000 > range and will out > perform these low-res units by an exponential > factor. > > -- -- > Rob Muessel, Director email: > rmuessel@t... > TSCM Technical Services Phone: 203-354-9040 > 11 Bayberry Lane Fax: 203-354-9041 > Norwalk, CT 06851 www.tscmtech.com > USA > > > -----Original Message----- > From: contranl [mailto:contranl@y...] > Sent: Monday, February 07, 2005 11:48 AM > To: TSCM-L@yahoogroups.com > Subject: [TSCM-L] Re: IRISYS Thermal Imager > > > > . > > Rob/Tim...just to be shure...you are saying that > the Irisys units > are not usable in TSCM. > (since the price is right i like to know for > shure) > > Lets for example look at the possibility to detect > cameras, > the idea is to see the temperature-difference > between the > camera-housing) or lens-opening and the > surrounding surface/objects. > When i understand it well this one will do that if > there is a > temperature-difference of at least 0.5 degrees > (Celcius) > (not shure if that is the between sensor-pixels) > > Since this unit does not have a lot of pixels,both > in the sensor and > display,it probably does not give you enough > resolution for detecting > cameras at big distances, for example when you > would stand in the > middle of a large room and scan the walls and > ceilings. > > What if you get a little closer (for example 3 > meters or less ) > that would give you a little more work...still not > usable ? lets say > an average spy-camera housing would be 3 x 3 cm's, > a standard lens opening 7 mm's,and a pinhole lens > opening 2 mm's, > > As i understand a pinhole camera hidden in a > plastic clock and > looking trough a 2 mm hole ,would give a bigger > "warmer" area then > just the 2 mm hole.it would also warm up the > surrounding area. > > > Question 1) > > How close would you have to be to see them with > this low-cost > Irisys unit ? > > > Question 2) > > Some time ago we discussed some units here that > were based on > optical reflection. > (using a laserbeam-reflection to detect optical > lenses) > Seems to me that this low-cost IR-device is a > better choice (for > this kind of money) ? > > > For your reference have a look at: > > http://www.spybusters.com/Infrared.html > > As you can see the IR-spots visible are not that > small and > i am not convinced that they would not show up on > a Irisys > Ok...a more expensive unit would be nice but not > neccessary ? > > > > Thanks. > > Tetrascanner > > http://www.tetrascanner.com > http://groups.yahoo.com/group/gsm-scanner > http://groups.yahoo.com/group/traffic-cams > > > > > > > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is > strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > > =================================================== > TSKS > > > > ---------------------------------------------------------------------------- > -- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an > email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the > Yahoo! Terms of Service. > > > > [Non-text portions of this message have been > removed] > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10990 From: Date: Mon Feb 7, 2005 11:53am Subject: Re: TRADEMARKS OF A FOOL Dropping the reference to Proverbs, There is some very good stuff there, especially considering the postings over the last several months. I've read some very foolish stuff. These are "10 TRADEMARKS of FOOL" 1. The fool rejects to the point of resisting instructions. 2. The fool believes he is always right. Fools are very prideful. 3. Fools are rebellious and they rejoice in and about sins. 4. Fools are quick to run their mouth. 5. A fool is NOT someone to be trusted with responsibilities as they are very unreliable. 6. A fool has a hard time controlling their rage. He is hot-tempered. 7. Fools resist correction. And like the scoffer, may retaliate with hatred toward you. 8. A fool will repeat his mistakes and return to his sins. 9. Fools are reckless with riches and possessions. 10. A fool's folly ruins his life. [Non-text portions of this message have been removed] 10991 From: Tim Johnson Date: Mon Feb 7, 2005 4:42pm Subject: Re: Another question on Thermal Imagers Sorry, Joe Joe. You didn't address the question. He was asking about a specific piece of equipment and if anyone had any personal knowledge of it. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10992 From: Guy Urbina Date: Mon Feb 7, 2005 4:21pm Subject: Re: TRADEMARKS OF A FOOL James, I for one enjoyed the article and found it enlightening and full of common sense. It has applications for the people I work with and for people on this list. \R -Guy ____________________________________________________________ Guy Urbina Defense Sciences Engineering Division Electronics Engineering Lawrence Livermore National Laboratory 7000 East Avenue, Mail Stop L-369 Livermore, CA 94551 USA Voice - (925) 422-6460 Fax - (925) 422-2118 email - urbina1@l... _____________________________________________________________ At 05:12 PM 2/7/2005 -0500, you wrote: >James, > >It's your group and you can post whatever you want, but why not start >another Yahoo group for the religious articles. This wasn't the forum >for it. > >Tim Johnson >Born a Baptist, raised a Protestant, married to a Catholic and my >religious beliefs are my own ands personal. I would hope that you >would keep your beliefs to yourself. > >Hopefully, I won't get bounced for my comment and view. > >Tim Johnson >-- 10993 From: wiseguypi Date: Mon Feb 7, 2005 4:37pm Subject: 2005 Cybercrime Summit Slightly off topic, but the Atlanta Chapter of the HTCIA is again hosting the 2005 Southeast Cybercrime Summit in metro Atlanta. www.atlccs.com. The Summit is a 4 day conference covering computer security, and other computer forensic related issues. Over 70 speakers are presenting this year. It would be a challenge to find this many topics covered in one conference, and impossible to find it open to everyone for such a low price. Price is $249.00 for the 4 days. Hope to see some of you there. Steven Wisenburg 10994 From: Thomas Jones Date: Mon Feb 7, 2005 5:26pm Subject: OSCOR comments from REI I try hard to honor the intent of this list and not use it as a marketing forum, but in monitoring the list, there were some comments from "tensor66B" about the OSCOR that I felt need to be clarified. 1. Our selling policy on the OSCOR has changed. For many years, the OPC software was an option that had to be purchased separately. However, in our new 5.0 version, the OSCOR hardware was upgraded for faster sweep times (to help address burst transmitters), the price was increased on the OSCOR, and the OPC software is now free. All of the password protection and licensing has removed from the OPC 5.0 software. But, it can only be used with OSCOR hardware that is upgraded to 5.0 level. 2. Please understand that our trace analysis methodology is a different approach than relying on expensive Time Domain analysis. OSCOR CAN capture evidence of burst transmissions for a very wide range of burst characteristics. It cannot demodulate, decode, or decrypt the burst information (even very expensive systems will have difficulty with this), and it is certainly not expected to capture every transmission event. It is not the intent to capture every event but to capture enough to use trace analysis to simply display the evidence that the event occurred and identify the frequency of transmission. One device that we have tested extensively has burst times between 30msec and 231msec. Using trace analysis, it takes about 30 minutes for good reliability to find this device while sweeping from 500KHz to 21GHz. Also, we use High-End Signal Generators to simulate other user defined burst characteristics so that it is easy to learn the capabilities and limitations of the OSCOR system. If you would like to learn more about how the OSCOR can do this, please attend our training courses or simply arrange a time for a visit. I would personally be happy to explain and demonstrate burst detection. It does work, and it does not even require the FREE OPC software to do this. 3. On the video demodulation, you are simply miss-informed. The maximum audio bandwidth is 250KHz, but the VIDEO bandwidth for demodulation is 6MHz. It is misleading to some people because the user selectable bandwidths for audio do not include the video bandwidth. The video bandwidth is automatically used when video demodulation is turned on. There has been a lot of assumption and misunderstanding about our products on this list. If you have questions, I hope that you will contact us directly for clarification. I cannot promise that I will personally address everyone, but we will work hard to ensure that you understand the products. If you would like subscribe to our newsletter in which some of the above issues have previously been discussed and published, please contact REI at "newsletter@r...". 10995 From: joe joe Date: Mon Feb 7, 2005 6:16pm Subject: Re: Another question on Thermal Imagers yes i did maybe you should reread what i wrote..i said check the specs and i gave which specs are good for tscm work..on that particular thermal, if you do check the specs i beleive you could know if its good or not --- Tim Johnson wrote: > Sorry, Joe Joe. You didn't address the question. > > He was asking about a specific piece of equipment > and if anyone had > any personal knowledge of it. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > MemberINTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail 10996 From: James M. Atkinson Date: Mon Feb 7, 2005 6:28pm Subject: Re: IRISYS Thermal Imager Tim, You might also want to pickup a Sony Nightshot/0 lux camcorder. No, really... I am serious. The Nightshot series of camcorders can be modified to force the unit into full time IR mode, and with removal of the hot filter that is in front of the CCD element you can have a fairly decent performance thermal or at least near thermal imaging system. It may not be a quarter of a degree of resolution, but it does provide something usable. Yes, it is primary designed to be an infrared camera, but the hot filter is actually a thermal low pass filter that when removed can be used for a wicked cheap thermal camera as you get to open up the CCD element to higher frequency light. You can also enhance the effect by illuminating the area that you are inspecting with a I/R spotlight with a 900 nm high pass filter. A small board camera hidden in a ceiling tile, or a pinhole microphone concealed in a wall will be quite obvious with this kind of system, and the results will be in a monochrome and not fancy color, but on the plus side you can put together a system for less than a few hundred bucks. Also, when using a thermal camera use a ***BIG*** display and not the cheesy little 2 or 3 inch micro-monitors they typically include. Set up something that is at least a 10 inch display or larger and don't be bashful about using a 15-17 inch LCD panel or video projector. You can even run the monitor in black-and-white mode and add in a small video amplifier to tweak up the contrast so that you can better see the slight anomalies. Don't expect to use a thermal system from more than 6-8 feet away from the thing that you are inspecting, and try to be within four feet or less. You will find it easier to find nasty goodies if you can rapidly drop the room temperature while you keep the wall or ceiling you are inspecting warmer. The ideal thermal system to use is one that is used to observe biological functions and not one used for mechanical systems and those used by electricians to examine transformers, motors, and breaker panels. Our primary interest is typically between 60 or 70 and 90 or 110 degree's F, and we typically would like to be able to detect a difference of a tenth of a degree or better. We want a system that can see the heat difference caused by a breath being exhaled, and then watch the eddies and currents are the heat curls though the air. The industrial units are fine if you are looking for a bug hidden in a molten pool of steel at the bottom of a blast furnace, or if you are trying to measure a the heat produced by a light bulb. -jma At 05:21 PM 2/7/2005, Tim Johnson wrote: >Thanks for the info. > >I bought it just to play around with and to see what its capabilities >are. It was interesting to see someone place their palm on a table >for 2 seconds and to then have the image displayed (we didn't try for >time, just for the image, so I have no idea how long it would have >been visible. > >Once (IF) I get it to interface with the Dell PC (without a serial >port) I'll do some testing and let the folks on TSCM-L know what the >results are. > >Tim >-- > >Tim Johnson > >Technical Security Consultants Inc. >PO Box 1295 >Carrollton, GA 30112 >770-836-4898 >770-712-2164 Cell ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 10997 From: joe joe Date: Mon Feb 7, 2005 6:48pm Subject: Re: IRISYS Thermal Imager hello james this was your quote," Our primary interest is typically between 60 or 70 and 90 or 110 degree's F, and we typically would like to be able to detect a difference of a tenth of a degree or better."..hmmmm sounds exactly like what i said huh?...you like to steal ideas from me,lol just kidding --- "James M. Atkinson" wrote: > Tim, > > You might also want to pickup a Sony Nightshot/0 lux > camcorder. > > No, really... I am serious. > > The Nightshot series of camcorders can be modified > to force the unit into > full time IR mode, and with removal of the hot > filter that is in front of > the CCD element you can have a fairly decent > performance thermal or at > least near thermal imaging system. It may not be a > quarter of a degree of > resolution, but it does provide something usable. > > Yes, it is primary designed to be an infrared > camera, but the hot filter is > actually a thermal low pass filter that when removed > can be used for a > wicked cheap thermal camera as you get to open up > the CCD element to higher > frequency light. You can also enhance the effect by > illuminating the area > that you are inspecting with a I/R spotlight with a > 900 nm high pass > filter. A small board camera hidden in a ceiling > tile, or a pinhole > microphone concealed in a wall will be quite obvious > with this kind of > system, and the results will be in a monochrome and > not fancy color, but on > the plus side you can put together a system for less > than a few hundred bucks. > > Also, when using a thermal camera use a ***BIG*** > display and not the > cheesy little 2 or 3 inch micro-monitors they > typically include. Set up > something that is at least a 10 inch display or > larger and don't be bashful > about using a 15-17 inch LCD panel or video > projector. You can even run the > monitor in black-and-white mode and add in a small > video amplifier to tweak > up the contrast so that you can better see the > slight anomalies. > > Don't expect to use a thermal system from more than > 6-8 feet away from the > thing that you are inspecting, and try to be within > four feet or less. You > will find it easier to find nasty goodies if you can > rapidly drop the room > temperature while you keep the wall or ceiling you > are inspecting warmer. > > The ideal thermal system to use is one that is used > to observe biological > functions and not one used for mechanical systems > and those used by > electricians to examine transformers, motors, and > breaker panels. Our > primary interest is typically between 60 or 70 and > 90 or 110 degree's F, > and we typically would like to be able to detect a > difference of a tenth of > a degree or better. We want a system that can see > the heat difference > caused by a breath being exhaled, and then watch the > eddies and currents > are the heat curls though the air. > > The industrial units are fine if you are looking for > a bug hidden in a > molten pool of steel at the bottom of a blast > furnace, or if you are trying > to measure a the heat produced by a light bulb. > > -jma > > > > > > At 05:21 PM 2/7/2005, Tim Johnson wrote: > > >Thanks for the info. > > > >I bought it just to play around with and to see > what its capabilities > >are. It was interesting to see someone place their > palm on a table > >for 2 seconds and to then have the image displayed > (we didn't try for > >time, just for the image, so I have no idea how > long it would have > >been visible. > > > >Once (IF) I get it to interface with the Dell PC > (without a serial > >port) I'll do some testing and let the folks on > TSCM-L know what the > >results are. > > > >Tim > >-- > > > >Tim Johnson > > > >Technical Security Consultants Inc. > >PO Box 1295 > >Carrollton, GA 30112 > >770-836-4898 > >770-712-2164 Cell > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and > Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson > Phone: (978) 381-9111 > Granite Island Group Fax: > > 127 Eastern Avenue #291 > Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent > Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory > Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com 10998 From: Tim Johnson Date: Mon Feb 7, 2005 7:03pm Subject: Re: Another question on Thermal Imagers Joe Joe, He asked three specific questions. 1. Do you have personal knowledge of the equipment? 2. How good is the picture? 3. Is it sufficient for TSCM work and able to focus in close range or is it only satisfactory for surveillance and outdoor applications? If I was familiar with that Imager, I would have answered the questions he posed. At any rate, i passed on your comment for him to look at. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 10999 From: Michael Dever Date: Mon Feb 7, 2005 7:07pm Subject: SONY 0LUX CAMCORDER Jim, You mentioned in your last post: "The Nightshot series of camcorders can be modified to force the unit into full time IR mode, and with removal of the hot filter that is in front of the CCD element you can have a fairly decent performance thermal or at least near thermal imaging system..." I am aware of how to remove an IR filter but are the other modifications you speak of electronic? If so are they published anywhere or is the information proprietary? Regards Mike Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 11000 From: Tim Johnson Date: Mon Feb 7, 2005 7:36pm Subject: Re: IRISYS Thermal Imager Thanks again for the input. That is the reason I'm trying to get the Dell PC Laptop to work with it; it has the 15 inch display. I think I have a USB to Serial Connector and will try again this weekend when the computer geek comes home. I have a Palm Pilot I could use, but am intimately familiar with the lack of resolution with a small display. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 11001 From: James M. Atkinson Date: Mon Feb 7, 2005 7:34pm Subject: Re: TRADEMARKS OF A FOOL Tim, I appreciate your thoughts on the subject matter, and you do not ever have to worry about getting bounced off the list expressing your view or for adding a comment to a subject matter. My posting from Proverbs was more of philosophical nature and a bit of wisdom as opposed to a discussion on the finer point of transubstantiation as opposed to consubstantiation or an analysis on the number of angel that can dance on the head of a pin. So as not to offend were are a few more pearls of wisdom from a variety of other sources: ------------------------------------------------ George Washington Quotes "Government is not reason. It is not eloquence. It is a force, like fire: a dangerous servant and a terrible master". "A free people ought...to be armed..." "Can it be that Providence has not connected the permanent felicity of a nation with its virtue? " "There is nothing which can better deserve our patronage than the promotion of science and literature. Knowledge is in every country the surest basis of public happiness." "Liberty, when it begins to take root, is a plant of rapid growth." "The aggregate happiness of the society, which is best promoted by the practice of a virtuous policy, is, or ought to be, the end of all government . . . ." "Human rights can only be assured among a virtuous people. The general government . . . can never be in danger of degenerating into a monarchy, an oligarchy, an aristocracy, or any despotic or oppressive form so long as there is any virtue in the body of the people." "Of all the dispositions and habits, which lead to political prosperity, Religion and Morality are indispensable supports. In vain would that man claim the tribute of Patriotism, who should labor to subvert these great pillars of human happiness, these firmest props of the duties of Men and Citizens. The mere Politician, equally with the pious man, ought to respect and to cherish them." "A volume could not trace all their connexions with private and public felicity. Let it simply be asked, Where is the security for property, for reputation, for life, if the sense of religious obligation desert the oaths, which are the instruments of investigation in Courts of Justice? And let us with caution indulge the supposition, that morality can be maintained without religion. Whatever may be conceded to the influence of refined education on minds of peculiar structure, reason and experience both forbid us to expect, that national morality can prevail in exclusion of religious principle." "The very atmosphere of firearms anywhere and everywhere restrains evil interference -- they deserve a place of honor with all that is good." "Government is not reason, it is not eloquence -- it is force!" "It is substantially true that virtue or morality is a necessary spring of popular government." "It is impossible to account for the creation of the universe without the agency of a Supreme Being. It is impossible to govern the universe without the aid of a Supreme Being. It is impossible to reason without arriving at a Supreme Being. Religion is as necessary to reason as reason is to religion. The one cannot exist without the other. A reasoning being would lose his reason in attempting to account for the great phenomena of nature, had he not a Supreme Being to refer to; and will has it been said, that if there had been no God, mankind would have been obliged to imagine one." "I never mean, unless some particular circumstances should compel it, to possess another slave by purchase, it being among my first wishes to see some plan adopted, by which slavery in this country may be abolished by law." "No people can be bound to acknowledge and adore the invisible hand which conducts the affairs of men more than the people of the United States. Every step by which they have advanced to the character of an independent nation seems to have been distinguished by some token of providential agency." "Ninety-nine percent of the failures come from people who have the habit of making excuses." Albert Einstein Quotes "The important thing is to not stop questioning. " "Imagination is more important than knowledge. " "Great spirits have always encountered violent opposition from mediocre minds" "It is enough for me to contemplate the mystery of conscious life, perpetuating itself through all eternity; to reflect upon the marvelous structure of the Universe; and to try humbly to comprehend even an infinitesimal part of the intelligence manifested in nature." "Only a life lived for others is worth living." "I am enough of an artist to draw freely upon my imagination. Imagination is more important than knowledge. Knowledge is limited. Imagination encircles the world." "Sometimes one pays most for the things one gets for nothing. " "If A equals success, then the formula is: A = X+Y+Z. X is work. Y is play. Z is keep your mouth shut." "There are only two ways to live your life. One is as though nothing is a miracle. The other is as though everything is a miracle." "I do not know with what weapons World War 3 will be fought, but World War 4 will be fought with sticks and stones." "Science without religion is lame, religion without science is blind." "God does not play dice with the universe." "Problems cannot be solved at the same level of awareness that created them." "Few are those who see with their own eyes and feel with their own hearts." "Peace cannot be achieved through violence, it can only be attained through understanding." "When the solution is simple, God is answering." "Where the world ceases to be the scene of our personal hopes and wishes, where we face it as free beings admiring, asking and observing, there we enter the realm of Art and Science" "Watch the stars, and from them learn. "Gravitation can not be held responsible for people falling in love" "In the middle of difficulty lies opportunity." Ben Franklin Quotes "If you'd know the power of money, go and borrow some." "To be intimate with a foolish friend is like going to bed to a razor." "No nation was ever ruined by trade." "Drive thy Business, or it will drive thee." "In this world nothing is certain but death and taxes." "He that falls in love with himself will have no rivals." "Let thy discontent be they secrets; if the world know them 't will despise thee and increase them." "There is no little enemy." "Setting too good an example is a kind of slander seldom forgiven." "Experience keeps a dear school, yet fools will learn in no other." "Avarice and happiness never saw each other, how then should they become acquainted." "Human felicity is produced not so much by great pieces of good fortune that seldom happen, as by little advantages that occur every day." "Where there is Marriage without Love, there will be Love without Marriage." "Write with the learned, pronounce with the vulgar." "Laws too gentle are seldom obeyed; too severe, seldom executed." "God heals, and the doctors take the fee." "A penny saved, is a penny earned." "Necessity never made a good bargain." "Let thy Child's first Lesson be Obedience, and the second will be what thou wilt." "Three may keep a secret, if two of them are dead." "Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety." "If you'd have it done; Go: if not, Send." "Dost thou love life? Then do not squander time; for that's the stuff life is made of." "We must all hang together, or assuredly we shall hang separately." "There never was a good war or a bad peace." "If you Riches are yours, why don't you take them with you to t'other World?" "Be slow in choosing a friend, slower in changing." "There is no little enemy." "Three can keep a secret, if two of them be dead." "Early to bed and early to rise, makes a man healthy wealthy and wise." "Don't throw stones at your neighbors if your own windows are glass." "The cat in gloves catches no mice." "Lost time is never found again." "Necessity never made a good bargain." "The definition of insanity is doing the same thing over and over and expecting different results." "Well done is better than well said." "Better slip with foot than with tongue." "Hide not your talents, they for use were made. What's a sundial in the shade?" Who hath deceived thee so often as thyself? "The heart of the fool is in his mouth, but the mouth of the wise man is in his heart." "The Constitution only gives people the right to pursue happiness. You have to catch it yourself." "Remember, that time is money." "At twenty years of age, the ill reigns; at thirty, the wit; and at forty, the judgement." "Does thou love life? Then do not squander time, for that's the stuff life is made of." "Only a virtuous people are capable of freedom. As nations become more corrupt and vicious, they have more need of masters." "Whatever is begun in anger ends in shame." "I haven't failed, I've found 10,000 ways that don't work." "Energy and persistence conquer all thing. " "Genius without education is like silver in the mine. " "I think vital religion has always suffered when orthodoxy is more regarded than virtue. The scriptures assure me that at the last day we shall not be examined on what we thought but what we did." "I wish it (Christianity) were more productive of good works ... I mean real good works ... not holy-day keeping, sermon-hearing ... or making long prayers, filled with flatteries and compliments despised by wise men, and much less capable of pleasing the Deity." "If you would persuade, you must appeal to interest rather than intellect." "They that will not be counseled, cannot be helped. If you do not hear reason she will rap you on the knuckles." "He that blows the coals in quarrels that he has nothing to do with, has no right to complain if the sparks fly in his face." "Any fool can criticize, condemn and complain and most fools do." "To be thrown upon one's own resources, is to be cast into the very lap of fortune; for our faculties then undergo a development and display an energy of which they were previously unsusceptible." "Hide not your talents. They for use were made. What's a sundial in the shade." "Sloth makes all things difficult, but industry, all things easy. He that rises late must trot all day, and shall scarce overtake his business at night, while laziness travels so slowly that poverty soon overtakes him." "Having been poor is no shame, but being ashamed of it, is." Another wise leader observed the following in the sermo cotidianus: "Vocatus atque non vocatus, Deus aderit", but a few year later another great military leader made a similar comment, "...ego vero, et domus mea colemus Jehovam", and while I agree with both, the later is something I have adopted as my motto. -jma At 05:12 PM 2/7/2005, Tim Johnson wrote: >James, > >It's your group and you can post whatever you want, but why not start >another Yahoo group for the religious articles. This wasn't the forum >for it. > >Tim Johnson >Born a Baptist, raised a Protestant, married to a Catholic and my >religious beliefs are my own ands personal. I would hope that you >would keep your beliefs to yourself. > >Hopefully, I won't get bounced for my comment and view. > >Tim Johnson ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11002 From: Tim Johnson Date: Mon Feb 7, 2005 7:51pm Subject: Re: TRADEMARKS OF A FOOL Now, quotes i can handle. I have a software program of nothing but quotes, as well as Bartlett's book of quotes and etc. I find them educational, informative and fun to drop into responses. Breaks the monotony and confuses the reader as to whether i actually know what I'm talking about. I particularly like the one by Scatman Cruthers; Don't look back; something may be gaining on you. Tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 11003 From: James M. Atkinson Date: Mon Feb 7, 2005 8:13pm Subject: and a light unto my feet The following product line has been brought up a number of times in the past, and I think that it is time to talk about it again. One of the simplest, and most overlooked tools or instruments in a TSCM'er set of equipment is the humble flashlight, or as out British brethren like to called them "Torches". The flashlight will turn up more bugs and/or eavesdropping devices than any other piece of equipment, and is the tool used to confirm the findings of a one of the fancy pieces of laboratory grade test equipment. The powerful, white light Xenon lights works really well, but the batteries tend not to last, they do not suffer abuse well and really run hot which makes then unpleasant to use in tight places. A tungsten bulb flashlight is pretty much out of the question as the red cast obscures details, and saturates the eye (white or green light is better). An LED type of flashlight works amazingly well, but lack the wide spectral response of a Xenon bulb flashlight. On the other hand an LED flashlight will run for extended periods on batteries, the lamps are quite small, they take a lot of abuse before breaking, and you can get them in a wide variety of colors (more on this later). A company called Emissive Energy makes a product line called "Inova" which is a good series of flashlights, and they have a website at: http://www.inovalight.com/ The X0 is a large unit suitable to general purpose illumination as it is about as close to a "white" light as you can get in an LED flashlight. It take CR123 lithium batteries and is small enough so that you can fit several in your pants pocket. The beam is highly focused and concentrated with a nice crisp penumbra. The X1 is much smaller, and runs on only a single AA alkaline battery. One of the great benefits of the X1 is the significantly smaller size which when used with a dental or small inspection mirror let's you get into some really tight spots. The X5 is an interesting product that is similar to the first two models, but it has five LED's in an array and while the white light version less desirable than the X0 or X1 it comes into its own with the UV model that really does a great job. The X1's are available in various colors including White, Blue, Green, and UV and you can buy several in each color for only a few dollars each. The Green unit will give you the greatest resolution and detail but a lot of people find it awkward at first to "see green" until they realize the little things they had previously missed. It is the same situation for using the X5's in UV where you will be amazed by what had previously been invisible to you. I recommend that you buy at least 2 or 3 ea of the X0's in White, 2 ea X5's in UV, 2 ea X1's in each of the following colors available. They can all be obtained via multiple vendors on E-Bay for very little money (in TSCM terms). I would caution you that the UV LED's will seriously harm you unless you take certain safety measures is they as very bright. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11004 From: secretsquirrel_2 Date: Mon Feb 7, 2005 6:51pm Subject: Re: IRISYS Thermal Imager Hi JMA, I'd be interested in seeing any images you may have of the below concept in motion. Theoretically it makes sense, however, would the images produced genuinely be of use for TSCM operations? Also, have you an exact model of the SONY you have done this to, or would any CDD low lux camera do the job? If it really does work, then there are thousands of dollars to save! Thank you! SS --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > Tim, > > You might also want to pickup a Sony Nightshot/0 lux camcorder. > > No, really... I am serious. > > The Nightshot series of camcorders can be modified to force the unit into > full time IR mode, and with removal of the hot filter that is in front of > the CCD element you can have a fairly decent performance thermal or at > least near thermal imaging system. It may not be a quarter of a degree of > resolution, but it does provide something usable. > > Yes, it is primary designed to be an infrared camera, but the hot filter is > actually a thermal low pass filter that when removed can be used for a > wicked cheap thermal camera as you get to open up the CCD element to higher > frequency light. You can also enhance the effect by illuminating the area > that you are inspecting with a I/R spotlight with a 900 nm high pass > filter. A small board camera hidden in a ceiling tile, or a pinhole > microphone concealed in a wall will be quite obvious with this kind of > system, and the results will be in a monochrome and not fancy color, but on > the plus side you can put together a system for less than a few hundred bucks. > > Also, when using a thermal camera use a ***BIG*** display and not the > cheesy little 2 or 3 inch micro-monitors they typically include. Set up > something that is at least a 10 inch display or larger and don't be bashful > about using a 15-17 inch LCD panel or video projector. You can even run the > monitor in black-and-white mode and add in a small video amplifier to tweak > up the contrast so that you can better see the slight anomalies. > > Don't expect to use a thermal system from more than 6-8 feet away from the > thing that you are inspecting, and try to be within four feet or less. You > will find it easier to find nasty goodies if you can rapidly drop the room > temperature while you keep the wall or ceiling you are inspecting warmer. > > The ideal thermal system to use is one that is used to observe biological > functions and not one used for mechanical systems and those used by > electricians to examine transformers, motors, and breaker panels. Our > primary interest is typically between 60 or 70 and 90 or 110 degree's F, > and we typically would like to be able to detect a difference of a tenth of > a degree or better. We want a system that can see the heat difference > caused by a breath being exhaled, and then watch the eddies and currents > are the heat curls though the air. > > The industrial units are fine if you are looking for a bug hidden in a > molten pool of steel at the bottom of a blast furnace, or if you are trying > to measure a the heat produced by a light bulb. > > -jma > > > > > > At 05:21 PM 2/7/2005, Tim Johnson wrote: > > >Thanks for the info. > > > >I bought it just to play around with and to see what its capabilities > >are. It was interesting to see someone place their palm on a table > >for 2 seconds and to then have the image displayed (we didn't try for > >time, just for the image, so I have no idea how long it would have > >been visible. > > > >Once (IF) I get it to interface with the Dell PC (without a serial > >port) I'll do some testing and let the folks on TSCM-L know what the > >results are. > > > >Tim > >-- > > > >Tim Johnson > > > >Technical Security Consultants Inc. > >PO Box 1295 > >Carrollton, GA 30112 > >770-836-4898 > >770-712-2164 Cell > > > -------------------------------------------------------------------- -------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > -------------------------------------------------------------------- -------------------------------- > James M. Atkinson Phone: (978) 546- 3803 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > -------------------------------------------------------------------- -------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > -------------------------------------------------------------------- -------------------------------- 11005 From: Charles Patterson Date: Tue Feb 8, 2005 0:00am Subject: Re: Re: Anyone know this new Yahoo-group (Email-tracer) That's a Ralph Thomas group. He's got a gizillion PI news groups and other pi related web sites. Easy for him to get 592 members in one day. Charles ----- Original Message ----- From: "contranl" To: Sent: Monday, February 07, 2005 3:28 PM Subject: [TSCM-L] Re: Anyone know this new Yahoo-group (Email-tracer) > > . > > Funny they exist only one day...and already have 592 members...i am > shure that is not possible. > (unless they use some tricks as Jim mentioned before) > > So probably these are they good guys to talk to since they > are "cheating" even before they've started :) > > > Tetrascanner > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > > -------------------------------------------------------------------------------- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 11006 From: Intercept Investigations Date: Mon Feb 7, 2005 11:23pm Subject: Re: Anyone know this new Yahoo-group (Email-tracer) From past experience with this so called 'professional organization', I'd have to say that since it's operated by 'NAIS', then it's only purpose is to bombard you with their advertising in an effort to sell you something - usually books and/or training certificates (read a book, get a 'certificate of completion'), etc. -- Steven W. Gudin, Director Intercept Investigations 700 NW Gilman Blvd. # 463 Issaquah (Seattle), WA 98027 Tel: (425) 313-1776 Fax: (425) 313-1875 Web: www.InterceptInvestigations.com Email: mail@I... Nevada License # 847 California License # (pending) Washington License # 602225499 NATIONWIDE & INTERNATIONAL INVESTIGATION SERVICES 11007 From: A Grudko Date: Tue Feb 8, 2005 1:14am Subject: RE: TRADEMARKS OF A FOOL -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > The Book of Proverbs deals with many different topics that relate to every day life. Author? Andy Grudko (British), DPM, Grad IS (South Africa) MIS/Grudko Associates, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , agrudko@i... Pretoria HO (+27 12) 244 0255 - 244 0256 (Fax) Branches: Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Mid Rand (+27 11) 318 1451 - 318 6846(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" ---------- Internal Virus Database is out-of-date. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.4 - Release Date: 2005/02/01 [Non-text portions of this message have been removed] 11008 From: Date: Tue Feb 8, 2005 5:13am Subject: Re: IRISYS Thermal Imager Tim and all, I have been using the IRISYS since around Oct of last year and it was the one we looked at at the conference in November. It is again like the Oscar and Spectrum analyzer's, good old mark one eyeball, a tool for the professional. I was disapointed with the capabilities of the IRISYS for possible use as a TSCM tool. But it is useful in determining hot spots for electrical wiring or circuit breakers which I think it was originally designed for. After seeing other units such as FLIR, Raython units and the palm IR, the IRISYS falls short of those capabilities. We did some tests witht the unit at the november conference and it jsut did not measure up to the quality of the other units but again its specs also tell you that. I was not up to IR requirments and took the chance and purchased the unit. I am now utilizing it with an master electrician for other uses such as determinging possible problems with older panels and alike, it does wellin some of those cases. I feel if they (IRISYS) would do a bit more such as making the lens capable of adjustment and get the sensitivity to an appreciable leverl for us to use it as a tool for TSCM it will be a good product but I am sure the cost would go up to. Bill Rhoads 11009 From: joe joe Date: Tue Feb 8, 2005 6:42am Subject: Re: Re: IRISYS Thermal Imager what james stated about the mod to the sony will work but it will almost be like using the irisys, it really falls short of a thermo for tscm use, unless the eavesdropper wants to use a car battery with a transmitter hidden somewhere then yes it will probably find it --- secretsquirrel_2 wrote: > > > Hi JMA, > > I'd be interested in seeing any images you may have > of the below > concept in motion. Theoretically it makes sense, > however, would the > images produced genuinely be of use for TSCM > operations? > > Also, have you an exact model of the SONY you have > done this to, or > would any CDD low lux camera do the job? > > If it really does work, then there are thousands of > dollars to save! > > Thank you! > > SS > > > --- In TSCM-L@yahoogroups.com, "James M. Atkinson" > wrote: > > Tim, > > > > You might also want to pickup a Sony Nightshot/0 > lux camcorder. > > > > No, really... I am serious. > > > > The Nightshot series of camcorders can be modified > to force the > unit into > > full time IR mode, and with removal of the hot > filter that is in > front of > > the CCD element you can have a fairly decent > performance thermal or > at > > least near thermal imaging system. It may not be a > quarter of a > degree of > > resolution, but it does provide something usable. > > > > Yes, it is primary designed to be an infrared > camera, but the hot > filter is > > actually a thermal low pass filter that when > removed can be used > for a > > wicked cheap thermal camera as you get to open up > the CCD element > to higher > > frequency light. You can also enhance the effect > by illuminating > the area > > that you are inspecting with a I/R spotlight with > a 900 nm high > pass > > filter. A small board camera hidden in a ceiling > tile, or a pinhole > > microphone concealed in a wall will be quite > obvious with this kind > of > > system, and the results will be in a monochrome > and not fancy > color, but on > > the plus side you can put together a system for > less than a few > hundred bucks. > > > > Also, when using a thermal camera use a ***BIG*** > display and not > the > > cheesy little 2 or 3 inch micro-monitors they > typically include. > Set up > > something that is at least a 10 inch display or > larger and don't be > bashful > > about using a 15-17 inch LCD panel or video > projector. You can even > run the > > monitor in black-and-white mode and add in a small > video amplifier > to tweak > > up the contrast so that you can better see the > slight anomalies. > > > > Don't expect to use a thermal system from more > than 6-8 feet away > from the > > thing that you are inspecting, and try to be > within four feet or > less. You > > will find it easier to find nasty goodies if you > can rapidly drop > the room > > temperature while you keep the wall or ceiling you > are inspecting > warmer. > > > > The ideal thermal system to use is one that is > used to observe > biological > > functions and not one used for mechanical systems > and those used by > > electricians to examine transformers, motors, and > breaker panels. > Our > > primary interest is typically between 60 or 70 and > 90 or 110 > degree's F, > > and we typically would like to be able to detect a > difference of a > tenth of > > a degree or better. We want a system that can see > the heat > difference > > caused by a breath being exhaled, and then watch > the eddies and > currents > > are the heat curls though the air. > > > > The industrial units are fine if you are looking > for a bug hidden > in a > > molten pool of steel at the bottom of a blast > furnace, or if you > are trying > > to measure a the heat produced by a light bulb. > > > > -jma > > > > > > > > > > > > At 05:21 PM 2/7/2005, Tim Johnson wrote: > > > > >Thanks for the info. > > > > > >I bought it just to play around with and to see > what its > capabilities > > >are. It was interesting to see someone place > their palm on a table > > >for 2 seconds and to then have the image > displayed (we didn't try > for > > >time, just for the image, so I have no idea how > long it would have > > >been visible. > > > > > >Once (IF) I get it to interface with the Dell PC > (without a serial > > >port) I'll do some testing and let the folks on > TSCM-L know what > the > > >results are. > > > > > >Tim > > >-- > > > > > >Tim Johnson > > > > > >Technical Security Consultants Inc. > > >PO Box 1295 > > >Carrollton, GA 30112 > > >770-836-4898 > > >770-712-2164 Cell > > > > > > > -------------------------------------------------------------------- > -------------------------------- > > We Expertly Hunt Real Spies, Real Eavesdroppers, > and Real > Wiretappers. > > > -------------------------------------------------------------------- > -------------------------------- > > James M. Atkinson > Phone: (978) 546- > 3803 > > Granite Island Group Fax: > > > 127 Eastern Avenue #291 > Web: > http://www.tscm.com/ > > Gloucester, MA 01931-8008 Email: > mailto:jmatk@tscm.com > > > -------------------------------------------------------------------- > -------------------------------- > > World Class, Professional, Ethical, and > Competent Bug Sweeps, and > > Wiretap Detection using Sophisticated Laboratory > Grade Test > === message truncated === __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 11010 From: G P Date: Tue Feb 8, 2005 7:02am Subject: RE: TRADEMARKS OF A FOOL Solomon, Son of David? --- A Grudko wrote: > -----Original Message----- > From: James M. Atkinson [mailto:jmatk@tscm.com] > >> The Book of Proverbs deals with many different >> topics that relate to every day life. > > Author? > > Andy Grudko (British), DPM, Grad IS (South Africa) 11011 From: jtowler Date: Tue Feb 8, 2005 6:22am Subject: RE: and a light unto my feet James, An interesting post, but can you write a little more on the subject please: Q: What might you see using UV, in a TSCM context, that you might not otherwise? Q: Same question, but for green, which you say offers finer detail? Q: More details please on the "take certain safety measures" re the bright UV leds? Etc, and so on, for any additional comments you might wish to add re using light, and different colours (Sorry: colors :-). Regards, Jim Towler -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Tuesday, 8 February 2005 3:14 p.m. To: TSCM-L Subject: [TSCM-L] and a light unto my feet The following product line has been brought up a number of times in the past, and I think that it is time to talk about it again. One of the simplest, and most overlooked tools or instruments in a TSCM'er set of equipment is the humble flashlight, or as out British brethren like to called them "Torches". The flashlight will turn up more bugs and/or eavesdropping devices than any other piece of equipment, and is the tool used to confirm the findings of a one of the fancy pieces of laboratory grade test equipment. The powerful, white light Xenon lights works really well, but the batteries tend not to last, they do not suffer abuse well and really run hot which makes then unpleasant to use in tight places. A tungsten bulb flashlight is pretty much out of the question as the red cast obscures details, and saturates the eye (white or green light is better). An LED type of flashlight works amazingly well, but lack the wide spectral response of a Xenon bulb flashlight. On the other hand an LED flashlight will run for extended periods on batteries, the lamps are quite small, they take a lot of abuse before breaking, and you can get them in a wide variety of colors (more on this later). A company called Emissive Energy makes a product line called "Inova" which is a good series of flashlights, and they have a website at: http://www.inovalight.com/ The X0 is a large unit suitable to general purpose illumination as it is about as close to a "white" light as you can get in an LED flashlight. It take CR123 lithium batteries and is small enough so that you can fit several in your pants pocket. The beam is highly focused and concentrated with a nice crisp penumbra. The X1 is much smaller, and runs on only a single AA alkaline battery. One of the great benefits of the X1 is the significantly smaller size which when used with a dental or small inspection mirror let's you get into some really tight spots. The X5 is an interesting product that is similar to the first two models, but it has five LED's in an array and while the white light version less desirable than the X0 or X1 it comes into its own with the UV model that really does a great job. The X1's are available in various colors including White, Blue, Green, and UV and you can buy several in each color for only a few dollars each. The Green unit will give you the greatest resolution and detail but a lot of people find it awkward at first to "see green" until they realize the little things they had previously missed. It is the same situation for using the X5's in UV where you will be amazed by what had previously been invisible to you. I recommend that you buy at least 2 or 3 ea of the X0's in White, 2 ea X5's in UV, 2 ea X1's in each of the following colors available. They can all be obtained via multiple vendors on E-Bay for very little money (in TSCM terms). I would caution you that the UV LED's will seriously harm you unless you take certain safety measures is they as very bright. -jma ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT _____ Yahoo! Groups Links *To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ *To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com *Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . From: jtowler Date: Tue Feb 8, 2005 7:13am Subject: RE: TRADEMARKS OF A FOOL Comment below ... -----Original Message----- From: A Grudko [mailto:agrudko@i...] Sent: Tuesday, 8 February 2005 8:14 p.m. To: TSCM-L@yahoogroups.com Subject: RE: [TSCM-L] TRADEMARKS OF A FOOL -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] > The Book of Proverbs deals with many different topics that relate to every day life. Author? Assuming a genuine question, the book of Proverbs is one of the books in the Old Testament of the Bible. In its own words, from the first line, it is the "... Proverbs of Solomon, the son of David, King of Israel". Authors: "Solomon is generally credited with writing a large number of the Proverbs. It is probable that even these were not all original with him. Chapters 30 and 31 are the words of Agur and Lemuel." - Notes on the book of Proverbs, The Thompson Chain-Reference Bible (TCR). (c) NIV, 1983. Solomon lived approx 1015 to 975 BC according to notes in the Thompson Chain-Reference, who seems to be quoting "Ussher" for some of the older dates. His dad, David, lived 1055 to 1015 BC per the same source. An alternative source I have, gives dates for David as c. (circa/about) 1000-960 BC and Solomon as c. 970-930 BC. Is is considered that Solomon turned from his wisdom in his later years. His son Rehoboam, even more so, and ... became a foolish and evil ruler. - TCR. However, there is much wisdom contained in the writings and can even be "fun" to read parts of it. Example: "Gold there is, and rubies in abundance, but lips that speak knowledge are a rare jewel." Consider that when you read things on the internet or in your emails, or maybe the replies to this post if people don't opt to ignore or accept this answer in the good faith it is offered with. Regards, Jim Towler Wellington New Zealand. [Non-text portions of this message have been removed] 11013 From: Nalesnik, Matthew Date: Tue Feb 8, 2005 7:42am Subject: RE: TRADEMARKS OF A FOOL I second that. Would love another posting such as that, James. Thanks. -----Original Message----- From: Guy Urbina [mailto:urbina1@l...] Sent: Monday, February 07, 2005 5:21 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] TRADEMARKS OF A FOOL James, I for one enjoyed the article and found it enlightening and full of common sense. It has applications for the people I work with and for people on this list. \R -Guy ____________________________________________________________ Guy Urbina Defense Sciences Engineering Division Electronics Engineering Lawrence Livermore National Laboratory 7000 East Avenue, Mail Stop L-369 Livermore, CA 94551 USA Voice - (925) 422-6460 Fax - (925) 422-2118 email - urbina1@l... _____________________________________________________________ At 05:12 PM 2/7/2005 -0500, you wrote: >James, > >It's your group and you can post whatever you want, but why not start >another Yahoo group for the religious articles. This wasn't the forum >for it. > >Tim Johnson >Born a Baptist, raised a Protestant, married to a Catholic and my >religious beliefs are my own ands personal. I would hope that you >would keep your beliefs to yourself. > >Hopefully, I won't get bounced for my comment and view. > >Tim Johnson >-- ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 11014 From: Nalesnik, Matthew Date: Tue Feb 8, 2005 7:47am Subject: RE: Another question on Thermal Imagers How about Tim Johnson and Joe Joe take their little fight offline/private? It's been quite a number of postings since anyone else jumped in to agree with either of them, therefore, that makes it a private discussion, and one that I'm sure the majority of people don't want to be involved in. I think they're going to have to coin a new term, "email-rage". -----Original Message----- From: Tim Johnson [mailto:dbugman@d...] Sent: Monday, February 07, 2005 8:04 PM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Another question on Thermal Imagers Joe Joe, He asked three specific questions. 1. Do you have personal knowledge of the equipment? 2. How good is the picture? 3. Is it sufficient for TSCM work and able to focus in close range or is it only satisfactory for surveillance and outdoor applications? If I was familiar with that Imager, I would have answered the questions he posed. At any rate, i passed on your comment for him to look at. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS Yahoo! Groups Sponsor ADVERTISEMENT _____ Yahoo! Groups Links * To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ * To unsubscribe from this group, send an email to: TSCM-L-unsubscribe@yahoogroups.com * Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service . [Non-text portions of this message have been removed] 11015 From: SEAN WALSH Date: Tue Feb 8, 2005 10:36am Subject: Re: Re: Anyone know this new Yahoo-group (Email-tracer) Charles, essentially it is a marketing pitch for his sales organization. He is one of the best marketers in the PI industry.... Sean J. Walsh, C.P.I., C.C.V. Walsh & Associates (415)899-9660, Fax (415)898-5500 www.tscm.net PI 18345 11016 From: SEAN WALSH Date: Tue Feb 8, 2005 10:49am Subject: Re: IRISYS Thermal Imager We have been using Thermal cameras on sweeps for awhile now. The Palm IR unit is convenient and passable. We also have an older Hughes/FLIR system that is for medical use. It is bulky and uses Argon gas canisters for cooling. Resolution is incredible and it has it's own CPU/controller and high resolution CRT monitor. The unit is excellent for larger sweeps, but takes time to set-up and another period of time to allow the Argon gas to cool the chip until stabilized. There is an engineer retired from Hughes in Southern CA who still repairs them and has parts as well. Argon gas (medical grade for less H20 content) is required and is stored at 6000 psi. These units pop up on the web occasionally but are probably overkill. Sean J. Walsh, C.P.I., C.C.V. Walsh & Associates (415)899-9660, Fax (415) 480-3198 www.tscm.net PI 18345 11017 From: joe joe Date: Tue Feb 8, 2005 11:05am Subject: RE: Another question on Thermal Imagers lol..actually i am not fighting..believe that :) --- "Nalesnik, Matthew" wrote: > > How about Tim Johnson and Joe Joe take their little > fight offline/private? It's been quite a number of > postings since anyone else jumped in to agree with > either of them, therefore, that makes it a private > discussion, and one that I'm sure the majority of > people don't want to be involved in. > I think they're going to have to coin a new term, > "email-rage". > > -----Original Message----- > From: Tim Johnson [mailto:dbugman@d...] > Sent: Monday, February 07, 2005 8:04 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Another question on Thermal > Imagers > > Joe Joe, > > He asked three specific questions. > > 1. Do you have personal knowledge of the equipment? > > 2. How good is the picture? > > 3. Is it sufficient for TSCM work and able to focus > in close range or > is it only satisfactory for surveillance and outdoor > applications? > > If I was familiar with that Imager, I would have > answered the > questions he posed. > > At any rate, i passed on your comment for him to > look at. > > tim > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > > [Non-text portions of this message have been > removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > =================================================== > TSKS > > > > > > Yahoo! Groups Sponsor > > > ADVERTISEMENT > > > > > > > > > > > _____ > > Yahoo! Groups Links > * To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > * To unsubscribe from this group, send an > email to: > TSCM-L-unsubscribe@yahoogroups.com > > > > * Your use of Yahoo! Groups is subject to > the Yahoo! Terms of Service > . > > > [Non-text portions of this message have been > removed] > > > > > __________________________________ Do you Yahoo!? The all-new My Yahoo! - Get yours free! http://my.yahoo.com 11018 From: joe joe Date: Tue Feb 8, 2005 11:09am Subject: Re: IRISYS Thermal Imager an you post his contact info please? thanks --- SEAN WALSH wrote: > > We have been using Thermal cameras on sweeps for > awhile now. The Palm IR > unit is convenient and passable. We also have an > older Hughes/FLIR system > that is for medical use. It is bulky and uses Argon > gas canisters for > cooling. Resolution is incredible and it has it's > own CPU/controller and > high resolution CRT monitor. The unit is excellent > for larger sweeps, but > takes time to set-up and another period of time to > allow the Argon gas to > cool the chip until stabilized. There is an > engineer retired from Hughes in > Southern CA who still repairs them and has parts as > well. Argon gas > (medical grade for less H20 content) is required and > is stored at 6000 psi. > These units pop up on the web occasionally but are > probably overkill. > > Sean J. Walsh, C.P.I., C.C.V. > Walsh & Associates > (415)899-9660, Fax (415) 480-3198 > www.tscm.net > PI 18345 > > > > > __________________________________ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo 11019 From: Scott Malcolm Date: Tue Feb 8, 2005 1:02pm Subject: Re: TRADEMARKS OF A FOOL Tim, When it comes to religious beliefs try to remember, "You don't have to be the birthday boy to come to the party" Regards, Scott Malcolm Malcolm & Associates, Inc. Serving the State of Wisconsin http://www.malcolm-associates.com Office 262 965 4426 Fax 262 965 4629 _________________________________________________ : Message: 11 : Date: Mon, 7 Feb 2005 17:12:44 -0500 : From: Tim Johnson : Subject: Re: TRADEMARKS OF A FOOL : : James, : : It's your group and you can post whatever you want, but why not start : another Yahoo group for the religious articles. This wasn't the forum : for it. : : Tim Johnson : Born a Baptist, raised a Protestant, married to a Catholic and my : religious beliefs are my own ands personal. I would hope that you : would keep your beliefs to yourself. : : Hopefully, I won't get bounced for my comment and view. : : Tim Johnson 11020 From: fromagebubble Date: Tue Feb 8, 2005 1:13pm Subject: Re: Stolen Equipment Alert --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > A large quantity of TSCM equipment was stolen from someone a short time Sounds like an inside job, or a person that knows this someone and took their gear? It's not likely the common street hood would know about or appreciate these things. > please let me know privately and I will ensure the appropriate authorities > are notified, and that you are put in touch with the victim so you can > return their property. Are you handling the case? I recently contacted a guy in Washington (State) about a "WiNRADiO" product I am interested in for sweeping RF in our data center. He is selling model WR-3500 for $500, it has a list of $2500 I think. It seems like an outlandish deal! Thanks, Mel 11021 From: Tim Johnson Date: Tue Feb 8, 2005 4:03pm Subject: An apology to the TSCM-L group members I apologize to the list for my recent interaction with Joe Joe. I probably shouldn't have wasted my time or yours in trying to explain something that should have been evident either time. But, I took the extra time because (and I may be wrong) it came across that his native language isn't English and i was concerned he didn't understand what I was trying to say. I haven't been a member of this group long enough to be able to recognize the TSCM professionals and the others who are there to try to pick up information and learn more about the profession. Regardless of whether he is a native English speaker or from another country, I will restrain myself in the future and let him read into a post whatever he wants. I, personally, feel that it is a disservice to anyone who posts a comment or question to ignore them. I have always gone out of my way to educate and/or enlighten those seeking information or posting what is probably erroneous information. But in this instance, based on the comment of other list members, I'll make an exception. For what it is worth, I believe Joe Joe contacted me several weeks or so ago via e-mail (his e-mail address looks familiar and information he posted to this group sounds like something I provided him in confidence) asking where he could get TSCM training and (I think) gathering information on becoming a PI. I think I answered his questions then, but haven't heard anything back. My only desire is to contribute to a list on which there are TSCM specialists and learn what I can, when I can. If anyone has a problem, comment or complaints, feel free to contact me direct.. Tim Johnson -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. Member INTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. 11022 From: joe joe Date: Tue Feb 8, 2005 4:21pm Subject: Re: An apology to the TSCM-L group members ok tim,lol :) --- Tim Johnson wrote: > I apologize to the list for my recent interaction > with Joe Joe. I > probably shouldn't have wasted my time or yours in > trying to explain > something that should have been evident either time. > But, I took the > extra time because (and I may be wrong) it came > across that his > native language isn't English and i was concerned he > didn't > understand what I was trying to say. I haven't been > a member of this > group long enough to be able to recognize the TSCM > professionals and > the others who are there to try to pick up > information and learn more > about the profession. > > Regardless of whether he is a native English speaker > or from another > country, I will restrain myself in the future and > let him read into a > post whatever he wants. I, personally, feel that it > is a disservice > to anyone who posts a comment or question to ignore > them. I have > always gone out of my way to educate and/or > enlighten those seeking > information or posting what is probably erroneous > information. But in > this instance, based on the comment of other list > members, I'll make > an exception. > > For what it is worth, I believe Joe Joe contacted me > several weeks or > so ago via e-mail (his e-mail address looks familiar > and information > he posted to this group sounds like something I > provided him in > confidence) asking where he could get TSCM training > and (I think) > gathering information on becoming a PI. I think I > answered his > questions then, but haven't heard anything back. > > My only desire is to contribute to a list on which > there are TSCM > specialists and learn what I can, when I can. If > anyone has a > problem, comment or complaints, feel free to contact > me direct.. > > Tim Johnson > > > -- > > Tim Johnson > > Technical Security Consultants Inc. > PO Box 1295 > Carrollton, GA 30112 > 770-836-4898 > 770-712-2164 Cell > > What you say in private is your business. Keeping it > private is ours. > > Georgia License # PDC 002074 Technical Security > Consultants Inc. > Member INTELNET > Espionage Research Institute > Association of Former Office of Special > Investigations > Special Agents-Technical Agent > http://www.dbugman.com > > This e-mail is intended for the use of the > addressee(s) only and may > contain privileged confidential, or proprietary > information that is > exempt from disclosure under law. If you have > received this message > in error, please inform us promptly by reply e-mail, > then delete the > e-mail and destroy any printed copy. > > Neither this information block, the typed name of > the sender, or > anything else in this message is intended to > constitute an electronic > signature for purposes of the Uniform Electronic > Transactions Act or > the Electronic Signatures in Global and National > Commerce Act > (E-Sign) unless a specific statement to the contrary > is included in > this message. > > __________________________________ Do you Yahoo!? Read only the mail you want - Yahoo! Mail SpamGuard. http://promotions.yahoo.com/new_mail 11023 From: moellerthy <1ach@g...> Date: Tue Feb 8, 2005 4:47pm Subject: Re: Stolen Equipment Alert --- In TSCM-L@yahoogroups.com, "fromagebubble" wrote: > > > --- In TSCM-L@yahoogroups.com, "James M. Atkinson" wrote: > > > > A large quantity of TSCM equipment was stolen from someone a short > time > > Sounds like an inside job, or a person that knows this someone and > took their gear? It's not likely the common street hood would know > about or appreciate these things. > I think you are wrong at least in Ohio the druggies are knowledgable of TSCM procedures and many own sweep detection equipment to protect themselfs from body worn mic's. Know your enemy Andre Holmes 1ach@G... > > > please let me know privately and I will ensure the appropriate > authorities > > are notified, and that you are put in touch with the victim so you > can > > return their property. > > Are you handling the case? > > I recently contacted a guy in Washington (State) about a "WiNRADiO" > product I am interested in for sweeping RF in our data center. He is > selling model WR-3500 for $500, it has a list of $2500 I think. It > seems like an outlandish deal! > > Thanks, Mel 11024 From: Hawkspirit Date: Tue Feb 8, 2005 6:15pm Subject: Oscor Yes it was an analog spectrum analyzer. I use an analog analyzer because there is no sampling rate that can interfere with reading pulsed signal sources. I will use a digital analyzer as well for precision measurements. Roger I take it that you used a Spectrum Analyser on your original sweep when you detected the Burst device Regards Dave David McGauley TSCM [Technical Surveillance and Countermeasures] Electronic Surveillance and Sweep Specialist Electrical/Electronics Engineer ex Police Demtec House Ormskirk Lancs L390HF UK 01695558544 07866206112 demtec@a..._ www.demtec.co.uk_ (HYPERLINK "http://www.demtec.co.uk/"http://www.demtec.co.uk/) -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 [Non-text portions of this message have been removed] 11025 From: Hawkspirit Date: Tue Feb 8, 2005 6:15pm Subject: Oscor What would your excuse be to the client if you did not identify one that was present at the tested location? They are out there, I have seen them. Roger. Date: Sat, 5 Feb 2005 22:56:40 +1100 From: Michael Dever Subject: Re: Oscor Speaking of 'burst bugs' - what level of threat do you believe they belong at? That is; professional/amateur, etc. Regards Mike -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 [Non-text portions of this message have been removed] 11026 From: Hawkspirit Date: Tue Feb 8, 2005 6:16pm Subject: Lie detector Police in Radnor, PA interrogated a suspect by placing a metal colander on his head and connecting it with wires to a photocopy machine. The message, "He's lying" was placed in the copier and police pressed the copy button each time they thought the suspect wasn't telling the truth. Believing the "lie detector" was working, the suspect confessed. -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 [Non-text portions of this message have been removed] 11027 From: Tim Johnson Date: Tue Feb 8, 2005 6:23pm Subject: Re: Oscor Roger, I thought I was the only dinosaur that appreciated the analog displays when doing TSCM. Glad to see at leas one other one out there. tim -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 11028 From: Michael Dever Date: Tue Feb 8, 2005 7:35pm Subject: Re: Oscor Roger With respect (please don't get offended), I think you missed the point of my question. I know they exist and we do have protocols for finding them. What I was interested in was: what are the capabilities of potential adversaries who might use a burst bug. This will assist greatly in conducting a threat assessment. I don't know about elsewhere, but here in Australia you won't find burst bugs being sold over the counter, so where do they come from? Yes I know the magic Internet. But seriously, what level of technical expertise do you think is required to design and construct a burst bug? Amateur, amateur radio operator, electronics engineer?? Regards Mike On 09 Feb 2005, at 11:15, Hawkspirit wrote: > What would your excuse be to the client if you did not identify one > that was > present at the tested location? > > They are out there, I have seen them. > > Roger. > Date: Sat, 5 Feb 2005 22:56:40 +1100 > > From: Michael Dever > > Subject: Re: Oscor > Speaking of 'burst bugs' - what level of threat do you believe they > > belong at? > That is; professional/amateur, etc. > Regards > > Mike > Michael J. Dever CPP Dever Clark & Associates GPO Box 1163 Canberra ACT 2601 Australia Voice: +612 6254 5337 Email: dca@b... ************************************************************************ ***** This message is sent in strict confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise the sender immediately of any error in transmission. [Non-text portions of this message have been removed] 11029 From: Hawkspirit Date: Tue Feb 8, 2005 7:55pm Subject: Sweep needed Residential sweep needed in South St. Paul Minnesota. Roger Tolces HYPERLINK "http://www.bugsweeps.com/"www.bugsweeps.com 760-861-7595 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 [Non-text portions of this message have been removed] 11030 From: James M. Atkinson Date: Tue Feb 8, 2005 7:48pm Subject: Terk HDTVi Antenna Here is an antenna that you may want to pick up to evaluate for a very inexpensive, but effective antenna for use during sweeps. http://www.terk.com/HDTVi.html It is a 75 ohm passive antenna, but the UHF log periodic element can be unplugged and used by itself and can be directly plugged into a low noise amplifier by using a long F style connector or even a short cable. I am not impressed with the stand or the VHF section of the antenna, but for 20-30 bucks I was very impressed with the UHF element. Buy the antenna, keep the top log periodic element and throw the rest away. An inexpensive 30-40 dB amplifier will make a big difference when looking for UHF wireless microphones and bugs, and you should be able to connect the output of the amplifier to the 50 ohm input of your spectrum analyzer but you will have to make a modest adjustment to your amplitude measurements if your SA only has a 50 ohm input. The antenna is spec'd from 470 to 894 MHz, but givent he geometry you should be able to use it from 350 to 950 MHz with no problem. -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11031 From: Charles Patterson Date: Tue Feb 8, 2005 9:48pm Subject: Re: Lie detector Cute story Roger, but perhaps not new, may date back to the 60's. see: http://www.snopes.com/legal/colander.htm Perhaps we can use the same technique to help sweep those who are hearing the voices? Carry a small printer and laptop, print out a file that says "Clean". :) Charles ----- Original Message ----- From: "Hawkspirit" To: Sent: Tuesday, February 08, 2005 7:16 PM Subject: [TSCM-L] Lie detector > > > > > Police in Radnor, PA interrogated a suspect by placing a metal colander on > his head and connecting it with wires to a photocopy machine. The > message, > "He's lying" was placed in the copier and police pressed the copy button > each time they thought the suspect wasn't telling the truth. Believing > the > "lie detector" was working, the suspect confessed. > > > > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.5 - Release Date: 2/3/2005 > > > > -- > No virus found in this outgoing message. > Checked by AVG Anti-Virus. > Version: 7.0.300 / Virus Database: 265.8.6 - Release Date: 2/7/2005 > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > =================================================== TSKS > > > Yahoo! Groups Sponsor > ADVERTISEMENT > > > > > > -------------------------------------------------------------------------------- > Yahoo! Groups Links > > a.. To visit your group on the web, go to: > http://groups.yahoo.com/group/TSCM-L/ > > b.. To unsubscribe from this group, send an email to: > TSCM-L-unsubscribe@yahoogroups.com > > c.. Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. > > 11032 From: James M. Atkinson Date: Wed Feb 9, 2005 1:54am Subject: Further Wisdom of the Ages Next time someone implies that something that is part of your future vision is impossible, improbable or even impractical, remember this list. (And perhaps quote them a favorite selection!) Enjoy the "wisdom of the ages". ************************************************* "Computers in the future may weigh no more than 15 tons." --"Popular Mechanics," forecasting the relentless march of science, 1949. ---------------------------------------------------- "I think there is a world market for maybe five computers." --Thomas Watson, chairman of IBM, 1943. ---------------------------------------------------- "I have traveled the length and breadth of this country... and talked with the best people, and I can assure you that data processing is a fad that won't last out the year." --The editor in charge of business books for Prentice Hall, 1957. ------------------------------------------------------ "But what...is it good for ?" -- Engineer at the Advanced Computing Systems Division of IBM commenting on the microchip, 1968. ------------------------------------------------------ "There is no reason anyone would want a computer in their home." --Ken Olson, president, chairman and founder of Digital Equipment Corp., 1977 --------------------------------------------------- "This 'telephone' has too many shortcomings to be seriously considered as a means of communication. The device is inherently of no value to us." -- Western Union internal memo, 1876. ----------------------------------------------------- "The wireless music box has no imaginable commercial value. Who would pay for a message sent to nobody in particular ?" -- David Sarnoff's associates (NBC) in response to his urgings for investment in the radio in the 1920s. --------------------------------------------------- "The concept is interesting and well-formed, but in order to earn better than a 'C,' the idea must be feasible." -- A Yale University management professor in response to Fred Smith's paper proposing reliable overnight delivery service. (Smith went on to found Federal Express Corp.) ----------------------------------------------------- "Who the hell wants to hear actors talk ?" -- Harry M. Warner, Warner Brothers, 1927. ------------------------------------------------------- "I'm just glad it'll be Clark Gable who's falling on his face and not Gary Cooper." --Gary Cooper on his decision not to take the leading role in "Gone with the Wind." ------------------------------------------------------- "A cookie store is a bad idea. Besides, the market research reports say America likes crispy cookies, not soft and chewy cookies like you make." -- Response to Debbi Fields' idea of starting her company, Mrs. Fields' Cookies. ---------------------------------------------------- "We don't like their sound, and guitar music is on the way out." -- Decca Recording Co. rejecting the Beatles, 1962. ------------------------------------------------------ "Heavier-than-air flying machines are impossible." --Lord Kelvin, president, Royal Society, 1895. ----------------------------------------------------- "If I had thought about it, I wouldn't have done the experiment. The literature was full of examples that said you can't do this." -- Spencer Silver, on the work that led to nthe unique adhesives on 3-M "Post-It" Notepads. --------------------------------------------------------- "So we went to Atari and said, 'Hey, we've got this amazing thing, even built with some of your parts, and what do you think about funding us ? Or we'll give it to you. We just want to do it. Pay our salary, we'll come work for you.' And they said, 'No.' So then we went to Hewlett- Packard, and they said, 'Hey, we don't need you; you haven't got through college yet.'" --Apple Computer Inc. founder Steve Jobs on attempts to get Atari and H-P interested in his and Steve Wozniak's personal computer. ------------------------------------------------------- "Professor Goddard does not know the relation between action and reaction... and the need to have something better than a vacuum against which to react. He seems to lack the basic knowledge ladled out daily in high schools." -- New York Times editorial about Robert Goddard's revolutionary rocket work, 1921. ------------------------------------------------------ "You want to have consistent and uniform muscle development across all of your muscles ? It can't be done. It's just a fact of life. You just have to accept inconsistent muscle development as an unalterable condition of weight training." -- Response to Arthur Jones, who solved the "unsolvable" problem by inventing Nautilus. ------------------------------------------------------- "Drill for oil ? You mean drill into the ground to try and find oil ? You're crazy." -- Drillers who Edwin L. Drake tried to enlist to his project to drill for oil in 1859. ------------------------------------------------------ "Stocks have reached what looks like a permanently high plateau." -- Irving Fisher, Professor of Economics, Yale University, 1929. --------------------------------------------------------- "Airplanes are interesting toys but of no military value." -- Marechal Ferdinand Foch, Professor of Strategy, Ecole Superieure de Guerre. -------------------------------------------------------- "Everything that can be invented has been invented." -- Charles H. Duell, Commissioner, U.S. Office of Patents, 1899. ------------------------------------------------------ "Louis Pasteur's theory of germs is ridiculous fiction." --Pierre Pachet, Professor of Physiology at Toulouse, 1872. --------------------------------------------------------- "The abdomen, the chest and the brain will forever be shut from the intrusion of the wise and humane surgeon." --Sir John Eric Ericksen, British surgeon, appointed Surgeon-Extraordinary to Queen Victoria, 1873. --------------------------------------------------------- "640k ought to be enough for anybody." -- Bill Gates, 1981 --------------------------------------------------------- ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11033 From: Tim Johnson Date: Wed Feb 9, 2005 8:28am Subject: More iPod uses I just posted the following to my personal e-mail list and thought it might be of interest to the TSCM-L group. Tim ================ I have over 11 gig of information from my laptop I back up to my 40 gig iPod weekly thru a 2.0 USB cable available form Apple for $19.95. It is the cheapest source of a large file back up I found. I take my iPod as I travel for speeches that use power point presentations and etc. Most all speech places now have a laptop and projector..This also keeps your information safer than loading it to the local available laptop. No need to carry a laptop thru the airport anymore!. ================= For those wondering what other nefarious uses an iPod could be used for, I suggest attending CanSecWest, they are going to have a briefing on hacking with iPods and other Firewire utilities. Firewire/i.Link is well known as a way for connecting video devices or external hard-disks to computers. One little known fact is that the Firewire protocol also allows to read and write physical memory on connected machines without further software support. This can be leveraged to escalate privileges or to spy on connected machines. We will present some fun software using FireWire to do things to computers which shouldn't happen. 0wn3d by an iPod: http://www.cansecwest.com/speakers.html -- Tim Johnson Technical Security Consultants Inc. PO Box 1295 Carrollton, GA 30112 770-836-4898 770-712-2164 Cell What you say in private is your business. Keeping it private is ours. Georgia License # PDC 002074 Technical Security Consultants Inc. MemberINTELNET Espionage Research Institute Association of Former Office of Special Investigations Special Agents-Technical Agent http://www.dbugman.com This e-mail is intended for the use of the addressee(s) only and may contain privileged confidential, or proprietary information that is exempt from disclosure under law. If you have received this message in error, please inform us promptly by reply e-mail, then delete the e-mail and destroy any printed copy. Neither this information block, the typed name of the sender, or anything else in this message is intended to constitute an electronic signature for purposes of the Uniform Electronic Transactions Act or the Electronic Signatures in Global and National Commerce Act (E-Sign) unless a specific statement to the contrary is included in this message. [Non-text portions of this message have been removed] 11034 From: John Young Date: Wed Feb 9, 2005 11:36am Subject: Olney Jim, I'm not sure of the Olney facility location. Could you look at this sat photo on Terraserver to see if this is the facility? http://www.terraserver-usa.com/image.aspx?T=1&S=11&Z=18&X=794&Y=10851&W=3&q s=%7claytonsville%7cmd%7c Somebody wrote the facility is on Riggs Rd, which the photo shows as adjoining this place. If this is the right location I've got a couple of more recent sat photos from Globe Explorer. Thanks very much, John 11035 From: Dragos Ruiu Date: Wed Feb 9, 2005 7:19pm Subject: Re: More iPod uses On February 9, 2005 06:28 am, Tim Johnson wrote: > For those wondering what other nefarious uses an iPod could be used for, I > suggest attending CanSecWest, they are going to have a briefing on hacking > with iPods and other Firewire utilities. > > Firewire/i.Link is well known as a way for connecting video devices or > external hard-disks to computers. One little known fact is that the > Firewire protocol also allows to read and write physical memory on > connected machines without further software support. This can be leveraged > to escalate privileges or to spy on connected machines. We will present > some fun software using FireWire to do things to computers which shouldn't > happen. > > 0wn3d by an iPod: > http://www.cansecwest.com/speakers >.html The same class of vulnerability applies in many areas... and has some suprising applications, both beneficial and malicious. There are actually two presentations in that area this year... those are among the ones that have already been announced. (some announcements still remain) cheers, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, CanadaMay 4-6 2005 http://cansecwest.com pgpkey http://dragos.com/ kyxpgp 11036 From: David C Williams Date: Wed Feb 9, 2005 0:57pm Subject: Need Forensic Alarm expert for a commercial theft- California I am posting this request for another pi so please email him only (not me) so I can forward the responses on to him. Greg Barker at gbarker@l... with a telephone number of (800)371-3171 looking for a forensic alarm specialist. One of their clients clients who is located in Northern California had a commercial theft over the weekend. Apparently the alarm was breached. They need someone to examine the alarm equipment and make a feasibility study of what happened. There client is requesting the alarm specialist. Please contact Greg Barker only(and not me) at either his email of office phone. Thanks. David C. Williams DCW & Associates 7400 Center Avenue, Suite 209 Huntington Beach, CA 92647 (714)892-0442 Fax (714)892-3543 CA PI License # PI 12300 Website: www.dcwpi.com Email: dwilliams@d... Driver Record/Vehicle Registration/Automated Name Index Information for California Serving Southern California's Investigative, Process Service and Computer Security Needs [Non-text portions of this message have been removed] 11037 From: James M. Atkinson Date: Wed Feb 9, 2005 11:01pm Subject: Ad Majorem Dei Gloriam I would like to give away more free copies of the movie "The Passion of the Christ" to those members of theTSCM-L list who would like a copy, AND who will promise to watch it. No sales gimmicks, no games, no kidding, no fooling, no tie ins, no strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask is that you watch the movie, nothing more. Please email me your address privately if you would like a free copy, but I have to ask that you only request one copy, and that the address to which it ships be limited to either the U.S. or Canada (the DVD will not play outside of those regions). This is my gift to members of the list, and I expect nothing in return. Ad Majorem Dei Gloriam -jma ---------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------------------------------- 11038 From: Mitch D Date: Wed Feb 9, 2005 11:37pm Subject: Re: Anyone know this new Yahoo-group (Email-tracer) another waste of bandwith from the pi spyshop --- contranl wrote > Just got note of this new Yahoo group called Email-tracer > > http://groups.yahoo.com/group/emailtracer/ > > This is is what it's about: > > "This group is being set up for professional private > investigators > who trace Emails for clients or want to learn how to do it. I > know > you will like this resource" ===== Mitch Davis TSCM/Special Operations Group Inc. Nashville,TN.USA MitchD@t... site:www.tscmusa.com. Tel (615)837-9933 FAX (615) 523-0300 Cell(615) 364-6776 __________________________________ Do you Yahoo!? Yahoo! Mail - Easier than ever with enhanced search. Learn more. http://info.mail.yahoo.com/mail_250 11039 From: Mark W. Kiefner Date: Thu Feb 10, 2005 9:42am Subject: RE: Ad Majorem Dei Gloriam Thanks, kiefnem@c... -----Original Message----- From: James M. Atkinson [mailto:jmatk@tscm.com] Sent: Thursday, February 10, 2005 12:01 AM To: TSCM-L Subject: [TSCM-L] Ad Majorem Dei Gloriam I would like to give away more free copies of the movie "The Passion of the Christ" to those members of theTSCM-L list who would like a copy, AND who will promise to watch it. No sales gimmicks, no games, no kidding, no fooling, no tie ins, no strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask is that you watch the movie, nothing more. Please email me your address privately if you would like a free copy, but I have to ask that you only request one copy, and that the address to which it ships be limited to either the U.S. or Canada (the DVD will not play outside of those regions). This is my gift to members of the list, and I expect nothing in return. Ad Majorem Dei Gloriam -jma ---------------------------------------------------------------------------- ------------------------ We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ---------------------------------------------------------------------------- ------------------------ James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ---------------------------------------------------------------------------- ------------------------ World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ---------------------------------------------------------------------------- ------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" VAH! DENUONE LATINE LOQUEBAR? ME INEPTUM. INTERDUM MODO ELABITUR. =================================================== TSKS Yahoo! Groups Links 11040 From: Thomas Kellar Date: Thu Feb 10, 2005 11:38am Subject: Re: Ad Majorem Dei Gloriam Sorry, that is anti-semitic crap. Goodbye. On Thu, 10 Feb 2005, James M. Atkinson wrote: > I would like to give away more free copies of the movie "The Passion of the > Christ" to those members of theTSCM-L list who would like a copy, AND who > will promise to watch it. > > No sales gimmicks, no games, no kidding, no fooling, no tie ins, no > strings, no payday, no gratuity, no favors, no preaching, nadda. All I ask > is that you watch the movie, nothing more. > > Please email me your address privately if you would like a free copy, but I > have to ask that you only request one copy, and that the address to which > it ships be limited to either the U.S. or Canada (the DVD will not play > outside of those regions). > > This is my gift to members of the list, and I expect nothing in return. > > Ad Majorem Dei Gloriam > > -jma > > > > > ---------------------------------------------------------------------------------------------------- > We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. > ---------------------------------------------------------------------------------------------------- > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 Web: http://www.tscm.com/ > Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com > ---------------------------------------------------------------------------------------------------- > World Class, Professional, Ethical, and Competent Bug Sweeps, and > Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. > ---------------------------------------------------------------------------------------------------- > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > VAH! DENUONE LATINE LOQUEBAR? > ME INEPTUM. INTERDUM MODO ELABITUR. > =================================================== TSKS > Yahoo! Groups Links > > > > > > > From: Steve Uhrig Date: Sun Feb 10, 2002 10:22pm Subject: AID Bird Dog manual needed Hello all, I thought I'd take a chance here. Would anyone have a copy of the operating manual for the AID Model 300 Bird Dog vehicle tracking system? This is one of the original ones from about 20 years ago. Any info would be appreciated and will be compensated. I need actual printed documentation, please, not speculation or reminiscing. The main thing I need is the part number for the red bulbs on the DF control head which indicate left or right. And any details on what appears to be a complicated pulse train coming out of the motion sensing transmitter. Thanks ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4774 From: Steve Uhrig Date: Sun Feb 10, 2002 10:45pm Subject: TDRs for sale Hello all, If you are serious about sweeping phone lines and do not have a TDR, you need one. Don't fool yourself. I've got several available, all Riser Bond, most current production, all working perfectly with new or very recent batteries, chargers, manuals, carrinyg cases etc. Info on using them as well as specific product info can be found on Riser Bond's excellent website http://www.riserbond.com. Available are quite a number of each of the following models: 2401B+ (little ping box with digital readout; possibly one of the most common TDRs used in TSCM. Must be used with an external oscilloscope with at least 100 Megacycle frequency response. Nicad powered. 1205C -- has large LCD display built in, auto setting, very simple front panel, variable pulse widths, variable velocity factor, variable impedance. Backlit screen. Battery gauge. Automatically calculates and displays fault on the screen as well as distance to the fault and dB loss through the fault. Very nice unit, one of the Cadillacs of TDRs. Digital storage of traces can be downloaded to a computer or printer later. Very easy to use. Connect the line to test, turn it on, and it does it all automatically. Has automatic noise filters which switch in automatically to give you the cleanest trace. Waterproof Pelican case. 1205CX - fancier model than 1205C, not many major differences. 1205CXA -- now uses nickel metal battery instead of lead acid like in the 1205 and 1205C and 1205CX series, for lighter weight, longer life per charge. Has sub nanosecond pulse for finding intermittents or very quick happenings on digital lines. The absolute Cadillac of TDRs. Current model; see Riser Bond's website for details. 1300 -- Latest design, smaller, more compact, probably not quite as rugged packaging but made for someone who uses the thing extensively and wants an executive quality instrument to carry around. Designed especially for twisted pair, and can read through loading coils and a lot of other garbage. Seems to be the same specs and menu as 1205CXA, just in different packaging. See website. Contact me if you have an interest in picking up a top quality TDR that will last the rest of your career. Now is the best time since I have more in house now than I have had in years. Call me with your needs or to discuss where you are, and I will recommend the best one for your level of experience, your budget and your personal capabilities. A TDR is easy to use, can read rat piss on the lines, and separates the men from the boys. You'll need one eventually. Here's your chance to save a lot of money and probably buy a better unit than you will be able to afford in the future. Practice some with these things, get confident in it, and you will be a major reckoning force in the industry. Few professional sweepers have TDRs as nice as are described on this page. Most also come with leads, all come with manuals and chargers. All come with a padded carrying case OR a Pelican waterproof case (depending on model). I can take credit cards and ship overnight if necessary. Call if interested in breaking through the equipment barrier from novice to journeyman. Are you going to play games all your life on telephone lines where the majority of the threats target, or are you going to equip yourself and learn to use the same silver bullet professionals use but like to keep quiet? Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4775 From: Steve Uhrig Date: Sun Feb 10, 2002 10:56pm Subject: RF TSCM gear available - REI Hello again people, I have several pieces of REI gear available if anyone is interested. First is a CPM-700 with audio leakage probe and ballistic nylon carrying case. Used once. Perfect condition. $2200. Not a bad little receiver, especially for the price. See: http://www.research-electronics.com/cgi- bin/main.cgi?action=viewprod&ct=products&num=CPM-700 for specs. Also have a special OSCOR 5000, which has a number of REI factory installed enhancements to improve performance. These enhancements are not included in production units and you cannot request them installed in yours. Unit is fully configured with latest firmware, maximum memory, recent battery, all manuals, perfect condition, used several times but handled gently and packed as new. Will include all paperwork, correspondence, etc,, whatever is in the file on this particular unit. This OSCOR is equipped with the Deluxe Package Upgrade as well as the 10.7 I.F. out. And don't overlook the other mods which are not in any other unit as far as I know. Comes with a case of chart paper, too. I have had this OSCOR since it was new, do not use it and would like to pass it along to someone who could make use of it. Remember, this unit has every option except the optional computer software. It has the optional I.F. out, dual color video monitors, max memory, latest firmware, etc. Looks unused. The major value in this piece is its impressive appearance. See: http://www.research-electronics.com/cgi- bin/main.cgi?action=viewprod&ct=products&pct=OSCOR&num=OSC-5000 for specs and pictures. I *strongly* recommend factory training to get the maximum performance out of this unit. If you can't afford or justify a few days in Tennessee for training on this unit, you can't afford it. Repeat -- do NOT consider buying this unit unless you will receive professional training or you consider yourself astute enough not to need it. I went to the factory for training, if that tells you anything. Price is in the $12,000 region. The special enhancements make this a better deal than a new unit, whatever they cost nowadays. Can take credit cards. Contact me if interested. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4776 From: Matthew Paulsen Date: Sun Feb 10, 2002 11:39pm Subject: RE: Anti-keylogger Cryptome posted an anti-keylogger report. Summary - snakeoil - see below. http://cryptome.org/anti-keylogger.htm 8 February 2002 ---------------------------------------------------------------------------- ---- Cryptome purchased a copy of Anti-Keylogger yesterday (thanks to AG), installed it on a couple of machines and ran the program. It runs on Windows 9X, not W2K or NT. One machine, a laptop running ME, was reported clean: System scanning is started ------------------------------------------------------------ [2/8/2002 5:38:15 PM] Running keystroke monitoring programs are not found on your system. A desktop running Windows 98 got this report: System scanning is started ------------------------------------------------------------ [2/8/2002 5:37:13 PM] The following LOG-files are detected: - c:\windows\cookies\index.dat - c:\windows\network~2\blackice\log0007.enc - c:\windows\history\history.ie5\index.dat - c:\windows\tempor~1\content.ie5\index.dat LOG-files selected for detection: - c:\windows\cookies\index.dat - c:\windows\network~2\blackice\log0007.enc - c:\windows\history\history.ie5\index.dat - c:\windows\tempor~1\content.ie5\index.dat None of these appear to be keylogging files, though they show logs of machine monitoring by BlackIce, a firewall program, and IE.5, Internet Explorer. The laptop had neither BlackIce or IE installed. Nothing in Anti-Keylogger documentation describes how to tell the difference between its suggestion of keylogging detection and simply examining overt system and usage monitoring logs. Nor any justification for the use of the term "anti-keylogging" as anything more than a sly bait and switch marketing gimmick. The program is capable of pointing to easily spotted logging files, and might point to concealed logs if there were any, but more likely it is up to the user to figure out what to do about any concealed keyloggings, including those neatly concealed by "anti-keylogging" programs. Certainly IE's obnoxious log of surfing should be dumped, perhaps IE too, and beyond that Microsoft itself. See Microsft's Hidden Files: http://www.astalavista.com/library/os/win95-98/mshidden.txt Cryptome's evaluation: Anti-Keylogger is rancid snakeoil. The cost of this futile anti-FBI investigation was $59.95. Futile for us, but Anti-Keylogger may now be monitoring our machines and forwarding data to its deeper customers. We're in Anti-Keylogger's database for selling to the FBI, though the FBI is could be running Anti-Keylogger as a honeypot sting. It smells like Elcomsoft, famous supplier to the USG of encryption cracking (and worse) programs. If Anti-Keylogger wants to correct this thumbs-down, refund $59.95, plus $1 million for our needy honeypot, and prove it can out the FBI's Scarfo DIRT. ---------------------------------------------------------------------------- ---- From Anti-Keylogger's parent company Raytown's website: "In God we trust. All others we monitor." NSA motto Do you need to track employees and monitor workstations at all times? Do you need to know what your child is doing on the computer? Do you want to see how others are using your PC while you are away? Do you want to find out if your wife/husband is having an online affair? Our general-purpose monitoring software for Windows 95/98/ME/NT/2000 is your solution. Because it records every keystroke on your computers invisibly and stores the keystrokes in a file that ONLY YOU can see. ONLY YOU will know exactly what was going on. Monitoring software track and report all activity on your PC (including DOS sessions). ________________________ Raytown Corporation was founded in 1999. The main specialization is developing monitoring and anti-monitoring software. We are independent security software developers corporation with more than 10 years of experience. We are proud of our achievements and excellent customer support. Today our products and custom solutions may be found in more then 70 countries all over the world including a large number of Fortune 500 companies, law enforcement, government and military agencies. Our international team consists of people from USA, Israel, Ukraine, Russia and other countries. Our high-tech computer security technologies are utilized by both individuals and organizations worldwide. Our software is a nice example of our ability to combine software development skills with a deep understanding of the security solutions needing to all contemporary organizations all around the world. We provide all our customers with the highest quality service. All activities are handled discreetly, with strict confidentiality. Please let us know what services might be of interest to you or your Company. If you need any further information regarding our activities please do not hesitate to contact us. ---------------------------------------------------------------------------- ---- -----Original Message----- From: MACCFound@a... [mailto:MACCFound@a...] Sent: Thursday, February 07, 2002 11:17 AM To: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Anti-keylogger In a message dated 2/7/02 11:02:26 AM Pacific Standard Time, agrudko@i... writes: << I'm more than dubious of any device that claims to be able to detect "UNKNOWN" threats. >> we have unknown threats on this list Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4777 From: Matthew Paulsen Date: Sun Feb 10, 2002 11:45pm Subject: more from cryptome. Perhaps of more interest to the group: 10 February 2002 View Submitted Comments For Member vote ETSI Document Number: ETSI ES 201 671 V2.1.1 (2001-07) http://cryptome.org/espy/ES201-671-Cmem-vote.htm (70K) 10 February 2002 Telekom Austriaës Position to the final draft ETSI ES 201 671 v2.1.1(2001-07) Telecommunications security; Lawful interception (LI); Handover interface for the lawful interception of telecommunications traffic http://cryptome.org/espy/ES201-671-Tele-AT.doc (52K) 10 February 2002 ETSI TS 101 331 V1.1.1 (2001-08) Technical Specification Telecommunications security; Lawful Interception (LI); Requirements of Law Enforcement Agencies http://cryptome.org/espy/TS101-331-v111-Req-LEAs.pdf (127K) 4778 From: Prokop Communications Date: Sun Feb 10, 2002 7:01pm Subject: Night Vision Equipment Night Vision Equipment Company (NVEC) manufactured a scope-Model NVEC 500 sometime back. Does anyone recall the pricing on this item, i.e. retail, wholesale, GSA, etc? Any comments as to present value? Rick Prokop -W9MLW Prokop Communications TSCM-ITC Certified Video Concealments Seattle, Washington (206) 378-5560 Seattle, WA [Non-text portions of this message have been removed] 4779 From: Hawkspirit Date: Mon Feb 11, 2002 6:13pm Subject: Hearing Voices? Over the past few months I have seen list members forward inquiries from some desperate individuals who claim that because of microwave radiation they hear voices and other auditory phenomena. Most comments from the list members are that these people need psychiatric help and most are skeptical of their claims. It is apparent that the U.S. patent office is not quite as skeptical as our members. Have a look at: United States Patent 4,858,612 Stocklin August 22, 1989 Hearing device Abstract A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the region of the auditory cortex is shown and described. A microphone is used to transform sound signals into electrical signals which are in turn analyzed and processed to provide controls for generating a plurality of microwave signals at different frequencies. The multi frequency microwaves are then applied to the brain in the region of the auditory cortex. By this method sounds are perceived by the mammal which are representative of the original sound received by the microphone. Roger Tolces www.bugsweeps.com 4780 From: Steve Uhrig Date: Mon Feb 11, 2002 10:16pm Subject: Re: Night Vision Equipment Once upon a midnight dreary, Prokop Communications pondered, weak and weary: > Night Vision Equipment Company (NVEC) manufactured a scope-Model NVEC 500 > sometime back. Does anyone recall the pricing on this item, i.e. retail, > wholesale, GSA, etc? Any comments as to present value? http://www.nvec-night-vision.com/ Contact them yourself. They have a long standing reputation for integrity, quality and customer service. Remember an eternity has passed in night vision in the last several years. Stuff police departments would fight over 10 or 15 years ago now is surplus and sold by the pound by the same agencies. Sounds like an earlier 2nd gen commercial handheld scope. If so, current value is probably less than the freight it cost to ship the product. There are some white papers on our website Articles section about selecting, operating, maintaining and using night vision, Keep in mind the articles are dated, and we no longer can endorse in good conscience some of the companies mentioned in those articles. Go to our website Articles section, read the several articles on night vision there, and you will know more about night vision than most of the places selling it or in the cases of spy shops, claiming to 'manufacture' it. The Russian garbage killed the U.S. law enforcement night vision market. The U.S. market was close to saturated anyway. Litton and ITT are the two primary U.,S. military suppliers now, and those two companies represent 95% plus of the domestic market share for military acquisitions of night vision equipment. My personal preference is to ITT, but Litton is OK also. I would avoid ALL Russian products, no name U.S. basement assemblies from surplus components, B.E. Meyers/Dark Invader series toys and anything other than Litton or ITT products purchased from an official distributor. 3rd gen is the choice if you are able to specify. Don't overlook 35mm film camera and video camera interfaces which are discussed in the white papers on our website. And, of course, no spy shops for night vision. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4781 From: Matthew Paulsen Date: Mon Feb 11, 2002 10:49pm Subject: RE: Re: Night Vision Equipment Not an endorsement, just a website that carrys ITT and Litton scopes. Easy navigation, specs and simple instructions. http://www.morovision.com/ -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Monday, February 11, 2002 8:16 PM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: Night Vision Equipment Once upon a midnight dreary, Prokop Communications pondered, weak and weary: > Night Vision Equipment Company (NVEC) manufactured a scope-Model NVEC 500 > sometime back. Does anyone recall the pricing on this item, i.e. retail, > wholesale, GSA, etc? Any comments as to present value? http://www.nvec-night-vision.com/ Contact them yourself. They have a long standing reputation for integrity, quality and customer service. Remember an eternity has passed in night vision in the last several years. Stuff police departments would fight over 10 or 15 years ago now is surplus and sold by the pound by the same agencies. Sounds like an earlier 2nd gen commercial handheld scope. If so, current value is probably less than the freight it cost to ship the product. There are some white papers on our website Articles section about selecting, operating, maintaining and using night vision, Keep in mind the articles are dated, and we no longer can endorse in good conscience some of the companies mentioned in those articles. Go to our website Articles section, read the several articles on night vision there, and you will know more about night vision than most of the places selling it or in the cases of spy shops, claiming to 'manufacture' it. The Russian garbage killed the U.S. law enforcement night vision market. The U.S. market was close to saturated anyway. Litton and ITT are the two primary U.,S. military suppliers now, and those two companies represent 95% plus of the domestic market share for military acquisitions of night vision equipment. My personal preference is to ITT, but Litton is OK also. I would avoid ALL Russian products, no name U.S. basement assemblies from surplus components, B.E. Meyers/Dark Invader series toys and anything other than Litton or ITT products purchased from an official distributor. 3rd gen is the choice if you are able to specify. Don't overlook 35mm film camera and video camera interfaces which are discussed in the white papers on our website. And, of course, no spy shops for night vision. Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* Yahoo! Groups Sponsor ADVERTISEMENT ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. [Non-text portions of this message have been removed] 4782 From: sdonnell Date: Tue Feb 12, 2002 1:00am Subject: Caller ID repeater(?) Hi, Perhaps one of the telecom experts can answer this one: I have a friend that operates a small business, which requires him to spend much of his time out of the office. In order to stay in touch, he currently uses a device which will answer is office phone, and after several unanswered rings, the call is forwarded to his cellphone number via a different line. One serious limitation to this is that none of the forwarded calls contain the Caller ID from whoever has called into his office number. Is there some type device that can also forward the CID of the original call when it is forwarded to the cellphone(or other number)?? I wouldnt normally think it would be posible to regenerate a CID, but I recall some mention here a month or so back of how it was posible for a phreaker to send a "fake" CID down most lines. If that is the case, then I would think there might be some way to regenerate/repeat a legit CID. The local carrier here is Verizon. thanks Steve 4783 From: mwel10 Date: Tue Feb 12, 2002 8:09am Subject: Hidden area on harddisks Dear All, Although a bit off-topic, I found this link on the forensics@s... mailinglist. If someone would like to know more about forensic IT research they can contact me off-list. BXDR A DOS based application that simply lists the Geometry of any attached hard disk drives using standard BIOS calls, Extended BIOS calls and Direct Disk access (ATA) calls. One of the more interesting features of BXDR and Direct Access calls is that it is possible to set the maximum addressable sector to an arbitary value. Future reads of the disk will then report the maximum sector to be the new value. This command can be (and via BXDR is) non- volatile - i.e. the limit will remain until reset with a subsequent command. From a forensic viewpoint this command can defeat most modern imaging systems. To test it I performed the following test. I took an 80GB hard disk drive and using BXDR set the max addressable sector to 999999 (1,000,000 sectors) approx 5GB. (BXDR 128 /s999999) Removed the hard disk drive and placed it into a second machine Attempted to image with SafeBack (using BIOS, XBIOS and Direct Access) and with Encase (DOS and FastBloc). Both SafeBack and Encase reported the drive as a 5GB device. I then ran BXDR to reset the max addressible sector to the maximum native addressable sector (BXDR 128 /r) SafeBack and Encase could subsequently see the full drive. http://www.sandersonforensics.co.uk/html/bxdr.html Yours sincerely, Matthijs van der Wel Project Manager Fox-IT Forensic IT Experts B.V. Oude Delft 47 2611 BC Delft The Netherlands ________________________________________________________ http://www.fox-it.com/engels/index.shtml ________________________________________________________ Phonenumber (general): +31 - 15 - 21 91 111 Phonenumber (direct): +31 - 15 - 21 91 124 Faxnumber: +31 - 15 - 21 91 100 ________________________________________________________ E-Mail Disclaimer This email may contain confidential information. If this message is not addressed to you, you may not retain or use the information in it for any purpose. If you have received it in error, please notify the sender and delete this message. We try to screen out viruses but take no responsibility if this email contains a virus. 4784 From: Date: Tue Feb 12, 2002 0:00pm Subject: Re: Hearing Voices? 30 Psycho-Acoustic Projector, Patent 3,566,347, US Patent Office, 23 February 1971 31 32 31 Method and System for Altering Consciousness, Patent 5,289,438, U.S. Patent Office 22 February 1994 33 Method and System for Altering Consciousness, Patent 5,123,899, dated 23 June 1992 35 Silent Subliminal Presentation, Patent 5,159,703, U.S. Patent Office, 27 October 1992 google +EEG +entrainment google +EEG +ELF google +HAARP google +Schumann +resonance google +PANDORA google +'Synthesised Brainwave' google +'directed energy' Quoting Hawkspirit : > Over the past few months I have seen list members forward inquiries from > some desperate individuals who claim that because of microwave radiation > they hear voices and other auditory phenomena. Most comments from the list > > members are that these people need psychiatric help and most are skeptical > of their claims. It is apparent that the U.S. patent office is not quite as > > skeptical as our members. Have a look at: > > United States Patent 4,858,612 > Stocklin August 22, 1989 > > Hearing device > > Abstract > A method and apparatus for simulation of hearing in mammals by introduction > > of a plurality of microwaves into the region of the auditory cortex is > shown and described. A microphone is used to transform sound signals into > electrical signals which are in turn analyzed and processed to provide > controls for generating a plurality of microwave signals at different > frequencies. The multi frequency microwaves are then applied to the brain > in the region of the auditory cortex. By this method sounds are perceived > by the mammal which are representative of the original sound received by > the microphone. > > Roger Tolces > www.bugsweeps.com > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > ------------------------------------------------- This message may contain confidential and/or privileged information belonging to Cadre Engineering, LLC. It is intended solely for the addressee and access to the e-mail by anyone else is unauthorized. If you are not the intended recipient, you are hereby notified that any unauthorized disclosure, copying, distribution and/or any action, which relies on the contents of this message, is strictly prohibited. Any comments or opinions expressed are those of the originator, and not of Cadre Engineering, LLC. If you have received this message in error, please notify the sender by return e-mail and delete it from your system. If you require any assistance, please contact postmaster@c.... 4785 From: James M. Atkinson Date: Tue Feb 12, 2002 10:09pm Subject: Spy watchdog to probe Tampa phone taps http://www.thewest.com.au/20020212/news/latest/tw-news-latest-home-sto44099.html Spy watchdog to probe Tampa phone taps CANBERRA THE nation's intelligence agency watchdog is set to investigate claims that defence electronic eavesdroppers listened in on satellite phone conversations during the Tampa crisis. In a departure from the traditional no comment on intelligence matters policy, the Government today denied any wrongdoing. Defence Minister Robert Hill said the director of the Defence Signals Directorate confirmed it had not targeted communications of the Maritime Union of Australia (MUA) or the International Transportation Federation. "More specifically the director has advised that DSD did not provide any reporting to the Government on communications from the MUA or ITF," he said. It was reported today that DSD monitored satellite phone conversations from the Tampa following its rescue of 438 boat people near Christmas Island last August. It cited a senior Government source who claimed transcripts of MUA and ITF conversations were used to help formulate a political response to the crisis. Senator Hill said he had asked the Inspector General of Intelligence and Security Bill Blick to review his records from this period to provide further public reassurance. But he did not deny DSD had a role in the Tampa crisis. "The capacity to intercept and report on communications exists to protect national interests," he said. "The protection of Australia's borders is obviously a matter of national importance." Australian Council for Civil Liberties president Terry O'Gorman lodged a formal complaint with Mr Blick urging him to examine whether DSD really did spy on Australians during the Tampa crisis. The Democrats and Labor have both proposed inquiries into the allegations. -AAP -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4786 From: William Knowles Date: Tue Feb 12, 2002 11:15pm Subject: FC: BARTEC, eavesdropping, and "open source" wiretap software ---------- Forwarded message ---------- Date: Tue, 12 Feb 2002 22:49:01 -0500 From: Declan McCullagh To: politech@c... Subject: FC: BARTEC, eavesdropping, and "open source" wiretap software BARTEC is an interesting company. It describes itself as being the best choice for police "telephone surveillance equipment." BARTEC's product line is extensive, featuring "the intelligent choice for all your telephone surveillance investigations - pen register, audio wiretap or PCS/cellular." (http://www.bartec.com/products.html) BARTEC products include: * DLP-14/400 WIRELESS INTELLIGENT TRANSMITTER, described as a "PCS/cellular intercept device designed for use by both law enforcement and wireless companies for telephone surveillance investigations." (http://www.bartec.com/content/wit.html) * D A R E / DIGITAL AUDIO RECORDING ENVIRONMENT, described as a tool for "streamlining and simplifying wiretap operations. This is accomplished by taking advantage of the latest in digital audio recording technology which automatically places both voice and data together on CD-ROM." (http://www.bartec.com/content/whatshotDARE.html) * C O P S / CALEA OPERATIONS, the recommended way for BARTEC customers to perform surveillance under the controversial Communications Assistance for Law Enforcement Act (CALEA), aka Digital Telephony law. To summarize: COPS essentially links the telephone company with police. COPS includes a dedicated PC, an 8-port Cisco router / modem pool, and a 100 base T Hub. The protocol used to share info is called J-025. (http://www.bartec.com/content/whatshotCOPS.html) J-025 is more properly called J-STD-025, and was jointly developed by the Telecommunications Industry Association and the Alliance for Telecommunications Industry Solutions. It came out in December 1997 and soon became the focus of litigation, with privacy groups and some industry groups saying it went beyond what Congress intended. The DC Circuit agreed in part (http://www.epic.org/calea/dc_cir_decision.html). For more background, consider a report by a Telecommunications Industry Association working group dated May 2000 that arose after a meeting at the Excalibur hotel in Las Vegas. The document is here: http://www.tiaonline.org/standards/CALEA_JEM/CJEM503-105.pdf What's interesting is that the report, authored by Mark A. Montz, a product architect at Compaq, talks up the benefits of open source softwware as a way to keep the Feds honest -- in much the same way that some of us have recommended the release of Carnivore's source code. Excerpt: >The connection point may also allow access to data packets not >authorized for surveillance to be collected as well as the ones >covered by a subpoena. Also, while the PC/hard disk system above >substitutes for a tape recorder, there is nothing currently equivalent >to a "pen trace device". Indeed, one of the major concerns with the >industry suggestion of delivering all the information to law >enforcement agencies was that the agencies could not be trusted to >discard data they were not authorized to receive. A novel solution to >this problem may be possible by the success of a new concept: Open >Source... A neutral organization such as UL Labs or some other agency >would be responsible for downloading the software into the computer, >and the delivering it to the law enforcement agency... Politech archive on CALEA: http://www.politechbot.com/cgi-bin/politech.cgi?name=calea -Declan --- http://www.bartec.com/content/whatshotCOPS.html C O P S "CALEA OPERATIONS" ______________________________________________________________________ BARTEC's simple, affordable, intelligent solution for CALEA intercepts! Click here for COPS diagram Click here for a diagram of a typical COPS configuration. What Is COPS? CALEA Operations (COPS) is BARTEC's solution for the Communications Assistance for Law Enforcement Act (CALEA) which will begin implementation on June 1, 2000. COPS serves as the primary interface for delivery of J-025 standard messages from the Telecommunications Service Provider (TSP) to the law enforcement agency (LEA), as defined in CALEA legislation. A COPS workstation consists of: BARTEC COPS Software PC (configured for COPS specs) 8 Port Cisco Router / Modem Pool 100 base T Hub How Does COPS Work? A COPS workstation supports three critical tasks in the CALEA pen register intercept environment, as follows: 1. CALEA "D" and "E" Interface CALEA legislation defines "D" and "E" interfaces for telephone surveillance. The "D" interface is located in the TSP switch or regional facility. The "E" interface is located at the LEA. The "D" interface will require a TCP/IP wide area network (WAN) to be established between the TSP and the LEA. The WAN may be on a dial-up or dedicated private lease line (PVC) that is defined by the TSP or LEA. To meet interface requirements, the COPS workstation includes a Cisco router with eight modem ports. Modem ports one to seven are dedicated for "E" interface - one for each TSP. Modem port eight is reserved for communication with existing BARTEC devices for analog pen register intercepts. Remote command and control and automatic downloads for BARTEC's Micro DNR, SSL-12 Smart Slave and DLP-14/400 Wireless Intelligent Transmitter will be accessible via port eight. This feature is not available on any other CALEA intercept system, and will prove important and useful as telephone surveillance makes the transition from analog to digital over the next several years. 2. Data Compilation In a CALEA pen register intercept environment, TSPs will deliver J-025 standard messages, as defined in the CALEA legislation, over a call data channel (CDC). Each of the modem ports on the Cisco router supports CDC delivery of data in a number of formats. Analog data received on port will be in ASCII format. COPS assembles and converts all data in all formats for compatibility with many different analytical software packages. 3. Creation of Files and Distribution of Collected Data Once data is assembled and converted, it is compiled into files. Once files are created at the COPS workstation, data can be distributed for analysis or other CALEA functions. Distribution can take place via the LEA network to a secure server, on a daily or periodic basis. Data may be loaded manually or on demand to the server by the LEA network administrator. Analysis software typically resides on the server. In a CALEA wiretap intercept environment, COPS will test J-025 messages received from the TSP to determine if immediate distribution is required. Messages are routed through the LEA network to the appropriate BARTEC Digital Audio Recording Environment (DARE) workstation. At the DARE workstation, analog voice and data will be assembled by the COPS Micro DNR for real time access by the DNR. Why Buy COPS? COPS offers multiple CALEA intercept capability and supports both pen register and wiretap configurations COPS can interface with BARTEC analog pen registers/remote devices as telephone surveillance transitions to CALEA COPS offers future expansion to accommodate additional CALEA interfaces COPS is affordably priced, allowing even small law enforcement agencies to perform CALEA intercepts ______________________________________________________________________ ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. Declan McCullagh's photographs are at http://www.mccullagh.org/ To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- 4787 From: James M. Atkinson Date: Wed Feb 13, 2002 7:17am Subject: Franklin High students adjusting to surveillance http://www.tennessean.com/local/archives/02/02/13655685.shtml?Element_ID=13655685 Tuesday, 02/12/02 Franklin High students adjusting to surveillance MICHELLE LORD / STAFF http://www.tennessean.com/local/archives/02/02/13657055.jpg Assistant Principal Todd Campbell views footage on the new security camera system at Franklin High School. By KNIGHT STIVENDER Staff Writer FRANKLIN - Say a Franklin High student forgets to put her expensive biology textbook into her backpack and leaves it sitting on top of her locker all day long. In the afternoon, she realizes where she left it, but it's no longer there. Because of a new security camera system at the school, someone in the office can quickly search video footage of that row of lockers to see when and how the book disappeared. ''It's pretty cool,'' said Tim McNeese, information services director for the county school system. Franklin High is the first school in the county to use such technology, which has cost taxpayers roughly $45,000. District officials want to bring the system to other schools as money becomes available. They've asked for $60,000 to wire up Page High next year with even more cameras. While some students initially were wary of cameras rolling in every corner, Franklin parents seem pleased with the experiment. ''I don't think it's meant to be a Big Brother, spy situation. I think they're more to protect the school during the time when the students are not present,'' said PTO President Pat Anderson. A year ago, the school system heard proposals from several security companies seeking to install the camera system. Eventually, school system leaders decided they could get more for their money if they did it themselves. Bob Spong, maintenance director for the school system, estimates that the county saved $15,000 to $20,000 on the Franklin system by using in-house expertise. The result at Franklin High is a remote camera system that allows school administrators to select one of 32 different cameras and search for any activity during any time period. Several cameras keep track of activity outside, all of them programmed to record any motion 24 hours a day. Since the cameras only record when there's motion, the disk space used up by recorded images isn't overwhelming. In the hypothetical biology book situation, the student could tell an assistant principal she left the book on the locker after second period and discovered it missing after fourth. Using his desktop computer, the assistant principal could command the system to replay any movement around that particular area of lockers in the time frame given by the student. It's a system that, earlier this year, came in handy when some money was stolen at a wrestling tournament. The culprits, from outside Williamson County, admitted to the theft once they were told they had been captured on camera. ''We've created a safer learning environment for everyone,'' Spong said. McNeese said it would cost about $14,000 to add 32 more cameras at Franklin High, bringing the total to a number the school system thinks would be ideal. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4788 From: Marty Kaiser Date: Wed Feb 13, 2002 7:47am Subject: Better way to get this to you FBI Vendetta Against Martin L. Kaiser III -------------------------------------------------------------------------------- Initially this page consisted of a compilation of news magazine and newspaper articles. I was under the impression that since I did not write these articles they would withstand the test of time. I was wrong. Not too long ago I received a direct threat from a well known U.S. intelligence agency ordering me to remove their three initials from these articles. Pointing out that asking me to remove their initials was essentially changing history didn't phase them... somewhere in my argument I mentioned Adolph Hitler. In the past I have purposely avoided making any personal observations and/or comments about these events and the stories surrounding them. The time is now right to make those observations and comments. The enormous damage caused to my family and me cannot be forgiven. These events are an insult to all my friends and associates... an insult to the United States of America... and an insult to the world community. Read on... Marty -------------------------------------------------------------------------------- First some comments on format. All my personal observations will be in BLUE while public records and direct quotations will be in BLACK. Names will be mentioned, where harmless, but where mentioning them may cause problems I shall simply put either initials or XX. -------------------------------------------------------------------------------- Deciding where to start was the most difficult part of this story. I decided to start at the beginning. Born in 1935, my family and I lived in the the hard coal region of northeastern Pennsylvania. We were surrounded by families from Czechoslovakia, Poland, Lithuania, Hungary and many other coal miner producing countries. Having the Kaiser name didn't help me much while these countries were being torn to shreds before and during World War II. The hatred expressed towards me by neighborhood children was enormous. As a child I had no idea that their animosity was anything other than the norm. My childhood obviously played a MAJOR role in what I became... there also were some shameful events that hardened me in ways few will understand... so I'll move on. During my pre-teen and early teen years I was fascinated by U control model airplanes and had a large collection of them. As radio controlled airplanes began to appear I found electronics more interesting. Shortly after the end of WW2 I received my amateur radio license W3VCG and still hold those call letters today. I can't say my school years were a shining beacon but at least I got through them. In prep school XX became my co-dependent good buddy. He was born without eyes but in spite of this I was able to get him involved in ham radio too. I took the glass out of the meters of an old rig and XX was able to tune it by the pressure the pointer exerted. He taught me how the loss of one sense is compensated for by the others. We had lots of fun together with this incident being the funniest. I had my Mom's hand-me-down 51 Caddy and would drive it to a long riverside park on the other side of the river from Wilkes-Barre. Then I would allow XX to take the wheel and speed up and down the park usually with his left arm out of the window banging wildly on the side of the car while grinning from ear to ear. In 1957, I was hired as a Research Technician by RCA Laboratories in Princeton, New Jersey. A group of 12 established scientists were my "bosses." Dr. Morton, co-inventor of television as we know it today... Dr. Rudy, inventor of many image conversion devices... one of our image intensifiers took the first pictures of the bottom of the polar ice cap and one took the picture of a single photon (one particle of light)... Dr. Forge, co-inventor of the vidicon and other TV conversion tubes... Dr. Sommers, inventor of the Iconoscope, the image conversion tube that made real time video possible... Dr. Kleitman, inventor of many high efficiency phosphors... Dr. Ching, inventor of many helical microwave amplifier tubes... Dr. Nergard, one of the people instrumental in the development of the Klystron oscillator that made radar possible... Dr. Klensch (Dick), (most of the work I did was for him) did basic engineering on a variety of projects... and many other truly brilliant minds. My job was to be their "hands." I designed and built much of the circuitry that permitted all of these men to continue with serious development. In our group I remember four other technicians, each with their own expertise. We worked well together as a team and although I was always sticking my nose (comments) into many, many projects other than mine it gave me the opportunity to be part of some incredibly interesting projects... the end results of which became technology and products we take for granted today. Obviously, I turned my amateur radio interests towards amateur television. I wrote extensively for technical journals, RCA in-house technical publications and radio amateur magazines and had my own ham TV station on the air. Another amateur television enthusiast, William Haldane (Bill), and I became close friends. He was part of RCA Service Company, a group that put our ideas into the field for further trials. At that time, Dr. Klensch and others, including me, were developing several schemes involving VVLF technology... below 10HZ... we used to call them "cycles" back then. Since we were all pretty much playing it "by ear" we had more fun than anyone should have in one lifetime. Here is a good example. Several hundred yards behind the main building was a small pond. A bridge crossed the pond and in the middle of the bridge was a small house for test equipment. A hydrophone was lowered from the house into the pond. Two hundred yards away a 10 foot long by four inch diameter rod was driven flush with the ground. Next to it lay a small loudspeaker connected to a microphone in the pond house. My job was to drop a 10 pound cannon ball onto the stake when Klensch yelled "go" and he, in turn, would measure the shock wave. So there I was in the middle of a field repeatedly dropping a cannon ball on the ground. Someone inside the main building noticed me and called authorities. Soon an ambulance was fast approaching across the field. My explanation caused all concerned side splitting laughter. After the ambulance left Klensch and I continued with the cannon ball dropping experiment. One day Bill approached me and asked if I'd like to go to Trinidad. Neither he nor I knew where that was but it sounded interesting. When I got home I grabbed the Encyclopedia and found out. After discussing it with with my wife I returned with a firm "YES." A month or two later Bill again approached me and advised that Trinidad would not accept our presence and asked if I would like to go to Antiqua. I didn't know where that was either but again said yes. A month or two later he told me that Antigua wouldn't accept our presence. He mentioned RCA had decided to set up the project on Barbados where there was a small U.S. Navy base and they simply would not tell the Barbadian government about the project. He asked if I would go there and I responded in the affirmative even thought I had no idea what the "Project" was all about. Finally I was given a briefing about a new high frequency (1 to 30 MHz) "Over the Horizon Radar" an RCA technician/ham had conceived. My job was to see if it would work. I later learned that the two islands had turned us down because it was during the Cuban missile crisis and they did not want to antagonize their friend, Cuba. I was transferred to RCA Service Company and sent to Burlington, Massachusetts to check out the hardware. When I got to Burlington, to my astonishment, NOTHING relating to the project was there! Within three months I appropriated or stole (allocated but not yet delivered... midnight raids, you know) and assembled all of the equipment needed in two 40 foot trailers. Finally the two trailers were ready to put on ships headed towards Barbados and Jamaica. My wife and I closed up the house and along with our 3 and 5 year old children flew, on probably one of the first 707's to take to the air, to Barbados. As soon as we got settled I went to the Navy base to announce my presence. The Captain of the base responded with total surprise. No one had informed him of our intention to set up on "his" base (north coast)! It turned out that the four RCA advance men never left Bridgetown (south coast), the capital city of Barbados, but instead spent their time enjoying the wonderful Barbadian rum and the strikingly beautiful Barbadian women! I was truly on my own. After some serious negotiating, the Captain gave me a few hundred square feet of space on which to set up my project. The trailer finally arrived and, you guessed it, there was no tractor on the island with which to pull it. Several trips to the junk yard solved that problem. The tractor also had no brake release compressor so I constructed a small gasoline powered compressor to do just that. The trailer was then towed, without brakes, over mountainous terrain! My caravan consisted of myself in a 1958 VW waving a very large red flag out of the window followed by the tractor/trailer. As I passed through villages many Barbadians ran out to the street clapping their hands and jumping wildly in joy thinking the island had been or was going to be taken over by Communist! After the trailer was in place I began installing four HUGE log periodic antennas. Two were 150 foot long 1 to 30 MHz vertical log periodic curtains and two were huge, and very heavy, 3 to 30 MHz horizontal log periodic beams mounted on the 100 foot towers that supported the curtain. They were to be supported by 1/2 inch nylon rope. Nearly every night Barbadian fishermen would "liberate" some of my beautiful rope. To solve that problem I made several meaningless medallions that my workmen had to hang around their necks while working at the antenna site otherwise they would become impotent. When word got out about that, the thefts stopped IMMEDIATELY! To see the antennas and trailers go to my NOSTALGIA page. My family and I settled into the wonderful Barbadian life but the peace didn't last long. One day while working on the antennas I heard the drone of a four engine airplane. Looking up I saw a Russian bomber at about 1,000 feet with its bomb bay doors open and a large camera sticking out. Others obviously saw the plane too because it wasn't long before the American Ambassador was banging on my door. Since my wife is the politician of the two of us I let her handle the incident. Sure enough, after a few of her special cherry-cheesecake pies we were back on track. Those pies seemed to be the magical answer to the many other situations that would arrive. In record breaking time I had the equipment up and running. All of the equipment worked fine and we were ready for the next step. That phase was up to someone else. A couple of years ago my copy of Microwave magazine arrived and lo and behold my project is STILL in operation. Again see the NOSTALGIA page for that article. On my return to the U.S. I approached RCA Laboratories to change my title from Senior Technician to Associate Engineer in view of the fact that I had, under very difficult conditions and circumstances, acted as international diplomat and single handedly managed, designed, built, refined and operated a major project. They essentially said that since I did not have an engineering degree I was a "certifiable dummy" and my title could not be changed. That was the end of my career with RCA. For a brief period I worked at Telerad Manufacturing, a division of the Lionel Corporation (toy trains), where I developed and oversaw the manufacturing of, among other products, the command receiver for the Atlas missile. Petrovend Corporation asked me to develop possibly the worlds first dollar bill changer. They wanted to put the changer into all of their gas pumps. The unit worked great but soon credit cards made the scene. Petrovend dropped the project in favor of credit cards. I returned to college to receive my degree in Business Administration. Most likely with RCA's comment in mind along with being more mature, I totally surprised my wife and myself by spending all remaining semesters on the Deans List. While at college I took up flying and on graduation looked for a job in the field of avionics. Narco Aviation Products hired me to work at their marine facility in Cockeysville, Maryland. The company, Enac Triton, was essentially a one man show. I eventually thought, if he can do it, so can I! That job lasted about three months. One day, in 1964, I announced to my wife that I was starting my own company. Naturally, she went into a panic. Not knowing exactly how to start a company, I picked up the telephone book and called the maintenance department of the first industry listed... Armco Steel. They agreed to give me a try and handed me an inoperative Curtis Immerscope. An Immerscope is a device that ultrasonically looks through a steel ingot to find flaws or air bubbles. I took it home in my 57 Chevy, cleaned it up and replaced all high voltage wiring. The maintenance manager was ecstatic and told me to "sit" while he called his equivalent in other companies to tell them he had finally found the man they had been looking for. Within weeks I had over fifty industrial customers within easy driving distance. Initially, I was uncertain about how much to charge my customers. One day at 2:00 AM I received an emergency call from Armco. Their vacuum degassing furnace had been damaged by some molten steel in the wrong place. This furnace was thirty feet in diameter and forty feet deep. Its load cell system (scale) was accurate to within less than one pound at 100,000 pounds! I climbed down inside the furnace and found the burned wiring. A few quick repairs had it up and running in no time. I billed them $200.00. A few days later the maintenance manager called and asked me to stop by... I did. He told me that Armco would have lost roughly $2,000,000.00 (1965 $s) if the steel awaiting the degassing furnace had hardened were it not for my timely and prompt repairs. He handed the invoice back to me and told me to add another zero! I WAS ON MY WAY!!! Obviously, I was wrong in charging only an hourly rate for my time when I should be charging for the value of the service from the customers prospective. My customers included steel mills, copper refineries, bottling companies, plastic companies, ice cream cone manufacturers, plastic and paper cup manufacturers, canning companies, veneer manufacturers, breweries and nearly 100 more. My 57 Chevy was a blue streak Earl Scheib Special (that was a "paint your whole car including the tires for $19.95" company... just kidding about the tires)! When called by my first brewery I learned very quickly that the "new" beer comes down the pipes very early in the morning and it is was mandatory for all employees, including me, to drink as much beer as possible while the machinery cooled down. I was on a first name basis with many famous cockroaches. In a brewery it impossible to get rid of those little critters even with soapy superheated steam. It was after one of those brewery trips that I got lost in downtown Baltimore (I can't imagine why!). I passed a gate that said "U S Army Intelligence, Fort Holabird." Hey, perhaps they too had something to fix. I drove around the property until I found a door that said "Supplies." A simple knock on that door put me into the "intelligence business." After repairing shelf upon shelf of equipment and noticing the allocation tag on each showing the value (price), I approached the powers to be and asked if they would consider my manufacturing for them exactly what they wanted... and at a greatly reduced price. My offer was immediately accepted and I was now in the intelligence equipment manufacturing business starting with the UAA-1 and 1059. Miniature transmitters (eavesdropping/bugging devices) intrigued me and I manufactured a wide variety of them. It didn't take long after I got into the bug building business for me to see the potential danger of those little devices so I decided I'd better get busy and start manufacturing bug detectors or countermeasure equipment to find them. Marketing my products was a snap since I could walk into virtually every intelligence agency in the Baltimore/Washington/Virginia area. I also began teaching courses on bugging and bug detection at Fort Holabird and that gave me access to other good marketplaces. By the mid-70's I had close to 200 customers (I know this because I put a list of them together for my trial). They included corporations large and small and foreign, federal, state and local governments. I did many high level sweeps that got lots of good press. Once firmly established in the intelligence equipment manufacturing business several magazine, news magazine and newspaper articles appeared about my company. It was a VERY satisfying time but it invited many people who were mildly crazy and some who were totally insane. For those I contacted their spouses or relatives suggesting they be hospitalized... and many were. One character turned out to be a professional litigant who was seeking affidavits to incriminate the Baltimore City Police Department. He left by air route. I later learned that the City of Baltimore settled out of court with him for $33,000.00. One sad fellow was convinced the Martians were following him. I built a Martian Ray Detector for him hoping that might ease his paranoia. He returned to my shop several times... each in a more depressed state. Finally, in desperation, he used a pair of ordinary gas pliers to pull out one of his molars thinking that was the homing device the Martians were using. He wrapped it in aluminum foil so the Martians couldn't track it and brought it to my shop. Out of curiosity I had my dentist X-ray the tooth and that revealed only a pin (antenna?). His wife joined him on his next visit and she and I decided on the obvious next step... the hospital. In the early 70's a disheveled man wearing mismatched jacket and pant and tennis shoes showed up at my door. Thinking he was just another unbalanced person I told him I had some sensitive material on my desk and asked if he would return in an hour. I used that time trying to figure out what to do with him. It was Edwin Duncan (now deceased) owner and President/Chairman of Northwestern Bank headquartered in North Wilkesboro, North Carolina. He told me he was having security problems at his bank and was afraid the IRS was bugging him. I agreed to train his security office, Jerry Starr (also now deceased), who in turn purchased a quantity of countermeasure equipment. Jerry eventually called me from the bank's home base in North Wilkesboro and asked if I would come to the bank and go through a sweep with him. He instructed me to go to the Baltimore/Washington International (BWI) airport and a company plane would pick me up and take me to North Carolina. I was impressed. Sure enough a twin engine turboprop showed up and ferried me to North Carolina. On landing at their home airport in North Wilkesboro I noticed the pilot push a button on the instrument panel and the doors of the very LARGE hanger ahead slid open. Inside the hanger were at least six, and probably more, beautiful white airplanes each with the Northwestern Bank logo on the tail. They ranged in size from a four engine Fairchild turboprop down to a classic Twin Beech. I was very, very impressed but wondered... what is a small North Carolina country bank doing with all these airplanes? Jerry later revealed that one of them had been set aside for North Carolina Senator Sam Irvin of Watergate fame. We performed an extensive sweep of all buildings and did indeed locate a device in the locked office of the Comptroller. I left finding the actual device to Jerry and returned to Baltimore in the same airplane. As years went by I learned a great deal about Duncan. He turned out to be a super patriot and used the banks enormous resources to fund various special operations conducted in foreign country's (most likely that is why he kept the IRS at bay). For example, in 1972, while visiting a friend with the Dade County (Miami) Bomb Squad I passed through the airport concourse and noticed a banner saying "Fly to the Cayman Islands... $62.00 round trip." Noting that I could get there and back in one day, I grabbed a flight. On landing in Cayman I knew that this is where I wanted to be. On my return trip I began scuba diving with XX. In time, I switched to a new company run by one of his dive masters. Several years later I again switched to a new dive operation that had a dive boat more to my liking. The dive master and I became very close friends. One day we got into a conversation about my work and he revealed that when he was a youngster he and several of his friends were snorkeling in a small lake located on the inland side of the main road across from where Laguna del Mar Condominiums now stands and they stumbled upon a huge underwater cache of weapons. He, and each of his friends, put a machine gun on each shoulder and marched into town. Word of the incident swiftly reached Jim Bodden, the father of the Cayman Islands, and he knew exactly who to contact to solve the problem, Duncan. Duncan grabbed plans for one of his existing banks, filled in the lake with marle (crushed limestone) and stuck one of his banks on it. SOME CORK! The bank was put up with such speed there was no time to change the design and it wound up with the drive-in-window on the wrong side (they drive on the left in Cayman). Feeling particularly spry one day I called FBI Director J. Edgar Hoover and told him I manufactured products that might be of interest to him. He promptly invited me to visit him at headquarters. Walking into his office I immediately noticed that his desk was on a four inch pedestal and the legs on the sofa had been sawed off. I sat on the arm of the sofa and looked at him eye to eye. I think he liked that. He passed me on to their intelligence support office where I met XX. XX took me to the U.S. Recording Company and explained how to do business with the FBI through that company. Business went along fine until the Omnibus Crime Bill (Title III) was passed in 1968. Upon reading it, I immediately saw that I could not deal with apparent commercial concerns such as U.S. Recording. The FBI gave me a rubber stamp that essentially said "This order complies with the provisions of the Omnibus Crime Bill." Seeing real problems with that arrangement, any equipment ordered through U.S. Recording was delivered DIRECTLY to the FBI with the invoice going to U.S. Recording. During one of my many visits to the FBI technical section I noticed one of my invoices sitting on XX's desk and it was marked up a substantial percentage. I thought that was strange but paid no further attention to it. In 1972 a company called Audio Intelligence Deices (AID) made its appearance. Their catalog claimed they could make "off the shelf" delivery... an apparent violation of Title III (Omnibus Crime Bill... it is illegal to manufacture, assemble, possess or offer for sale any device primarily designed for surreptitious interception of oral communications UNLESS you are under contract with a federal, state or local government). I had been warned on numerous occasions that I could not manufacture any device unless I had the contract in hand first so immediately brought this apparent conflict to the attention of the U.S. Attorney General. Many, many letters followed. Eventually he commented... You do what you think is correct and if you're wrong we will arrest you! Built into the Omnibus Crime Bill (Title III) was an automatic five year review period. In early 1975 I was contacted by investigators XX and XX of the U.S. House Select Committee on Intelligence. They asked that I prepare a statement detailing my observations of the effectiveness of the Omnibus Crime Bill. During our conversation I mentioned how I was dealing with the FBI through U.S. Recording, the rubber stamp and the incident about the marked up invoice. I prepared a statement primarily asking why AID was permitted to inventory and market "off the shelf" equipment while I could not. After my statement was prepared I contacted the CIA and FBI to see if there were any problems with my appearing before the Committee. The CIA asked for a days delay (a huge snowstorm saw to that) and then gave me the O.K. The statement was turned over to the investigators and a day was set for my appearance before the Committee. Upon taking a seat to read my prepared statement, to my astonishment, it had been completely rewritten! The new statement attacked the FBI and made no mention whatsoever of AID. I immediately told XX that I was NOT going to read that statement. He instructed me to go to an ante room and repair it where ever I felt it was needed. Not anticipating this level of deception I had not brought a copy of my original statement. If I had, I most certainly would have read that instead. Given little time to repair a non-repairable statement, I did the best I could. When I read the revised statement all of the Congressmen looked at each other, me and the paper in front of them, wondering what was happening. To this day I do not know which of the three statements was read into the Congressional Record and... quite frankly, I don't give a damn. On returning to my office I telephoned FBI Director Kelly and requested a meeting with him. Two other high level FBI officials were present. I later read the internal FBI communications about that meeting. One of the men wanted to seriously deal with the U.S. Recording problem while the other wanted to execute me on the spot! Shortly afterwards two FBI agents showed up at my plant and tried to get me to withdraw my testimony. Every half hour one agent would leave the room to go to the "bathroom" i.e. change the tape in his recorder. He didn't even have the common sense to flush the toilet, that was on the other side of the wall from my office, to cover his activities. They tried to force me to sign their statement. I initially refused but later agreed to sign it with the statement "I have partially prepared the above statement." That got them out the door. Shortly after that incident a "private detective" called and asked if I would show him how to three wire a telephone. We met in a conference room at a local motel in Towson. He handed me a screwdriver and I handed it right back to him and told him if he wanted to learn the process HE would have to do the work. About that time I noticed the toes of a pair of wing-tipped shoes at the bottom of the curtain that separated the room. Finally that person entered the room and, along with the other, tried to force me to make the modifications. I declined and departed. What a bunch of nonsense. In a few weeks just about every common criminal in the Baltimore area began showing up at my plant. None got in the door. The FBI must have covertly informed these scum bags they were being wiretapped by the FBI and Kaiser could fix their problems. This type of nonsense went on for years. Within months of my testimony before the House Select Committee on Intelligence my business of manufacturing eavesdropping and countermeasure equipment fell to ZERO! Fortunately, I had ability to shift into the manufacture of bomb detection and disposal equipment, a marketplace the intelligence community couldn't and wouldn't dare try to control. Heh, heh... was I wrong... again! -------------------------------------------------------------------------------- Even though it is slightly out of place time wise, I'm putting the Lou Panos Evening Sun article next. Events from roughly 1975 onward attach to the FBI criminal case and I'll pick up there. The Evening Sun Baltimore, MD Monday, October 25, 1976 Witness's Business Suddenly Drops When the House Select Committee on Intelligence invited Marty L. Kaiser to testify at its hearings on illegal wiretapping by government agencies, he did the statesmen a favor and accepted the invitation. Now they can return it by helping him answer a question: Why is it that he averaged about $200,000 annual in business from these agencies before he testified just one year ago and has averaged zilch since then? That's what has happened to Martin Kaiser since he went to Washington last October and startled the intelligence community. He offered evidence that prices for equipment he had sold to an FBI front had apparently been marked up by about 30 per cent before delivery from the front to the FBI. Word later came that Edward H. Levi, Attorney General, ordered an investigation of links between several top echelon FBI officials and the head of the firm serving as the original recipient of the equipment. Citizen Kaiser is the slightly stout little fellow from Timonium who has been called "the Michelangelo of electronics" because of his uncanny talent for making things out of juiced up wires and finding such things made by others to bug their fellow man. There was a time when his marvelous little devices - all assembled by his nimble brain and nimble fingers in a small block building next to Brooks Robinson's sporting goods shop - were the rage of the FBI, Secret Service, armed forces and private customers in the world of the super-duper snoop and counter-snoop. His developments in electronic eavesdropping for law enforcement and government intelligence had made him one of the most widely publicized and sought after specialists in the field. His equipment and techniques led to the discovery that bugs had been placed on telephones in the offices of Governor Mandel, at least four other governors, and Milton A. Allen, the Supreme Bench judge who was then state's attorney for Baltimore. The big, red car in his driveway is known as his "President Sadat Cadillac" because he bought it after a lucrative service performed for the Egyptian chief, training his aides in electronic counterintelligence. Such foreign work and private assignments like countering industrial espionage, says Marty Kaiser, have enabled his company to survive the withdrawal of government business. "I'm still busy, but most of my business comes from other sources," he says. "I've tried to find out why I was dropped so suddenly. After all, I didn't ask to talk to the committee. They invited me and made it clear that I'd be subpoenaed if I didn't accept the invitation. "I even went over and talked to (FBI Director) Clarence Kelley about it for an hour. I was only doing my duty, which is something the FBI certainly ought to understand, and he certainly seemed to understand. At one point Citizen Kaiser brought suit against officials of several intelligent and military agencies under the Freedom of information Act in an attempt to get an official reason for his freeze-out. "About the only thing I got out of that was word from the Army that they have no file on me. I told that they must have, became I was in the Army once. I even gave- them my Trial number, but they said my file must have burned up in a fire at the records center. For Martin Kaiser, who is more at home in the microcosmic world of transistors and printed circuits than the mystical world of Washington politics, there is something familiar about it all. Shortly before establishing his Timonium business 12 years ago, he helped develop a missile detection system heralded in 1964 by President Johnson using the bending beam principle in a device "seeing" beyond the horizon. At the time, he says, he was making about $6,300 a year for Radio Corporation of America after starting at $3,900 about six years earlier. For his sterling work, he was rewarded with an assignment as manager of the anti-missile project when it was moved from Burlington, Mass., to Barbados, West Indies. But one day, be recalls, an Air Force officer asked him to compare RCA's efforts with Raytheon in similar work. "After evaluating their work against RCA, I really felt they were doing a better job, really outstanding. I said so, and the and the next thing we knew was that Raytheon had the project. "I wasn't fired, because that wasn't the way they operate instead, they offered me a promotion - in Australia. "I said it was okay if they'd pay to move my wife and kids, too, but they said no, I'd have to pay. I calculated the costs and they came to roughly $14,000. So I didn't take the promotion." There is something faintly similar between the Australia to which Martin Kaiser was to be assigned in 1964 for his compulsive candor with an Air Force officer and the Siberia of the intelligence world to which he has been relegated for speaking out before the House Select Committee on Intelligence in 1975. For a man whose equipment may form the heart of the nation's defense and counterintelligence system, he seems to be getting short shrift. The least the committee owes him in return for his service is a little help in determining why. Obviously, I did NOT have a huge intelligence organization at my disposal so I did the best I could to uncover those who were liabling and slandering me. My success was limited and it wasn't until after my criminal trial that I uncovered one of the documents that provided the driving source for the incessant anger against me. As a Christian I found it difficult to believe that some individuals would continue a vendetta for such a long period of time... yet, it was true. Here is Attorney General Levi's report on the U.S. Recording scandal that Mr. Panos and I are referring to. Read it and weep. STATEMENT BY ATTORNEY GENERAL GRIFFIN B. BELL ON THE RELEASE OF THE U.S. RECORDING REPORT I am today releasing a report on an investigation of allegations that certain individuals misused their official positions while employed by the Federal Bureau of Investigation. After careful consideration, I decided to issue a full public report. When reporting on disciplinary actions taken against government employees, federal agencies have traditionally made public the administrative action taken and the nature of the conduct which caused the action to be taken, but have not always identified the particular individuals involved. There are, however, certain instances of employee misconduct which call into question the integrity of the institution itself. If the agency's mission is particularly sensitive, the misconduct serious, or the officials of high rank, then the public interest is best served by more extensive disclosure. It is this kind of wrongdoing which is described in the report I am releasing. In cases such as this one, personal privacy considerations must give way to the legitimate interest of the American public in knowing how its government operates and how high-ranking officials have abused their official positions and neglected their official responsibilities. High-ranking officials entrusted with public office simply cannot expect the same measure of privacy about the way they perform their official duties or use their offices as they could expect if they were private citizens. Moreover, the public has a legitimate interest in knowing and being able to evaluate how the heads of Executive agencies deal with official misconduct and take corrective action to ensure that similar, abuses of power and position do not recur. In this particular instance, it is my judgment that the public is entitled to know which officials engaged in the misconduct and which officials did not. The misconduct summarized here, and reports in the news media about these allegations, have cast a shadow over a great institution and over those of its officials who engaged in no wrongdoing whatsoever. I am vitally interested in restoring public confidence in the Federal Bureau of Investigation. This report will confirm that very few individuals engaged in improper conduct. We should bear in mind that this small number of individuals in no way represents the thousands of FBI employees who are dedicated, honest public servants and whose personal and professional integrity is beyond reproach. Today I asked Director Kelley to issue a bulletin to all Bureau officials in which it will be made clear that neither the Department of Justice nor the FBI as institutions, nor I, as Attorney General, will tolerate the kind of misuse of office or abuse of authority described in this report. I am pleased to note that Director Kelley has made the following structural reforms to prevent the recurrence of the kind of improper practices described in this report: 1. Reorganized the Inspection Division and renamed it the Planning and Inspection Division;' created the Office of Professional Responsibility, an Office of Inspections, and an Office of Planning and Evaluation; established within the Office of Inspections a separate Audit Unit, responsible for auditing all FBI funds and financial transactions; and organized the Division so that it reports directly to him, as Director. 2. Removed the Property Procurement and Management Section from the Division with budget responsibility, the Finance and Personnel Division, thereby making one Division head responsible for procurement and another responsible for the FBI budget and funds. Director Kelley has placed a Special Agent Accountant, a Certified Public Accountant, as Section Chief of the Property Procurement and Management Section. 3. Discontinued the use of the U. S. Recording Company as a "cover" or "cut-out" for confidential purposes and established controls to ensure that all purchases are made in accordance with government regulations. 4. Restructured the FBI inventory system, to provide built-in controls and audit trails, and initiated automation of the inventory system to provide better accountability. 5. Discontinued the FBI Laboratory and Exhibits Sections' practice of providing personal services to FBI officials. Director Kelley also has discontinued the use of the unauthorized cash fund once maintained in the Exhibits Section. 6. Reorganized the management and handling of the FBI Recreation Association (FBIRA) and its funds, so that FBIRA officers are aware of their responsibilities to prevent unauthorized expenditures. A new Treasurer of the FBIRA has taken office and is not responsible for any other FBI fund. 7. Replaced the FBI Confidential Fund with the Field Support Account, an imprest fund approved by the Treasury Department. 8. Developed and improved the FBI career development program for Special Agents to ensure that the best qualified individuals are selected for administrative advancement, substantially reducing the possibility that one person or group can control the selection of such candidates. In addition, Director Kelley assures me that the FBI has taken other steps to prevent the kind of misconduct described here. The Bureau has increased legal instruction within its training curriculum; held training sessions on the FBI guidelines for career agents; and issued detailed instructions to the field on legal questions concerning the legality and propriety of investigative techniques. In connection with the latter step, the FBI is seeking advice from the Department's Office of Legal Counsel with increasing frequency. I have asked Director Kelley to bring to my attention any improper attempts to have FBI agents conduct investigations or undertake activities which are not within the Bureau's authorized jurisdiction. I have directed all Bureau personnel to bring reports of misconduct to the attention of appropriate Bureau officials and, when necessary, the Office of Professional Responsibility at the Bureau and Office of Professional Responsibility here at the Justice Department. Recognizing the concern of Bureau personnel about threatened civil litigation., we have submitted legislation to the Congress which would protect FBI personnel against civil suits by substituting the government as defendant. I believe this approach will protect the rights of citizens without unfairly penalizing individual agents. The release of this summary report is intended to assure the nation that the Justice Department can investigate and police itself. It will also put all officials of this Department on notice that they will be held accountable to the American people for the manner in which they discharge their official responsibilities while employed as servants of the American people. # # # THE DEPARTMENT OF JUSTICE REPORT ON THE RELATIONSHIP BETWEEN UNITED STATES RECORDING COMPANY AND THE FEDERAL BUREAU OF INVESTIGATION AND CERTAIN OTHER MATTERS PERTAINING TO THE F.B.I. JANUARY, 1978 -------------------------------------------------------------------------------- THE DEPARTMENT OF JUSTICE REPORT ON THE RELATIONSHIP BETWEEN UNITED STATES RECORDING COMPANY AND THE FEDERAL BUREAU OF INVESTIGATION, AND CERTAIN OTHER MATTERS PERTAINING TO THE F.B.I. This is a report on a Department of Justice investigation of alleged misconduct by certain past and present officials of the Federal Bureau of Investigation. In the Fall of 1975, the House Select Committee on Intelligence provided the Department with information that certain officials of the F.B.I. were allegedly profiting from the Bureau's business transactions with its exclusive electronics equipment supplier, the United States Recording Company of Washington, D.C. On November 3, 1975, Attorney General Edward H. Levi requested F.B.I. Director Clarence M. Kelley to investigate these allegations. Director Kelley appointed an Ad Hoc Committee to oversee an inquiry by the F.B.I.'s Inspection Division, the Bureau unit ordinarily responsible for internal investigations. Attorney General Levi found the report of the Inspection Division and the Ad Hoc Committee to be incomplete and unsatisfactory. On January 2, 1976, he directed the office of Professional Responsibility and the Criminal Division to review the Inspection Division Report and conduct an independent investigation. The Deputy Attorney General requested two Criminal Division attorneys to work with the office of Professional Responsibility in supervising a special team of F.B.I. investigators, who were carefully selected from Bureau field offices for their ability and experience. I.R.S. agents were also selected to investigate the tax implications of the allegations. Hundreds of past and present F.B.I. officials were interviewed. Agent-accountants examined vast quantities of documents and records to determine the nature of the F.B.I. U.S.R.C. relationship and the FBI's procedures for purchasing electronic equipment. As the investigation proceeded and possible criminal violations emerged, a Federal Grand Jury in the District of Columbia, raided by the Criminal Division attorneys, began to review the findings of the Department's investigators. The investigation was completed on November 11, 1976. The findings went beyond the original allegations into other areas of misconduct uncovered by the investigation. The Criminal Division investigative report examined the use of Government material and personnel services by F.B.I. officials for their personal benefit; the administrative mishandling and misapplication of appropriated funds; the misuse of funds of the FBI Recreation Association -- a private association of FBI employees; and improprieties in the FBI's dealings with contractors other than USRC. PART 1 A. The Relationship Between the United States Recording Company and the Federal Bureau of Investigation -------------------------------------------------------------------------------- Joseph Tait has been owner and manager of the United States Recording Company (USRC) since 1938. Incorporated in 1969 in the District of Columbia, USRC sells and distributes electronic equipment, principally to the Federal Government. Mr. Tait started doing business with the Government in 1943, when Army Intelligence asked the Bureau's Laboratory Division, then interested in purchasing two Army microphones, to use USRC as a middleman. in the late 1940's, USRC contracted with the Bureau to service amplifiers, recorders and other technical equipment used by the Laboratory Division. From 1963 to 1975, USRC was virtually the sole supplier of electronic equipment to the FBI, and bureau purchase orders were frequently directed to USRC without open bidding as required by Government procurement statutes and regulations. _1/ FBI officials justified the exclusive relationship under a specific exemption for purchases that require confidentiality for security reasons. _2/ The following facts do not support this explanation, however. For instance, from 1971 to 1975, the Bureau made $500,000 worth of exclusive purchases from USRC which were not marked as confidential. Much of the equipment, including transmitters, receivers, and microphones, clearly fell into the "sensitive" category, but it was not clear why other "nonsensitive" equipment was purchased exclusively from USRC. Also, the Bureau took few precautions to insure the security and confidentiality of the FBI-USRC relationship. A number of electronic equipment manufacturers and suppliers were aware that the FBI used USRC as a middleman. The Bureau often purchased equipment directly from the manufacturer, but always paid its bills through USRC. USRC employees did not receive security clearances. The firm was broken into on at least two occasions. USRC made equipment deliveries to the FBI during working hours in a panel truck plainly marked "U.S. Recording Company." Moreover, the FBI failed to follow proper procedures for such "confidential" purchases. Section 252(c)(12) of Title 41 of the United States Code requires an agency head to make a determination that the purchase of certain equipment should not be publicly disclosed before public advertising and open bidding regulations can be suspended. ado evidence was found that either the Attorney General or the FBI Director ever made such a formal determination. The procurement regulations were also evaded, and the scrutiny of the Department of Justice avoided, by the "splitting" of orders to USRC so that no single order exceeded $2,500, the limit above which all purchase orders had to be advertised for open bid. _3/ From 1961 to 1973, the Bureau purchased large quantities of tape recorders, playback units, closed circuit television systems, video tape machines, laboratory test equipment and FM radio equipment under confidential contract with USRC to the virtual exclusion of all other contractors. The costs to the Government of this special relationship were considerable. From Fiscal Year 1971 through 1975, 60 percent of USRC's total sales were made to the Bureau. Department investigators examined 1,339 USRC sales invoices, compared the cost of each item, where available, to USRC to the price USRC charged the Bureau, and found an average markup of 23.8 percent from Fiscal Year 1969 through 1975. Individual markups varied widely and were as high as 40 to 70 percent. In addition to high markups, by using USRC as a middleman, the Bureau was not able to purchase equipment at discount prices offered by manufacturers for direct sales on large orders. For example, in 1971 the Bureau paid USRC $147,261.50 for burglar alarm equipment which could have been purchased from a New York supplier for $81,357.00. USRC asserted that its overhead costs amounted to 15 to 16 percent over the price it paid to the manufacturer. Department investigators found no objective evidence supporting a figure this high. These findings essentially confirmed allegations made by a Special Agent of the FBI's Radio Engineering Section in 1973. He reported that the FBI paid too much for USRC equipment, that USRC markups were too high, that FBI employees were forced to buy inexpensive items from USRC when they were available elsewhere, and that the FBI-USRC relationship was not confidential. An Inspection Division inquiry was made into those allegations, but this investigation found that during that inquiry key witnesses were not interviewed. One Bureau official, now retired, provided Inspection Division investigators with palpably inaccurate information. The committees which reviewed the inquiry recommended the continued use of USRC as a "cutout" (i.e. a middleman used to conceal the Bureau's identity from outsiders) for confidential procurement without any sound basis for the conclusion. The agent who made the complaint was denied promotion and then transferred to the Tampa Field office, where the Special Agent-in-Charge was told the agent was not a good "team" player and did not get along with other employees. The officials chiefly responsible for the proper implementation of procurement requirements and procedures were John P. Mohr, Assistant to the Director for Administrative Affairs; Nicholas P. Callahan, Assistant Director, Administrative Division; and G. Speights McMichael, Chief Procurement Officer. The investigation clearly established that these officials knowingly failed to apply required procurement procedures to purchases from USRC. Two possible motives were found for their actions. No evidence of cash kickbacks or bribes was discovered. Rather, a pattern of social contacts and minor gratuities was revealed between Mr. Tait and various FBI officials, including Messrs. Mohr, Callahan and Mc-Michael. In the 1960's, Mr. Tait and a number of high Bureau officials would get together at the Blue Ridge Rod and Gun Club (Blue Ridge Club)_4/ to play poker. The poker parties would begin on Friday evening and continue until Saturday noon. (Each participant paid the host, a Bureau official, for the cost of food and lodging.) Mr. Tait also entertained FBI officials on occasion at the Bethesda Country Club, Billy Martin's Carriage House in Georgetown, and the Rotunda Restaurant on Capitol Hill. There was no evidence of excessive drinking, associating with the opposite sex, payoffs, big winners or losers. Nor was there evidence that official FBI files were destroyed, as alleged, at the Blue Ridge Club. Mr. Tait often gave Laboratory Division employees small gifts at Christmas time, such as tie clasps, wallets, manicure sets, and desk calendars. In 1971, Mr. Tait gave one FBI employee a stereo playback unit for his car after he retired from the Bureau. A former USRC employee stated that in 1969 Mr. Tait purchased and paid for the installation of an eight track tape player with two speakers in John P. Mohr's Cadillac at a total cost of $172.12. There was no other evidence of any personal benefit to any other FBI official. The investigation also disclosed another possible reason for the Bureau's special relationship with Mr. Tait and USRC. Over the years, Bureau officials came to trust. Tait's willingness to keep the FBI-USRC relationship confidential, and especially, to keep Congress in the dark about FBI eavesdropping practices. In a March 14, 1963, memorandum to Laboratory Assistant Director, Ivan W. Conrad, M. Mohr ordered that: ...no recorders are to be purchased by the Bureau outside of USRC. The reason for this is because Mr. Tait of the USRC will protect the Bureau in the event questions are asked by a Congressional committee concerning the purchase of recorders by the FBI. Other companies will not do this for the Bureau. On May 22, 1964, after learning that Mr. Tait had been invited to testify before the Senate Subcommittee on Administrative Practice and Procedure, Mr. Mohr wrote in a memorandum: ...Mr. Tait told me he does not know at this point just what he is going to do with the letter but he does not intend to furnish the Subcommittee with any specific information. It should be noted that the Bureau purchases virtually all of its electronic eavesdropping devices from the U.S. Recording Company. Over the years bite. Tait has been an excellent friend of the Bureau and would go to any lengths to protect our interests from any sources. He is a personal friend of mine and he told me that he would most certainly furnish us with any response that he makes to the Subcommittee's letter before submitting it to the Subcommittee._5/ According to past and present employees of the Radio Engineering Section, Mr. Mohr's March 1963 order initiated the Bureau's exclusive relationship with USRC. The Department concluded that FBI officials showed an improper favoritism to Mr. Tait and USRC in violation of specific conflict of interest regulations of the Department of Justice._6/ However, no evidence was found indicating a fraudulent intent sufficient to make out a crime under Federal bribery or fraud statutes. B. Tax Investigation Mr. Tait was tried and, on June 20, 1977, acquitted of all tax evasion charges under Title 26, United States Code, Section 7201, for the years 1971, 1972 and 1973. The Department found no evidence that Mr. Mohr violated any federal tax laws. C. Conversion of Electronic Equipment Ivan W. Conrad, former Assistant Director of the FBI Laboratory Division, was found to have taken a large quantity of FBI electronic equipment to his home, principally, between 1964 and 1966. Conrad liked to tinker with electronic equipment and was a "ham" radio operator. The equipment included voltmeters, watt meters, battery testers, stereo amplifiers, consoles, speakers, microphones, cables, sidewinders, mixers, tape recorders, transformers, and other sorts of electronic gadgetry. This equipment was evidently delivered directly from USRC to Mr. Conrad's office at FBI headquarters and he took the equipment home. No record was made on FBI inventory files that Mr. Conrad had possession of the equipment. In late December 1975, after being questioned by investigators from the 1975 Inspection Division inquiry about unaccounted for equipment and after denying knowledge of it, Mr. Conrad, with Mr. Tait's assistance, shipped twenty-nine packages of electronic recording "ham" radio equipment and a large recording console from his home to the USRC warehouse in Southeast Washington. This included the equipment about which he had been questioned. A USRC employee made the delivery in a USRC truck. As much as eighty percent of the equipment had never been used and was in excellent condition. This equipment was subsequently recovered for the Bureau by this investigation. Purchasing documents revealed an acquisition cost of over $20,000. Mr. Conrad, who retired in July 1973, was interviewed four times during this investigation. He admitted that the equipment once belonged to the FBI. While head of the Laboratory Division, he ordered the equipment from USRC and then used it on "special projects" for Director Hoover, he said. He serviced the Director's television, hi-fi sets, short-wave radio, and designed a portable recording system for him. The console recorder was delivered directly to his home by Mr. Tait, and he took the other equipment home after USRC delivered it to the Bureau. He said that most of the equipment was obtained between 1964 and 1966. Mr. Conrad asserted that he never intended to convert this equipment to his own use. After Director Hoover died in 1972, he wanted either to buy the equipment from USRC or return it to the company. He said he was "tardy" in not returning it to Mr. Tait until late December 1975. In August 1976, in response to inquiries from this investigation, he delivered another shipment of electronic equipment to the FBI. He had signed this out of FBI Laboratory stocks in the early 1960's. Auto radios, control cables, heads, speakers, antennas, assorted accessory equipment, a stereo receiver, tape recorders, microphones, and a sound recording set were included in this shipment. It is believed that all FBI equipment that was in Mr. Conrad's possession has now been recovered. D. Goods and Services of the FBI's Exhibits Section The Department also investigated the allegation that FBI employees were required to provide goods and services to their superiors. The Exhibits Section of the FBI is staffed with accomplished craftsmen and artisans. Their official task is to design and construct exhibits for use in Department litigation and displays, furniture, and other exhibits for internal FBI use. The Radio Engineering Section is responsible for maintaining and servicing FBI electronic equipment. Interviews with past and present employees of those sections and an examination of photographs and personal logs maintained by some of them revealed that services were provided to FBI officials during official duty hours and that goods were produced for FBI officials with Government property and equipment._7/ This constituted a misuse of Government time and materials, contrary to federal law and regulations. 18 U.S.C. 641; 28 C.F.R.ß45.735-16. Prosecutions, where otherwise possible, are barred by the statute of limitations as virtually all of the following misconduct occurred more than five years ago. 18 U.S.C. 3282. 1. Director J. Edgar Hoover Exhibits Section employees painted Director Hoover's house each year when he visited California during the summer. They built a front portico onto his house and dug a fish pond, equipping it with water pump and outdoor lights. They constructed shelves, telephone stands, and an oriental fruitbowl. Home appliances, air conditioners, stereo equipment, tape recorders, and television sets, and electric wiring were serviced and repaired by Radio Engineering. Section employees. Exhibits Section employees serviced his lawn mower and snowblower, maintained his yard, replaced sod twice a year, installed artificial turf, and planted and moved shrubbery. The Exhibits Section built a deck in the rear of his house, a redwood garden fence, a flagstone court and sidewalks. A power window with sliding glass doors was also designed and constructed. Clocks were reset, metal polished, wallpaper retouched, firewood provided, and furniture rearranged. Employees were on call night and day for this work. Mr. Hoover employed one grade 15 Bureau accountant to give him tax advice, maintain his tax records, and prepare his annual Federal tax return. His secretary or two associates would generally make the work requests. Exhibits Section employees were called upon to build gifts for Director Hoover every year for Christmas, his service anniversary and other special occasions. These gifts included furniture such as tables, display cases, cabinets, a bar and valets. Assistant Directors chipped in to pay for cost of materials. Employee labor, however, was not compensated. FBI employees called upon to perform these services did not think them proper, but felt compelled to follow orders for fear of losing their jobs, or of arbitrary transfers or promotion delays. 2. John P. Mohr Mr. Mohr had car radios repaired, the body of his son's MG repaired and repainted, and an elaborate dental exhibit constructed for his son, a dentist. At his home, Exhibits Section employees shaved doors to accommodate new carpeting, and Radio Engineering Section employees repaired his television numerous times, and installed phones, stereo hi-fi speakers (Mr. Mohr's property) and a burglar alarm system which required frequent servicing after installation (FBI property). They repaired his stereo and purchased and installed a new FM radio tuner in an existing cabinet which was modified by Exhibits Section employees. Mr. Mohr also received certain gifts made by the Exhibits Section, including a coat of arms, a dresser top valet, and an oak portable liquor cabinet in the shape of a wine case. Exhibits Section employees painted a desk and made a drawing board for Mr. Mohr. They made, at his direction, a walnut cigar box, a walnut tape-cartridge rack, a walnut wine rack cabinet whose value has been estimated at $2,000, and two walnut gun cases with glass front doors. Mr. Mohr had employees mount snow tires, wash, and transport his personal automobile to commercial garages for repairs. A battery was installed in his car and a turn signal lamp was replaced by Exhibits Section employees. Mr. Mohr also received tapes of record albums which were copied and distributed by Radio Engineering Section employees at the direction of former Assistant to the Director Cartha D. DeLoach. Mr. Mohr received services even after he retired in June 1972. Radio Engineering Section employees were sent to his home, at his request, to repair electrical switches, televisions, and the burglar alarm system which had been . installed earlier. Mr. Mohr also asked a Radio Engineering Section employee to repair his electric blood pressure machine. At Mr. Mohr's request to former Exhibits Section Chief John P. Dunphy, the Exhibits Section built a birdhouse according to plans he provided. 3. Nicholas P. Callahan For Mr. Callahan, Exhibits Section employees silk screened a felt cloth used for table games, cut doors at his house to accommodate new carpeting, printed maps showing the location of his beach home and finished styrofoam nautical objects to decorate it. They made walnut fishing rod racks for his beach home, assembled a lathe fence to prevent sand erosion at his beach home, and built a picket fence for his residence._8/ He had walnut shelves cut by section employees during official hours (he supplied the material), had a piece of plywood covered with weatherproof material for a shed roof, had Exhibits Section employees make a sign for his daughter and son-in-law with their name, and had former Exhibits Section Chief Leo J. Gauthier make a fuse box cover for the basement recreation room in his home. At his request, the exhibits section cast a desk memento in plastic for him to give to a friend and make him a set of stack tables which duplicated a set which had been made for Director Kelley (see below). Radio Engineering Section employees diagnosed troubles with his televisions and Exhibits Section employees framed his personal photographs. Mr. Callahan also received various gifts. He received a framed plaque which recited an Irish prayer, a plaque bearing his coat of arms, a dresser top valet, a portable oak liquor cabinet in the shape of a wine cask, a decorative Christmas tree ball and a gold medallion and chain for Mrs. Callahan into which a gold-disc with the FBI seal was set by the Exhibits Section (Mr. Callahan bought the medallion and chain). The valet and liquor cabinet were duplicates of gifts given to Director Hoover, Mr. Mohr and Mr. Dunphy. Mr. Callahan also received considerable services to his automobile. Employees test drove his personal car, did diagnostic work on it, took it out for washes, fill-ups, snow tire mounting, and servicing at garages and muffler shops. Scratches on his car were touched up. (Some employees, however, recalled that the whole trunk lid on Mr. Callahan's car was painted.) Mr. Callahan states that Mr. McMichael provided him with a Polaroid camera which he used for personal photographs.Film for the camera was also provided at FBI expense. He has since returned the camera.____9/ 4. John P. Dunphy On August 13, 1976, Mr. Dunphy pleaded guilty to a misdemeanor charge under Section 641, Title 18, United States Code, as part of an agreement with the United States as a result of which he voluntarily tendered his resignation from his position as Chief of the Exhibits Section and cooperated with this investigation.__10/ 5. Director Clarence M. Kelley on directions from Mr. Callahan shortly after Director Kelley and his wife moved to Washington, two sets of valances were made and installed in Director Kelley's apartment by the Exhibits Section and two television sets were purchased and installed by the Radio Engineering Section. After this investigation began, Director Kelley paid for the estimated cost of the valances. Director Kelley admitted he knew, after the job was done, that the Exhibits Section installed the first set of valances. when they proved unsatisfactory, he requested a second set to be built and installed. This set was also built and installed by Exhibits Section employees. The television sets were ordered returned by Director Kelley after this investigation revealed their source. Although Mr. Callahan said he directed that the televisions be loaned to Director Kelley, the sets were not entered on FBI equipment inventory until after their return from Director Kelley's apartment on February 19, 1976. The Exhibits Section also built a walnut table, a set of stack tables, and a jewelry box which were given to Director Kelley as gifts from the Executive Conference. He was unaware that the Exhibits Section made the gifts, he said. The Conference, by donations from its members, paid for the materials used in these gifts. Director Kelley's personal automobile received occasional servicing by FBI employees and his FBI-provided chauffeur performed personal errands for him. Section employees repaired a broken cabinet for Director Kelley, and mounted the FBI seal on a gold disc as a charm for the Director's wife. 6. Miscellaneous The practice of providing FBI goods and services to high Bureau officials was not limited to the above individuals. Clyde Tolson, long-time Associate Director under Hoover, had FBI employees develop several patented devices during official hours. These included a reusable bottle cap and a power window opener. These patents were assigned to the FBI. There was no evidence that Mr. Tolson personally benefited from the development of these devices. one of the power windows was installed for President Johnson in the White House. A second unit, designed and intended for President Johnson's ranch, was never completed. E. Imprest Fund There was evidence that an FBI official received reimbursement from the FBI Imprest Fund (petty cash fund) for personal purchases. G. Speights McMichael, Chief Procurement officer, denied that Imprest Funds were used for the personal purchases of Bureau officials. He stated that he did not check to see whether the purchases were proper. Under Federal law he was required, as the Bureau's chief procurement officer, to certify that each disbursement was proper and correct. Each voucher reads, in part: "I certify that the disbursements claimed herein are correct and proper..." Many of the personal purchases could have been used by the Exhibits Section and, therefore, could have escaped Mr. McMichael's attention. He admitted being derelict in his responsibilities as the Imprest Fund's cashier, disbursing and certifying officer. F. Confidential Fund Part of the FBI's annual appropriation is specified "not to exceed $70,000 to meet unforeseen emergencies of a confidential character to be expended under the direction of the Attorney General and to be accounted for solely on his certificate." The most common use is for payments to informants. Contrary to the appropriation language and to Federal regulations, this money was drawn from the Treasury by travel vouchers that failed to reflect the actual expenditures. Top FBI administrative officers were, therefore, able to maintain in cash form these monies over which they exercised custody and control. Field offices were given separate funds for payment of informants which were maintained in separate accounts in addition to the so-called "Confidential Fund" which was kept at headquarters. Also contrary to Federal regulations, the unspent portion of the yearly appropriation was accumulated. By 1974, the headquarters "Confidential Fund" totalled $34,000. Nicholas P. Callahan controlled the Fund from 1946, when he was Number One man to the Assistant Director of the Administrative Division, until July 1973, when he became Associate Director. John P. Mohr, Clyde Tolson, and Director Hoover could also authorize disbursements. A 1974 inspection of the Fund concluded that "no written guidelines exist pertaining to the utilization of this fund" and that separate records for this fund were kept by FBI administrative units apart from the FBI's normal accounting system and were not subject to Treasury Department audit. This investigation revealed uses of the "Confidential Fund" maintained at headquarters by FBI administrative officers that were not within the scope of the appropriation. _l2/ This investigation revealed that between August 1956 and May 1973 the Bureau purchased over $75,000 worth of electronic equipment with money from the Confidential Fund. No memoranda, purchase orders, requisitions, vouchers or similar documentation were located indicating why the equipment was purchased or who requested it. Mr. Callahan acknowledged that Mr. Mohr and he decided to use Confidential Fund monies to purchase electronic equipment. This was not done to disguise the nature of the equipment, he said, but to expedite large purchases of equipment. The Confidential Fund was also used to pay for public relations expenses. Between 1961 and 1975, $23,399.15 of Confidential Funds were spent on room rentals, food, drink and gifts for the liaison officers of foreign and domestic law enforcement and intelligence gathering organizations. Mr. Callahan approved disbursements for liaison functions. There was also evidence that Mr. Mohr, and, to a far lesser extent, Assistant Director Eugene W. Walsh, and Deputy Associate Director Thomas J. Jenkins also authorized such disbursements. Director Kelley recalled such an authorization by himself on one occasion. One of these officials stated that any expenditure which in any way aids "the detection and prosecution of crimes against the United States," including liaison functions, is justified under the FBI's total appropriation and that the Confidential Fund was used only to expedite reimbursement. He admitted, however, that the Confidential Fund had been obtained on the representation to Treasury that they would be used for "unforeseen emergencies of a confidential character." Congress had not been informed that the Bureau was incurring public relations and liaison expenses and paying them out of the Confidential Fund. The Bureau had never submitted a formal request to Congress or the Office of Management and Budget for the proper budget authority to make these Confidential Fund expenditures. Title 31, United States Code, Section 551, which prohibits the use of appropriated funds for lodging, feeding, or providing transportation to an assemblage, can be interpreted specifically to prohibit the use of the Confidential Fund for public relations and liaison purposes. This investigation also revealed that FBI officials used the Confidential Fund to cash personal checks. This practice was stopped after Mr. Welsh was questioned about the practice on May 21, 1976. No evidence was found indicating that any senior official applied these appropriated funds to his own use. G. The FBI Recreation Association The FBI Recreation Association (FBIRA) was founded in 1931 for the purpose of promoting and encouraging athletic, social and welfare activities among its members. The FBIRA is an independent and tax exempt organization whose membership is voluntary. The Association's funds were spent on athletic and social functions, group travel, clubs, hobbies, art shows, and publication of The Investigator, a monthly magazine reporting on FBIRA activities. Its constitution and bylaws provide for the election of officers and a five-member Board of Directors. This investigation revealed that between September 1951 and June 1972, Nicholas P. Callahan obtained $39,590.98 from the FBIRA designated for the "Library Fund." The Association's records contain no explanation or authorization for these disbursements. No disbursement requests or vouchers were found. Mr. Callahan was the Library Fund's only recipient and maintained the only records of its expenditures. Mr. Mohr periodically reviewed the records. Shortly after Mr. Hoover died, Mr. Callahan and Mr. Mohr discontinued the Fund and destroyed its records. Neither of the two FBIRA treasurers who served during this period knew why the fund was named the Library Fund in the FBIRA Disbursements Journal. The treasurers understood that these "Library Fund" disbursements were for Director Hoover's public relations expenses, such as office flowers, condolence telegrams, and for unspecified office expenses, such as books and newspapers. Only Messrs. Hoover, Tolson, Callahan, Mohr, and the treasurers knew about the "Library Fund" and disbursements were made to the Fund without the authorization of FBI-RA officers whose approval is required under the FBIRA charter. Mr. Callahan asserted that the disbursements were for official public relations and liaison functions for which appropriated funds are unavailable under law and that they were proper under a broad interpretation of the FBIRA constitution's "general welfare" clause because money spent promoting the FBI's general welfare is in the best interest of its employees. The investigation also revealed that $55,849.77 of FBIRA funds were expended on receptions for National Academy students and guests between April 8, 1958, and June 20, 1972. The National Academy is an FBI operated training and education facility for local law enforcement personnel around the country. The receptions were not FBIRA activities and they were not open to FBIRA members. About half the cost of the receptions was borne by those attending the receptions so that net cost to the FBIRA after offset by these donations was $29,443.67. The FBIRA constitution and bylaws do not provide for expenditures for such functions as National Academy receptions. From July 1952 to December 1975, another $12,219.90 of FBIRA funds were spent on miscellaneous or liaison expenses and on receptions, luncheons, retirement parties, and gifts for foreign law enforcement liaison officers, and senior FBI officials. The funds also covered the cost of FBI press receptions and other public relations expenses. Director Hoover, Mr. Callahan, Mr. Mohr, Mr. DeLoach, and Mr. Walsh, not the FBIRA Board of Directors, approved these disbursements, according to the records. The above facts established that, from 1951 to 1975, high officials of the FBI obtained funds from the FBIRA for public relations and other uses not authorized by its charter and without obtaining the approval of its Board of Directors. There is no evidence that these Bureau officials converted the money to their own use and, therefore, no evidence of criminal intent as required under Title 18, United States Code, Section 654. H. Special Agents Mutual Benefit Association (SAMBA) SAMBA is an unincorporated association designed to provide life and health insurance to FBI employee members. The Prudential Insurance Company has been SAMBA's underwriter since SAMBA was founded in 1948. SAMBA is independent of the FBI, with private offices at 1325 G Street, N.W., Washington, D.C. This investigation uncovered questionable expenses from SAMBA books and records. The amount of $635.21 was withdrawn from the SAMBA account to pay for a retirement party and gift for Mr. Mohr. $310.22 of this withdrawal covered the price of a Sears Roebuck fishing boat, which was delivered to Mr. Mohr by FBI employees. One SAMBA officer admitted that SAMBA funds were used, in disregard of its charter, to pay for retirement parties, luncheons, and gifts for outgoing SAMBA officials and Directors. Other questionable expenses included two professional football season tickets for the use of a SAr4BA official, Saturday work charges, wedding and anniversary gifts, and annual Christmas parties. Director Kelley and his wife, along with Mr. and Mrs. Mohr, Mr. and Mrs. Thomas Jenkins, and SAMBA President Thomas J. Feeney, Jr., and his wife, attended a weekend meeting in New York City with officials of Prudential Life Insurance Company, which underwrites the SAMBA policy. Director Kelley's travel from Kansas City, Missouri, to New York and return to Washington, D.C., was by Government Travel Request (GTR). Travel for Mrs. Kelley and the others was paid by SAMBA. Prudential paid all other expenses. Director Kelley subsequently reimbursed Prudential for these expenses. I. FBI Officials' Relations with Firearms Suppliers The Remington Arms Company, which bids on arms and ammunition contracts with the FBI, maintains a 300-acre working farm and game preserve in Chestertown, Maryland, called Remington Farms. On January 3 and 4, 1972, Remington hosted three FBI officials at Remington Farms and paid for their room, board, hunting licenses and stamps at a cost of $203.50. Twelve other FBI officials were hosted at the Remington Farm on three subsequent occasions, costing the arms dealer an additional $1,168 in room and board. Remington also paid for liquor, ammunition, guides and game shot on these four weekends. Although a breakdown by individual is not available for these costs, Remington spent a total of $2,013.96 for forty seven individuals for the four weekends. Fifteen of the forty seven guests were then active FBI officials. FBI records show that the Remington Firearms Company has not been awarded a firearms contract since 1971. The hunting weekends mentioned above all occurred after 1971. Six ammunition (not firearms) contracts have been awarded to Remington since fiscal year 1971, but each of these contracts was solicited and awarded after open bidding by the Justice Department. Although several of the FBI officials who attended the hunting weekends were in a position to influence the awarding of arms contracts, no arms contracts were awarded to Remington during the 1970's. Nor were arms contracts awarded during this time to Winchester Firearms Company which hosted a hunting weekend for three Bureau officials in 1973. The Federal illegal gratuities statute, Title 18, United States Code, Sections 201 (f) and (g), requires that the gratuity shall be "for or because of" an official act. This investigation found no evidence that the recipients of the gratuities did anything for Remington or Winchester, and therefore, there was no evidence warranting prosecution under this statute. The evidence does indicate that the Departmental regulation prohibiting the accepting of gifts or entertainment from those having or seeking a contractual relationship with the United States was violated. 28 C.F.R. ß45.735-14(a). Moreover, the evidence shows that these employees also violated the general Departmental prohibition against conduct creating the appearance of impropriety. 28 C.F.R. ß45.735-2. The Attorney General has referred this matter to the FBI Director with instructions to take appropriate administrative action against these employees. J. Miscellaneous Allegations 1. Financial Dealings Between Joseph C. Palumbo and John P. Mohr This investigation received information from the House Select Committee on Intelligence that John P. Mohr and Joseph C. Palumbo of Charlottesville, Virginia had had improper financial dealings. Mr. Palumbo and Mr. Mohr entered a financial arrangement in late 1972, after Mr. Mohr had retired from the FBI. The transaction was entirely lawful and at arms length and no evidence was found that Mr. Palumbo ever discussed the FBI or its activities with Mr. Mohr. 2. Official and Confidential Files During 1975, an investigation was conducted into the disposition of the "official and confidential files" of J. Edgar Hoover following his death in May 1972. The inquiry determined that the files were turned over to Assistant Director W. Mark Felt by Miss Helen W. Gandy, Executive Assistant to Mr. Hoover, on May 4, 1972, and now are located at FBI headquarters. No evidence was found that official FBI files of any kind were removed to Mr. Hoover's home following his death. A. PART II Summary and Actions Taken Against Principal Subjects 1. John P. Mohr (a) Mr. Mohr was Assistant Director for the Administrative Division of the FBI and the Assistant to the Director. He was primarily responsible for using USRC as an exclusive supplier of electronics equipment to the FBI. His conduct towardß,USRC violated 28 C.F.R. 045.735-2(b) and (c)(2) (prohibiting employees from giving preferential treatment to any person outside the Department). He received a few gratuities (tape deck, Christmas gifts) from Mr. Tait. No evidence was found that he was bribed, but he violated 945.735-14(a)(1), which prohibits employees from accepting gifts from those doing business with the Department. (b) FBI employees provided goods and services to him as described above. This arguably violated 18 U.S.C. 641 (conversion of government property to his own use), (prosecution barred by the statute of limitations), and 28 C.F.R. ß45.735-16 (misuse of federal property). (c) Mr. Mohr was also responsible, along with Mr. Callahan, for using FBI Recreation Association and Confidential Fund monies for unauthorized public relations purposes. This matter has been referred to the Department's office of Management and Finance for appropriate action (see footnote 12 above). In 1972, he attended an expense paid hunting weekend at Remington Farms, an FBI arms supplier. This is a violation of the Department prohibition against accepting gifts from those doing business with the Department, 28 C.F.R. ß45.735-14(a)(1). (d) No action has been taken against Mr. Mohr. He retired on June 30, 1972. Criminal action under all of the above federal provisions is barred by the five year statute of limitations. 2. Nicholas P. Callahan Mr. Callahan was Assistant Director for the FBI's Administrative Division and later Associate Director. In 1976, pursuant to Attorney General Levi's order, he was asked to resign as a result of this investigation. He did resign. (a) Mr. Callahan was responsible for improperly diverting thousands of dollars of FBIRA and Confidential Fund monies to official FBI public relations activities. The funds were not authorized or appropriated for public relations activities. There was no evidence that he converted these funds to his personal use, and therefore, no evidence warranting prosecution. This matter has been referred to the Department's Office of Management and Finance for appropriate action. (See footnote 12 above.) (b) Mr. Callahan admitted receiving FBI goods and services. FBI employees decorated his beach house, built a fence, walnut shelves, and other furniture for his residence. The statute of limitations bars prosecution of Mr. Callahan for receiving government property in violation of 18 U.S.C. 641. (c) No evidence was found that Mr. Callahan was bribed or that he received illegal gratuities. (d) No further action has been taken against Mr. Callahan. 3. Ivan W. Conrad Mr. Conrad was employed by the FBI Laboratory in many positions from 1934 to 1973. He retired on July 12, 1973, as Assistant Director of the Laboratory. (a) Mr. Conrad took many pieces of electronic recording and amplifying equipment home with him and used them for his own benefit. Mr. Conrad asserted he had the equipment for legitimate purposes. The Department recovered all equipment, and Mr. Conrad tendered a $1,500 cashier's check to pay for his use of the equipment. (b) No further action has been taken against Mr. Conrad. Prosecution was barred, in the judgement of the Criminal Division, by the statute of limitations and because of the lack of evidence showing criminal intent on the part of Mr. Conrad. 4. Clarence M. Kelley Director Kelley received the limited amount of goods and services described above. He was not involved in any of the other matters which are the subject of this report. Attorney General Levi and Deputy Attorney General Tyler determined that no disciplinary action was called for, but that Director Kelley should reimburse the Bureau for the goods and services he received. That has been done and no further action against him has been taken. Director Kelley should be given credit for putting an end to the improper practices described in the report. His cooperation greatly assisted Departmental investigators in uncovering the facts. His cooperation made this report possible. It should also be noted that Director Kelley was primarily responsible for bringing about the internal reforms set forth in the final section of this report. 5. G. Speights McMichael Mr. McMichael is no longer in charge of, but continues to work in, the FBI's Property Procurement and Management Section. He is no longer cashier of the Imprest Fund, a petty cash reimbursement fund. (a) Mr. McMichael clearly neglected his responsibilities in managing the Imprest Fund. There is some evidence that he permitted violations of procurement procedures to favor USRC in the purchase of electronic equipment. 41 U.S.C. 252(c)(12). There is no evidence of bribery. (b) While serving as the FBI's chief procurement officer, he attended an expense paid hunting weekend at Remington Farms. This is a probable violation of the Department regulation prohibiting the receipt of gifts from those doing business with the Department. 28 C.F.R. ß45.735 14 (a) (1) . (c) The evidence that Mr. McMichael knowingly approved Imprest Fund reimbursement for the personal purchases of an FBI employee is not substantial. There is no evidence that he converted government money to his own use. 18 U.S.C. 641 and 643. (d) McMichael clearly failed to meet his responsibilities as the FBI's Chief Procurement officer and probably violated 28 C.F.R. 945.735-13 (misuse of official position) and 945.735-16 (misuse of federal property). His attendance at Remington Farms probably violated ß45.735-14 (gifts from Department contractors). He failed to assist Department investigators. The statute of limitations bars criminal action against Mr. McMichael. These matters have, however, been referred to the Director with instructions to institute appropriate administrative action against him. 6. Joseph X. Tait (a) On June 20, 1977, a jury acquitted Mr. Tait of. charges that he understated his income in 1971, 1972 and 1973, in violation of 26 U.S.C. 7201. (b) A jury acquitted Mr. Tait on all counts of charges that he violated 18 U.S.C. 287 (false claims on the United States), 371 (conspiracy to defraud), and 1341 (mail fraud). (c) Further comment regarding Mr. Tait is considered inappropriate because, unlike the other subjects of this report, he is not a government official. B. Possible Civil Actions 1. U.S. Recording Company The Department is considering taking civil action to invalidate USRC contracts and recover the excess profits obtained from the Bureau. The basis of such a suit would be the clear breach of applicable government procurement regulations. The Civil Division is now evaluating the relevant facts to determine whether the Department should institute a civil recovery action against the United States Recording Company or its president. 2. Conversion of Government Property by Bureau Officials Civil actions may not be instituted because: the actual amounts involved are small compared to the expense of litigation; there would be substantial difficulty in fixing the government's loss with any appreciable accuracy; and, much of the government's property has already been returned. In addition, civil action may be barred by the statute of limitations. 3. Imprest Fund Approximately, $1,700 was diverted from that fund for clearly improper purposes. The property obtained with Imprest Fund monies has been returned to the Bureau. This matter has been referred to the Department's Office of Management and Finance to review the facts, and to take necessary administrative action. 4. Confidential Fund Approximately, $75,000 was spent to purchase electronic equipment and $23,000 was spent over a fifteen year period on public relations type matter. This matter has also been referred to the Department's Office of Management and Finance for appropriate administrative action. 5. FBI Recreation Association Monies from the FBI Recreation Association were improperly diverted. According to the Civil Division, the Government lacks standing to initiate any civil action, except under a somewhat strained theory of parens patriae. Accordingly, no civil action will be instituted regarding this matter. C. Action Taken to Prevent Recurrence Within the last fifteen months, Director Kelley has taken the following corrective measures to prevent the recurrence of the improper practices described in this report.He has: 1. Reorganized the Inspection Division and renamed it the Planning and Inspection Division; created the office of Professional Responsibility, an office of Inspections, and an office of Planning and Evaluation;' established within the office of Inspections a separate Audit Unit, responsible for auditing all FBI funds and financial transactions; and organized the Division so that it reports directly to him, as Director. 2. Removed the Property Procurement and Management Section from the Division with budget responsibility, the Finance and Personnel Division, thereby making one Division head responsible for procurement and another responsible for the FBI budget and funds. Director Kelley has placed a Special Agent Accountant, a Certified Public Accountant, as Section Chief of the Property Procurement and Management Section. 3. Discontinued the use of the U.S. Recording Company as a "cover" or "cut-out" for confidential purposes and established controls to ensure that all purchases are made in accordance with government regulations. 4. Restructured the FBI inventory system, to provide built-in controls and audit trails, and initiated automation of the inventory system to provide better accountability. 5. Discontinued the FBI Laboratory and Exhibits Sections' practice of providing personal services to FBI officials. Director Kelley also has discontinued the use of the unauthorized cash fund once maintained in the Exhibits Section. 6. Reorganized the management and handling of the FBI Recreation Association (FBIRA) and its funds, so that FBIRA officers are aware of their responsibilities to prevent unauthorized expenditures. A new treasurer of the FBIRA has taken office and is not responsible for any other FBI fund. 7. Replaced the FBI Confidential Fund with the Field Support Account, an imprest fund approved by the Treasury Department and administered in accordance with Treasury and Justice Department regulations. 8. Developed and improved the FBI career development program for Special Agents to ensure that the best qualified individuals are selected for administrative advancement, substantially reducing the possibility that one person or group can control the selection of such candidates. In addition to these administrative measures, the FBI has increased legal instruction within its training curriculum; held training sessions on the FBI guidelines for career agents; and issued detailed instructions to the field on legal questions concerning the legality and propriety of investigative techniques. The FBI is also posing such questions to the Department's Office of Legal Counsel with increasing frequency. On January 3, 1978, the Attorney General referred the entire U.S. Recording Company matter to the FBI and instructed the Director to initiate administrative proceedings against G. Speights McMichael and other FBI employees whom the Director considers to be appropriate, subjects for administrative action. The Attorney General requested the Director to keep him advised by informing the Department's Counsel on Professional Responsibility of all administrative action taken. Finally, the Attorney General has asked Director Kelley to bring to the Attorney General's attention any improper attempts to have FBI agents conduct investigations or undertake activities which are not within the Bureau's authorized jurisdiction. The Attorney General has also directed all Bureau personnel to bring reports of misconduct to the attention of appropriate Bureau officials, and when necessary, the office of Professional Responsibility at the Bureau and at the Department of Justice. _1/ 41 U.S.C. 252 (c) and regulations promulgated thereunder. _2/ 41 U.S.C. 252 (c) (12) . _3/ The limit was raised to $10,000 by statutory amendment in 1974. _4/ The Blue Ridge Club burned down on November 23, 1975, just before House Select Committee investigators were scheduled to interview Club employees. This investigation revealed that an eight-year-old child caused the fire while playing with matches. The child "confessed" to Department investigators. The testimony of other witnesses corroborates the confession. _5/ A search of the transcripts of committee hearings revealed no evidence that Mr. Tait actually testified before the referenced subcommittee or any other subcommittee. _6/ 28 C.F.R. ß45.735-2(b) and (c) prohibit the giving of favored treatment or advantage to any member of the public and any action which might result in, or create the appearance of: preferential treatment, the use of public office for private gain, or an adverse effect on public confidence in the integrity of the Government. 28 C.F.R. X45.735-14(a)(1) prohibits the acceptance by public officials of gifts or gratuities from those doing business with the Department of Justice. _7/ No official documents, memoranda, or work orders were found which account for the work performed, the materials used, or the goods produced by Exhibits Section employees for the personal benefit of Bureau officials. _8/ Contrary to the evidence obtained from Exhibits Section employees, Mr. Callahan stated that he paid for the material for the fences and installed them himself on personal time. _9/ Mr. Callahan testified that agents are allowed to take home cameras for personal use to maintain their proficiency with them. Agents assigned to this investigation verified that this is the case, but indicated that the practice is intended to maintain familiarity with cameras more complex than the Polaroid. _10/ A further term of the agreement was that he make restitution for the goods he received in an amount to be determined later between his attorney and attorneys for the United States. On September 28, 1976, Dunphy was fined $500 and placed on probation. He returned all government materials to the Bureau, in accordance with the plea agreement. There was no footnote _11/ _12/ Title 31 U.S.C. 628, a noncriminal statute, prohibits the use of appropriated funds for a purpose not specified in the appropriation. The Counsel on Professional Responsibility has requested the Department's Office of Management and Finance to review these facts, to take necessary administrative action to prevent the recurrence of this conduct, and if appropriate, to refer the matter to the Comptroller General for possible recovery actions against responsible disbursing officers. DOJ-1978-M 02/02 -------------------------------------------------------------------------------- There are four more chapters to this story and they will be up loaded as soon as I can write them. They are... Bugging the FBI... The criminal case... The civil case... Repercussions... -------------------------------------------------------------------------------- The following newspaper articles were part of the original upload. The new chapters mentioned above will fill in and expand around these articles with true events. Journal Tuesday, February 21, 1978 Jury May Get Case Today, Is Kaiser Object of FBI Vendetta? Twelve jurors probably will begin deliberations today to decide whether Martin L. Kaiser is guilty of conspiracy and illegally bugging FBI agents while they investigated Northwestern Bank last year. One thing the jury must decide is whether the FBI is carrying out a vendetta against Kaiser, one of the, country's foremost wiretap and bugging experts. Kaiser, a manufacturer of surveillance devices - from Maryland, was once a major supplier of the FBI's surveillance equipment But his dealings with the FBI stopped when he publicly identified an FBI front company used to buy his products and resell them to government agencies at substantially higher prices. Today, Kaiser no longer works with the FBI, but his clients include the ..., the Army, and Air Force, several foreign countries and more than 200 police departments. Martin Kaiser is still one of the most respected makers of bugging equipment in the world - among his character references is the head of the CIA's procurement division. Kaiser still supplies the ... with a great deal of surveillance gear' and he still holds an agency rating of secret. But Kaiser says that the FBI wants revenge on him. He alleges that the FBI seeks revenge because of his testimony before the presidentially appointed National Wiretap Commission and the House Select Committee on Intelligence in 1975. In his testimony before the panels Kaiser revealed links between the FBI and U.S. Recording Co., an electronic equipment purchasing company. Kaiser told the committee that the recording company was actually an FBI front - an apparently legitimate private business. Which was in fact operated by high ranking FBI officials. Kaiser had done a considerable amount of business with the FBI, he said, but his business began to suffer greatly after he was instructed in 1969 to sell his equipment to U.S. Recording instead of directly to the FBI. Kaiser testified that he first assured that the procedure was merely a security measure, - but he later discovered that the electronic devices he sold to U.S. Recording were being duplicated and resold at substantial markups. Kaiser had sold the FBI many surveillance devices - among them the bug detection kit used to find the listening devices Kaiser is charged with installing at Northwestern's headquarters in Wilkesboro. After his testimony an investigation by the General Accounting Office revealed that the FBI front company had marked up the prices of Kaiser's gear from 12 percent to 280 percent. Kaiser testified that the FBI was not the only group buying his products through U.S. Recording. In addition to federal agencies, Kaiser told the congressional committee foreign governments, including Canada and Iran bought the marked-up goods. Kaiser now says that most - of his federal contracts were severed after he brought the front company to public attention. An affidavit Kaiser filed in federal court claims that his sales plummeted from $200,000 annually before his testimony to $450 afterward. His allegations of a vendetta go beyond the U.S. Recording Co. payment scheme, though. Kaiser said that Thomas J. Brereton, the FBI agent in charge of the Northwestern investigation illegally attended grand jury proceedings while Kaiser was testifying. Kaiser's allegations resulted in a special hearing called by Judge Hiram H. Ward in U.S. Middle District Court here last month. Ward ruled that Brereton had not improperly attended the grand jury hearings and that "a mistake had been made, honest or otherwise." Brereton testified that he had been in the U S. attorneys law library during Kaiser's grand jury appearance. Friction between Kaiser and Brereton seemed to continue throughout the seven days of testimony in the bugging trial. Kaiser's attorneys repeatedly asked Ward to admonish Brereton for speaking with Assistant U.S. Attorney Benjamin White during cross examination. Brereton consulted with White before many questions were put to defense witnesses, and Kaiser's attorneys objected that the jury could overhear Brereton's comment's. Several times, Ward instructed Brereton to lower his voice when he spoke with the prosecutor. A part of Kaiser's affidavit on the FBI vendetta matter said that two special FBI agents visited him in December 1975 to interview him on his U S. Recording Co. testimony. Kaiser said the two "literally held me for several hours hostage... to elicit a statement which repudiated my earlier congressional testimony and absolved the Bureau and U.S. Recording Co. of their wrongdoing." The U.S. attorney's office filed a motion in federal court to deny Kaiser's allegations of a vendetta. Kaiser's trial will continue at 9:30 a.m. today, with final arguments and instructions to the jury scheduled. -------------------------------------------------------------------------------- Winston-Salem Journal Wednesday - February 22, 1978 Martin L. Kaiser has been found not guilty of bugging FBI agents, conspiracy and illegal transporting listening devices. The verdict was returned by a jury of eight women and four men after 2.5 hours of deliberation yesterday afternoon in U.S. Federal District Court here. Kaiser, an electronic surveillance expert from Cockeysville, MD, had been charged with helping Edwin Duncan Jr. and Gwen E. Bowers bug FBI agents who were investigating Northwestern Bank last year. Duncan, former bank board chairman, and Bowers, a former bank vice president, pleaded guilty to similar charges last November. The bugging took place between April and July 1977 in an office in the bank's headquarters in Wilkesboro. "In all honesty," Kaiser said after the verdict was announced, "it's what we expected. Needless to say I'm satisfied." Throughout the eight day trial Kaiser admitted installing bugging equipment in a bank office used by the FBI agents but denied knowing that Duncan and Bowers would use the equipment illegally. The government case contended that Kaiser was fully aware that bank employees would use the bugging system to illegally monitor the FBI investigation. "What this case is really about is human rights - the right to human privacy," said Assistant U.S. attorney Benjamin White in his final argument yesterday morning. "There is nothing illegal about him installing these devices - many attorneys have them in their offices, many businessmen have them in their offices," said John Morrow, ore of Kaiser's attorneys. Much of Kaiser's trial was marked by controversy over his past business dealings with the FBI. Kaiser, who is a major manufacturer of surveillance equipment for government agencies, filed a pretrial affidavit protesting that the FBI was seeking revenge against him. Kaiser said the FBI wanted vengeance because of testimony he gave before congressional panels on surveillance matters. He had identified an FBI front company that bought his equipment and resold it to the FBI and other government agencies at marked-up prices. Most of the defense witnesses were from law enforcement agencies, and most testified that Kaiser is reputable and trustworthy. Kaiser testified that at he Sells bugging equipment and bomb detection gear to more than 200 law enforcement groups. His clients, he said, include the ..., the Army and Air Force and several foreign governments. In his closing remarks, White questioned the nature of Kaiser's relations with his clients. After saying that Kaiser had once had the trust of law enforcement groups. White said, "Mr. Kaiser sold that trust, ladies and gentlemen, for $3,500 (Kaisers fee - for the Northwestern Bank bugging)." Shortly after the end of the trial, one of Kaiser's attorneys told reporters that Northwestern has never paid Kaiser's fee. "We hope we don't have to sue them to get it - they're a big bank," said Bernard Fensterwald, a Washington lawyer who once defended James McCord, one of the Watergate burglars. Kaiser said he plans to visit his daughter in Florida and then return to work. "I've really been out of business since July 29 (the date of his indictment)," he said. "I'm really looking forward to getting back to it." -------------------------------------------------------------------------------- The Sentinel Winston-Salem, NC Saturday, February 5, 1983 Defendants Claim Agents Abused Process GREENSBORO, NC - Two FBI agents abused the criminal process to strengthen their position in a $22 million lawsuit stemming from the 1977 investigation and bugging at Northwestern Bank lawyers for defendants in the suit charged in federal court yesterday. One defendant in the civil case also accused the FBI of tampering with evidence. In an affidavit, defendant Martin L. Kaiser, an Electronics expert from Cockeysville, MD., said bureau agents or, employees altered two tape recordings and switched tape recorders. He also claimed that one agent removed documents from FBI files which have never been recovered. The allegations were made during three hours of argument In U.S. Middle District Court Federal Judge Frank W. Bullock Jr. held a hearing on numerous motions pending in the case which began almost five years ago. In July 1978, FBI agents Thomas J. Brereton and Zachary T. Lowe filed suit alleging that their civil rights were violated and their privacy was invaded when their conversations were electronically recorded during their investigation of Northwestern Bank from April to July 1977. Brereton and Lowe charged that Edwin Duncan Jr., then Northwestern Bank chairman, and Gwen E. Bowers, then bank vice president, conspired to intercept the agents oral and telephone communications. They also claimed that Kaiser agreed to help Duncan and Bowers by possessing, selling, transporting, and installing electronic surveillance equipment or bugs to help them accomplish their sinister conspiratorial scheme." Northwestern Bank and Northwestern Financial Corp., the bank's holding company, also are defendants in the lawsuit. The agents discovered they were being recorded while they were investigating financial irregularities at the North Wilkesboro-based bank. Duncan was convicted of misapplying bank funds and recording conversations of IRS agents who were reviewing bank records in October 1977, and in November 1977, he pleaded guilty to the bugging conspiracy against the FBI. Bowers pleaded guilty to the conspiracy to record the FBI agents' conversations and to the actual bugging. However, Kaiser pleaded not guilty to charges related to the bugging and he was acquitted in federal court in Winston-Salem in February 1978. Since Brereton and Lowe's suit was filed, it has become one of the most complicated civil cases ever in the U.S. Middle District. Three Greensboro attorneys - Bynum N. Hunter, Michael R. Abel, and Ben F. Tennille, have been released as defendants, and the remaining defendants and the plaintiffs have filed pages and pages of motions' affidavits and cross claims. There also is a similar case filed by former FBI agent Donald G. Wilson for $5.5 million in damages from Duncan, Bowers, Northwestern Bank and Northwestern Financial. Lawyers for Duncan and Kaiser yesterday said Brereton and Lowe used the criminal investigation of their clients to prepare for their multi-million-dollar civil suit. "They were given access and power of the federal government they should not have been given," Stephen Spring, a Louisiana attorney representing Kaiser said. Duncan's attorney, Ted G. West, claimed that the former bank chairman Agreed to plead guilty to the bugging conspiracy during a meeting with Brereton and a former U.S. attorney. "We contend that Mr. Brereton and Mr. Lowe abused the process," West said. "That's what it boils down to in instigating a guilty plea from Mr. Duncan so they could have something to hang their hat on in this civil case." He also said, "This court must and should look closely at a situation where investigators of the U.S. government pursue their investigation knowing during the entire course of the investigation that they have a civil suit in mind". But Mike Bailey, one of Brereton's and Lowe's lawyers, said the agents were only fulfilling their obligations by investigating and helping prosecute the cases. Kaiser filed a $720,000 counterclaim against Brereton and Lowe in 1978 and last year he asked to add the FBI to his suit. He is seeking $10.7 million from the FBI. Kaiser claimed the bureau "actually assisted and enabled... Brereton and Lowe to gain access to Information and records while on bureau time and through bureau resources of information directly bearing to the outcome of the civil action." Duncan also has asked the court to allow him to add the FBI, a former U. S. attorney and a former assistant U.S. attorney to his cross-claim against Brereton and Lowe. However, Bullock questioned whether the statutory limitation on adding to the cross-claims has run out. Kaiser made other allegations against the FBI in his affidavit. He accused the bureau of fraudulently concealing and manufacturing evidence. The Panasonic tape recorder presented at his criminal trial played at one-third normal speed, Kaiser said, but he said the recorder being used as evidence in the civil case operated at one-fourth normal speed. He also said tests showed that two tape recordings of Brereton and Lowe were not made on the tape recorder provided to Northwestern Bank in 1977 and that the two tapes were made on two different recorders, he said. Kaiser said, "It is my belief based upon a review of tests that these modifications or manufacturing of evidence was performed by agents and/or employees of the Federal Bureau of Investigation as part of a conspiracy wherein the FBI acted in concert with plaintiffs Brereton and Lowe by attempting to convict me of a crime I did not commit ... and instituting the present civil suit as a retaliatory measure designed to drain me of funds necessarily spent in my defense." Kaiser further charged that Brereton took documents out of the FBI files and that the bureau claims those papers are lost. He also said Brereton made misrepresentations to a grand jury which led to Kaiser's indictment on charges related to the buggings Brereton did that Kaiser said, so he could use the criminal trial to gather evidence for the civil case. Duncan and Kaiser have filed motions for summary judgment and have asked for dismissal of the actions against them. Yesterday, attorneys for Northwestern Bank and Northwestern Financial Corp. also argued for summary judgment and dismissal. "The bank was the one who was losing from this illegal activity" not just the customers, The bank," Richard Vanore, Northwestern attorney, said. "Because (Duncan) benefited is not sufficient to say the bank benefited and should be held responsible for his action." He also charged that Brereton and Lowe are "seeking monetary damages as the real fruit of their criminal investigation" -------------------------------------------------------------------------------- The Sentinel Winston-Salem, NC Bugging Expert Adds FBI To His Suit Against Agents GREENSBORO, NC - A Maryland electronics expert is asking for more than $10 million in damages from the FBI, claiming that the agency as assisted two of its agents who were planning a lawsuit against him. Martin L. Kaiser specializes in electronic surveillance (bugging), counter-surveillance and bomb detection equipment says in a document filed in federal court here that agents Thomas J. Brereton and Zachary T. Lowe were contemplating a lawsuit against him while they were involved in prosecuting him on criminal charges. The FBI "actually assisted and enabled... Brereton and Lowe to gain access to information and records while on bureau time and through bureau resources of information directly bearing to the outcome of their proposed civil action", Kaiser claims. He says in the document which is an amendment to an earlier counterclaims against the agents, that the FBI's action represents a "malicious motive for the institution and prosecution" of the criminal case against him "in violation of federal statutes which require federal agents with a conflict of interest to excuse themselves from such investigation". Brereton and Lowe sued Kaiser in U. S. Middle District Court in July 1978, five months after he was found not guilty of charges of bugging them while they were conducting an investigation at Northwestern Bank in Wilkesboro in 1977. The agents also sued the bank and its former president Edwin Duncan Jr., claiming that their right to privacy was violated by the bugging of the room they were using at the bank head quarters. The agents claim a total of $22 million in damages. Several months later Kaiser filed a counterclaim against the agents claiming they abused the criminal process against him and asking for $720,000 in damages. The agents responded by denying that they had acted improperly in the criminal investigation and they asked for a dismissal of the counterclaim. Kaiser's addition to the counterclaims filed this week asks that the United States be brought into the suit to represent the FBI, and he asks for an additional $10.7 million in damages. U. S. Attorney Kenneth W. McAllister said this morning that "I certainly wouldn't comment on any pending civil actions". Duncan and the bank have filed motions for dismissal of the agents' suit, and Duncan has asked the court for permission to file his own counterclaim against the government and prosecutors in a 1977 criminal case against him. Duncan pleaded guilty to charges of conspiring to bug the agents. He spent several months in prison as the result of convictions on other charges stemming from the agents investigation. No trial dates have been set in the lawsuit, which has become one of the most complex civil cases now pending in the district. -------------------------------------------------------------------------------- The Daily Telegraph London, England Bugged FBI Men with Hemorrhoids Sue for 11 Million A telephone tapping expert who supplied the Federal Bureau of Investigation with electronic eavesdropping devices is being sued for alleged "bugging of two FBI agents." The agents, Thomas Brereton and Zachary Lowe, are claiming eleven million pounds compensation They say their right as private citizens were "grossly violated" and they are suing Mr. Martin Kaiser and a bank in North Carolina. They were investigating the bank's affairs after allegations that an executive was misusing funds, and according to Mr. Kaiser a vice president of the bank sought his assistance, wanting recorders installed to tape conversations and interviews in the bank involving the officers. Devices were provided, Mr. Kaiser said, on the understanding that the equipment would be used legally with the consent of the agents. The FBI men have now named him together with the bank in a lawsuit filed at Greensboro, North Carolina. In a court deposition Mr. Brereton tells of finding five bugging devices, including special transmitters and amplifiers, in the building. He recalled: "That night there was tremendous anger and frustration". He remembered one of the bank's executives sitting "smirking at me when he pulled all the mikes out of the wall. He went on: "You wouldn't believe the anger that took place in here that night when I found out... you go home and all you do is think about it." "You know you've been bugged... It keeps playing on your mind". As a result he was humiliated and embarrassed as a special agent and suffered, he said, increased hypertension and cysts in his eyes. His colleague said in his deposition that after the incident his hemorrhoid condition worsened. FBI AXIOM If you lie in a court of law and get away with it, it is called "JUSTICE." If you lie in a court of law and get caught, it is called "PERJURY." -------------------------------------------------------------------------------- Martin L. Kaiser in His Lab -------------------------------------------------------------------------------- Note: In certain government circles it is "understood" that Martin L. Kaiser inspired Francis Ford Coppola to write the manuscript for "The Conversation" back in the early seventies. Some of Marty's FBI Story formed the basis for the new Jerry Bruckheimer/Tony Scott film "Enemy of the State" starring Gene Hackman, Will Smith, John Voit and Regina King. -------------------------------------------------------------------------------- HOME [Non-text portions of this message have been removed] 4789 From: James M. Atkinson Date: Wed Feb 13, 2002 4:23pm Subject: Microsoft Settlement Decision Keeps Redmond from Monopolizing Massive Microsoft Patch Industry Redmond, Wash. (SatireWire.com) - In a surprise settlement today with nine U.S. states, Microsoft agreed to be split into two independent companies - one that will continue to make Microsoft operating systems, browsers, and server software, and another, potentially larger company that will make patches for Microsoft operating systems, browsers, and server software. Critics immediately charged that the settlement - which overrides a previous agreement with the U.S. Department of Justice - does nothing to diminish Microsoft's standing as the world's most powerful software company. But industry analysts argued that providing patches for security holes in Microsoft programs is a major, untapped growth industry, and applauded the states for not allowing Redmond to control it. "Just consider, Microsoft can make an operating system, such as Windows XP, and sell 200 million copies, but each one of those copies is going to need at least five patches to fix security holes, so that's 1 billion patches," said Gartner Group analyst Mitch Fershing. "That is an enormous, undeveloped market." Microsoft employees seem to agree, as sources in Redmond described a "mad scramble" among staffers to position themselves for spots at the new company, called Patchsoft. Asked why people would want to leave Microsoft for a startup, the source said the answer was "really quite simple." "Everyone here is asking themselves, 'Do I want to be part of the problem, or part of the solution?'" he said. But J.P. Morgan analyst Sherill Walk suspects another motive. "Considering the sheer number of patches we're talking about, I think the new company will become another monopoly, and I believe the people who've jumped ship very well know that." "Nonsense. It's really all about consumer choice," responded Patchsoft's new co-CEOs, Bill Gates and Steve Ballmer. But how will Patchsoft make money? Currently, Microsoft issues free patches for problems in Windows XP, SQL Server, Internet Explorer, Outlook, Windows 2000, Flight Simulator, Front Page, Windows Me, Media Player, Passport, NT Server, Windows 98, LAN Manager (for a complete list of MS software needing patches, see www.support.microsoft.com). Under the agreement, Microsoft will no longer issue patches, which Gates said explains the recent five-day outage at Microsoft's upgrade site. "That was planned," he said. "It was a test of the Microsoft No Patch Access system. Went perfectly. No one was able to download anything." At a press conference to outline the settlement, Connecticut Attorney General Richard Blumenthal pledged to keep a close eye on Patchsoft to ensure it would not overcharge for its services. He also expressed hope that other firms would soon become Certified Microsoft Patch Developers (CMPDs) and challenge the spin-off. Asked if Patchsoft, with so many former Microsoft employees, will have an advantage over potential competitors in the Microsoft patch market, Blumenthal said the settlement prohibits collaboration. "Patchsoft developers will not have any foreknowledge of bugs or security holes before software is released. They'll just have to be surprised," he said. "So it will be just like it was when they were at Microsoft," he added. One Reuters reporter, meanwhile, questioned the long-term viability of Patchsoft. "This seems like a logical split right now, but what if Microsoft's products improve to the extent that patches are needed less frequently, or perhaps not at all?" she asked. "I'm sorry, I can only respond to serious questions," Blumenthal answered. Copyright © 1999-2002, SatireWire. http://www.satirewire.com/news/jan02/patchsoft.shtml -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4790 From: James M. Atkinson Date: Wed Feb 13, 2002 5:58pm Subject: Comcast Admits To Spying on Customers http://www.osopinion.com/perl/story/16316.html Comcast Admits To Spying on Customers By Tim McDonald www.NewsFactor.com, Part of the NewsFactor Network February 13, 2002 Stored data can be subpoenaed by law enforcement officials or by lawyers in civil cases - and it can be stolen. Cable Internet giant Comcast (Nasdaq: CMCSK) reportedly has begun tracking the Web browsing habits of its customers, keeping records of every Web page they visit. The company has roughly 1 million high-speed Internet customers. The third largest cable TV company behind AT&T Cable and AOL Time Warner (NYSE: AOL), Comcast admitted that it stores the Internet Protocol (IP) addresses -- unique numeric Internet addresses assigned to subscribers -- along with the Internet address of every Web page subscribers visit. Jeffrey Chester of the Washington, D.C.-based Center for Digital Democracy, a nonprofit watchdog group, called the tracking "incredibly aggressive." "It's not a surprise they are tracking what people are doing, it's just the tip of the iceberg," Chester told NewsFactor. "The next generation of broadband services provided by Comcast and others allows for this kind of tracking. The whole business model moving forward for cable and the television industry generally is one which emulates the deeply personalized e-commerce strategies." Sensitive Information Comcast also said it stores sensitive information, such as credit card numbers and passwords, in a database managed by network infrastructure specialist Inktomi (Nasdaq: INKT). Stored data can be subpoenaed by law enforcement officials or lawyers in civil cases -- and, as has been proven several times, it can be stolen. For example, last week, a database with thousands of records involving potential Comcast Business Communication Internet customers was found exposed on the Web. Comcast said the snooping was part of a technological overhaul launched to save money, according to wire service reports. However, Inktomi, which sold the technology to Comcast, asserted that Comcast was collecting more information than was absolutely necessary for technological enhancements. Leading Role Comcast claimed the tracking is permitted in its service agreement with subscribers and said it does not intend to infringe on the privacy of its customers. The company would not say how long the information it collected was stored. A company spokesperson said that customers' Web browsing is being recorded in Detroit, Michigan, and parts of Delaware and Virginia, and that such tracking will spread across the United States by the end of this week. "Personalized television is really the cornerstone of the plan Comcast and others have for the convergence of television with the Internet in the broadband online medium," Chester said. "So, technologies are being deployed, strategies are being developed, investments are being made in hardware and software and applications all across the board -- and Comcast is playing the leading role in that regard." Excuse for Privacy Erosion? Some civil libertarian groups have openly expressed concern about the erosion of online privacy in the aftermath of the September 11th terrorist strikes. The FBI has been particularly aggressive in rooting out online evidence, serving ISPs with warrants under a 1978 antiterrorism law. "The privacy debate has been placed on the back burner, conveniently for companies like Comcast, because of the concern over security since September 11th," Chester said. "As this and other incidents will undoubtedly show, we need strong consumer safeguards when it comes to cable broadband." More Cities 'Digitized' Comcast announced a fourth-quarter net loss of US$321 million, due mainly to its costly effort to migrate customers from @Home, the broadband Internet service provider that recently filed for bankruptcy. The company has said it plans to add more high-speed Internet customers and is planning to spend $1.3 billion to get more cities "digitized." Comcast made a winning bid of $72 billion for AT&T Broadband in December. If the deal is approved by shareholders, the Federal Trade Commission and the Federal Communications Commission, it will result in the largest cable ISP in the United States, with 2.2 million high-speed Internet customers. The combined company would be called AT&T Comcast Corp. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4791 From: Aimee Farr Date: Thu Feb 14, 2002 9:28am Subject: Released "Dead Man's Stop" - Marty Marty wrote: > To this day I do not know which of the three > statements was read into the Congressional Record and... I do. But I'll take the "don't give a damn" as you don't want to know. I have a collection of the 70's Greatest Congressional Hits. It was the only way I could understand the law here, as lawyers often end up resorting to the congressional record for intent and meaning -- even though they rarely find it. ~Aimee 4792 From: James M. Atkinson Date: Thu Feb 14, 2002 0:09pm Subject: 1.5 to 18 GHz High Gain Horn Antenna I would encourage list members to check out the following product for use during the the microwave signals analysis segment of the sweep. While it's not a standard gain horn with a nice flat response curve, it should fit in well for those quick checks, and it blows away the dual ridged EMCO broadband horns. I would suggest having the factory fit the unit with an SMA connector and a dielectric bracket/cradle so you can put it on top of a tripod. Once you get the unit you can epoxy your own bore bore sites to the corners, and add a broadband LNA and power supply yourself. Also, when your at their site take a look at the standard gain products horns they offer... very inexpensive when compared to some to the $$ horns available in the US. -jma > >http://www.q-par.co.uk/pages/Broadband_Horns_high_gain.htm > > >1.5 to 18 GHz High Gain Horn Antenna > >This high gain high performance ridged waveguide horn, Model Number >6878/24H is ideal for EMI/RFI testing, EMC measurements, wide-band >spectrum surveillance or materials evaluation etc. The horn covers >frequencies used for PCN, PCS, GSM, GPS, direct to home satellite >broadcasting, and many others. It is especially useful for receiving >very low level signals or transmitting moderate power levels. The >horn can be used where a parabolic reflector antenna may have been >previously used to increase the gain, or where it is not practical >to install a wide band standard reflector antenna. This horn is >cheaper than an equivalent feed and reflector antenna assembly. > >Special techniques have been incorporated to prevent higher order >waveguide modes. The construction is a aluminium/plastic composite. >The horn comes with a specially designed weatherproof radome that >provides good protection against the elements but has very little >loss across the frequency band. > >A mounting bracket is shown that provides a useful way to set the >antenna in either Horizontal or Vertical polarisation. > > >Specification: > >Model >Number > 6878/24H > >Frequency1.5 to 18 GHz >Nominal GainVaries from 6 to 22 dB across the band >Nominal >Beamwidth >'H' plane varies from 46 - 6.5 degrees >'E' Plane varies from 40 - 9.5 degrees > >VSWR< 2:1 across the band >Constructionaluminium/plastic composite >Dimensions >620 x 160 x 160 mm approx. >i.e. 24.5 " x 6.3" x 6.3" > >Power50 Watts (c.w.) >ConnectorSMA or Type N (others available) >Weight2.6 kg (5.7 lbs) >Temperature-40 ∞C to +70 ∞C > > -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4793 From: John Savage Date: Thu Feb 14, 2002 2:21pm Subject: Homemade GPS Tracking System? Good Afternoon: I had a question asked to me awhile ago this afternoon and was wondering if anybody could lend their opinion. First of all, let me begin by saying that about a week ago, I saw the below information posted on another group... BUILD YOUR OWN GPS TRACKER !!!!! Here's a list of the necessary items to build one hell of a great system that beats all the rest. 1). Garman Etrex (as your receiver $80.00) 2). Etrex cigarette/power supply 9 pin cable $$15 - $27.00 depending on where you buy it. 3). Galls Uniform Supply JOTO DESK, $160.00 (for the computer stand in your car.) 4). Any standard laptop computer. 5). Power converter (best buy, Jensen, $80.00, two plug.) 6). Microsoft Streets and Trips 2002 $40.00 After this initial investment, it's free from now on and better than any over the counter system on the market. Simply plug in the waypoints (addresses) and hit the "Optimize" & "Route" buttons on Streets and Trips and the software routes you from where you are to where you want to be and all points in between as they fall closest to each other (cheapest and shortest.) Then I received the question below... I am interested in acquiring a GPS Tracking System and I have a laptop and a Garmin III GPS. I am wondering if it would be better to construct my own unit or to purchase one outright. I would appreciate any information you may have about it. Thanks and if you ever need anything, don't hesitate. (Also, I appreciate the time you've spent and currently spend on compiling information-it's been a help to me many times). Now , I too was wondering if it would be better to construct my own unit or to purchase one outright? What are the pros and cons in making your own GPS Tracking System? Thanks! John Lee Savage (LPIA) P.O. Box 634 Old Orchard Beach, ME 04064 TEL: 207-286-3945 FAX: 781-723-2551 ******************************************* Licensed by the Maine Department of Public Safety (Lic #373) ******************************************* Maine Notary Public ******************************************* National Association of Investigative Specialists (NAIS) ******************************************* Maine Licensed Private Investigators Association (MLPIA) www.mlpia.org ******************************************* MLPIA Internet Committee ******************************************* Moderator of the "MLPIA Network" ******************************************* --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.323 / Virus Database: 180 - Release Date: 2/8/02 4794 From: Steve Uhrig Date: Thu Feb 14, 2002 3:08pm Subject: Re: Homemade GPS Tracking System? Once upon a midnight dreary, John Savage pondered, weak and weary: > Now , I too was wondering if it would be better to construct my own unit > or to purchase one outright? What are the pros and cons in making your own > GPS Tracking System? If you mean a device to assist you in determining the location of a vehicle under surveillance, I can't believe this is a serious question. The cons are, they don't work. After that, the pros don't matter. There is a place for electronics as a hobby, then there is a place for leaving things to professionals. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4795 From: Hawkspirit Date: Thu Feb 14, 2002 6:54pm Subject: Photo Radar Countermeasures Anyone know about these photo radar countermeasure products? http://www.specterguard.com/ http://www.jamradar.com/ 4796 From: Justin T. Fanning Date: Thu Feb 14, 2002 7:01pm Subject: Re: Photo Radar Countermeasures Since the inception of photo enforcement products I have been hearing crazy stories like bake your licence plates in an oven and it reduces their reflactiveness etc. Almost without exception, most of the products in this field are snake oil. The UK police did several tests with the licence plate covers and also with the "special" licence plates themselves (in the UK you make your own licence plates, the state only supplies you the plate details, then you have to privately arrange to have the plate made). The UK police using a real GATSO photo radar setup, found them all to be snake oil. I'll try and dig up the web site for you. The active RF jammers would be more effective, but totally illegal and a sinch to detect even using a primative tool like a radar detector. Active laser jamming is still legal in most countries from a technical prospective, but could be argued as interfering with police operations. I've heard varying reports of it's effectiveness. Personally the thought of cars driving around with high power laser light spewing out into the eyes of oncoming traffic quite disturbing. The most effective product I have seen is also the simplest, a slave flash repeater. The flash on the camera is very powerful as it's designed to light under a truck's tray, or in the case of a red light camera, designed to light a whole intersection. A slave flash repeater is a professional photography tool used to trigger multiple flash units to light a subject from many angles at once. The flash units are trigged by the light from the master flash. As you would imagine, in a traffic situation, the enforcement camera flashes the car, the car simultaneously flashes the enforcement camera. You can find real GATSO photo radar images of this kind of thing if you search hard enough. Even this is now being worked around by the use of IR film and digital camera's that can rapidly adjust to the incoming light and other conditions. I've heard a rumour of an LCD style plate cover also, when it see's a flash it was said to go all dark momentarily, I've never actually seen one so can't comment. Hope this helps, be careful your _deep_ into snake oil country! JF --- Hawkspirit wrote: > > Anyone know about these photo radar countermeasure products? > > http://www.specterguard.com/ > > http://www.jamradar.com/ > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4797 From: James M. Atkinson Date: Thu Feb 14, 2002 7:38pm Subject: Re: Photo Radar Countermeasures At 4:54 PM -0800 2/14/02, Hawkspirit wrote: >Anyone know about these photo radar countermeasure products? > >http://www.specterguard.com/ > >http://www.jamradar.com/ The foolproof countermeasure is simply not to speed. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4798 From: Steve Uhrig Date: Thu Feb 14, 2002 11:39pm Subject: A new record A new record has been set. This week I referred seven people to the following website in lieu of using my services: http://zapatopi.net/afdb.html We should start a new group effort, charting calls from lunatics with the phase of the moon. I bet we'd eventually see a pattern once we had a large enough database. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4799 From: David Alexander Date: Fri Feb 15, 2002 4:53am Subject: re: Microsoft settlement Jim It gets better than that: Most of this lifted from an article in Infoworld - all rights acknowledged. If you check the fine print in Microsoft's new licensing agreement it permits access to your computer at will The clause is contained in the Product Use Rights (PUR) document that can be found at www.microsoft.com/licensing/resources. As the PUR document is part of most customers' volume license agreements and is subject to periodic change, in theory Microsoft customers should check it regularly to see what rights Microsoft has decided to grant or take away. Fortunately, one Microsoft customer did review the PUR document recently and noticed a change. In the section on Windows XP Professional, he found the "Internet-Based Services Components" paragraph that said in part, "You acknowledge and agree that Microsoft may automatically check the version of the Product and/or its components that you are utilizing and may provide upgrades or fixes to the Product that will be automatically downloaded to your Workstation Computer." By changing that term in the PUR, Microsoft has found a creative way to obtain authorization from users to access their workstations at will. The sucker punch is that all the risk for the security and privacy violations due to this are neatly put on the customer's shoulders, not Microsoft's." The most obvious concern is the damage the most benign of automatic OS upgrades could cause in a corporate environment, or that someone could hack the system and upload a backdoor monitoring tool - either of data or to activate the microphone on the PC. As an IT person, the idea that Microsoft can change software without notifying anyone is totally unacceptable. Fortunately I don't think this is enforceable in Europe, due to our privacy laws. But is suspect that this 'right to access' to computers would force some companies into non-compliance with government security guidelines and various privacy laws. This concern was exacerbated by additional PUR language in the same Windows XP section. In terms of "Security Updates," users grant Microsoft the right to download updates to Microsoft's DRM (Digital Rights Management) technology to protect the intellectual property rights of "Secured Content" providers. It says Microsoft may "download onto your computer such security updates that a secure content owner has requested that MS, Microsoft Corporation, or their subsidiaries distribute." In other words, it would seem Microsoft's idea of a security update is one that protects the property rights of vendors, not the security of customers' systems. It is possible (I suggest mandatory) to turn off Windows Auto-Update. If it is indeed Microsoft's intent to continue giving users the right to decline downloads, why has the company written its XP agreements to force users to explicitly surrender that right? Are customers supposed to ignore what the licenses say and just hope Microsoft won't ever do what the terms say it can do? That's not a concept that will make anyone other than Bill Gates feel very secure. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4800 From: Michael Puchol Date: Fri Feb 15, 2002 3:11am Subject: Re: Photo Radar Countermeasures Very well said. In Spain, until last week, police had to pull you over after taking your picture with a radar trap, to positively identify you and give you the ticket - this meant only about 10% of pics taken were notified. Now, the laws have been changed, allowing a picture alone to prove you were speeding, thus allowing instalation of fixed speed traps. In the first day of the new law's life, on a particular stretch of road, some 1600 pictures were taken.... Of course, installation of any kind of device which has a primary function of avoiding speed traps is prohibited, punished with heavy fines - that would include any sort of laser detector or jammer, counter-reflective flash, weird license plates (which are State-made anyway), etc. In my particular experience a few years back, which included testing a few of these radar detectors with a local manufacturer of speed trap radar systems, most (to be gentle) of them were totally ineffective. They rely on reflections from traffic signals (large ones), trucks, cars, etc. On an open road, with no signs or traffic, you are not going to detect the signal in time. Some time after this, on another mailing list a heated debate sprang up regarding the detectability of such detectors by the radar operator (pardon the redundance). The theory was that most of these detectors generate a large amount of reflected RF, which could be detected by a radar system equipped to do so - has anyone any insights into this, and wether it is being applied? Cheers, Mike ----- Original Message ----- From: "James M. Atkinson" To: Sent: Friday, February 15, 2002 2:38 AM Subject: Re: [TSCM-L] Photo Radar Countermeasures > At 4:54 PM -0800 2/14/02, Hawkspirit wrote: > >Anyone know about these photo radar countermeasure products? > > > >http://www.specterguard.com/ > > > >http://www.jamradar.com/ > > > The foolproof countermeasure is simply not to speed. > > -jma > -- > > -------------------------------------------------------------------------- ------------------------ > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. > -------------------------------------------------------------------------- ------------------------ > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 mailto:jmatk@tscm.com > -------------------------------------------------------------------------- ------------------------ > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > ------------------------------------------------------------------------ -------------------------- > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4801 From: Fernando Martins Date: Fri Feb 15, 2002 1:15am Subject: RE: Photo Radar Countermeasures The only crazy story I know about photo radar contermeasures is the one related to Nokia cellphone. I didn't find a link in english, so here's the short version, if I still remember this well ... In GSM cellphones from Nokia using ... Definitions -> Security Definitions -> Restrict Group -> Active -> 00000 -> OK ... A little symbol will appear on the screen. Configuring the phone like this, when one is near a radar the phone acts as it is receiving a call, and that was the alarm to not cross the speed limit. The supposed explanation is that it got to do with Nokia radars that somehow were sensitive to Nokia cellphones. What I can say is that about 2/3 years ago when this was on the news here in Portugal, I had 2 Nokias at the time (GSM 1800) 8210 and 6215 if I can remember right, and it seems that there was also some Nokia radars around the country. People said that sometimes the phones rings. Personaly I don't remember if after receiving a call a radar (or a police car with one) was near, anyway I don't drive too fast and always in the limit of what the car can handle in safety :> FM > -----Original Message----- > From: Justin T. Fanning [mailto:Justin@f...] > Sent: sexta-feira, 15 de Fevereiro de 2002 1:01 > To: Hawkspirit > Cc: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Photo Radar Countermeasures > > > > Since the inception of photo enforcement products I have been > hearing crazy stories like bake your licence plates in an > oven and it reduces their reflactiveness etc. > > Almost without exception, most of the products in this field > are snake oil. The UK police did several tests with the > licence plate covers and also with the "special" licence > plates themselves (in the UK you make your own licence > plates, the state only supplies you the plate details, then > you have to privately arrange to have the plate made). The > UK police using a real GATSO photo radar setup, found them > all to be snake oil. I'll try and dig up the web site for you. > > The active RF jammers would be more effective, but totally > illegal and a sinch to detect even using a primative tool > like a radar detector. Active laser jamming is still legal in > most countries from a technical prospective, but could be > argued as interfering with police operations. I've heard > varying reports of it's effectiveness. Personally the > thought of cars driving around with high power laser light > spewing out into the eyes of oncoming traffic quite disturbing. > > The most effective product I have seen is also the simplest, > a slave flash repeater. The flash on the camera is very > powerful as it's designed to light under a truck's tray, or > in the case of a red light camera, designed to light a whole > intersection. A slave flash repeater is a professional > photography tool used to trigger multiple flash units to > light a subject from many angles at once. The flash units > are trigged by the light from the master flash. As you would > imagine, in a traffic situation, the enforcement camera > flashes the car, the car simultaneously flashes the > enforcement camera. You can find real GATSO photo radar > images of this kind of thing if you search hard enough. Even > this is now being worked around by the use of IR film and > digital camera's that can rapidly adjust to the incoming > light and other conditions. I've heard a rumour of an LCD > style plate cover also, when it see's a flash it was said to > go all dark momentarily, I've never actually seen one so > can't comment. > > Hope this helps, be careful your _deep_ into snake oil country! > > > JF > > --- > > Hawkspirit wrote: > > > > Anyone know about these photo radar countermeasure products? > > > > http://www.specterguard.com/ > > > > http://www.jamradar.com/ > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, the > > hands acquire shaking, the shaking is a warning. It is by caffeine > > alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to > > http://docs.yahoo.com/info/terms/ > > ------------------------ Yahoo! Groups Sponsor > ---------------------~--> Sponsored by VeriSign - The Value > of Trust Pinpoint the right security solution for your > company - FREE Guide from industry leader VeriSign gives you > all the facts. > http://us.click.yahoo.com/lWSNbC/WdiDAA/yigFAA> /kgFolB/TM > > > -------------------------------------------------------------- > -------~-> > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire > speed, the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to > http://docs.yahoo.com/info/terms/ > > > 4802 From: James M. Atkinson Date: Fri Feb 15, 2002 8:29am Subject: Spy Charges for Air Force Retiree Spy Charges for Air Force Retiree By TED BRIDIS Associated Press Writer Arizona Republic February 15, 2002 WASHINGTON (AP) - A retired Air Force sergeant with thousands of dollars in debts sought $13 million from Iraqi President Saddam Hussein in exchange for sensitive U.S. military secrets, and also offered to spy for Libya and China, the government says. Bitter over ``the small pension I will receive for all of the years of service,'' Brian Patrick Regan allegedly wrote to Saddam that the payment demand was a ``small price to pay,'' the government said Thursday as it lodged new criminal charges in the government's latest espionage case. Regan, 39, could face the death penalty. A grand jury in Alexandria, Va., indicted him Thursday on three counts of attempted espionage and one of gathering national defense information. He was previously indicted in October on a single espionage charge, although it did not specify whom authorities suspected him of spying for. Regan previously pleaded innocent to the charge in federal court, and he was scheduled to be arraigned Friday on the latest charges. Deputy U.S. Attorney General Larry Thompson declined to say whether Regan turned over any secret or otherwise classified information to foreign governments. Thompson also declined to say whether Regan actually delivered the letter he is accused of writing to Saddam. But the indictment indicated that Regan in June flew to Berlin and possibly Munich before returning to Washington seven days later, and the trip was ``not in connection with any official duties.'' Prosecutors said Regan wrote personally to Saddam sometime between 1999 and 2001 and asked for $13 million in Swiss currency to provide information about U.S. satellites and other military secrets. Prosecutors said he offered to send a sample of secrets for $1 million, and offered additional information afterward for $3 million and $5 million payments. ``There are many people from movie stars to (athletes) in the U.S. who are receiving tens of millions of dollars a year for their trivial contributions,'' Regan allegedly wrote, falsely describing himself as a CIA officer near retirement. ``If I am going to risk my life and the future of my family, I am going to get paid a fair price.'' Court records indicated that Regan carried debts of at least $53,000 earlier this year, and he told a federal judge in November that he could not afford to hire a lawyer. Regan allegedly described the demand to Iraq for $13 million as ``a small price to pay to have someone within the heart of (a) U.S. intelligence agency providing you with vital secrets.'' The letter said the information being offered was worth ``billions'' and ``worth many times what I am requesting.'' Thursday's indictment also accused Regan of writing a nearly identical letter to Libyan leader Moammar Gadhafi between August 2000 and August 2001, but it apparently did not include demands for payment. That letter offered Gadhafi ``top secret'' information about satellites, early warning systems and overall U.S. defense strategies, prosecutors said. It wasn't immediately clear how investigators found the letters that Regan allegedly wrote, though court records said computer files were recovered at his home in Bowie, Md., where he lived with his wife and children, on the day of his arrest Aug. 23. U.S. officials have said Regan worked at the National Reconnaissance Office in Chantilly, Va., a U.S. intelligence agency that designs, builds and operates the nation's vast network of spy satellites. He worked at the NRO from July 1995 until his arrest - first in the Air Force, then as a defense contractor for TRW Inc. beginning in October 2000. Prosecutors said that shortly after he returned from Germany in July, he began repeatedly logging into the government's classified ``Intelink'' computer network and searching for information - including satellite photos - of military facilities in Iraq, Iran, Libya and China, even though those countries were not related to his official duties at TRW. From Aug. 6 to his arrest, officials said he logged into the system every day, Monday through Thursday, when he was in the office. But FBI spy-catchers, alerted by then to what they described as his suspicious behavior, were watching Regan on secret video cameras during some of the times he used Intelink, officials said. Wary of falling into an FBI counterespionage trap, prosecutors said, Regan also demanded that Iraq subtly alter its official Web site on computers run by the United Nations - and place an ad in The Washington Post for a 1996 Acura sports car - as proof that Iraqi officials were cooperating. That is similar to the case involving Robert Hanssen, the FBI agent arrested last February and convicted of spying for the Russians from 1985 to 2001. Court records said Hanssen instructed the Russians to place an ad in The Washington Times in July 1986 for a 1971 Dodge Diplomat as a signal of readiness to exchange secrets. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- From: Steve Uhrig Date: Mon Feb 10, 2003 4:33pm Subject: Re: Unknown modulation On 10 Feb 2003 at 17:21, kondrak wrote: > I believe the tipoff is the 135% negative modulation. Its broadcast > AM. Ot someone trying awfully hard to sound broadcast, er.."quality".. Good call. I totally overlooked that. The latter makes more sense, maybe a good buddy. I would think commercial stations would have competent engineers, test equipment and requirements for spectral purity. Demodulating it would tell the story. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6904 From: Kirk Adirim Date: Tue Feb 11, 2003 3:28am Subject: re: Unknown modulation No mystery here as to what kind of modulation, the first sentence in the first paragraph tells you it's a commercial A.M. station. Quote "The waveforms taken on this page were all taken from the outputs of one or other of the two modulators fitted to Radio Carolines BTA-50H Ampliphase transmitter". Anybody in the broadcasting industry, SWL, european and over 35, or knows anything about pirate radio or "black broadcasting" knows Radio Caroline. Radio Caroline is an A.M. broadcast transmitter in England, used to be a pirate radio station back in the 60's. The author included a Banner Ad that links you to the Radio Caroline site and it's A.M. broadcasting history. Pretty clear to me. [Non-text portions of this message have been removed] 6905 From: Andre Holmes <1ach@g...> Date: Tue Feb 11, 2003 6:05am Subject: Re: Re: Unknown modulation Greetings I plucked a signal at 32 Mhz it was modulated AC sine wave but was extremely bunched up on other occasions the AC sine wave is spread. I could not get audio and did not try any other receivers. The Carrier is a first for this area I always keep tabs on everything around the Cincinnati Ohio area. There are CBers out here communicating outside of protocol, they use no handle and they surveil peoples directions in travel at 23 Mhz. I picked them up using a Kaiser 2044 Mobil. There is CB antenna on every other house out here. I have read somewhere that the FBI is using a public band 0-50 Mhz. That could have been there transmittion. I did pick a transmittion up once but its rare to see the 30 Mhz range in use out here and there. Sorry I could not get to you sooner you know work and all. ANDRE HOLMES. ----- Original Message ----- From: "Steve Uhrig" To: Sent: Monday, February 10, 2003 10:59 AM Subject: [TSCM-L] Re: Unknown modulation > On 9 Feb 2003 at 12:04, Andre Holmes wrote: > > > I was tuning my SA and ran across some modulations that I never seen > > before, so I started surveying some mod-schemes heres a start of my > > search. > > Do you live near: > > 1) An AM radio broadcast station? > > 2) A ham radio operator (within a block or two?). You frequently can > identify them by towers and large directional antennas. > > 3) A CB operator maybe running illegal high power? Or within a few > hundred feet of one running legal power? > > What you have described from the other website is signals from a pure > textbook AM transmitter. I listed above the most likely sources, but > there can be others. > > Do you hear anything when you try to demodulate the signal? That will > tell you for sure what it is. If it sounds like Donald Duck, it's > single sideband which most likely would be CB or amateur (ham). > > What you are seeing is the 'modulation envelope'. Straight out of the > textbook. > > Extremely unlikely to be hostile transmissions. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6906 From: Hawkspirit Date: Tue Feb 11, 2003 11:03am Subject: Sweep needed Residential sweep needed near Milwaukee Wisconsin, please contact me off list Roger Tolces Electronic Securtity 6907 From: Hawkspirit Date: Tue Feb 11, 2003 11:07am Subject: Sweep Needed Automobile sweep needed in Atlanta, please contact me off list. Roger Tolces Electronic Security 6908 From: kondrak Date: Tue Feb 11, 2003 0:45pm Subject: Re: Re: Unknown modulation Well, IF its a CB'er, he's got a 'precisely' proper negative modulation component. I find this type of equipment (CB and outbander) to be far from precise, as they're usually cobbled together by someone with the intent of a whomping signal, and little regard for modulation quality. On the other hand, a broadcast station makes careful adjustments to achieve around a 130-135% negative modulation for a tradeoff between audio power and "prescence" and spectral purity requirements. Sure, the guy might of hit it right, but I seriously doubt it... And Yes, I concur, get a sample on a modulation analyzer and a SA and see what it says.... At 17:33 2/10/03 -0500, you wrote: >On 10 Feb 2003 at 17:21, kondrak wrote: > > > I believe the tipoff is the 135% negative modulation. Its broadcast > > AM. Ot someone trying awfully hard to sound broadcast, er.."quality".. > >Good call. I totally overlooked that. > >The latter makes more sense, maybe a good buddy. I would think >commercial stations would have competent engineers, test equipment >and requirements for spectral purity. > >Demodulating it would tell the story. > >Steve > > >******************************************************************* >Steve Uhrig, SWS Security, Maryland (USA) >Mfrs of electronic surveillance equip >mailto:Steve@s... website http://www.swssec.com >tel +1+410-879-4035, fax +1+410-836-1190 >"In God we trust, all others we monitor" >******************************************************************* > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6909 From: kondrak Date: Tue Feb 11, 2003 1:25pm Subject: Fwd: [ISN] Taking byte from Baghdad > > >http://www.gomemphis.com/mca/opinion_columnists/article/0,1426,MCA_539_1726690,00.html > >Gary Pounder >February 9, 2003 > >Although President Bush hasn't made a final decision about going to >war with Iraq, preparations for that potential conflict are almost >complete. Thousands of American troops have been deployed to the >Middle East in recent weeks, along with dozens of warships and >hundreds of combat aircraft. > >These preparations have been highly publicized, with daily pictures of >departing aircraft, naval vessels and military personnel, all designed >to convey a final warning to Saddam Hussein. But preparations for war >also are under way in less-visible areas. > >If Bush gives the order to attack Iraq, U.S. forces will initiate >information operations (IO) as part of their overall military >strategy. Aimed at disrupting Iraqi information systems, the expected >"information war" may represent the ultimate technology weapon in what >will be a high-tech campaign. > >Details of this war are almost nonexistent. Although the Pentagon has >spent billions of dollars on IO since the early 1990s, it has said >little about its capabilities in this area. > >What is known is that this investment has fostered the development of >highly specialized IO units, doctrine and tactics. Gen. Tommy Franks, >commander of U.S. forces in the Persian Gulf region, has his own team >of IO specialists. > >Although IO is sometimes described in terms of computer attack or >cyber-warfare, it covers a variety of functions related to the use and >protection of information and information systems. The rationale >behind IO is simple: deny the enemy use of the information spectrum, >while protecting our own information assets. > >IO includes several disciplines that are almost as old as warfare >itself: intelligence collection, deception, psychological operations. >It also incorporates newer technologies, exploiting advances from the >information revolution of the past 20 years. > >Cyber-attack is one of the most intriguing and useful new tools of >information warfare. Because of the explosion of computer networks and >the Internet, it is now possible to gain access to information systems >that support an enemy's economy or military forces. Disrupting these >systems can wreak havoc with an adversary's war machine, potentially >shortening the war and reducing the number of allied casualties. > >The United States displayed the benefits of a computer war in the 1991 >Gulf War, when it conducted its first cyber-attack on Iraq's air >defense system. The highly automated system (nicknamed KARI) linked >Iraqi surface-to-air missiles and anti-aircraft guns in a computerized >command-and-control network. > >The KARI system could withstand air attacks reliably and still provide >critical information to Iraqi air defense commanders. Neutralizing >KARI was deemed essential to the allied air campaign. > >IO experts decided to attack KARI internally and externally. Allied >electronic warfare aircraft would jam and bomb KARI components, while >specially designed computer viruses would infect the system from >within. Agents inserted the virus in a printer shipped to an Iraqi air >defense site. > >The virus also was introduced via a fiber optic cable that connected >air defense nodes. A Special Forces unit infiltrated Iraq, dug up the >cable and inserted the virus. It remained dormant until the opening >moments of the air war, when it went active and crippled KARI. The >Iraqi air defense system never recovered, and allied losses in the air >campaign were minimal. > >Since the Gulf War, IO tacticians have added to their target lists >economic and infrastructure systems that support an enemy's ability to >fight: power grids, water supplies, banking networks. There are >unconfirmed reports that cyber-attacks helped shut down the Serb power >grid during the 1999 Balkans War. Information operations also have >been used in the war on terrorism to ferret out al-Qaida bank >accounts, trace financial transactions and identify potential >operatives. > >Officially, the Pentagon won't say what level of IO planning and >preparation is under way, but there are vague hints about what might >be in store for Baghdad. Several media outlets reported last month >that the United States was sending E-mail messages to Iraqi military >commanders, urging them not to fight if war breaks out. > >In a police state such as Iraq, E-mail directories are classified >material, off limits to anyone outside the military and security >establishment. Our ability to send E-mail to Iraqi generals suggest IO >teams have identified key computer networks, earmarking them for >potential disruption or destruction. > >There is a good chance the cyber-battle will spread beyond Iraqi >information systems. If the United States launches military action >against Baghdad, we can expect a vicious "war" between Middle Eastern >and western computer hackers. > >Remember the 2001 "spy plane" incident between the United States and >China? That relatively minor episode prompted a month-long >confrontation between American and Chinese hackers that resulted in >the defacement of thousands of Web sites around the world. > >A hacker war emerging from a new conflict with Iraq would be even more >intense, likely unleashing new computer viruses, denial-of-service >attacks aimed primarily at Internet providers and Web site >defacements. The potential cost of such a war could be staggering. > >The United States is not alone in developing information operations as >a tool of war. Although Iraq's IO capabilities in this area are >rudimentary, other potential adversaries - notably China - are >investing heavily in information warfare. More-sophisticated enemies >would have no qualms about mounting an IO campaign against us. > >As the most "wired" nation on Earth, the United States has the >greatest vulnerability to information attack. Although our government >and private companies have invested heavily in computer security, the >recent virus that disabled thousands of automated teller machines >illustrates the potential impact of even small-scale cyber-attacks. >The forces about to be unleashed on Saddam Hussein may be used against >us in the future. > > >Guest columnist Gary Pounder is a retired U.S. Air Force intelligence >officer who lives in Oxford, Miss. 6910 From: Steve Uhrig Date: Tue Feb 11, 2003 1:33pm Subject: Taking byte from Baghdad On 11 Feb 2003 at 14:25, kondrak wrote: > >Although President Bush hasn't made a final decision about going to > >war with Iraq, preparations for that potential conflict are almost > >complete. Thousands of American troops have been deployed to the > >Middle East in recent weeks, along with dozens of warships and > >hundreds of combat aircraft. Lot of US Mil traffic on 11.175 USB including some relays from UHF aircraft AM. All in the clear. Relatively weak and sporadic, but perfectly copyable here in MD with a decent tuned wire outside antenna and kit receiver. Periodically interesting. That is the primary interagency coordination channel. You're likely to hear almost anything there. May go hours with no traffic, then bursts of activity for an hour. Freq picked to be OK worldwide both daytime and night time. Reception depends a bit on the day's propogation. We're currently just coming down off the peak of an 11 year sunspot cycle, so HF worldwide is possible with excellent signals and low power. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6911 From: Fernando Martins Date: Tue Feb 11, 2003 2:42pm Subject: Re: Taking byte from Baghdad That issue remind me other ... COIAS - Converge Internet-ATM-Satellite If anyone is aware, was this just a study or it became used in aeronautical communications? FM ----- Original Message ----- From: "Steve Uhrig" To: Sent: Tuesday, February 11, 2003 7:33 PM Subject: [TSCM-L] Taking byte from Baghdad > On 11 Feb 2003 at 14:25, kondrak wrote: > > > >Although President Bush hasn't made a final decision about going to > > >war with Iraq, preparations for that potential conflict are almost > > >complete. Thousands of American troops have been deployed to the > > >Middle East in recent weeks, along with dozens of warships and > > >hundreds of combat aircraft. > > Lot of US Mil traffic on 11.175 USB including some relays from UHF > aircraft AM. All in the clear. Relatively weak and sporadic, but > perfectly copyable here in MD with a decent tuned wire outside > antenna and kit receiver. Periodically interesting. That is the > primary interagency coordination channel. You're likely to hear > almost anything there. May go hours with no traffic, then bursts of > activity for an hour. Freq picked to be OK worldwide both daytime and > night time. Reception depends a bit on the day's propogation. We're > currently just coming down off the peak of an 11 year sunspot cycle, > so HF worldwide is possible with excellent signals and low power. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 6912 From: Paolo Sfriso Date: Wed Feb 12, 2003 4:45am Subject: Microtel Surveillance Recievers Dear Colleagues. I have recently seen for sale a MICROTEL MSR-904A Surveillance Receiver. Does anybody have experience with this piece of equipment and what are your opinions on its use for TSCM (particularly in the 2-18 GHz band). Kind Regards. Your Italian Connection. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... [Non-text portions of this message have been removed] 6913 From: James M. Atkinson Date: Wed Feb 12, 2003 5:48am Subject: Re: Microtel Surveillance Recievers They are nice units, but are way, way out of date. Virtually impossible to obtain parts, very high noise figure (so you lose you signal), and most units lack the dual Sub Carrier mod, and the video module. -jma At 11:45 AM +0100 2/12/03, Paolo Sfriso wrote: >Dear Colleagues. > >I have recently seen for sale a MICROTEL MSR-904A Surveillance Receiver. > >Does anybody have experience with this piece of equipment and what >are your opinions on its use for TSCM (particularly in the 2-18 GHz >band). > >Kind Regards. > >Your Italian Connection. > >Paul Sfriso >Director >GRUPPO S.I.T. >Security, Investigations & Technology >Quarto d'Altino, Venice >ITALY > >phone +39 0422 828517 >fax +39 0422 823224 >24hr GSM cellphone +39 335 5257308 >www.grupposit.com >paulsfriso@t... >info@g... > > > > >[Non-text portions of this message have been removed] > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6914 From: A Grudko Date: Wed Feb 12, 2003 10:41am Subject: Re: Taking byte from Baghdad - Original Message - From: Steve Uhrig > Lot of US Mil traffic on 11.175 USB including some relays from UHF > aircraft AM. All in the clear. Relatively weak and sporadic, but > perfectly copyable here in MD with a decent tuned wire outside > antenna and kit receiver. Thanks for that - I'm getting a usable signal here on the southern tip of Africa. But the unsociable buggers don't answer me even if I put on an American accent and use the callsign Airforce One... Just kidding - I'm listening on about 10 metres of untuned wire. Andy Grudko (British), Grad I.S, South Africa SIRA investigators Reg. No. 8642 www.grudko.com , andy@g... . Est. 1981. International investigations (+27 12) 244 0255 - 244 0256 (Fax). IPA, SACI, WAD, CALI, UKPIN, IWWA. When you need it done right - first time 6915 From: Hawkspirit Date: Thu Feb 13, 2003 10:19am Subject: Re: Digest Number 1189 Parts are available from the manufacturer or should I say the company who took over Microtel, also the service manual lists oem sources on parts, anyone needing that info let me know and I will look it up. Also this unit runs circles around the newer digital units for resolution and seeing short duration R.F. spiked transmissions (burst bugs). Roger Tolces Electronic Security Co www.bugsweeps.com At 11:29 AM 2/13/03 +0000, you wrote: > Date: Wed, 12 Feb 2003 06:48:07 -0500 > From: "James M. Atkinson" >Subject: Re: Microtel Surveillance Recievers > >They are nice units, but are way, way out of date. > >Virtually impossible to obtain parts, very high noise figure (so you >lose you signal), and most units lack the dual Sub Carrier mod, and >the video module. > >-jma > > 6916 From: Paolo Sfriso Date: Fri Feb 14, 2003 5:01am Subject: New editions of the CODE MANUAL and the INTELLIGENCE AND SECRET SERVI Dear Colleagues. Following Email was received today from Klingenfuss: ----- Original Message ----- From: "Joerg Klingenfuss" To: Sent: Friday, February 14, 2003 11:46 AM Subject: New editions of the CODE MANUAL and the INTELLIGENCE AND SECRET SERVI Dear friends, we will soon publish a new edition of our famous RADIO DATA CODE MANUAL. The handbook will have more than 600 pages with 265 fascinating new screenshots and details on --- state-of-the-art digital data transmission systems such as ACARS ALE ALF-RDS ALIS ALIS-2 ARQ-E ARQ-E3 ARQ-M ASCII BULG-ASCII Chirp Sounders CIS-36 MFSK Clover Clover-2 Clover-2000 CODAN Coquelet DGPS DSC DUP-ARQ DUP-ARQ-2 DUP-FEC-2 FAX FEC-A G-TOR GW-CLOVER GW-PACTOR HFDL ICAO-SELCAL ITA2 MFSK-8 MFSK-16 MSI NAVTEX Packet Radio PACTOR PACTOR-2 PACTOR-2-FEC PACTOR-3 Piccolo POL-ARQ PSK-31 PSK-63F PSK-125F RUM-FEC SITOR SP-14 T-PLEX TWINPLEX; --- Military modem standards MIL-STD-188-110A MIL-STD-188-110B (Appendix B) MIL-STD-188-110B (Appendix C) MIL-STD-188-110B (Appendix F) MIL-STD-188-141A MIL-STD-188-141B (Appendix C) MIL-STD-188-203A-1 MIL-STD-188-203-3 MIL-STD-188-212 STANAG 4198 STANAG 4285 STANAG 4415 STANAG 4481 STANAG 4529 STANAG 4538 STANAG 4539 STANAG 4591 STANAG 5031 STANAG 5035 STANAG 5066 TADIL-A TADIL-B TADIL-C; --- teleprinter alphabets Arabic ATU-Arabic Chinese Cyrillic Latin Third-shift Cyrillic --- Unicode tables for Arabic Armenian Assamese Azerbaijani Bengali Bopomofo Burmese Chinese Cyrillic Ethiopic Farsi Georgian Greek Gujarati Gurmukhi Hebrew Hindi Japanese Kannada Khmer Korean Lao Latin Malayalam Mongolian Oriya Punjabi Sinhalese Tamil Telugu Thai Tibetan Vietnamese; --- latest versions of major meteorological codes AIREP AMDAR ARFOR BATHY METAR SPECI PILOT PILOT MOBIL PILOT SHIP ROFOR SHIP SYNOP SYNOP MOBIL TAF TEMP TEMP DROP TEMP MOBIL TEMP SHIP TESAC TRACKOB WINTEM; --- thousands of new WMO index numbers of observing stations particularly in Antarctic Argentina Armenia Australia Austria Brazil Canada China France Indonesia Kazakhstan Korea Oman Pakistan Romania Saudi Arabia Sweden Thailand Timor United Kingdom. This list is much more correct than the original WMO list that has many writing errors and omissions; --- thousands of new ICAO location indicators particularly in Albania Antarctic Austria Chile China Cuba El Salvador Germany Greenland Korea Mongolia Namibia New Zealand Norway Papua New Guinea Philippines Serbia Solomon Islands South Africa Spain Sweden Switzerland Tanzania Timor Uganda Ukraine United Kingdom Uruguay. This list is much more correct than the original ICAO list that has many writing errors and omissions; --- solar and geophysical data; --- dozens of new Internet addresses; --- hundreds of new screenshots from our continuous radio monitoring; --- cryptology, intelligence and radio: the terrorism threat. If you're interested in the fascinating subject of HF e-mail and terrorist radio networks, please have a look at http://www.klingenfuss.org/terror.htm The new 17th edition will be published in March 2003. Price is 45 EUR including worldwide surface mail postage. If you would like to be among the first readers of the new book, you can place an advance order right now. ----------------------------------------------- A new edition of the superb ENCYCLOPEDIA OF INTELLIGENCE AND SECRET SERVICES has been published in January 2003. It has been considerably enlarged to 770 pages (!) and is, again, the most up-to-date international handbook on the current methods, techniques, and organization of secret services all over the world. On page 44 it even notes the new Kommando Strategische Aufklaerung created on 17 JAN 2002! The author is a noted expert from the Swiss military. This unique book is now available from us for 50 EUR including worldwide surface mail postage. Attention: this handbook is in French - there is NO English edition. I SAY AGAIN: THERE IS NO ENGLISH EDITION! The new edition can be ordered right now for immediate delivery. ----------------------------------------------- Save with our new package price for the RADIO DATA CODE MANUAL and the ENCYCLOPEDIA OF INTELLIGENCE AND SECRET SERVICES: 90 EUR including worldwide surface mail postage! ----------------------------------------------- Due to excessive new so-called "service charges" and really absurd new authorization procedures, we can't accept Visa card payments any longer. The whole story behind that - and convenient alternatives for Visa card holders - can be found at http://www.klingenfuss.org/visa.htm ----------------------------------------------- A new edition of our bestseller GUIDE TO WORLDWIDE WEATHER SERVICES will be published later this year. If you live outside Europe, could you please check the worldwide NAVTEX schedule, as listed on pages 459-468 of our 2003 GUIDE TO UTILITY RADIO STATIONS. Please contact us for amendments and corrections in your region, and advise if you refer to the standard NAVTEX frequency of 518 kHz, or to the new additional frequencies 424 or 490 kHz. Proud users of WAVECOM Digital Data Decoder Cards are invited to send us their most interesting .w40 .w41 .w51 data files continuously - not only for NAVTEX ;-) Thank you for your cooperation. ----------------------------------------------- The WAVECOM W40PC DSP Digital Data Decoder Card now cracks MIL-STD 188-141A ALE. The next version of the superb software will include HFDL = ACARS-HF and further improvements. For recent reviews of WAVECOM Digital Data Decoders by happy customers and independent experts see http://www.klingenfuss.org/reviews.htm. Says Lee Reynolds in Monitoring Times, United States of America - January 2003: " If you're in the market for a high-end decoder, I can definitely recommend the WAVECOM line of products. One big plus for this device is that software updates are reasonably regular and, importantly, free! This compares extremely favourably with a competitor's offering of a 3.5" diskette with the latest software upgrade for their hardware for a mere USD 400. I may be crazy enough to be a digital utility monitor but I'm not crazy enough to pay that kind of money for a merely incremental software upgrade as well!" ----------------------------------------------- The WAVECOM W51PC DSP Digital Data Decoder Card for the PCI bus, and the WAVECOM W41USB DSP Digital Data Decoder Box for high portability and quick computer changes with the Universal Serial Bus (USB) system, are simply the very best professional data decoders available worldwide - at a reasonable price. Unfortunately, because these units decode certain paging modes, they are not legal for consumer sales in the US, but can only be sold to qualifying agencies. Please contact us if you have problems buying a WAVECOM decoder. We can name the decoder a "digital data interface PC card" or something similar if you ask us to do so (actually IT IS a "digital data interface PC card ;-)) and UPS will settle the customs clearing procedure for you - that's their job and they really know it! We ship worldwide by fully insured UPS express airfreight at original WAVECOM prices without additional costs or profit, and we throw in free Klingenfuss publications as well (at a value of 120 EUR) - you need them anyway to make full use of these worldwide leading decoders: 2003 Guide to Utility Radio Stations, the brandnew Radio Data Code Manual, 2003 Super Frequency List on CD-ROM, and Radiotelex Messages. ----------------------------------------------- Please note our new e-mail address info@k.... Recently, communication via e-mail has become more and more unreliable, and in the case of cyber attacks will crash completely. If you send us an e-mail message and don't get a reply within one or two days, we did not receive your message and you should contact us by other means. (But please note we're closed for a few weeks between April and September each year.) Good old telefax is still the safest and fastest way of communication, particularly for orders with payment by credit card. Forget that so-called SSL et al - it's latest versions have been perfectly hacked! ----------------------------------------------- Best wishes, Joerg Klingenfuss Klingenfuss Publications Hagenloher Str. 14 D-72070 Tuebingen Germany Phone ++49 7071 62830 Fax ++49 7071 600849 E-Mail info@k... Internet http://www.klingenfuss.org ----------------------------------------------- Latest references (for the full list please click http://www.klingenfuss.org/ref.htm) Mike Richards G4WNC, Decode editor of Shortwave Magazine, United Kingdom - February 2003: "Despithe the rapidly increasing use of the Internet, the 2003 Guide to Utility Radio Stations remains the most usable reference for most listeners. The 2003 Super Frequency List on CD-ROM continues to improve with every edition. This latest version is lightning fast. The most powerful is the word search. This is an incredibly fast and powerful search system that really allows you to make the most of the 10,000+ frequency list." Nils Schiffhauer DK8OK, editor of Funk, Germany - February 2003: "Der Meister hatte wieder einmal recht, wenn er einen steigenden Anteil privater Funkdienste, Milit‰rfunk und die Kurzwelle als kostenlosen E-Mail-Ersatz prophezeite. Der 2003er-Jahrgang dokumentiert den Wahrheitsgehalt von Jˆrgs fundierten Vorhersagen auf eindrucksvolle Weise. 34 Jahre Erfahrung flieflen auch in der 21. Auflage des Guide to Utility Radio Stations zusammen. Auch sein 2003er-Guide ist wiederum unverzichtbar f¸r jeden, dessen HF-Horizont nicht beim Bayerischen Rundfunk endet. Er sollte zudem Pflichtlekt¸re f¸r jeden Funkamateur sein, der daran sehen kann, wie dank neuer digitaler Betriebsarten der ƒther brennt wie selten zuvor." Anker Petersen, Chairman of Danish Shortwave Clubs International, in Shortwave News - February 2003: "I found the following details essential for the DXer during his listening and identification of the transmitter and broadcast: station name, exact language, scheduled broadcast time, exact frequency and transmitter site. For identification purposes, it is necessary that all the essential details are readily available in the handbook. This was found to be the case in 68% of the checks in the WRTH, and 74% in 2003 Shortwave Frequency Guide." Bob Padula, Australia, in Electronic DX Press - 31 January 2003: "2003 Super Frequency List on CD-ROM ... Particularly neat is the "concurrent search" program, which when sued in combination with the incremental search represents a very powerful tool. A search for all broadcasters using the Al Dhabayya relay centre in Abu Dhabi gave us 131 results, in 1 millisecond. Program listeners may use the disk to obtain details of an almost infinite number of permutations, such as "all broadcasts in Arabic at 0615 UTC". I met with Joerg at his home some three years ago when I visited Germany, and was impressed with his dedication and superb attention to detail and topicality of all products and services he offers." David Fleming NS8S, United States of America - 23 January 2003: "Enjoy your website too! Fantastic!" John Kench G8JTQ, United Kingdom - 16 January 2003: "Have been looking at your website - absolutely magic! Saving up for a WAVECOM!!" Radio Nederland's Real Radio Booklist Review - 09 January 2003: "2003 Super Frequency List on CD-ROM ... an extremely comprehensive and accurate list ..." Giuseppe Gianotti, President of Associazione Italiana Radioascolto, Italy - 21 December 2002: "2003 Guide to Utility Radio Stations ... 2003 Super Frequency List on CD-ROM ... 2003 Shortwave Frequency Guide ... ringrazio sentitamente per queste stupende opere che sono una vera pietra migliare del radioascolto." Richard D'Angelo, Executive Director, North American Shortwave Association - 13 December 2002: "2003 Shortwave Frequency Guide... Mailed monday, and arrived today, Thursday ... very fast! ... another excellent edition of this very valuable resource." Radio Monitoring Station, Station Manager, Greenock, Scotland, United Kingdom - 12 December 2002: "2003 Guide to Utility Radio Stations ... 2003 Super Frequency List on CD-ROM ... Thank you again for your wonderful products." Kind Regards. Your Italian Connection. Paul Sfriso Director GRUPPO S.I.T. Security, Investigations & Technology Quarto d'Altino, Venice ITALY phone +39 0422 828517 fax +39 0422 823224 24hr GSM cellphone +39 335 5257308 www.grupposit.com paulsfriso@t... info@g... 6917 From: Andre Holmes <1ach@g...> Date: Sat Feb 15, 2003 2:19pm Subject: Re: Taking byte from Baghdad Hello all After reading Steves reply I would like to add that I heard a broadcast from a foreign country at around 12MHz it was a woman and the language barrier was in effect I could not piece together what she was saying, but a over broadcast of hers was present and I did here the words AMERICANS at least twice it was a male talking in a language I could not interpret. My message is that the enemys will communicate by simply over broadcasting a broadcast station. ANDRE HOLMES ----- Original Message ----- From: "Steve Uhrig" To: Sent: 11 February, 2003 02:33 PM Subject: [TSCM-L] Taking byte from Baghdad > On 11 Feb 2003 at 14:25, kondrak wrote: > > > >Although President Bush hasn't made a final decision about going to > > >war with Iraq, preparations for that potential conflict are almost > > >complete. Thousands of American troops have been deployed to the > > >Middle East in recent weeks, along with dozens of warships and > > >hundreds of combat aircraft. > > Lot of US Mil traffic on 11.175 USB including some relays from UHF > aircraft AM. All in the clear. Relatively weak and sporadic, but > perfectly copyable here in MD with a decent tuned wire outside > antenna and kit receiver. Periodically interesting. That is the > primary interagency coordination channel. You're likely to hear > almost anything there. May go hours with no traffic, then bursts of > activity for an hour. Freq picked to be OK worldwide both daytime and > night time. Reception depends a bit on the day's propogation. We're > currently just coming down off the peak of an 11 year sunspot cycle, > so HF worldwide is possible with excellent signals and low power. > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 6918 From: kondrak Date: Sat Feb 15, 2003 4:07pm Subject: Re: Taking byte from Baghdad Wouldn't surprise me at all, 12 mhz is the 25 meter International shortwave band. Actually, it's 11.650-12.050 mhz. Nice chart of allocations: http://www.pacificsites.com/~brooke/FA.shtml Its primarily in usage in Euro/Asia, so hearing a foreign story mentioning Americans isn't unusual. At 15:19 2/15/03 -0500, you wrote: >Hello all > >After reading Steves reply I would like to add that I heard a broadcast from >a foreign country at around 12MHz it was a woman and the language barrier >was in effect I could not piece together what she was saying, but a over >broadcast of hers was present and I did here the words AMERICANS at least >twice it was a male talking in a language I could not interpret. >My message is that the enemys will communicate by simply over broadcasting a >broadcast station. ANDRE HOLMES 6919 From: Date: Sun Feb 16, 2003 6:25am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 6920 From: Date: Sun Feb 16, 2003 6:25am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 6921 From: Ocean Group - MU TSD Date: Wed Feb 12, 2003 8:39pm Subject: Laser countermeasures... http://www.beltronics.com/lp904.html We have been considering sticking one if these units on one of our vans to see if they really do work. We're going to import one from the US and I reckon it should be a standard wavelenght for the European LIDAR but wasn't sure. (904nm?) Does anyone have any experience of these gizmo's? I'm told they are not illegal in the US as there is no FCC restriction on laser?? Here in Ireland there is no precedence so it's pretty much free reign however you might be snatched on an obstructing justice rule...I've checked with the DOE here in Ireland and they said they had no ruling on it so technically you can use them, however the DOJ said that should they catch you interfering with one of their speed units they would drag you out of your car and beat you with a stick! This is of course is for purely educational purposes, a learning experiment for laser countermeasures.... :) Thanking you, Oisin Ocean Group, Technical Security Division, Ireland. 6922 From: Bergstrom, Dennis Date: Wed Feb 12, 2003 8:21am Subject: RE: Fwd: [ISN] Taking byte from Baghdad Hi guys (girls?), I must admit that I seldom, if never!, have contributed to this list before, apart from introducing myself quite some time ago, but this I just *have* to comment on... :o) For those of you that don't know me (that should be most of you actually...(!)) my name is Dennis Bergstrom and I work as a Security Consultant for the company Cap Gemini Ernst & Young (One of the largest consulting companies in Europe btw) in Stockholm, Sweden. In my line of work I have among various other security related things performed Penetration Tests, Secured different systems to prevent breakins, done forensic cases etc. When I read the column "Takin Byte from Bagdad" I note that the columnist - Mr. Gary Pounder - for some reason mentions a couple of things that probably aren't true, or if they - against all odds! - are, the probablility that it happened the way it is described in the column are slim to none. Let me show you what I mean: "...Because of the explosion of computer networks and the Internet, it is now possible to gain access to information systems that support an enemy's economy or military forces. Disrupting these systems can wreak havoc with an adversary's war machine, potentially shortening the war and reducing the number of allied casualties..." Comments: Probably untrue to say the least. I have a hard time believing anyone would connect critical military systems to be accessable for anyone from the Internet. Those times you hear that someone "hacked NASA" or "hacked the US. Military" often this is just defacing of websites, or poor security on the public part of an organisation. Often Intelligence services (at least in Europe, probably elsewhere too) and military have separated networks for critical vs. non-critical systems. --- "...IO experts decided to attack KARI internally and externally. Allied electronic warfare aircraft would jam and bomb KARI components, while specially designed computer viruses would infect the system from within. Agents inserted the virus in a printer shipped to an Iraqi air defense site..." Comments: Probably not true. Very often - if not always!- a virus is written specifically for a certain platform, be it Microsoft based, *Nix or Mac. A Microsoft based virus does not infect a Mac and so on. For Mr. Pounder to be right several things must be true: * The IO Experts (whoever they are..) must know the structure and operating system of the KARI defence system to be able to develop a virus that works. * You really can infect a printer... and frankly, you can't. And if there for some reason - unknown to me and the rest of humanity - could be done, how would the virus in the printer infect the O/S of the defence system? Belive me, this is disinformation big time! The case itself *could* of course be true, but the virus was introduced into the KARI system by some other means than a printer... --- "...The virus also was introduced via a fiber optic cable that connected air defense nodes. A Special Forces unit infiltrated Iraq, dug up the cable and inserted the virus..." Comment: Probably untrue also. You don't just dig up optic cables and "insert a virus". The same as above applies. An optic cable is just a communication link between 2 nodes. If we speculate that the KARI system used TCP/IP (probably) this is the same as you or me trying to infect our office neighbors boxes by just pushing virus code through the NIC. Well, if KARI was based on SQL Server or IIS (evil grin) I *could* buy this, but probably a defence system would be custom build, wouldn't you agree? And while they were busy digging up optic cables, why not just break them so the communication was disrupted? ---- Thanks for bearing with me this far. This was my 50 cents on IT-warfare and security. Best Regards, Dennis in Stockholm, Sweden, Europe. -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: den 11 februari 2003 20:25 To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Fwd: [ISN] Taking byte from Baghdad > > >http://www.gomemphis.com/mca/opinion_columnists/article/0,1426,MCA_539_1726 690,00.html > >Gary Pounder >February 9, 2003 > >Although President Bush hasn't made a final decision about going to >war with Iraq, preparations for that potential conflict are almost >complete. Thousands of American troops have been deployed to the >Middle East in recent weeks, along with dozens of warships and >hundreds of combat aircraft. > >These preparations have been highly publicized, with daily pictures of >departing aircraft, naval vessels and military personnel, all designed >to convey a final warning to Saddam Hussein. But preparations for war >also are under way in less-visible areas. > >If Bush gives the order to attack Iraq, U.S. forces will initiate >information operations (IO) as part of their overall military >strategy. Aimed at disrupting Iraqi information systems, the expected >"information war" may represent the ultimate technology weapon in what >will be a high-tech campaign. > >Details of this war are almost nonexistent. Although the Pentagon has >spent billions of dollars on IO since the early 1990s, it has said >little about its capabilities in this area. > >What is known is that this investment has fostered the development of >highly specialized IO units, doctrine and tactics. Gen. Tommy Franks, >commander of U.S. forces in the Persian Gulf region, has his own team >of IO specialists. > >Although IO is sometimes described in terms of computer attack or >cyber-warfare, it covers a variety of functions related to the use and >protection of information and information systems. The rationale >behind IO is simple: deny the enemy use of the information spectrum, >while protecting our own information assets. > >IO includes several disciplines that are almost as old as warfare >itself: intelligence collection, deception, psychological operations. >It also incorporates newer technologies, exploiting advances from the >information revolution of the past 20 years. > >Cyber-attack is one of the most intriguing and useful new tools of >information warfare. Because of the explosion of computer networks and >the Internet, it is now possible to gain access to information systems >that support an enemy's economy or military forces. Disrupting these >systems can wreak havoc with an adversary's war machine, potentially >shortening the war and reducing the number of allied casualties. > >The United States displayed the benefits of a computer war in the 1991 >Gulf War, when it conducted its first cyber-attack on Iraq's air >defense system. The highly automated system (nicknamed KARI) linked >Iraqi surface-to-air missiles and anti-aircraft guns in a computerized >command-and-control network. > >The KARI system could withstand air attacks reliably and still provide >critical information to Iraqi air defense commanders. Neutralizing >KARI was deemed essential to the allied air campaign. > >IO experts decided to attack KARI internally and externally. Allied >electronic warfare aircraft would jam and bomb KARI components, while >specially designed computer viruses would infect the system from >within. Agents inserted the virus in a printer shipped to an Iraqi air >defense site. > >The virus also was introduced via a fiber optic cable that connected >air defense nodes. A Special Forces unit infiltrated Iraq, dug up the >cable and inserted the virus. It remained dormant until the opening >moments of the air war, when it went active and crippled KARI. The >Iraqi air defense system never recovered, and allied losses in the air >campaign were minimal. > >Since the Gulf War, IO tacticians have added to their target lists >economic and infrastructure systems that support an enemy's ability to >fight: power grids, water supplies, banking networks. There are >unconfirmed reports that cyber-attacks helped shut down the Serb power >grid during the 1999 Balkans War. Information operations also have >been used in the war on terrorism to ferret out al-Qaida bank >accounts, trace financial transactions and identify potential >operatives. > >Officially, the Pentagon won't say what level of IO planning and >preparation is under way, but there are vague hints about what might >be in store for Baghdad. Several media outlets reported last month >that the United States was sending E-mail messages to Iraqi military >commanders, urging them not to fight if war breaks out. > >In a police state such as Iraq, E-mail directories are classified >material, off limits to anyone outside the military and security >establishment. Our ability to send E-mail to Iraqi generals suggest IO >teams have identified key computer networks, earmarking them for >potential disruption or destruction. > >There is a good chance the cyber-battle will spread beyond Iraqi >information systems. If the United States launches military action >against Baghdad, we can expect a vicious "war" between Middle Eastern >and western computer hackers. > >Remember the 2001 "spy plane" incident between the United States and >China? That relatively minor episode prompted a month-long >confrontation between American and Chinese hackers that resulted in >the defacement of thousands of Web sites around the world. > >A hacker war emerging from a new conflict with Iraq would be even more >intense, likely unleashing new computer viruses, denial-of-service >attacks aimed primarily at Internet providers and Web site >defacements. The potential cost of such a war could be staggering. > >The United States is not alone in developing information operations as >a tool of war. Although Iraq's IO capabilities in this area are >rudimentary, other potential adversaries - notably China - are >investing heavily in information warfare. More-sophisticated enemies >would have no qualms about mounting an IO campaign against us. > >As the most "wired" nation on Earth, the United States has the >greatest vulnerability to information attack. Although our government >and private companies have invested heavily in computer security, the >recent virus that disabled thousands of automated teller machines >illustrates the potential impact of even small-scale cyber-attacks. >The forces about to be unleashed on Saddam Hussein may be used against >us in the future. > > >Guest columnist Gary Pounder is a retired U.S. Air Force intelligence >officer who lives in Oxford, Miss. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ This message contains information that may be privileged or confidential and is the property of the Cap Gemini Ernst & Young Group. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain, copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. 6923 From: David Vine Date: Thu Feb 13, 2003 7:26am Subject: Re: Digest Number 1189 There has been some discussion about "Microtel" receivers. I recently became a dealer for Alinco scanner radios which are very affordable and have unique features that make them useful for basic RF sweeps. They cover broadcast to gHz ranges and have "transweeper" function (listening for unit-generated audio on RF as unit sweeps) and frequency counter built-in. In essence, they are roughly equivalent to an AOR with Optoelectronics unit but priced from about $250 to $500. If anyone is interested in more detail let me know. David Vine ===== www.investigativetechnology.net __________________________________________________ Do you Yahoo!? Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com 6924 From: Julie Burger Date: Thu Feb 13, 2003 3:49pm Subject: Interesting Link: Web Controlled Shortwave Receivers http://www.ralabs.com/webradio/ _________________________________________________________________ Add photos to your messages with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail 6925 From: Ocean Group - MU TSD Date: Fri Feb 14, 2003 5:38am Subject: Laser countermeasures... http://www.beltronics.com/lp904.html We have been considering sticking one if these units on one of our vans to see if they really do work?? We're going to import one from the US and I reckon it should be a standard wavelenght for the European LIDAR but wasn't sure. (904nm?) Does anyone have any experience of these gizmo's? I'm told they are not illegal in the US as there is no FCC restriction on laser?? Here in Ireland there is no precedence so it's pretty much free reign however you might be snatched on an obstructing justice rule...I've checked with the DOE here in Ireland and they said they had no ruling on it so technically you can use them, however the DOJ said that should they catch you interfering with one of their speed units they would drag you out of your car and beat you with a stick! This is of course is for purely educational purposes, a learning experiment for laser countermeasures.... :) Thanking you, Oisin Ocean Group, Technical Security Division, Ireland. 6926 From: George Shaw Date: Sun Feb 16, 2003 9:38am Subject: CCTV line monitoring OK not directly a case of tracking a monitored line but more a quest to understand how it could be accomplished. Situation: I have a client that has around 55 RG59 coax cables in a bundle running through the building. None are marked as to which camera they are coming from or which terminal on the multiplex they are connected to. The multiplex has 32 + 16 inputs (48) and a selector for 48 cameras. If I can not access the coax ends (at the multiplex) how can I test for 1. The presence of a video feed in the coax without breaking the coax and testing for signal? Say from a point within the building but NOT at either end, the test has to be as un-intrusive as possible; (no cutting the coax and rejoining) like a clamp meter for current would do. 2. The detection of a live cable i.e. one that is being used as opposed to a dead coax. Like above no/little intrusion of the coax possible. -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 6927 From: Ben Pasco Date: Sun Feb 16, 2003 6:26am Subject: Your Email Hello and thank you for your email. I shall be out of my office from the 17th-28th Feb and will be out of normal email contact. If you need to contact PGI then please email my business partner, David Rule at davidr@p... who will be happy to respond. Thanks again, Ben Pasco 6928 From: George Shaw Date: Sun Feb 16, 2003 1:06pm Subject: CCTV Line Monitoring OK not directly a case of tracking a monitored line but more a quest to understand how it could be accomplished. Situation: I have a client that has around 55 RG59 coax cables in a bundle running through the building. None are marked as to which camera they are coming from or which terminal on the multiplex they are connected to. The multiplex has 32 + 16 inputs (48) and a selector for 48 cameras. If I can not access the coax ends (at the multiplex) how can I test for 1. The presence of a video feed in the coax without breaking the coax and testing for signal? Say from a point within the building but NOT at either end, the test has to be as un-intrusive as possible; (no cutting the coax and rejoining) like a clamp meter for current would do. 2. The detection of a live cable i.e. one that is being used as opposed to a dead coax. Like above no/little intrusion of the coax possible. If it is not possable to demodulate the video signal, what could you monitor as to line activity? If you were to try and detect such a "tap" how could you? You may be able to get at the end to attach a TDR but would that show you given a no-intrusive attachment? -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... 6929 From: Kirk Adirim Date: Wed Feb 19, 2003 2:04am Subject: RE: CCTV line monitoring Hi George, You make a TINY slit or nick in the coax with a razor knife, then seperate the braided shielding and foil (if any), expose the dielectric material. Using a homemade needle probe jig, you penetrate the dielectric and make contact with the center conductor while avoiding any shorts to the shield. Another needle is woven slightly into the exposed braided shield to give you your ground. Both needle probes are terminated onto a piece of RG174/U or similar coax and run to your hand held video monitor or other test equipment. In lieu of slitting the coax, you could obtain one of the circular punches from a leather belt hole punch. By chucking it into a handle you can cut out a circular plug of insulation from the side of the coax. Using liquid tape or neoprene glue, you can reseal your intrusion from moisture. Hope this helps, Kirk www.tactronix.com -----Original Message----- From: George Shaw [mailto:george.shaw@u...] Sent: Sunday, February 16, 2003 7:39 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] CCTV line monitoring OK not directly a case of tracking a monitored line but more a quest to understand how it could be accomplished. Situation: I have a client that has around 55 RG59 coax cables in a bundle running through the building. None are marked as to which camera they are coming from or which terminal on the multiplex they are connected to. The multiplex has 32 + 16 inputs (48) and a selector for 48 cameras. If I can not access the coax ends (at the multiplex) how can I test for 1. The presence of a video feed in the coax without breaking the coax and testing for signal? Say from a point within the building but NOT at either end, the test has to be as un-intrusive as possible; (no cutting the coax and rejoining) like a clamp meter for current would do. 2. The detection of a live cable i.e. one that is being used as opposed to a dead coax. Like above no/little intrusion of the coax possible. -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6930 From: Matt Paulsen Date: Wed Feb 19, 2003 9:17am Subject: RE: Your Email Everyone, this is what not to do with email. Hello and thank you for your email. I shall be out of my office from the 17th-28th Feb so please by all means come rob me. In fact, here's my home address and do please feed the cats while you're there.... -----Original Message----- From: Ben Pasco [mailto:benp@p...] Sent: Sunday, February 16, 2003 4:26 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Your Email Hello and thank you for your email. I shall be out of my office from the 17th-28th Feb and will be out of normal email contact. If you need to contact PGI then please email my business partner, David Rule at davidr@p... who will be happy to respond. Thanks again, Ben Pasco ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6931 From: Hawkspirit Date: Wed Feb 19, 2003 7:06pm Subject: CCTV line monitoring Ok, I am not getting this, please define the nature of the threat and the object of the threat. Roger At 11:43 AM 2/19/03 +0000, you wrote: >Date: Sun, 16 Feb 2003 15:38:30 -0000 > From: "George Shaw" >Subject: CCTV line monitoring > >OK not directly a case of tracking a monitored line but more a quest to >understand how it could be accomplished. > >Situation: I have a client that has around 55 RG59 coax cables in a >bundle running through the building. None are marked as to which camera >they are coming from or which terminal on the multiplex they are >connected to. The multiplex has 32 + 16 inputs (48) and a selector for >48 cameras. > >If I can not access the coax ends (at the multiplex) how can I test for > >1. The presence of a video feed in the coax without breaking the coax >and testing for signal? Say from a point within the building but NOT at >either end, the test has to be as un-intrusive as possible; (no cutting >the coax and rejoining) like a clamp meter for current would do. > >2. The detection of a live cable i.e. one that is being used as opposed >to a dead coax. Like above no/little intrusion of the coax possible. > > 6932 From: Kutlin, Josh Date: Wed Feb 19, 2003 6:54am Subject: RE: Taking byte from Baghdad Ok ...thanks to this thread I went out and bought my first shortwave (DX-399) this past weekend for $30 on closeout. The first thing I realized is that I need a better antenna. Did some reading (and rigging) and I realized that the 25 feet of co-ax (its all I had and the snow closed radio shack) is just not cutting it. My question is and I apologize if it is off topic for this group, but does any one know where I could find plans to make a cheap active antenna? Thanks Josh -----Original Message----- From: kondrak [mailto:kondrak@s...] Sent: Saturday, February 15, 2003 5:08 PM To: Andre Holmes Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Taking byte from Baghdad Wouldn't surprise me at all, 12 mhz is the 25 meter International shortwave band. Actually, it's 11.650-12.050 mhz. Nice chart of allocations: http://www.pacificsites.com/~brooke/FA.shtml Its primarily in usage in Euro/Asia, so hearing a foreign story mentioning Americans isn't unusual. At 15:19 2/15/03 -0500, you wrote: >Hello all > >After reading Steves reply I would like to add that I heard a broadcast from >a foreign country at around 12MHz it was a woman and the language barrier >was in effect I could not piece together what she was saying, but a over >broadcast of hers was present and I did here the words AMERICANS at least >twice it was a male talking in a language I could not interpret. >My message is that the enemys will communicate by simply over broadcasting a >broadcast station. ANDRE HOLMES ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS From: Date: Sun Feb 11, 2001 7:50am Subject: In Tapping Net, F.B.I. Insists Privacy Is Not a Victim In Tapping Net, F.B.I. Insists Privacy Is Not a Victim February 8, 2001 By JOHN SCHWARTZ QUANTICO, Va. -- AS long as there have been law enforcement agents, they have tried to listen in on what the bad guys are planning. In early times, that meant standing next to a window in the evesdrope, the place where water from the eaves drips, to overhear conversations. As communications went electronic, eavesdropping did, too: Gen. Jeb Stuart hired a tapper to intercept telegraph messages in the Civil War. And by the 1890's, two decades after Alexander Graham Bell's first call to Watson, the first known telephone wiretaps by the police were in place. The Internet, in turn, has provided new frontiers for law enforcement tappers. At first, surveillance of Internet traffic was useful only in hacking cases ‚Äî after all, only geeks were online. But as the world has gone digital, criminals have as well, and Internet taps are requested in a growing number of cases. According to documents obtained by the Electronic Privacy Information Center, an advocacy group based in Washington, requests from field offices for help with "data interception operations" rose more than 18-fold between fiscal years 1997 and 1999. In Congressional testimony in July, the assistant director of the Federal Bureau of Investigation's laboratory division, Donald M. Kerr, painted a stark portrait of the dangers of the online world. "The use of computers and the Internet is growing rapidly, paralleled by exploitation of computers, networks and databases to commit crimes and to harm the safety, security and privacy of others," he said. All manner of crimes ‚Äî child pornography, fraud, identity theft, even terrorism ‚Äî are being perpetrated using the Internet as a tool, he said. But one device developed by the F.B.I. to deal with this new world of crime has drawn it squarely into a debate over the proper limits of government surveillance: an Internet wiretapping system called Carnivore. The Carnivore effort, which came to light last June, met with resistance from groups as diverse as the American Civil Liberties Union and the Republican leadership of the House of Representatives. The F.B.I. says it has already used the device in dozens of investigations. But critics are concerned that Carnivore, much more than telephone wiretaps, can cast an investigative net that captures the communications of bystanders along with those of a suspect. The House majority leader, Dick Armey of Texas, has said the technology raises "strong concerns" that the government "is infringing on Americans' basic constitutional protection against unwarranted search and seizure." "Until these concerns are addressed," he said, "Carnivore should be shut down." The name, to be sure, has not helped the F.B.I.'s salesmanship. It was derived from an earlier system, called Omnivore, that captured most of the Internet traffic coursing through a network. "As the tool developed and became more discerning" ‚Äî able to get at the meat of an investigation ‚Äî "it was named Carnivore," an official said. ("If they called it Device 374," he explained, "nobody could remember what Device 374 is.") The F.B.I. says the real value of Carnivore, by any name, is that it can do much less than its predecessors. It says agents can fine-tune the system to yield only the sources and recipients of the suspect's e- mail traffic, providing Internet versions of the phone-tapping tools that record the numbers dialed by a suspect and the numbers of those calling in. Those tools, known respectively as pen registers and "trap and trace" devices, are valuable building blocks of any preliminary investigation. "Trap and trace is vital," said Marcus C. Thomas, who heads the bureau's cybertechnology section, "to try to understand criminal organizations, who's communicating with who." Moreover, a full federal wiretap ‚Äî whether of a suspect's phone or of Internet traffic ‚Äî requires extensive evidence of criminal activity and approval from high Justice Department officials and a judge. Court approval to monitor the origins and destinations, not the content, requires only a pledge from the investigators that the information would be relevant. Law enforcement officials say the goal of Carnivore is to protect privacy. Under most wiretaps, they reason, investigators have to review all the material that comes in over the wire and discard any material that they are not entitled to review under the terms of the warrant ‚Äî say, a conversation with the suspect's grandmother. Because the path of online data is harder to isolate than a telephone line, Carnivore may capture communications unrelated to the suspect. But because it then filters out whatever investigators are not entitled to see, officials say, privacy is enhanced. To understand why the F.B.I. hungers for Carnivore, behold its ancestor: a hulking stainless steel box the size of an old Kelvinator in the building in Quantico where the bureau designs what it calls interception systems. The $80,000 behemoth can monitor data traffic on three phone lines simultaneously and translate the squeal of modems into the e-mail and Web pages that a criminal suspect sees. But it can monitor only a standard modem. If a criminal suspect has, like millions of other Americans, decided to trade up to high-speed Internet access through a cable modem or the telephone service known as D.S.L., "it's worthless," Mr. Thomas said. In contrast to that middle-tech dinosaur, Carnivore is a sleek and speedy mammal, a black box of a PC built to work with the vast amounts of high-speed data that course through the Internet. The machine can tap communications for almost all of the ways that people get online. It costs a tenth of what the bureau pays for each of the older machines, and it can do far more: it can sift through all the communications of an Internet service provider, perhaps including tens of thousands of users, and pull out the e-mail and Web travels of the suspect. And although doing so would raise deep constitutional issues, the system can even be programmed to monitor the use of particular words and phrases used in messages by anyone on the network. When law enforcement agents get permission to install Carnivore, they send their own technicians to the office of an Internet service provider. The system itself, once programmed with the details of a search, can easily be installed on the same racks that the company uses for its own network equipment, and is tied in to the flow of data. For all its power, however, Carnivore cannot digest all that it eats: if law enforcement officials intercept a message that has been encrypted, they will get a featureless fuzz of ones and zeroes. The furor over the technology caught the F.B.I. by surprise. "What would you have us do?" Mr. Thomas asked in frustration. "Stop enforcing laws because it's on the Internet?" Paul Bresson, an F.B.I. spokesman, added, "The public should be concerned about the criminals out there abusing this stuff, and not the good guys." The two men discussed the system in Mr. Thomas's office at the bureau's research center at Quantico, home of the F.B.I. training academy. From the outside, the center is so unremarkable that it could be a college classroom building in a witness-protection program. But the array of dishes and antennas along the roofline suggest that something more interesting is going on inside. This is where three F.B.I. engineers took pieces of commercial software and modified them in an effort to allow the kind of selective data retrieval that the law requires, and where they have worked to upgrade the system in response to the criticism of Carnivore. The engineers have added auditing features, for example, that the bureau says will help insure that investigators will not tamper with the system or try to gather more information than authorized. But the F.B.I. is not depending on Carnivore alone for the future of online surveillance. According to budget documents obtained by the Electronic Privacy Information Center under a Freedom of Information Act request, the bureau's plans include developing ways to listen in on the growing medium of voice telephone calls conducted over the Internet and to monitor the live online discussion system known as Internet Relay Chat, as well as other network technologies that were identified in the original document but were blacked out in the copies provided to the group. Some alternatives are already in use, including one that reportedly figured in an investigation of Nicodemo S. Scarfo Jr., an accused bookmaker whose imprisoned father is the former head of the Philadelphia crime organization. In 1999, The Philadelphia Inquirer reported recently, agents planted a tap in Mr. Scarfo's computer keyboard that stored everything the suspect typed ‚Äî including the password for the encryption software used to protect files on his hard drive. Mr. Thomas was unwilling to discuss new techology methods in detail, but said he knew of only two cases in which such devices had been used. A former federal prosecutor, Mark Rasch, says still more methods of Internet wiretap could be on the way. Mr. Rasch, vice president for cyberlaw at Predictive Systems, an Internet consulting company, noted that hacker groups had developed malicious computer programs with names like Back Orifice 2000 that when planted in a target computer give full remote access of the target machine to the hacker. Mr. Rasch suggested that such remote-control programs could reduce the risk of break-ins for the agency and might already be in use. "I would be shocked," he said, if such software were not being used in intelligence investigations, which provide government agents with more leeway than in criminal investigations of American citizens. But Marc J. Zwillinger, a former Justice Department lawyer, said law enforcement agents were unlikely to take such a risky course, because "it would be difficult to control, and if it did get out of control, there would be a backlash against the agency." In the meantime, as the Congressional debate over Carnivore continues, the future of the system is uncertain. [The new attorney general, John Ashcroft, has not addressed Carnivore directly, but he has taken a tough stand in the past against what he sees as high-tech government intrusions into privacy.] Members of Congress and civil libertarians argue that the analogies to telephone taps are flawed and that the Carnivore technology violates constitutional protections against unreasonable searches. "The whole controversy is over intercepting thousands of conversations simultaneously," regardless of the filtering then applied, said Richard Diamond, a spokesman for Mr. Armey, the House majority leader. Some critics have suggested imposing the same strict authorization rules on Carnivore that prevail for full-scale telephone wiretaps, with stiff penalties for any abuse of the system. Still, many of those who oppose Carnivore have concluded that it is here to stay. "You can't outlaw this technology," said James X. Dempsey, deputy director of the Center for Democracy and Technology, a high-tech policy group in Washington. "All you can do is set strict legal standards." http://www.nytimes.com/2001/02/08/technology/08CARN.html?ex=982836325&ei=1&en= 5f0395420440e48e /-----------------------------------------------------------------\ Visit NYTimes.com for complete access to the most authoritative news coverage on the Web, updated throughout the day. Become a member today! It's free! http://www.nytimes.com?eta 2463 From: Date: Mon Feb 12, 2001 9:25am Subject: PRO-2006 for sale I have a PRO-2006 that is un blocked for sale for $400. "Dick Seward "THE BUG HUNTER" 23 yrs. debugging. FCC & CCW licensed. CALI Affiliated. Great prices & lots of experience. (949-770-8384)" ________________________________________________________________ GET INTERNET ACCESS FROM JUNO! Juno offers FREE or PREMIUM Internet access for less! Join Juno today! For your FREE software, visit: http://dl.www.juno.com/get/tagj. 2464 From: none none Date: Mon Feb 12, 2001 10:45am Subject: Greetings Greetings, I would like to reiterate my appreciation to Jim and all the listmembers for maintaining and contributing to this list. I find it informative and amusing. 'Short and Sweet.' Erik. == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com 2465 From: mike f Date: Mon Feb 12, 2001 6:19pm Subject: anac disconnected Toll Free ANAC 'Automatic Number Announcement Circuit' It happenned sometime last week wednesday or thursday. The ANAC 1-800-346-0153 has been disconnected. "ANOTHER ONE BITES THE DUST" later4,mike f. Michael T. Fiorentino Syracuse,NY 13206 "CONFIDENTIALITY WARNING" This electronic message contains information which may be privileged and/or confidential. The information is intended for use only by the individual(s) or entity named/indicated above. If you are not the identified/intended recipient, be aware that any disclosure, copying, distribution, or use of the contents of this message/information is prohibited. If you are not the indicated recipient or have received this message in error contact our offices immediately for instructions." 2466 From: Charles P Date: Mon Feb 12, 2001 7:26pm Subject: Re: anac disconnected yes, I was using 800 346 0152, it's gone too. too bad ----- Original Message ----- From: "mike f" To: ; "TSCM-L" Sent: Monday, February 12, 2001 7:19 PM Subject: [TSCM-L] anac disconnected | Toll Free ANAC 'Automatic Number Announcement Circuit' | It happenned sometime last week wednesday or thursday. | The ANAC 1-800-346-0153 has been disconnected. | "ANOTHER ONE BITES THE DUST" | | later4,mike f. | | | | | | Michael T. Fiorentino | Syracuse,NY 13206 | "CONFIDENTIALITY WARNING" | This electronic message contains information which may be privileged and/or | confidential. The information is intended for use only by the | individual(s) | or entity named/indicated above. If you are not the identified/intended | recipient, be aware that | any disclosure, copying, distribution, or use of the contents of this | message/information is prohibited. If you are not the indicated recipient | or | have | received this message in error contact our offices immediately for | instructions." | | | | ======================================================== | TSCM-L Technical Security Mailing List | "In a multitude of counselors there is strength" | | To subscribe to the TSCM-L mailing list visit: | http://www.onelist.com/community/TSCM-L | | or email your subscription request to: | subTSCM-L@t... | =================================================== TSKS | | | 2467 From: Robert Dyk Date: Tue Feb 13, 2001 0:06pm Subject: ANAC With the disappearance of most local ANACs in my area, I have started using 888 837-8274. This is a combination ANAC + ringback/loopback. If it works in your area, beware, after ringback, your line will be dead for about 30 seconds. Hope this helps. Robert Dyk Worldwide Security Ltd. Mississauga, Ontario, Canada (888) 4-COVERT 2468 From: Mike Date: Tue Feb 13, 2001 0:34pm Subject: Pinhole Just got a few Military Surplus covert pinhole lenses. These cost the gov over $800. Will sell for $200 each. Email me for pics/info. bootleg@p... Mike [Non-text portions of this message have been removed] 2469 From: Index Date: Tue Feb 13, 2001 4:27pm Subject: Questions? Greetings Everyone: I have a client who used her cellular telephone(analogue) to phone her daughter. The client was approximately 8 km. from her home. her daughter who does not live with her, was 12 km. from clients house. The conversation lasted approximately 45 seconds. When the client returned home, she noticed recorded on her Bell Telephone, Call Answer(voicemail), the 45 sec. conversation that took place on her cellular telephone that day. She also noticed heavy breathing on the call answer recording, which was not heard during the conversation on her cellular telephone. She advises that she has never call forwarded the cell to the residence, nor the residence to the cellular telephone. She did note that the conversation stopped being recorded when her passenger got out, and closed the car door. Her concern is whether this is some type of possible wiretapping scenario, that developed into a temporary glitch? She would like some type of hypothesis, before allowing us to conduct a sweep of her house, and/or motor vehicle. I can't think of any way that this can possibly happen. Thank you for your help in advance. Regards, Bob Panczenko President/CEO, License #000394 Index Investigation & Security Service Inc.(Ontario, Canada) P.O. Box 214 Station D Toronto, Ontario Canada M9A 4X2 Voice: (416) 604-4690 Fax: (416) 604-8993 E-Mail: index@s... http://www.indexinvestigation.com [Non-text portions of this message have been removed] 2470 From: Charles P Date: Tue Feb 13, 2001 8:32pm Subject: Re: Questions? A fairly common occurance these days, is when someone hits the "talk" or "send" button by accident, basically re-dialing the last number called (often their own office voicemail). The cell phone then records the local conversations onto the voicemail or answering machine called. In this scenario, what could have happened, is that the passenger in the car with the client had their own cellphone, they could have accidentally dialed the clients home by bumping their cell phone button. When they got out of the car, the phone was no longer picking up any noise and the answering machine may have stopped, or the phone could have been turned off. The same thing could have been done intentionally by the passenger, but there is no sane reason why someone would do that. This happens far more frequently than people would like to admit, and then they can start imagining a diabolical harassment conspiracy. charles Charles Patterson charles@t... Global Communications Tarrytown, NY www.telephonesecurity.com www.avtele.com ----- Original Message ----- From: "Index" To: Sent: Tuesday, February 13, 2001 5:27 PM Subject: [TSCM-L] Questions? | Greetings Everyone: | | I have a client who used her cellular telephone(analogue) to phone her daughter. The client was approximately 8 km. from her home. her daughter who does not live with her, was 12 km. from clients house. The conversation lasted approximately 45 seconds. | | When the client returned home, she noticed recorded on her Bell Telephone, Call Answer(voicemail), the 45 sec. conversation that took place on her cellular telephone that day. She also noticed heavy breathing on the call answer recording, which was not heard during the conversation on her cellular telephone. She advises that she has never call forwarded the cell to the residence, nor the residence to the cellular telephone. She did note that the conversation stopped being recorded when her passenger got out, and closed the car door. | | Her concern is whether this is some type of possible wiretapping scenario, that developed into a temporary glitch? She would like some type of hypothesis, before allowing us to conduct a sweep of her house, and/or motor vehicle. | | I can't think of any way that this can possibly happen. | | Thank you for your help in advance. | | Regards, | | Bob Panczenko | President/CEO, License #000394 | Index Investigation & Security Service Inc.(Ontario, Canada) | P.O. Box 214 Station D | Toronto, Ontario | Canada | M9A 4X2 | Voice: (416) 604-4690 | Fax: (416) 604-8993 | E-Mail: index@s... | http://www.indexinvestigation.com | | | | [Non-text portions of this message have been removed] | | | | | ======================================================== | TSCM-L Technical Security Mailing List | "In a multitude of counselors there is strength" | | To subscribe to the TSCM-L mailing list visit: | http://www.onelist.com/community/TSCM-L | | or email your subscription request to: | subTSCM-L@t... | =================================================== TSKS | | | 2471 From: Craig Snedden Date: Wed Feb 14, 2001 6:42am Subject: Re: Questions? Hi, I'm afraid I don't have the answer, but a similar scenario happened about 5 or 6 years ago to a colleague of mine in the UK, using an analogue BT CELLNET phone: The colleague switched off (power down) the mobile phone when he went into a meeting and verified that it was off. When he came out of the meeting he switched the phone back on (power up). The battery remained connected to the phone whilst in the meeting. A short time later his daughter telephoned the mobile to ask if he had just called her by accident and proceeded to relate the content of the meeting he had just attended. Apparently her landline telephone had rung and she had been able to hear the meeting being picked up by the mobile phone mic. He reported the matter to CELLNET who advised that this scenario had happened to a number of persons using the same type of phone, I beleive a NOKIA 1510 or similar vintage. They advised him to dump the phone. He was supplied with a new phone and has never experienced the same again. We took the phone apart, and had it checked over, but couldn't find anything by way of physical tampering, or tampering with the firmware which may have caused this to happen. CELLNET clearly were aware of this happening, but could not or would not provide a suggested answer as to what had caused it. I've made enquiries and only ever heard of this happening on BT CELLNET analogue. Regards, Craig Snedden ----- Original Message ----- From: "Index" To: Sent: Tuesday, February 13, 2001 10:27 PM Subject: [TSCM-L] Questions? > Greetings Everyone: > > I have a client who used her cellular telephone(analogue) to phone her daughter. The client was approximately 8 km. from her home. her daughter who does not live with her, was 12 km. from clients house. The conversation lasted approximately 45 seconds. > > When the client returned home, she noticed recorded on her Bell Telephone, Call Answer(voicemail), the 45 sec. conversation that took place on her cellular telephone that day. She also noticed heavy breathing on the call answer recording, which was not heard during the conversation on her cellular telephone. She advises that she has never call forwarded the cell to the residence, nor the residence to the cellular telephone. She did note that the conversation stopped being recorded when her passenger got out, and closed the car door. > > Her concern is whether this is some type of possible wiretapping scenario, that developed into a temporary glitch? She would like some type of hypothesis, before allowing us to conduct a sweep of her house, and/or motor vehicle. > > I can't think of any way that this can possibly happen. > > Thank you for your help in advance. > > Regards, > > Bob Panczenko > President/CEO, License #000394 > Index Investigation & Security Service Inc.(Ontario, Canada) > P.O. Box 214 Station D > Toronto, Ontario > Canada > M9A 4X2 > Voice: (416) 604-4690 > Fax: (416) 604-8993 > E-Mail: index@s... > http://www.indexinvestigation.com > > > > [Non-text portions of this message have been removed] > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 2472 From: Greg H. Walker, Attorney At Law Date: Wed Feb 14, 2001 2:45pm Subject: Questions --- Cell Phones Craig Snedden wrote: > I'm afraid I don't have the answer, but a similar scenario happened about 5 or 6 years ago to a colleague of mine in the UK, using an analogue BT CELLNET phone: Greg Replies: I normally don't post on this list because, to be honest, you all are way above my electronic skills and I don't do TSCM, I refer it to folks like you who are true professionals, but this is finally something I can comment on. I have had this happen on several occasions with my NOKIA 6160 either recording to my cellular voice mailbox or to my office voice mailbox. It has occured when my last call had been to one or the other. I believe that I either hit my send button or a speed dial button -- none of the calls have ever recorded anything important, but normally just picks up my car radio, or on really bad days me singing in the car :) I notice that this does not happen if the phone is not clipped to my belt holder and only happens if I am in the sitting position, that's why I believe it is caused by either clothing or something else accidently pushing a button. Thanks for all of the great info you all put on this list, it is very educational. GREG -- Greg H. Walker Attorney At Law President RisKontroL -- Risk Management, Security Consulting & Investigations Houston, Texas (713) 850-0061 2473 From: James M. Atkinson, Comm-Eng Date: Wed Feb 14, 2001 4:08pm Subject: Good old Big Brother - All over the place Good old Big Brother - All over the place http://www.dawn.com/2001/02/13/op.htm#4 By Omar Kureishi THE story is apocryphal but it's instructive in a humorous sort of way. Emperor Bokassa sent off Pierre Cardin and wanted a uniform designed. He wanted purple trousers, a red shirt, plush yellow jacket and a hat with ostrich feathers. "Is it for you, your Majesty?" the French designer asked. "No" said the Emperor, "it's for my secret service." Before Ayub shifted the capital from Karachi to Rawalpindi, the embassies were the focal point of social activities and there was a dress-code for the receptions which was usually black tie. These functions provided an ideal listening post for sleuths of various intelligence agencies who would eaves-drop on the conversations as well as observe who was talking with whom. In the meanwhile lesser functionaries were duly noting car number plates particularly if the reception was hosted by the embassy of a country not deemed friendly. The problem was that those of them attending the function were a dead give away because they were not observing the dress-code and, in this context, wearing 'civvies' The DIB chief happened to be a friend of mine and I mentioned this to him. He got the point. He had them kitted in white, shark-skin sherwanis. This made them even more conspicuous for they were the only ones wearing white, shark-skin sherwanis. The secret service, by definition, is meant to be secret and officially one is not supposed to acknowledge that it exists but if it is meant to be secret, it must be the worst kept secret in the world. The CIA and KGB are brand names as well known and familiar as McDonald's and Pepsi-Cola and one imagines that they probably have their own public relations divisions. Many years ago, I read a book called The Invisible Government. The book purported to blow the lid off the CIA but, in fact, catalogued the achievements of the CIA, about the covert operations, of how a particular government was destabilised. It showed the CIA, about the covert operations, of how a particular government was destabilized. It showed the CIA as being all-powerful. Many held the view that the book had been written at the behest of the CIA and had been sponsored by it, yet another example of a covert operation. I am sure that the KGB had its own version of such book, they too like to flex their muscles and are disinclined to do good deeds and dump them in the river. The British who had operated with characteristic secretiveness decided to go for broke with James Bond, Special Agent 007. Not only did the secret service cease to be secret, it achieved the celebrity of a pop star. Their mystique was gone. This brings me to our own efforts, better known for monitoring ourselves than outsiders on the theory that charity begins at home and Big Brother, therefore, keeps a watchful eye (and ear) on his own family. The latest example of which is The Sunday Times disclosure of taped conversations between a judge and high government functionaries, the masala having been provided by a Deputy-Director of the Intelligence Bureau. I don't know whether the audio-tapes are genuine or not or whether they have been edited. Not surprisingly, there have been denials and repudiations but these have lacked conviction and so far, we have been spared the boast that legal action is being considered against The Sunday Times. In the past, such legal action has not materialised. And the general opinion is that a newspaper of the calibre of The Sunday Times which is a respectable broadsheet as opposed to a sensation-mongering tabloid would have done its homework and would not have gone half-cock. The contents of the taped conversations have an importance of their own but not the same importance as the fact that the telephone of a judge of a higher court was being taped. The question that arises is who is the ultimate authority that decides whose telephones should be tapped? Is there a procedure for it or is it a catch-as-catch can? What happens to the privacy of individuals? And how widespread is telephone tapping? In other countries, at least in some of them, the United States and Britain for example, a court order is necessary to keep a telephone under surveillance and some justification has to be provided for doing so. Not that this precaution is necessarily observed. Herbert Hoover of the FBI was a law unto himself and would routinely (and illegally) have telephones taped of people like Martin Luther King and rumour has it, of John F. Kennedy when he was the president of the United States. The most celebrated case is, of course, of Richard Nixon who bugged his own office and was, metaphorically speaking, strangulated by his own tapes. Electronic surveillance has now become so sophisticated that the old-fashioned telephone tapping is the equivalent of the bullock-cart in this age of supersonic aircraft. One would have imagined that some other system would be used for listening to telephone calls if some sort of incriminating evidence was being sought. Yet for some reason (an exaggerated sense of self-importance) many believe that their telephones are bugged and those who live in five-star hotels, especially in Islamabad, are certain that all the telephones are bugged. It is not unusual to find a guest switching on the television set at a high volume while talking on the telephone. There is no doubt that there is this eerie feeling of being watched. My own guess would be that master spies, being master, would not be so stupid as to carry out their cloak-and-dagger activities in broad daylight. But the tapes involving a judge, a federal minister and the chairman of the Ehtesab Bureau would seem to suggest that the higher the position one holds, the more one becomes vulnerable, a sort of reverse of the perks of the job, the downside. In normal circumstances, it would be scandalous. But we have got used to Big Brother watching over us. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2474 From: James M. Atkinson, Comm-Eng Date: Wed Feb 14, 2001 5:32pm Subject: Re: Good old Big Brother - All over the place At 5:08 PM -0500 2/14/01, James M. Atkinson, Comm-Eng wrote: >Good old Big Brother - All over the place > >http://www.dawn.com/2001/02/13/op.htm#4 > >By Omar Kureishi [snip} >Yet for some reason (an exaggerated sense of self-importance) many believe >that their telephones are bugged and those who live in five-star hotels, >especially in Islamabad, are certain that all the telephones are bugged. > >It is not unusual to find a guest switching on the television set at a high >volume while talking on the telephone. There is no doubt that there is this >eerie feeling of being watched. > [snip] The "exaggerated sense of self-importance" results in a lot of people who have ego problems or suffering from mental illness inventing antagonists and fabricating harassment just to get attention. This in turn becomes them reaching out to a TSCM person and requesting a bug sweep... not because they have a credible threat, but because they want to be made to feel important. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2475 From: James M. Atkinson, Comm-Eng Date: Wed Feb 14, 2001 8:16pm Subject: Canadian Humor CANADIAN JOKE #1 A Canadian is walking down the street with a case of beer under his arm. is friend Doug stops him and asks, "Hey Bob! Whacha get the case of beer for?" "I got it for my wife, eh." answers Bob. "Oh!" exclaims Doug, "Good trade." =============================== CANADIAN JOKE #2 An Ontarian wanted to become a Newfie (ie. a Newfoundlander). He went to the neurosurgeon and asked "Is there anything you can do to me that would make me into a Newfie?" "Sure it's easy." replied the neurosurgeon. "All I have to do is cut out 1/3 of your brain, and you'll be a Newfie." The Ontarian was very pleased, and immediately underwent the operation. However, the neurosurgeon's knife slipped, and instead of cutting 1/3 of the patient's brain, the surgeon accidentally cut out 2/3 of the patient's brain. He was terribly remorseful, and waited impatiently beside the patient's bed as the patient recovered from the anesthetic. As soon as the patient was conscious, the neurosurgeon said to him "I'm terribly sorry, but there was a ghastly accident. Instead of cutting out 1/3 of your brain, I accidentally cut out 2/3 of your brain." The patient replied "Qu'est-ce que vous avez dit, monsieur?" =============================== CANADIAN JOKE #3 Did you hear about the war between Newfoundland and Nova Scotia? The Newfies were lobbing hand grenades; the Nova Scotians were pulling the pins and throwing them back. =============================== CANADIAN JOKE #4 In Canada we have two seasons......six months of winter and six months of poor snowmobiling. =============================== CANADIAN JOKE #5 One day an Englishman, an American, and a Canadian walked into a pub together. They proceeded to each buy a pint of beer. Just as they were about to enjoy their beverages, three flies landed in each of their pints. The Englishman pushed his beer away from himself in disgust. The American fished the offending fly out of his beer and continued drinking it as if nothing happened. The Canadian picked the fly out of his drink and started shaking it over the pint, yelling, "SPIT IT OUT, SPIT IT OUT, YOU BASTARD!!!" =============================== CANADIAN JOKE #6 A Quebecer, staying in a hotel in Edmonton phoned room service for some pepper. "Black pepper, or white pepper?" asked the concierge. "Toilette pepper!" yelled the Quebecer. =============================== CANADIAN JOKE #7 An American, a Scot and a Canadian were in a terrible car accident. They were all brought to the same emergency room, but all three of them died before they arrived. Just as they were about to put the toe tag on the American, he stirred and opened his eyes. Astonished, the doctors and nurses present asked him what happened. "Well," said the American, "I remember the crash, and then there was a beautiful light, and then the Canadian and the Scot and I were standing at the gates of heaven. St. Peter approached us and said that we were all too young to die, and said that for a donation of $50,we could return to earth. So of course pulled out my wallet and gave him the $50, and the next thing I knew I was back here." "That's amazing!" said the one of the doctors, "But what happened to the other two?" "Last I saw them," replied the American, "the Scot was haggling over the price and the Canadian was waiting for the government to pay his". -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2476 From: James M. Atkinson, Comm-Eng Date: Wed Feb 14, 2001 9:01pm Subject: Question for the list A list member who wishes to remain anonymous asked me to post this to the list for discussion: -jma > Question: > > "As a client, which would you prefer? A TSCM person with good knowledge, > experience and older equipment, or a person with just enough knowledge and > training to turn buttons/knobs on the latest and greates available equipment?" > > END OF MESSAGE -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2477 From: William Knowles Date: Thu Feb 15, 2001 1:37am Subject: Re: Question for the list On Wed, 14 Feb 2001, James M. Atkinson, Comm-Eng wrote: > A list member who wishes to remain anonymous asked me to post this > to the list for discussion: > > > Question: > > > > "As a client, which would you prefer? A TSCM person with > > good knowledge, experience and older equipment, or a person > > with just enough knowledge and training to turn buttons/knobs > > on the latest and greates available equipment?" > > > > END OF MESSAGE Lately I have been consulting groups that having a sysadmin with security experience is not the same thing as having a full-time security admin. That it basically follows the old Bell helmets advertisement of "Putting a $10 helmet on a $10 head" I would prefer a TCSM person with good knowledge and older equipment over the person with just enough knowledge to sqeak through. The TCSM professional would know their equipment, and know how to take it to 11. :) If TCSM was easy, Sally Struthers would probably be selling classes on TV for it along with gun repair and vetrinary assistant. William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2478 From: Robert G. Ferrell Date: Thu Feb 15, 2001 7:31am Subject: Re: Question for the list >> "As a client, which would you prefer? A TSCM person with good knowledge, >> experience and older equipment, or a person with just enough knowledge and >> training to turn buttons/knobs on the latest and greates available >equipment?" The answer to this question is really the same for all fields where human senses are enhanced by technological innovations. The equipment merely serves as an extension to the sensory capabilities of the person operating it. Without a seasoned, reasoning human mind to interpret the data it generates, the most sophisticated piece of technology is little better than a paperweight. Choose veteran, battle-hardened personnel over blinking lights every time. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2479 From: Mike Date: Thu Feb 15, 2001 5:30am Subject: Re: Question for the list Who would you bet your bippy on? A point man with 2 full combat tours and a 12 gauge in the bush or a fresh Marine with night vision goggles and a full auto Car15? A pretty hooker that's been working 10 years or a youngster with a stopwatch? An old loyal junkyard dog or a "Newly Trained young shepard with electronic collar"? A guide that lived his territory all his life or a new one with GPS? A trusted handshake and a mans word or a 40 page legal contract with fine print? Finally- an old and experienced friend or a NEW aquaintance with all the toys? Just WHO would YOU bet your bippy on? Need I say more? Nuff Said- Bootleg ----- Original Message ----- From: James M. Atkinson, Comm-Eng To: TSCM-L Mailing List Sent: Wednesday, February 14, 2001 7:01 PM Subject: [TSCM-L] Question for the list > A list member who wishes to remain anonymous asked me to post this to > the list for discussion: > > -jma > > > > Question: > > > > "As a client, which would you prefer? A TSCM person with good knowledge, > > experience and older equipment, or a person with just enough knowledge and > > training to turn buttons/knobs on the latest and greates available > equipment?" > > > > END OF MESSAGE > > > > -- > > ======================================================================= > Sed quis custodiet ipsos Custodes? > "In a time of universal deceit, telling the > truth is a revolutionary act" - George Orwell > ======================================================================= > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group Fax: > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > ======================================================================= > The First, The Largest, The Most Popular, and The Most Complete TSCM, > Technical Security, and Counterintelligence Site on the Internet. > ======================================================================= > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2480 From: Rob Muessel Date: Thu Feb 15, 2001 8:36am Subject: Re: Question for the list I hate to say it, but clients, for the most part, aren't qualified to make the determination as to the ability of the service provider and the technical capability of the equipment used during the sweep. If it were different, we would not have any significant competition from guys with DARs, CPMs, Great Southern Security gizmos, and all the other spy shop junk. Experience has shown me that clients are impressed with bells and whistles, even if the bells and whistles don't add much to the effectiveness of the sweep. I use a computer controlled spectrum analyzer now. I used to use a manual spectrum analyzer. I remember the first time I set up the notebook PC to run the analyzer on a job. Usually during the sweep, the client watched the RF portion for about 5 minutes before finding something more important to do. It's not very exciting to watch someone turn knobs and push switches. But, with the PC doing the work and with an interesting user interface, the RF sweep drew a crowd. Go figure. The results were not any different, but the equipment was more interesting. For my dollar the guy with the experience will always do a better job than the new guy with the latest equipment. I'd trust an old A-3C in the hands of a well trained technician to give me more accurate results than any of the new stuff that has been designed to do it all for you. It may be more time consuming and not as nicely packaged, but the job will be properly done. There is a lot of subtlety, nuance, and insight to a sweep. It can't be recreated in hardware. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 2481 From: James M. Atkinson, Comm-Eng Date: Thu Feb 15, 2001 9:35am Subject: Re: Question for the list At 10:01 PM -0500 2/14/01, James M. Atkinson, Comm-Eng wrote: >A list member who wishes to remain anonymous asked me to post this to >the list for discussion: > >-jma > > >> Question: >> >> "As a client, which would you prefer? A TSCM person with good knowledge, >> experience and older equipment, or a person with just enough knowledge and >> training to turn buttons/knobs on the latest and greates available >equipment?" >> > > END OF MESSAGE My opinion is that customers want a mix of both. Compare it to a group of people who go to see a concert at symphony hall performed by seasoned professionals with top grade musical instruments, verses a group of parents who visit a local grade school to hear their children in a school band mangling every pieces of music. On the one hand we have seasoned and well trained professionals with strictly the finest instruments, and on the other hand we have rank amateurs who are just trying to do their best. When it really comes down to the wire customers want go with the seasoned veteran with older (but not obsolete) equipment. The "older (but not obsolete)" part is really important. Customers will not be amused by an experienced TSCM specialist if all of their equipment is of 50's, 60's, and 70's vintage and still uses vacuum tubes. Nor, will they be amused with the enthusiastic newbie who shows up with cardboard boxes brimming with hobbyist toys. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2482 From: James M. Atkinson, Comm-Eng Date: Thu Feb 15, 2001 0:08pm Subject: The Top 25 Alabama Country Songs of All Time The Top 25 Alabama Country Songs of All Time..... 25. Get Your Tongue Outta My Mouth 'Cause I'm Kissing You Goodbye 24. Her Teeth Was Stained, But Her Heart Was Pure 23. How Can I Miss You If You Won't Go Away? 22. I Don't Know Whether To Kill Myself Or Go Bowling 21. I Bought A Car From A Guy Who Stole My Girl, But It Don't Run, So We're Even 20. I Keep Forgettin' I Forgot About You 19. I Liked You Better Before I Knew You So Well 18. I Still Miss You, Baby, But My Aim's Getting Better 17. I Wouldn't Take Her To A Dog Fight, Cause I'm Afraid She'd Win 16. I'll Marry You Tomorrow But Lets Honeymoon Tonight 15. I'm So Miserable Without You, It's Like Having You Here 14. I've Got Tears In My Ears From Lyin' On My Back and Cryin' Over You 13. If I Can't Be Number One In Your Life, Then Number Two On You 12. I Haven't Gone To Bed With Any Ugly Women, But I've Sure Woken Up With a Few 11. Mama Get A Hammer (There's A Fly On Papa's Head) 10. My Head Hurts, My Feet Stink, And I Don't Love You 9. My Wife Ran Off With My Best Friend, And I Sure Do Miss Him. 8. Please Bypass This Heart 7. She Got The Ring And I Got The Finger 6. You Done Tore Out My Heart And Stomped That Sucker Flat 5. You're The Reason Our Kids Are So Ugly 4. If The Phone Don't Ring, You'll Know It's Me 3. She's Actin' Single and I'm Drinkin' Double 2. She's Looking Better After Every Beer And the number 1 Alabama Country song of all time is 1. If I Had Shot You When I Wanted To, I'd Be Out By Now -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2483 From: James M. Atkinson, Comm-Eng Date: Fri Feb 16, 2001 7:29am Subject: Is Phone Interference Phony? Is Phone Interference Phony? http://www.wired.com/news/business/0,1367,41273,00.html by Elisa Batista 2:00 a.m. Feb. 15, 2001 PST If a passenger were to ask anyone in the aviation industry why mobile phone use is not permitted in flight, the likely response would be that cell phones "may interfere with the communication and navigation systems of the plane." In fact, most airlines issue such warnings before takeoff. However, what the industry doesn't tell passengers is that there is no scientific proof to support these claims. What also isn't widely known is that pilots have blamed portable voice recorders, heart pacemakers, electric shavers and hearing aids for interfering with their cockpit controls, yet there are no restrictions on their use during flights. The industry's evidence of cell phone-caused interference is purely anecdotal -- instances engineers have tried but failed to duplicate under "controlled conditions." "We've never been able to replicate it, so we can't verify that (portable electronic devices) do interfere," Boeing spokeswoman Mary Jean Olsen said. "We go along with the RTCA recommendation that portable electronic devices should be restricted in critical aspects of the flight, which is takeoff and landing." In three studies -- none more recent than 1996 -- aeronautic adviser RTCA concluded portable electronic devices have the potential to interfere with critical aircraft instruments such as the altimeter. The study also said the likelihood of interference is low. RTCA engineers could not replicate on the ground or in the air any alleged interference. "We would get a fairly detailed and credible report of an interference event," said John Sheehan, who headed the RTCA's last study and now owns his own aviation consulting firm. "We would try to replicate that in the same aircraft and same airplane seat and couldn't do it." "Interference" is not only the garbling of communication. It can include false warnings of unsafe conditions or noise in the flight crew's headphones. In a recent incident, a Slovenian airplane en route to Sarajevo made an emergency landing after a cell phone accidentally left on in the luggage compartment triggered an erroneous fire warning aboard the aircraft. Boeing once purchased a passenger's laptop after claims that the computer caused interference during a flight from London to Paris; the pilot said turning the laptop on and off triggered autopilot error. Boeing then flew that same laptop on the same route in the same seat and was unable to duplicate the interference. But it doesn't mean the interference never occurred, Sheehan said. Engineers say replicating interference is tricky because they can't duplicate the exact environment of the plane, which at the time of the interference could have been bombarded with other microwave emitters like radio towers and satellite transmissions. "Whether the airplane receives interference or not is dependent on the electromagnetic environment, like the airport," Sheehan said. "The air is saturated with microwaves ñ- the 'electromagnetic soup' around the airport. It's the environment that airplanes would operate under which would promote or retard (the source of interference). That is difficult to replicate." Although there is no clear evidence that PEDs interfere with onboard instruments, the RTCA recommends against the use of PEDs during the "critical phases of flight" -- taking off and landing -- when the plane is most likely to be bombarded by signals from other sources, like industrial heaters, cable TV networks and FM broadcast stations. "I guess we should all feel a little nervous during takeoff and landing," Sheehan said. Interestingly, laptop computers, and not cell phones, are the leading cause of in-flight interference. Still, laptop use is only restricted during takeoff and landing, while cell phones are prohibited as soon as the plane's doors are shut. The International Air Transport Association found laptops responsible for 16 of the 40 reported incidents (40 percent) of interference through last summer. Also, the FAA specifically excludes portable voice recorders, heart pacemakers, electric shavers and hearing aids from its rules, although pilots have blamed at least one of these devices for interference. A pilot reported to NASA that during an October 1998 flight from Seattle to Cincinnati, his aircraft experienced a loss of all three of its autopilot systems because a man was wearing a headset that was part of a hearing aid. The passenger was allowed to use the device, but was moved forward several seats, at which point the plane regained full operational capabilities. The RTCA, which concluded in three studies that PEDs could interfere with onboard instruments, said its latest study in 1996 did not include electric shavers, heart pacemakers, portable voice recorders and hearing aids. An RTCA spokesman would not verify whether these devices were included in earlier studies, conducted in 1963 and 1988. The RTCA never studied "intentional transmitting devices" like cell phones and two-way pagers. But it recommended the prohibition of the use of these devices in all aspects of flight until "exhaustive testing" deemed them safe. The airlines themselves have never conducted tests. The Civil Aviation Authority, the British equivalent of the FAA, studied the effect of cell phones on aircraft and reinforced the RTCA's recommendations a year ago. The CAA measured the strength of simulated cell phone transmissions in various parts of the fuselage of two different Boeing aircraft at London's Gatwick Airport last year. The agency found that cell-phone emissions could theoretically exceed the susceptibility levels of aircraft equipment, so it recommended the continuation of the cell-phone ban on commercial airlines. It even recommended an onboard detector for cell phone use. But the CAA, like the RTCA, was unable to duplicate the interference, even under controlled conditions. Cell phones operate on different frequencies from onboard instruments, which may be why there are so few reported incidents of interference. However, if multiple devices were operating simultaneously, even FAA-approved airplane-installed phones could theoretically cause interference, said Tim Brown, an engineering professor at the University of Colorado in Boulder. "It is conceivable if you had a plane full of devices working, they could interfere with the most sensitive instruments," Brown said. "Just because they are in separate bands doesn't mean some energy isn't spilling over into these other bands." Even though it's not certain that cell phones have ever caused interference, the FAA defends the ban, arguing that safety comes first. "Those (interference anecdotes) are fact-based and apparently cannot be attributed to something else," FAA spokesman Jerry Snyder said. "The FAA believes (any reported interference) is not an acceptable number of incidents affecting aircraft." Yet, despite its safety-conscious tone, the FAA has not followed the CAA's recommendation to implement a detector. Due to "budgetary restraints," the FAA a year ago declined to fund a device by Megawave that could detect illegal PED use. The implementation of the device would have made it possible for passengers to use any PED as long as it didn't interfere with the plane's systems. The device is also capable of detecting would-be terrorists trying to jam the airplane's instruments with global positioning system devices, according to Megawave's chairman, Marshall Cross. At the very least, Cross said the device could determine whether or not PEDs actually cause interference. "There is an ultimate problem here," Cross said. "We have no (clinical) information now (on causes of interference) from in flight. It's all anecdotal, so no one knows whether it's a problem or not." Still, even if the FAA eased its cell-phone use restriction, passengers would have a difficult time convincing the FCC to lift its cell phone ban. The FCC has never conducted tests to prove cell phones could interfere with signals on the ground, because it considers it "common sense" that cell towers are for terrestrial use. "I don't know how you could do that," said Dale Hatfield, a former FCC engineer who is now a professor of telecommunications at the University of Colorado. "It doesn't make sense to an engineer like me to use ordinary cell phones at 30,000 feet." When told of instances in which passengers have used their cell phones on private jets against FCC regulations and not caused interference, Hatfield responded, "How do they know? They could affect people (on the ground) and not know it." Because the FCC and FAA don't have much evidence to support their ban, their reasons for the prohibition remain clouded. In fact, Rep. Peter DeFazio (D-Ore.) called the FAA's studies in a July congressional hearing "dispositive" because they haven't been replicated. He called the airplane-installed phone service -- a passenger's only option to communicate with someone on the ground -- "a crummy service at an extraordinary price." "(Rep. DeFazio) wouldn't want to contribute to any unsafe circumstances or issues, if there is definite evidence that using cell phones and laptops cause problems on airplanes," DeFazio spokeswoman Kristie Greco said. "The main focus would be to improve and reduce the cost of air phone service if that's our only option." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2484 From: Robert G. Ferrell Date: Fri Feb 16, 2001 10:12am Subject: Re: Is Phone Interference Phony? >However, what the industry doesn't tell passengers is that there is no >scientific proof to support these claims. If there were even a 0.0001% chance that it would make my airplane trip safer, I would stand on my head and hum the Star Spangled Banner while gargling with balsamic vinegar. People use their #$#@! cell phones waaaay too much as it is. If you can't go a few hours without being wired directly to the home office or the spouse, don't leave home. And stop using your stupid phone while you're driving. Not a day goes by that I don't observe some moron swerving all over the friggin' road while gabbing into one of those infernal contraptions. I'm all for making use of a cell phone while driving a public whipping offense. Not that I have a strong opinion or anything. ;-) Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2485 From: Robert G. Ferrell Date: Fri Feb 16, 2001 10:18am Subject: RE: Fw: ARROGRANCE >No -it's not. Every version of this story changes.. > >By the way, Lincoln has never sailed off of Newfoundland. I became fascinated by this urban legend a few years ago and spent too much time researching it. The first version I've been able to find intact dates to the World War II era, but there are rumors that it can be traced to as far back as the 19th century, except of course that the communications were by flag or lantern, not voice... It seems that sailors, or perhaps harried journalists in search of a piece of good filler, update the story every so often with modern ship names and contemporary political references. Quite an interesting phenomenon. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2486 From: James M. Atkinson, Comm-Eng Date: Fri Feb 16, 2001 0:52pm Subject: Re: Is Phone Interference Phony? Curious... I have found that the older I get the less I use my cell phone, and it is rare for me to use it for more then 20-30 minutes a month with most calls lasting less then 3 minutes. Of course I always carry a phone, but it is rare for me to even turn it on except to make a call, and turn it back off. About he only thing I use my cell phone for is calling for directions, letting someone know I am running late for a meeting, calling 911 at an accident scene, or calling for a cab when I travel,. I always turn off cell phone when I go out to perform any kind of sweep work (inside five miles of the target), but keep a phone nearby in case of emergency (with the local PD on speed dial). There is virtually nothing you can do to make a cellular phone secure, so why would a TSCM'er use one any more then absolutely necessary. -jma At 10:12 AM -0600 2/16/01, Robert G. Ferrell wrote: > >However, what the industry doesn't tell passengers is that there is no >>scientific proof to support these claims. > >If there were even a 0.0001% chance that it would make my airplane trip >safer, I would stand on my head and hum the Star Spangled Banner >while gargling with balsamic vinegar. People use their #$#@! cell >phones waaaay too much as it is. If you can't go a few hours without >being wired directly to the home office or the spouse, don't leave home. >And stop using your stupid phone while you're driving. Not a day goes >by that I don't observe some moron swerving all over the friggin' road >while gabbing into one of those infernal contraptions. I'm all for >making use of a cell phone while driving a public whipping offense. > >Not that I have a strong opinion or anything. > >;-) > >Cheers, > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2487 From: Dick Dillman Date: Fri Feb 16, 2001 0:53pm Subject: Re: Is Phone Interference Phony? On 16 Feb 01, at 10:12, Robert G. Ferrell wrote: > If there were even a 0.0001% chance that it would make my airplane trip > safer, I would stand on my head and hum the Star Spangled Banner > while gargling with balsamic vinegar. We have that to look forward to, RGF. However aside from the issue of interference to flight instruments there is another problem associated with using cellular phones from aircraft. A cellular phone transmitting from high altitudes and especially the altitudes used by transport aircraft will be received by many cellular receiving sites on the ground. This in turn causes interference to cellular phone service over a large region. That's one reason why the telephone equipment certified for use in aircraft operates through dedicated ground stations designed for this purpose. And of course these systems have been proven to not cause interference to aircraft navigation or communications systems. But on the issue of passenger use of cellular phones on aircraft I recently had an interesting experience on American Airlines. The cabin attendant announced that the captain had a cockpit indication that someone on board was using a cellular phone and requested that it be turned off. This was before the aircraft left the gate. Is it possible that the airlines have really installed sensors to detect on- board cellular transmissions? Regards, Dick ============================= Dick Dillman [Special Services] Greenpeace San Francisco Direct Phone: +1 415-512-7137 Fax: +1 415-512-8699 ICQ: 4785730 ============================= 2488 From: Gerard P. Keenan Date: Fri Feb 16, 2001 10:53am Subject: Re: Is Phone Interference Phony? Just FYI, I live in Suffolk County, NY, and as of 01JAN01 talking on your cell phone while is a moving violation -- points and $150.00 fine throughout the County. Really upset a lot of folks out here. We have the largest population of celebrities in the country, outside of Hollywood. Some of my 'neighbors' include Billy Joel, Steven Spielberg, all the Baldwins (well, we all have our crosses to bear!), Maria Carey, Eric and Julia Roberts, and a whole list of others. Imagine their chargrin at this law when it went through the County legislature like doo-doo through a goose with very few dissenting votes!! Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY 11795-2503 ----- Original Message ----- From: "Robert G. Ferrell" To: Sent: Friday, February 16, 2001 11:12 AM Subject: Re: [TSCM-L] Is Phone Interference Phony? > >However, what the industry doesn't tell passengers is that there is no > >scientific proof to support these claims. > > If there were even a 0.0001% chance that it would make my airplane trip > safer, I would stand on my head and hum the Star Spangled Banner > while gargling with balsamic vinegar. People use their #$#@! cell > phones waaaay too much as it is. If you can't go a few hours without > being wired directly to the home office or the spouse, don't leave home. > And stop using your stupid phone while you're driving. Not a day goes > by that I don't observe some moron swerving all over the friggin' road > while gabbing into one of those infernal contraptions. I'm all for > making use of a cell phone while driving a public whipping offense. > > Not that I have a strong opinion or anything. > > ;-) > > Cheers, > > RGF > > Robert G. Ferrell, CISSP > Information Systems Security Officer > National Business Center > U. S. Dept. of the Interior > Robert_G_Ferrell@n... > ======================================== > Who goeth without humor goeth unarmed. > ======================================== > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 2489 From: James M. Atkinson, Comm-Eng Date: Fri Feb 16, 2001 3:39pm Subject: Skirt train spy 'watched live on his laptop' Skirt train spy 'watched live on his laptop' http://www.ananova.com/news/story/sm_210832.html?menu= A US man has been arrested for using a spy camera to film up a woman's skirt and watch live on his laptop. He was detained by detectives as he was allegedly caught filming on a rush-hour commuter train, in Boston. The 47-year-old computer company worker has been charged with lewd and lascivious behaviour. He is scheduled to appear before a Boston court. Police allege he concealed the camera between his knees, reports the Boston Herald. Joe Pesaturo, a spokesman for Massachussetts Bay Transportation Authority, said: "Police will seek a search warrant to examine the computer's files to see if more charges are warranted." The victim, who was seated opposite, was "startled" by the discovery, said Mr Pesaturo. He added: "It was a rush-hour train. It was not short of passengers." Last updated: 19:36 Friday 16th February 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2490 From: Miguel Puchol Date: Fri Feb 16, 2001 8:15pm Subject: RE: Is Phone Interference Phony? Dick, Some airlines have indeed installed detectors. They are based on two receiving antennas, which can give a good estimate on the location of the offending phone along the aircraft. All you are looking for is RF in the uplink (sorry if I use sat terms) frequency band, above a certain level, and you consider that to be an emanation from within the aircraft. I believe BA has some of these already installed. All the best, Mike > -----Mensaje original----- > De: Dick Dillman [mailto:ddillman@s...] > Enviado el: viernes, 16 de febrero de 2001 19:54 > Para: TSCM-L@yahoogroups.com > Asunto: Re: [TSCM-L] Is Phone Interference Phony? > > > On 16 Feb 01, at 10:12, Robert G. Ferrell wrote: > > > If there were even a 0.0001% chance that it would make my airplane trip > > safer, I would stand on my head and hum the Star Spangled Banner > > while gargling with balsamic vinegar. > > We have that to look forward to, RGF. However aside from the > issue of interference to flight instruments there is another problem > associated with using cellular phones from aircraft. A cellular phone > transmitting from high altitudes and especially the altitudes used by > transport aircraft will be received by many cellular receiving sites on > the ground. This in turn causes interference to cellular phone > service over a large region. That's one reason why the telephone > equipment certified for use in aircraft operates through dedicated > ground stations designed for this purpose. And of course these > systems have been proven to not cause interference to aircraft > navigation or communications systems. > > But on the issue of passenger use of cellular phones on aircraft I > recently had an interesting experience on American Airlines. The > cabin attendant announced that the captain had a cockpit indication > that someone on board was using a cellular phone and requested > that it be turned off. This was before the aircraft left the > gate. Is it > possible that the airlines have really installed sensors to detect on- > board cellular transmissions? > > Regards, > > Dick > > ============================= > Dick Dillman > [Special Services] > Greenpeace San Francisco > Direct Phone: +1 415-512-7137 > Fax: +1 415-512-8699 > ICQ: 4785730 > ============================= > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2491 From: none none Date: Fri Feb 16, 2001 4:01pm Subject: I thought the responce fron Mr. Ferrel was beautifully eloquent. >The answer to this question is really the same for all fields >where human senses are enhanced by technological innovations. >The equipment merely serves as an extension to the sensory >capabilities of the person operating it. Without a seasoned, >reasoning human mind to interpret the data it generates, the most >sophisticated piece of technology is little better than >a paperweight. > >Choose veteran, battle-hardened personnel over blinking lights every time. > Erik. == Those that travel long distances in isolation will defend themselves with strange arts. Shin shin, shin gan. _____________________________________________________________ Yourname@i...
When you want them to remember!
http://burn.inhell.com From: Gregory Horton Date: Fri Feb 13, 2004 11:41am Subject: Re: Digest Number 1487 You know, I read the entire article and I didn't notice anything about TSCM. Take it to a different thread. maxs@m... wrote: >Hello SOCIETY > >What about this topic ? > >1. Quote of the Month: Interpreting God's Intentions >--------------------------------------------------- >"Both speeches had the quality of sermons. Both leaders invoked God, and neither had any doubt about whose side God was on. And both interpreted God's intentions." >-- Brian Michael Jenkins, RAND terrorism expert, writing in a Los Angeles Times commentary that compared recent speeches by President Bush and Osama bin Laden > > >>>http://www.rand.org/rnbrd/commentary/020104LAT.html >>> >>> > >Sincerely > >Martin KO CIA N > > > > >----- >P¯ipojte se p¯es RazDva a vyberte si jednu z nov˝ch cen v Bonus Clubu. VÌce na http://club.razdva.cz. > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS >Yahoo! Groups Links > > > > > > > > [Non-text portions of this message have been removed] 8225 From: James M. Atkinson Date: Fri Feb 13, 2004 11:23am Subject: To change a light bulb... alone... in the rain... How many group posters does it take to change a light bulb? 1 to change the light bulb and to post that the light bulb has been changed 14 to share similar experiences of changing light bulbs and how the light bulb could have been changed differently 7 to caution about the dangers of changing light bulbs 27 to point out spelling/grammar errors in posts about changing light bulbs 53 to flame the spell checkers 41 to correct spelling/grammar flames 6 to argue over whether it's "lightbulb" or "light bulb" ... another 6 to condemn those 6 as anal-retentive 2 industry professionals to inform the group that the proper term is "lamp" 15 know-it-alls who claim *they* were in the industry, and that "light bulb" is perfectly correct 156 to email the participant's ISPs complaining that they are in violation of their "acceptable use policy" 109 to post that this group is not about light bulbs and to please take this discussion to a lightbulb group 203 to demand that cross posting to hardware forum, off-topic forum, and lightbulb group about changing light bulbs be stopped 111 to defend the posting to this group saying that we all use light bulbs and therefore the posts *are* relevant to this group 306 to debate which method of changing light bulbs is superior, where to buy the best light bulbs, what brand of light bulbs work best for this technique and what brands are faulty 27 to post URL's where one can see examples of different light bulbs 14 to post that the URL's were posted incorrectly and then post the corrected URL's 3 to post about links they found from the URL's that are relevant to this group which makes light bulbs relevant to this group 33 to link all posts to date, quote them in their entirety including all headers and signatures, and add "Me too" 12 to post to the group that they will no longer post because they cannot handle the light bulb controversy 19 to quote the "Me too's" to say "Me three" 4 to suggest that posters request the light bulb FAQ 44 to ask what is a "FAQ" 4 to say "didn't we go through this already a short time ago?" 143 to say "do a Google search on light bulbs before posting questions about light bulbs" 1 forum lurker to respond to the original post 6 months from now and start it all over again.... Happy Friday the 13th ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8226 From: James M. Atkinson Date: Sat Feb 14, 2004 9:28am Subject: Taiwanese couple held in China for spying http://straitstimes.asia1.com.sg/asia/story/0,4386,235147,00.html Taiwanese couple held in China for spying BEIJING - China has detained a Taiwanese couple for spying, making them the third in a string of espionage-related arrests on the mainland, state media said yesterday. Chang Hsu-min, 27, and his girlfriend Yu Shi-ping, 24, were arrested on Jan 13 for collecting missile intelligence in south-eastern Fujian province which faces Taiwan, the Global Times reported. The latest case came a month after the arrest of 24 other Taiwanese accused by the Chinese of being agents, along with 19 mainlanders. Chang and Yu, described as agents of the Taiwanese Military Intelligence Bureau, were in Taiwan at the time of the December arrests. They were there to report to their superiors, according to the paper. Despite the increased danger, they were sent back to the mainland via Hong Kong and were detained after just two days, it said. 'It's outrageous that the Taiwan intelligence service simply slipped them into the opponent's pocket,' the paper commented. It published pictures of the couple with their eyes blacked out. News of the duo's detention followed reports in Taiwan media last week that three other Taiwanese had been arrested in the mainland on suspicions of spying on military installations, including Chinese missiles pointing in the direction of Taiwan. Reports have said the Chinese were able to track down the intelligence operations after Taiwan President Chen Shui-bian gave the exact number of missiles aimed at the island. -- AFP, Reuters ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8227 From: Robert Dyk Date: Sat Feb 14, 2004 2:18pm Subject: Surveillance Periscope This item was just listed for any active surveillance types out there... Surveillance Periscope http://cgi.ebay.ca/ws/eBayISAPI.dll?ViewItem&item=3077869038 Thanks for your time, Robert Dyk robert@w... Worldwide Security Ltd. Mississauga, Ontario Canada This e-mail is confidential and may contain privileged information. If you are not the addressee it may be unlawful for you to read, copy, distribute, disclose or otherwise use the information in this e-mail. If you are not the intended recipient please notify us immediately. 8228 From: contranl Date: Fri Feb 13, 2004 6:53pm Subject: New electronic trick to steal money from ATM's . Dutch police are trying to catch a gang that uses advanced electronic equipment to empty bankaccounts from people that use magnetic credit cards on automatic money machines. This is how it works: The gang searches for a money dispenser in a shopping street preferably one that is not placed in the wall of a bank...they do that because these ones do'nt have built-in security cameras that could later identify them. The criminals have made a perfect copy of a part of the machine it's the part where you insert your magnetic-stripe card This is placed over the original area where the card should be inserted...not being an expert you wo'nt recognize it as a fake. Inside the fake part is a simple and very small card reader that collects the data from the stripe while it is passing trough on it's way to the real reader below...the gathered data is then transmitted on to a van on the other side of the street. This is not enough...they need the 4 digit pin-code as well...so a small camera with transmitter is placed...hidden in a object that seems to belong there...the video signal is also received in the van Immidiatly when they have all data collected the gang members start to make a copy of the card...this takes them 30 seconds When nobody is looking they take the fake card to the money machine punch in the pin-code and completely empty the account. ............ I estimate the following stuff is used to do this: A card reader is simple to make...all you need is a magnetic head like those used in tape-recorders...some simple circuit to convert the pulses to a FSK-signal and a simple low power transmitter All this would fit in a matchbox In the van you need a a receiver and a fsk-decoder like the software based ones used by radioamateurs...the data can be stored on a laptop A card encoder is widely available for less then 200 US$ This card encoder is also hooked up to the same laptop..the received data is then passed from the stored data file to the file used to encode the credit card ...thats all. The video camera is probably a very small one (1,5 x 1,5 cm's) wihth a pinhole lens..the camera is connected to a 10 mw videotransmitter probably working in the 2.4 Ghz band Since this is a short time operation the battery can be very small too. A second variation is where the reader is placed next to or inside the original reader that is used to open a door that gives acess to the room where the money-machine is placed. I "designed" this trick myself about 8 years ago...and i am surprised that it took so long before some criminals figured it out too. You are warned ! Tetrascanner www.tetrascanner.com . 8229 From: contranl Date: Fri Feb 13, 2004 7:12pm Subject: Screening your house against unhealthy radiation from Tetra-base-stations . There is a lot of fuzz going on about the new digital radio-networks based on the "Tetra" standard, These networks are now operational in 50 countries The unhealthy effects have not been proven...but the contrary neither Tetra uses the 380~400 Mhz band and the modulation is TDMA The carrier is switched on and of at a rate of around 17 hz Similair to GSM-cellphones (217) this causes a lot of interference The power levels in Tetra are higher then with Gsm,the switching frequency of 17 hz is more dangerous then that of Gsm because it's in the range of "human" frequencies Specially in the UK action-groups exist that want to ban the antenna-masts at all Now i read this article: http://www.iwcp.co.uk/ViewArticle2.aspxSectionID=1252&ArticleID=73998 I have no opinion about the possible health effects...but screening only your windows and not the whole house including walls wont help much i guess ? if it helps at all ... in the worse case small pieces of non-grounded shields might even worsen the case ? (re-radiating/reflecting/concentrating) Any comments ? Tnx Tetrascanner www.tetrascanner.com . 8230 From: contranl Date: Fri Feb 13, 2004 7:28pm Subject: Van Eijck receiver (radiation of crt monitors) . About 10 years ago a researcher from a laboratory owned by the Dutch PTT(former state telephone company similair to AT&T) invented a receiver that could pick up radiation from crt based monitors. Not shure if the man his name was "Van Eijck" or "Van Eck" Distance was up to 400 meters...they even made a unit available at about 3500 US $...all this was done to market a chip made by plessey that would scramble the tv-lines...the lines would be written in a different order then normal...so anyone who would try to receive anything would not be able to restore the original picture... The person watching the original screen would still see the whole picture in a correct way caused by the delay effect of the crt screen Does anyone know where to find information about this? how to make such a receiver...or does anyone manufacutere such a receiver ? Yes i know That it does'nt work on LCD screens Thanks . 8232 From: Steve Uhrig Date: Sat Feb 14, 2004 8:53pm Subject: Re: Screening your house On 14 Feb 2004 at 1:12, contranl wrote: > There is a lot of fuzz going on about the new digital radio-networks > based on the "Tetra" standard, > The unhealthy effects have not been proven...but the contrary neither You can't prove a negative. > Tetra uses the 380~400 Mhz band and the modulation is TDMA > The carrier is switched on and of at a rate of around 17 hz > Similair to GSM-cellphones (217) this causes a lot of interference The > power levels in Tetra are higher then with Gsm,the switching frequency > of 17 hz is more dangerous then that of Gsm because it's in the range > of "human" frequencies The U.S. FCC has guidelines for human exposure to RF radiation. There are formulae and charts for frequency, ERP, distance, field strength, etc. Amateur radio operators are supposed to know this. I don't. The type of modulation is not mentioned and I do not believe it would make a difference overall. There may be some consideration for duty cycles of stuff like SSB with an intermittent duty cycle and lower average power versus continual key down data. Do some web searching and you'll turn up the data and the studies used to derive it. I don't recall seeing any credible information on 'human' frequencies. I have seen a lot of lunatic fringe stuff on them. That doesn't mean there isn't anything to it, but I haven't seen anything credible. Shielding and screening can work if done properly. It rarely is done properly and probably never at a consumer level. Research screen rooms and you'll see why. You may want to research the archives of this list on yahoogroups.com. Every question you asked in your various messages has been discussed and debated to death on this list in previous years. Here is a good site for Van Eck info: http://www.eskimo.com/~joelm/tempest.html Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8235 From: James M. Atkinson Date: Sat Feb 14, 2004 9:20pm Subject: Re: Van Eijck receiver (radiation of crt monitors) I have an extended write up of this subject at: http://www.tscm.com/TSCM101tempest.html -jma At 08:28 PM 2/13/2004, contranl wrote: >. > > >About 10 years ago a researcher from a laboratory owned by the Dutch >PTT(former state telephone company similair to AT&T) invented a >receiver that could pick up radiation from crt based monitors. >Not shure if the man his name was "Van Eijck" or "Van Eck" > >Distance was up to 400 meters...they even made a unit available at >about 3500 US $...all this was done to market a chip made by plessey >that would scramble the tv-lines...the lines would be written in a >different order then normal...so anyone who would try to receive >anything would not be able to restore the original picture... >The person watching the original screen would still see the whole >picture in a correct way caused by the delay effect of the crt screen > >Does anyone know where to find information about this? how to make >such a receiver...or does anyone manufacutere such a receiver ? > >Yes i know That it does'nt work on LCD screens > >Thanks ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8236 From: Date: Sun Feb 15, 2004 1:41pm Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 8237 From: James M. Atkinson Date: Sun Feb 15, 2004 11:04pm Subject: GOP has asked British SS to bug phones of American political candidates http://www.freerepublic.com/focus/f-news/1078599/posts Explosive Story: GOP has asked British SS to bug phones of American political candidates! Posted on 02/15/2004 8:36:43 AM PST by Hillary's Lovely Legs FOX NEWS 11:25am EST 2-15-2004 Fox news is interviewing John Loftus, Formers Justice Department Prosectutor who states that he has an inside scoop that "the Republican Party has asked the British Secret Service to bug phones of American political Candidates. " FOX NEWS Eric Shawn: "It's a very serious and very shocking story." JOHN LOFTUS: "That allegation seems very strong of that is the case. Why would any political party want to bug someone else? It's a juicy way of running a smear campaign behind the works. We have been doing that for about 50 years and it started with president Roosevelt. He had signed a secret treaty with Britain in 1943 that let them each set up listening posts on each other's soil with no search warrants. It's a great little scheme. " "So the British can use American computers to bug American politicians, and the Americans can use British computers to bug British politicians and each side can truthfully say that they aren't spying on their own citizens. They are just trading information under the table." ERIC: How widespread is this. Members of the Security Council admitted to me that they are being bugged and that it wasn't surprising, they expected that. JOHN: "What congress doesn't realize is that this is meant to favor one party only. In 1978 Carter tried to ban taping without a court order. So the bill is that the NSA cannot target American citizens, but not other countries from doing it. " ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8238 From: James M. Atkinson Date: Sun Feb 15, 2004 11:07pm Subject: British spy op wrecked peace move http://www.guardian.co.uk/Iraq/Story/0,2763,1148623,00.html British spy op wrecked peace move Martin Bright, Peter Beaumont and Jo Tuckman in Mexico Sunday February 15, 2004 The Observer A joint British and American spying operation at the United Nations scuppered a last-ditch initiative to avert the invasion of Iraq, The Observer can reveal. Senior UN diplomats from Mexico and Chile provided new evidence last week that their missions were spied on, in direct contravention of international law. The former Mexican ambassador to the UN, Adolfo Aguilar Zinser, told The Observer that US officials intervened last March, just days before the war against Saddam was launched, to halt secret negotiations for a compromise resolution to give weapons inspectors more time to complete their work. Aguilar Zinser claimed that the intervention could only have come as a result of surveillance of a closed diplomatic meeting where the compromise was being hammered out. He said it was clear the Americans knew about the confidential discussions in advance. 'When they [the US] found out, they said, "You should know that we don't like the idea and we don't like you to promote it."' The revelations follow claims by Chile's former ambassador to the UN, Juan Valdes, that he found hard evidence of bugging at his mission in New York last March. The new claims emerged as The Observer has discovered that Government officials seriously considered dropping the prosecution against Katharine Gun, the translator at the GCHQ surveillance centre who first disclosed details of the espionage operation last March. According to Whitehall sources, officials feared the prosecution would leave the Government and the intelligence services open to embarrassing disclosures. They were known to be concerned that the 29-year-old Chinese language specialist would be seen as a patriotic young woman acting out of principle to reveal an illegal operation rather than as someone who betrayed her country's secrets. They are also known to be worried that any trial would force the disclosure of Government legal advice on intervention in Iraq, described by one source as 'at best ambiguous'. Gun has attracted high profile support, particularly in the US, where her case has been taken up by Hollywood stars, civil rights campaigners and members of Congress. Yesterday, Oscar nominee, Sean Penn, told The Observer that Gun was 'a hero of the human spirit'. Aguilar Zinser also paid tribute: 'She is serving a noble cause by denouncing what could be illegal acts,' he said. The operation by the US National Security Agency and GCHQ was revealed by The Observer last March, after a leaked memo showed US spies had begun an intelligence 'surge' on members of the UN security council in which they needed British help. Liberal Democrat Foreign Affairs spokesman Menzies Campbell last night called on Foreign Secretary Jack Straw to clarify Britain's role: 'If the allegations that these operations had ministerial authority are well-founded, then it could hardly be more serious for the Government. There will be understandable uproar at the UN. On the other hand, if the eavesdropping took place without Ministers knowing, then the question is, who was in charge?' The Mexican government confirmed last week that diplomatic letters were sent to Straw last December asking him to clarify whether GCHQ was involved in spying on its UN allies. They have yet to receive a response. The Foreign Office refused to comment on the new allegations. But the revelations of the former Mexican ambassador will not go away as he is planning a book about his experiences at the United Nations. Aguilar Zinser told The Observer that the meeting of diplomats from six nations took place about a week before the decision not to put the resolution to the vote. They were working on a draft document of a compromise solution when the American intervened. 'We had yet to get our capitals to go along with it, it was at a very early stage. Only the people in the room knew what the document said. The surprising thing was the very rapid flow of information to [US] quarters. 'The meeting was in the evening and they call us in the morning before the meeting of the Security Council and they say, 'We appreciate you trying to find ideas, but this is not a good idea." I say, "Thanks, that's good to know." We were looking for a compromise and they [the US] say, "Do not attempt it."' ----------------------------------------------------------------------------------------------------- We Expertly Hunt Real Spies, Real Eavesdroppers, and Real Wiretappers. ----------------------------------------------------------------------------------------------------- James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 Web: http://www.tscm.com/ Gloucester, MA 01931-8008 Email: mailto:jmatk@tscm.com ----------------------------------------------------------------------------------------------------- World Class, Professional, Ethical, and Competent Bug Sweeps, and Wiretap Detection using Sophisticated Laboratory Grade Test Equipment. ----------------------------------------------------------------------------------------------------- 8239 From: Jim Conrad Date: Mon Feb 16, 2004 0:19am Subject: Re: Van Eijck receiver (radiation of crt monitors) The real thing ??? :-) http://www.oceanviewcom.com/ebay/021504/van_eijck_box.jpg At 10:20 PM 2/14/2004, James M. Atkinson wrote: >I have an extended write up of this subject at: >http://www.tscm.com/TSCM101tempest.html > >-jma > > > >At 08:28 PM 2/13/2004, contranl wrote: > >. > > > > > >About 10 years ago a researcher from a laboratory owned by the Dutch > >PTT(former state telephone company similair to AT&T) invented a > >receiver that could pick up radiation from crt based monitors. > >Not shure if the man his name was "Van Eijck" or "Van Eck" > > > >Distance was up to 400 meters...they even made a unit available at > >about 3500 US $...all this was done to market a chip made by plessey > >that would scramble the tv-lines...the lines would be written in a > >different order then normal...so anyone who would try to receive > >anything would not be able to restore the original picture... > >The person watching the original screen would still see the whole > >picture in a correct way caused by the delay effect of the crt screen > > > >Does anyone know where to find information about this? how to make > >such a receiver...or does anyone manufacutere such a receiver ? > > > >Yes i know That it does'nt work on LCD screens > > > >Thanks <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> Jim Conrad - jjc@o... or jimc1790@a... (backup) 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax CAGE 0UD60 - http://www.oceanviewcom.com/ 8242 From: contranl Date: Sun Feb 15, 2004 1:09pm Subject: Laser Microphones , Gps receiver-detector. . Last questions for today : 1) What is the current state of development and availability of so called "laser microphones" where a leaser beam is being directed at a window and then reflected back...the reflected beam is then converted to an electrical signal using a photo electric cell I have seen demonstrations on this by a German company (PK Electronics)many years ago, and later i made one myself...results were not to good but i succeeded in listening to a closed telephone booth with windows...from a 50 meters distance. such a phonebooth is probably the easiest way to use this technique on ,since it is very small and has big windows therefore the sound pressure on these windows is very high...but what about less convinient situations ? Are there any developments on this...a serious manufacturer that has one available maybe ? ........................ 2) Does any one have experience with this fairly new equipment: "Signet" and "Signet-mobile" they are manufactured by the UK based company called "Audiotel" http://www.audiotel-int.com I know they have been around for a long time and have manufactured some good detection equipment. But these new devices...i do'nt know...they seem to me like simple wideband AM-detectors..in a nice hightek casing. ........................... 3) Detection of Gps receivers Has anyone ever thought of the possibility to make a "GPS receiver-detector" Gps receivers are used in many applications... i would be interested in obtaining ore making such a detector...the application would be the detection of car-trackers (passive or active) specially the so called "loggers" that just receive and do'nt cummunicate Such a detector could be based on the principle of detecting either the: Local oscillator frequency (LO) or Microprocessor quartz frequency chances are very high that most of these gps-receivers use some common frequencies...a list of used frequencies would be very small i guess...so they could be scanned fast using a dedicated receiver or possibly a standard radio-scanner anyone ? Thanks Tetrascanner www.tetrascanner.com . 8243 From: Spook Date: Mon Feb 16, 2004 2:23am Subject: Re: Van Eijck receiver (radiation of crt monitors) Nope, -jma At 01:19 AM 2/16/2004, Jim Conrad wrote: >The real thing ??? :-) > >http://www.oceanviewcom.com/ebay/021504/van_eijck_box.jpg > > > >At 10:20 PM 2/14/2004, James M. Atkinson wrote: > >>I have an extended write up of this subject at: >>http://www.tscm.com/TSCM101tempest.html >> >>-jma >> >> >> >>At 08:28 PM 2/13/2004, contranl wrote: >> >. >> > >> > >> >About 10 years ago a researcher from a laboratory owned by the Dutch >> >PTT(former state telephone company similair to AT&T) invented a >> >receiver that could pick up radiation from crt based monitors. >> >Not shure if the man his name was "Van Eijck" or "Van Eck" >> > >> >Distance was up to 400 meters...they even made a unit available at >> >about 3500 US $...all this was done to market a chip made by plessey >> >that would scramble the tv-lines...the lines would be written in a >> >different order then normal...so anyone who would try to receive >> >anything would not be able to restore the original picture... >> >The person watching the original screen would still see the whole >> >picture in a correct way caused by the delay effect of the crt screen >> > >> >Does anyone know where to find information about this? how to make >> >such a receiver...or does anyone manufacutere such a receiver ? >> > >> >Yes i know That it does'nt work on LCD screens >> > >> >Thanks > > ><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> > Jim Conrad - jjc@o... or jimc1790@a... (backup) > 757-560-5970 Office/Voicemail/Pager - 757-587-8251 Fax > CAGE 0UD60 - http://www.oceanviewcom.com/ 8246 From: Steve Uhrig Date: Mon Feb 16, 2004 1:13pm Subject: Re: Laser Microphones , Gps receiver-detector. On 15 Feb 2004 at 19:09, contranl wrote: > What is the current state of development and availability > of so called "laser microphones" where a leaser beam is being > directed at a window and then reflected back...the reflected beam is > then converted to an electrical signal using a photo electric cell Laboratory science only. Impractical in the real world. Again, check the archives. I bet you'll find fifty messages discussing this in detail. There is some non-hype factual info on www.spybusters.com. > I have seen demonstrations on this by a German company (PK > Electronics)many years ago PK is well known for staging phony demos. I've personally seen them. Don't use shysters as a reference. Or any spy shop. The concept is valid, and the spy shops have capitalized on it. However, environmental noises are much greater intensity than the human voice, not to mention the near-impossibility of finding the reflected laser beam. People like to throw around the buzzwords of angle of incidence equals the angle of reflection. You'd have to hit the surface off which you're reflecting at precisely 90 degrees to have the beam bounce back to you, and that's presuming the reflecting surface is perfect, which glass or other things are not. I don't know if retroreflectors would address this problem or not. > Detection of Gps receivers > Such a detector could be based on the principle of detecting either > the: > Local oscillator frequency (LO) Possible. Probably not practical, especially if the receiver is in a metal box. > or > Microprocessor quartz frequency > chances are very high that most of these gps-receivers use some > common frequencies...a list of used frequencies would be very small i > guess...so they could be scanned fast using a dedicated receiver or > possibly a standard radio-scanner How many microprocessors do you think are in a modern automobile? If you get close enough to sniff a pipsqueek oscillator, you'd be close enough to see the thing physically I expect. You're talking a very weak signal, with the SMD leads being an inefficient antenna, probably inside a grounded metal box acting as a shield, in an environment with hundreds of microprocessors all happily radiating away and infinite nonlinear junctions in the vicinity to give you 2nd and 3rd and Nth order products of all these signals mixing. It'd be fun finding one signal out of the mass of noise across the spectrum. Certainly it could be done by experienced people knowing precisely what they were looking for, using the proper equipment, and having a blank check. But what is possible is very different from what is practical. A physical search would be much more practical. Keep thinking though. That's a good thing. And keep asking questions. You don't learn by talking nearly as much as you learn by listening. I commend you on your open and inquisitive mind. Don't forget the archives. Over a thousand people have been discussing every topic under the sun for years. There's a lot of info in the archives. Go to www.yahoogroups.com and log in using your username and password, then go to TSCM-L under My Groups, and you'll see the links for searching the list archives. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8247 From: Michael Puchol Date: Mon Feb 16, 2004 1:05pm Subject: Re: Re: Screening your house Hi, I happen to work with a TETRA network as part of my volunteer firefighter work - we have a regional TETRA network in the 380-400MHz band. Indeed, since this is a TDMA network, with logical carriers (slots) on each physical carrier, with 25kHz bandwidth, there is switching - however, this switching is only done by the mobile stations (hand portable and vehicle mount). The base stations transmit a full-time carrier, and so they do not switch or alternate the RF patterns at all - in your SA it will look exactly the same as any other UHF RF carrier of similar characteristics, but in the analog domain. I've had one of these stations about 700 meters from my house, where I receive a -60dBm signal, for over three years, and I've not grown green tentacles or anything of the like. These stations transmit an EIRP of 10W, handheld transceivers between 1W and 3W, and mobiles a maximum of 10W. I can understand concerns about the RF characteristics of TETRA, but only by the professionals that use the terminals - they are the ones subjected to the switching RF......but so is anyone using a digital phone, and I think we'd be seeing an epidemic pattern by now if it had such bad effects. GSM has been widely used in Europe for some 10 years, time enough for sensitive people to develop RF-augmented diseases. Best regards, Mike ----- Original Message ----- From: "Steve Uhrig" To: Sent: Sunday, February 15, 2004 3:53 AM Subject: [TSCM-L] Re: Screening your house > On 14 Feb 2004 at 1:12, contranl wrote: > > > There is a lot of fuzz going on about the new digital radio-networks > > based on the "Tetra" standard, > > > The unhealthy effects have not been proven...but the contrary neither > > You can't prove a negative. > > > Tetra uses the 380~400 Mhz band and the modulation is TDMA > > The carrier is switched on and of at a rate of around 17 hz > > > Similair to GSM-cellphones (217) this causes a lot of interference The > > power levels in Tetra are higher then with Gsm,the switching frequency > > of 17 hz is more dangerous then that of Gsm because it's in the range > > of "human" frequencies > > The U.S. FCC has guidelines for human exposure to RF radiation. There > are formulae and charts for frequency, ERP, distance, field strength, > etc. Amateur radio operators are supposed to know this. I don't. > > The type of modulation is not mentioned and I do not believe it would > make a difference overall. There may be some consideration for duty > cycles of stuff like SSB with an intermittent duty cycle and lower > average power versus continual key down data. > > Do some web searching and you'll turn up the data and the studies > used to derive it. > > I don't recall seeing any credible information on 'human' > frequencies. I have seen a lot of lunatic fringe stuff on them. That > doesn't mean there isn't anything to it, but I haven't seen anything > credible. > > Shielding and screening can work if done properly. It rarely is done > properly and probably never at a consumer level. Research screen > rooms and you'll see why. > > You may want to research the archives of this list on > yahoogroups.com. Every question you asked in your various messages > has been discussed and debated to death on this list in previous > years. > > Here is a good site for Van Eck info: > > http://www.eskimo.com/~joelm/tempest.html > > Steve > > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > Yahoo! Groups Links > > > > > > 8251 From: jimbo Date: Tue Feb 17, 2004 3:26am Subject: Intercepted video signal leads to arrest in suspected abuse http://www.jsonline.com/news/metro/feb04/208097.asp Intercepted video signal leads to arrest in suspected abuse By JOHN DIEDRICH jdiedrich@j... Posted: Feb. 16, 2004 As William Brookins surveyed the images on a monitor from his home security cameras Sunday night, two young girls with their hands overhead flickered onto the screen. Milwaukee Surveillance Camera A video, which Milwaukee resident William Brookins said he picked up on his security system, shows two youngsters and a woman apparently striking one of them. A woman was later arrested. Surveillance Camera Related Coverage Video: TMJ4 report The 57-year-old snowplow driver realized he was intercepting images from another camera. He called neighbors trying to figure out whose home he was watching. All the while, the kids kept their hands high. After 25 minutes, the 2-year-old's arms began to sag. A woman charged into the picture and hit the toddler in the abdomen and then the face, knocking her to the floor. As the woman gestured, the girl scrambled back to her feet and again put her arms overhead. That was enough for Brookins. "I said, 'I got to call the police. This isn't right,' " he said. Detectives scoured the neighborhood and early Monday arrested Theresa Smith, a foster mother who lives in the 3200 block of N. 41st St. The girls in the video were foster children. Smith, 39, was arrested on suspicion of physical abuse of a child, according to the police jail log. The district attorney was reviewing the case. Six children lived in the home: the 2- and 4-year-old girls and a 5-month-old boy, all in foster care, plus Smith's own children, ages 14, 12 and 10, police said. Investigators did not find signs of abuse on the infant or older children. The younger children went to different foster homes. Child welfare workers took custody of Smith's children. Smith doesn't have a criminal record, and there were no other allegations of neglect against her during her three years as a licensed foster care parent, said Denise Revels Robinson, executive director of the state-run Bureau of Milwaukee Child Welfare, which oversees the foster care system. The bureau put a hold on Smith's status as a foster mother, meaning no children can be placed at her home while an outside agency conducts an investigation that could take 60 days, said Revels Robinson. Revels Robinson said it was "totally intolerable" that children who were sent to a foster home to escape neglect or abuse may have faced the same treatment in what was supposed to be a safe place. "I am very appalled," she said. "This is very much the exception, but one child is too many." In 2003, the bureau received 465 allegations of abuse by foster parents, 49 of which were substantiated, Revels Robinson said. The bureau supervises 1,600 foster homes in Milwaukee County where 3,900 children live, she said. Police and social workers alike said Monday that they had never heard of alleged abuse being captured by an intercepted video signal. Home security cameras operate in a relatively narrow frequency band, and it makes sense that one signal could pop onto another system, said Don Larson, who runs Security Electronics Inc., Muskego. "That is bizarre, but it's definitely possible," he said. Brookins bought the cameras off the Internet a couple of years ago to keep an eye on his snowplows. Each night, he flips among several cameras, videotaping the action off the monitor. At 9 p.m. Sunday, the other picture crept onto Brookins' screen. He compared it to having a call cut in on a wireless phone. After watching the girls stand with their hands overhead for a while, Brookins called friends who take care of children to see if they thought that was abuse. Making young children do that for so long was wrong, they said. The girls stood for 90 minutes with the arms up before they were allowed to go to bed at 10:40 p.m., he said. "That is too long for anyone," Brookins said. "I couldn't do it." Besides striking the 2-year-old, the woman in the video hit the 4-year-old on the head with what looked like a stick, Brookins said. Police officers arrived and were initially stumped about how to find the suspect. Detectives Sean Lips, a technology buff, called the camera maker and figured out that the other camera must be within 300 feet. Brookins gave police a tape of the abuse and went to bed. He woke at 4:18 a.m. to find his system still receiving the other camera's picture. He was shocked to see the 4-year-old girl again standing with her hands up. She stayed that way for more than two hours, until 6:30 a.m., when police arrived. Brookins saw the woman take the girls from the room and then a police officer came on his screen. Monday night, Brookins was back to watching his cameras for burglars. "They work well for me, and in this case they stopped some abuse," he said. From the Feb. 17, 2004 editions of the Milwaukee Journal Sentinel 8253 From: John Papaleo Date: Tue Feb 17, 2004 10:26am Subject: RE: File - mission.txt this is a test only -----Original Message----- From: TSCM-L@yahoogroups.com [mailto:TSCM-L@yahoogroups.com] Sent: Sunday, February 15, 2004 2:41 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8255 From: contranl Date: Tue Feb 17, 2004 0:47pm Subject: To the moderator of this group . Dear Moderator, I see that one of the messages posted by my a few days ago (i guess i sent them on subday)has not shown up, The message concerned was about if anyone did have any experience with some new devices made by "audiotel UK"..i also stated that this company has been around for a long time and usually makes very good equipment.in my view the message was on topic and not against any of the rules of this group it did'nt insult the mentioned company either I do agree with somekind of moderation however...allthough i do'nt allways understand your criteria,specially the current gsm-jammer issue is not really very professional,i do understand your sometimes difficult position. Ofcourse you would have the right to keep this group the way you want it to be... Since i am a new member to this group it could be that i have written something that you would consider unfit. I am certainly not planning to spoil my membership here,i do appriciate this group very much and i have already sent several postings that were certainly of interest and on topic. i am not planning to lose my membership and will certainly keep to the rules Could you advice me what happened to my posting ? in the worst case something went wrong and the posting did'nt arrive..if that is the case please consider this message as not being written and i apologize beforehand. Thanks Yours sincerely Tetrascanner Amsterdam The Netherlands . 8256 From: contranl Date: Wed Feb 18, 2004 0:16pm Subject: Re: Lasermics and Gps receiver detector . A Little confused how it can happen that replies to messages come back to my yahoo mailadress saying that "they failed to be delivered"..while the where send and accepted in this group.....lucky enough the original message was included so here they are again: ................................................................. Thanks for the reply Steve, > Laboratory science only. Impractical in the real world. I am not shure on that...since i made one my self 10 or more years ago...you would have to agree that things have changed a little in 10 years...also i did not have access to all technology then (i still do'nt :) i used a simple and lowcost (noisy) laser and a lowcost photocell (noisy) the receiver was built in a old reflex camera and i succeeded doing 50 meters. i imagine that there's a lot of better components around today > I have seen demonstrations on this by a German company (PK > Electronics)many years ago > PK is well known for staging phony demos. I've personally seen > them. Don't use shysters as a reference. Or any spy shop. Could be but i was very sceptical..maybe they could fool someone else...i am technician enough to understand all the tricks they could use, thats why i made one myself > The concept is valid, and the spy shops have capitalized on it. I dont think they did that to a great extend ... the Germans asked something like 20.000 US$ for it... allthough i remember something about someone disappearing around that time..it had something to do with delivery of nightvision stuff to the middle east (that's what they said)it was either PK or Micro-electronics (both from Germany) > However, environmental noises are much greater intensity than the > human voice, true but since then DSP-filtering,Phasearray,Correlation and other techniques have come around. >not to mention the near-impossibility of finding the >reflected laser beam. you know more or less where it comes back...using a switchable dual beam (infrared+visible) solves that, it can be made visible using cards(kodak) that light up when "touched" by laser > You'd have to hit > the surface off which you're reflecting at precisely 90 degrees to > have the beam bounce back to you, That is when your transmitter and receiver are in the same place wich is not necessary. > surface is perfect, which glass or other things are not. I don't > know if retroreflectors would address this problem or not. I have heard of a slightly different approach where you do'nt actually have to catch back the reflected beam...they simply measure the size of the spot on the surface...this spot varies in size according to the movement of the surface...if this is possible then you could be anywhere and look at the spot from any angle...ofcourse maximum variation would still be at 90 degrees...allthough i think that these variations could be to small to measure.it's an interesting thought. My idea is that this lasermic technique could have been much improved since i made one myself(using low cost parts) 10 years ago, so it might be around...i always look at countersurveillance equipment available to know if the other side (the surveillance) exists...and specific laser counter stuff is around...shure..you could sell anti UFO stuff if somebody want's it. So i am not shure if better lasermics do'nt exist...the fact that you do'nt see them advertised does'nt mean anything. Allthough one other thing is that these days there are lots of other things around that would be easier and cheaper to use instead of lasermics > > Detection of Gps receivers > Possible. Probably not practical, especially if the receiver is in > a metal box. Agree allthough there maybe some radation over antenna cables or power supply cables > How many microprocessors do you think are in a modern automobile? If you remove the main cable to the battery all microprocessors will be off (unless backupped ofcourse wich in practice would be only alarmsystems maybe) ,self generated signals would be known > If you get close enough to sniff a pipsqueek oscillator, you'd be > close enough to see the thing physically I expect. You're talking > a very weak signal, with the SMD leads being an inefficient > antenna, I personally have detected pagers from 100 meters distance the interesting thing there was that the received LO was slightly modulated with the actual data being received by the pager !! This trick would allow you to actually receive the contents of messages being send to a closeby pager...such a message will also contain the RIC code of that pager...meaning that once the RIC code has been intercepted you won't have to stay close to that pager, you could go home and monitor the pager there using widely available pocsag software or a "cloned" pager (thie effect is probably caused by the fact that the LO gets slightly pulled off frequency in the same rythm as what is being received...pagers are very basic receivers and the data send is many times not a fsk signal modulated onto a fm carrier...but the carrier itself is switched (keyed) in the rythm of the data. antennas in pagers are very minimal but since the LO is not that far away from the antenna(not physical and not electronical)it might get reradiated. > Certainly it could be done by experienced people knowing precisely > what they were looking for, using the proper equipment, and having > a > blank check. But what is possible is very different from what is > practical. A physical search would be much more practical. I was actually thinking of a system that would be built in car so the cars owner would be warned of such a gps-tracking device so you wo'nt need to do a physical inspection all the time,or a small portable and simple to use device I agree that a physical inspection would be a good way since such a gps device could not just be placed anywhere..because it will always at least have to "see" a part of the sky...allthough a new correlation technique now makes it possible to even get correct readings with the intenna inside a closed trunk !!! This technique is now being implemented in cellphones there location is now known even when the phones are inside 20 floor high buildings !! i am shure it is now coming to cartrackers too I nice video demo you will find below where a gps receiver is actually put inside a microwave oven wich in turn is inside a building...later on there is a demo showing a gps receiver inside a car's trunk....in both cases it still finds it's position. http://www.globallocate.com/demos_main.shtml# If "they" are using this new technique in a cartracker this means it could be anywhere...then your job to find it might mean that you will have to dismantle the car completely ! Somebody knowledgeable did some research on how many different frequencies (LO and uP)are being used in various brands of gps receivers and he said they were allmost all the same i was amazed ...and he said that was because they all used the same kind of frontend tuned to the same frequency and using the same LO i will verify that by looking up some specs > Keep thinking though. That's a good thing. And keep asking > questions. > You don't learn by talking nearly as much as you learn by > listening. > I commend you on your open and inquisitive mind. Thanks for the compliments and your appriciated answers i am happy to get some good respons ! Tetrascanner www.tetrascanner.com . 8257 From: contranl Date: Wed Feb 18, 2004 0:38pm Subject: Re: Screening your house . This message was posted and accepted too...but it did not appear and also came back to me trough the mail so here it is again....sorry for the confusion...do'nt know how to solve that or what causes this) .................................................................... Thanks for your reply, Here in your Europe there are currently much more networks based on TDMA techniques(comparable with PCM) then in the USA Some of these are GSM and TETRA. The type of modulation is certainly of influence on the (unwanted) effects to health (in fact it is the main point) and radiofrequency interference (RFI) ...it's the pulsing that causes the problems and more specific the waveform...specially the risetime..the shorter risetime or the more the more rfi and the more unwanted detection takes place. The order of modulation types that cause unwanted RFI is something like this (min) WFM..NFM..........AM...SSB..................TDMA (max) TDMA is a modulation type where the carrier is (hard) switched on and off The rf carrier frequency itself is off less importance allthough the 380~400 mhz band has a ideal wavelength for penetrating human made structures (wavelength = about 80 cm) Remark: the max power might be 10 watts.(per channel)..but do'nt forget that in most cases there is not 1 rf carrier but 3 or 5 (in my country)one antenna can have that many carriers ...so the total fieldstrength would be higher (not shure about how to add that up since they do'nt have the same frequencies and contents) I have read about 25 reports on this ...you may find some of them on my website here: http://www.tetrascanner.com/gsm-tetra-detector.html With "human frequencies" i mean those frequencies that are in the same range as the frequencies that the human bodies uses or generates to regulate it's functions Those frequencies are exactly the ones that are being measured using medical equipment in hospitals ..since the Tetra equipment (specially the mobile handhelds) pulse exactly in this range (17 hz) they may cause problems like unwanted detection (AM components) and this could lead to the malfunction of such equipment...screening and filtering inputs does help...but is a little difficult because the wanted frequencies are in the same range as the unwanted...i am not talking about "beta" , "Alfa" or any other "occult" type of waves just plane and well known electrical signals The health problem is still in research by various respectable laboratories their reports do not all point in the same direction..at least they don't all conclude that the Tetra system is 100% safe ...specially the long term effects are not known...the general public is not convinced. In the USA there might be less problems since most systems use CDMA modulation (APCO and Cellphone) CDMA does no pulse since it is a digital signal modulated on a steady NFM-carrier it does not cause strong RFI. Here is the latest Tetra-mast removal (yesterday): http://news.bbc.co.uk/1/hi/wales/mid/3473207.stm Thanks Tetrascanner www.tetrascanner.com . 8258 From: contranl Date: Wed Feb 18, 2004 0:47pm Subject: Re: Screening your house . The last one that also came back as not delivered ................................................. It's the correct link to the article that started this thread: www.iwcp.co.uk/ViewArticle2.aspx?SectionID=1252&ArticleID=739918 copy and paste that in your browser...if that does'nt work put http:// in front of that. Specially the picture is interesting showing a older and very tired couple screening there windows...typically what you would expect. Tetrascanner . 8259 From: Shawn Hughes Date: Thu Feb 19, 2004 10:40am Subject: Re:the ENTIRE Digest Number 1494 Contranl, Couple of things..... 1) Instead of flooding my mailbox with all these bounced posts, couldn't you have simply emailed jma about your situation? 2) Since Steve Uhrig is too modest to really introduce himself, allow me. He is one of the best and brightest we have on this list. Saying that, unlike many 'personalities' in this business, he really, really does take time to help and guide newbies. 3) You are taking advantage of Steve with these questions you ask. You are mistaking genuine interest in your posts for people gently helping you, but trying to get you to read the archives, where you'll find LASER mikes and GPS have been beaten to death. (PS, many phones don't use GPS. GPRS and GPS aren't the same). 4) Then, after these guys take a sec to try to point out what the rest of us know, you respond with: "I am not shure on that...since i made one my self 10 or more years ago." So? So did many, many other children in the US for science fairs. Steve makes real gear for real people FOR A LIVING. This isn't his hobby; it's his livelihood. Do you REALLY think there's a technology that's completely escaped his attention? Not saying he is infallable, but, if he says it, he's putting his rep on the line behind his statement, so I tend to listen. 5) You state " SU - However, environmental noises are much greater intensity than the human voice, YOU-true but since then DSP-filtering,Phasearray,Correlation and other techniques have come around." This gives me a good approximation where you are in your study of this field. Also, one can learn a lot about you by looking at your webpage. In closing, welcome to the board, but please give some consideration to what I had to also learn. Regards, -Shawn Shawn Hughes Lead Instructor, Tactical Response, Inc. USA 8260 From: Date: Thu Feb 19, 2004 6:55am Subject: U.S. to Keep Key Data On Infrastructure Secret 02/19/04 Washington Post U.S. to Keep Key Data On Infrastructure Secret Firms Encouraged to Report Security Gaps By John Mintz Washington Post Staff Writer Thursday, February 19, 2004; Page A21 Starting tomorrow, chemical companies, railroads, electric utilities and other parts of the nation's critical infrastructure can begin submitting sensitive information to the Department of Homeland Security about their vulnerabilities to terrorist attacks with assurances that their proprietary data would be safe from public disclosure. Under the Homeland Security Act of 2002, the department can deem data voluntarily provided by businesses that help the government stave off possible disruptions by terrorists as secret and unavailable to outsiders. The law's supporters view it as a way for U.S. officials to help map security plans for critical U.S. infrastructure, 85 percent of which is in private hands. But some advocates for environmental protection and open-records laws say unscrupulous firms might manipulate the rules as part of an attempt to evade federal enforcement of health or safety rules. Sean Moulton, a senior policy analyst with OMB Watch, a nonprofit group that opposes government secrecy, said that during the drafting of the law and the rules being released this week, key industries successfully lobbied for procedures ensuring that any information they share with Homeland Security would remain secret and would not be usable by other agencies in civil enforcement actions. "The government agreed that 'we'll keep secret this information you give to Homeland Security, and we won't do anything with it,' " other than for counterterrorist purposes, Moulton said. "It's naive to think we won't have bad actors in industry" misusing the protections, he said. Federal officials said they will strive to prevent the rules from allowing firms to avoid accountability for wrongdoing by including data about, for example, pollution at a chemical plant in a confidential report to the Homeland Security Department about security gaps. Robert Liscouski, the department's chief of infrastructure protection, said his staff will strive to ensure that the law is "not providing a safe haven" for corporate wrongdoers. Companies can be charged with felonies if they mislead the department into believing that the information they provide is not related to any enforcement matters being considered by other agencies, officials said. U.S. officials have no power under the Homeland Security Act to compel industries to provide data about their security gaps, so any corporate cooperation would be voluntary. Safeguarding nuclear plants, telecommunications nodes and thousands of other critical networks was one of the main reasons for the formation of the Homeland Security Department last year. It is an arena in which it is critical that U.S. officials synchronize their efforts with private industry, officials said. U.S. officials found soon after the Sept. 11, 2001, attacks that many industries were reluctant to share information about their operations and their security vulnerabilities because of fears of legal liability and concern that the information would be unearthed by outsiders using the federal Freedom of Information Act. "These industries weren't comfortable giving sensitive information" to the federal government, said Jamie Conrad, a lawyer who specializes in security issues for the American Chemistry Council, which represents large chemical companies. "There wasn't a high degree of confidence the Department of Homeland Security could keep it confidential." The industries' reluctance stifled progress in tightening security at many sites, officials said. That was what prompted Congress to extend secrecy guarantees to voluntary corporate declarations. Liscouski said yesterday that while some infrastructure industries are eager to discuss security issues with the government, others are dragging their feet for fear of prompting later government requirements that they spend money to protect their networks. The motivation of companies giving the information to his department, Liscouski said, is "doing public good in protecting the country." [Non-text portions of this message have been removed] 8261 From: A Grudko Date: Thu Feb 19, 2004 11:10pm Subject: Re: To the moderator of this group >-Original Message- > >From: contranl <> >I see that one of the messages posted by my a few days ago (i guess >i sent them on subday)has not shown up,..... >I do agree with somekind of moderation however...allthough i do'nt >allways understand your criteria,specially the current gsm-jammer >issue is not really very professional,i do understand your sometimes >difficult position. Although this message was addressed to the moderator I'd like to point out that this message certainly did get posted to the group and I would have replied to the Audiotel question if I had had time and as I am a fan of thier equipment but have not used the particular unit he was enquiring about. Pointing out that offering certain equipment for sale is illegal in certain areas seems very professional to me. If JMA erred it was perhaps by ommission, by not including 'in the USA' but this is a common oversight by American contributors to Internet groups. Andy Grudko (British), DPM, Grad IS (South Africa) Consulting Investigator, Est. 1981. PSIRA reg. No. 8642 www.grudko.com , andy@g... Pretoria (+27 12) 244 0255 - 244 0256 (Fax) Sandton (+27 11) 465 9673 - 465 1487 (Fax) Johannesburg (+27 11) 781 7206 - 781 7207(Fax) Cellular (+27) 82 778 6355 - ICQ 146498943 SACI(Pres) SASA, IPA, WAD, CALI, UKPIN, IWWA. "When you need it done right - first time" 8262 From: Steve Uhrig Date: Fri Feb 20, 2004 0:50pm Subject: Yahoo privacy problems Yahoo is using 'Web Beacons' to track Yahoo Group users around the net and see what they're doing and where they are going - much like cookies. Yahoo's Privacy Statement has been updated: http://privacy.yahoo.com/privacy/us/pixels/details.html In the section 'Outside the Yahoo! Network' (3rd bullet down), you'll see a little 'click here' link that will let you opt-out of their new method of snooping. I strongly recommend you do this. Once you have clicked that link, you are opted out. Notice the 'Success' message the top the next page after you opt-out. Be careful because on that page there is a 'Cancel Opt-out' button that, if clicked, will *undo* the opt-out. Very misleading if you don't read before clicking (or not clicking) This situation affects everyone reading this message. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 8263 From: Ocean Group Date: Fri Feb 20, 2004 1:48pm Subject: Brilliant Minds... Alright folks! With all this faffin' about I thought I would try and get all these brilliant minds on the list to stop messin' and see if they could use their technical greatness to other ends... I was wondering if anyone had any ideas on how to best detect the new Ultra Wide Band transmitters coming onto the market at the moment. The tx's are already available on the hardware developers market and I can see them being quickly incorporated into exisiting audio/video hardware. From what I gather the UWB allocated frequencies are at 2.5ghz and 5.8ghz and will probably operate at a centered frequency band of about 1500Mhz per channel.... With the bandwidth of UWB being so high it makes it ideal for high res video, and since UWB does not show up above the noise floor of most standard RF receivers I'd interested to hear if anyone has any ideas on what type of equipment to use or better yet how to adapt standard equipment to at least give some sort of indication of a UWB tx. I look forward to hearing any input... Oisin 8264 From: cismic Date: Fri Feb 20, 2004 1:16pm Subject: Re: Yahoo privacy problems Hi Steve, This technology has been around a long time. It used to be called spy-bots. When you setup a web page most servers will log and acknowledge that you have visited a web page. ie, *.gif, *.jpg, *.html, *.asp, *.php etc are some of the common extentions that appear when you visit a web page in that web servers log. So, now, when an email is created that has a link back to some web page via a graphic in an html email. http://www.somesite.com/emailopendpixel.gif then that will show up in the web log that the email was either read or opened. I don't like all the pretty email anyway. I mean formated html in email can allow virsuses to enter your system because it is just html like visiting a web page and scripting can be ran from email. I read all email as text that way the graphics or "web beacons", won't appear in any log of sites whose email I decide to read. I also completely clear out all cache every day. Joseph ----- Original Message ----- From: "Steve Uhrig" To: Sent: Friday, February 20, 2004 10:50 AM Subject: [TSCM-L] Yahoo privacy problems Yahoo is using 'Web Beacons' to track Yahoo Group users around the net and see what they're doing and where they are going - much like cookies. Yahoo's Privacy Statement has been updated: http://privacy.yahoo.com/privacy/us/pixels/details.html In the section 'Outside the Yahoo! Network' (3rd bullet down), you'll see a little 'click here' link that will let you opt-out of their new method of snooping. I strongly recommend you do this. Once you have clicked that link, you are opted out. Notice the 'Success' message the top the next page after you opt-out. Be careful because on that page there is a 'Cancel Opt-out' button that, if clicked, will *undo* the opt-out. Very misleading if you don't read before clicking (or not clicking) This situation affects everyone reading this message. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Yahoo! Groups Links 8265 From: Date: Sat Feb 21, 2004 4:40pm Subject: Interesting site for gain antennas http://www.directivesystems.com/ [Non-text portions of this message have been removed] From: DrPepper Date: Fri Feb 15, 2002 10:15am Subject: Re: Photo Radar Countermeasures Actually, Spain is the most dangerous place to drive an automobile in the world. The seem to have no sense of danger out on the highways, and lethal accidents are very common They really need SOMETHING to slow people down. But then again, ignorance can be cured but stupidity is forever ========================================= Michael Puchol wrote: > Very well said. In Spain, until last week, police had to pull you over after > taking your picture with a radar trap, to positively identify you and give > you the ticket - this meant only about 10% of pics taken were notified. > ==================snippy de deee=================== -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm 4804 From: Craig Snedden Date: Fri Feb 15, 2002 2:17pm Subject: RE: Photo Radar Countermeasures Nope, disagree. Cyprus is pretty hairy. Traffic lights: Green - Go very fast, Amber - Go Faster, Red - Put your foot down...... -----Original Message----- From: DrPepper [mailto:DrPepper@i...] Sent: 15 February 2002 16:15 To: Michael Puchol Cc: TSCM-L@yahoogroups.com Subject: Re: [TSCM-L] Photo Radar Countermeasures Actually, Spain is the most dangerous place to drive an automobile in the world. The seem to have no sense of danger out on the highways, and lethal accidents are very common They really need SOMETHING to slow people down. But then again, ignorance can be cured but stupidity is forever ========================================= Michael Puchol wrote: > Very well said. In Spain, until last week, police had to pull you over after > taking your picture with a radar trap, to positively identify you and give > you the ticket - this meant only about 10% of pics taken were notified. > ==================snippy de deee=================== -- Dr Pepper aka WB6GKI in the High Desert of California. Check out my LIVE Hamshack Cam at: http://www1.iwvisp.com/DrPepper/ham/ham.htm ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4805 From: gkeenan Date: Fri Feb 15, 2002 3:53pm Subject: Re: Photo Radar Countermeasures Ever try driving in Egypt? Cairo or Alexandria? Or better yet, take the "lovely" trip down the road alongside the Nile between the two cities! Lights? What Lights? We don't need no stinking lights!" What yellow line? I thought you only signed on a dotted line! I sure had lots of fun there!! Jerry Keenan GPKeenan Co., Int'l Security Services West Islip, NY ----- Original Message ----- From: "Craig Snedden" To: Sent: Friday, February 15, 2002 3:17 PM Subject: RE: [TSCM-L] Photo Radar Countermeasures > Nope, disagree. > > Cyprus is pretty hairy. Traffic lights: Green - Go very fast, Amber - Go > Faster, Red - Put your foot down...... > > > > 4806 From: Justin T. Fanning Date: Fri Feb 15, 2002 9:01pm Subject: NY Times: How to Fake a Passport (10-Feb-2002) I'm not normally taken to posting news stories on mailing lists, but this is such an exceptional piece I really think all the law enforcement types will enjoy. JMA: No more off topic posts I promise ;) JF --- http://www.nytimes.com/2002/02/10/magazine/10PASSPORT.html?pagewanted=all New York Times February 10, 2002 How to Fake a Passport By JEFF GOODELL Alain Boucar flips open a passport and holds it under an ultraviolet light. A background image of Belgium's royal palace, faintly printed on the page, vanishes. ''See that?'' he says. He holds another Belgian passport under the spooky purple light. The image on this one is printed in a special reactive ink. It glows brightly. ''The first one's a complete counterfeit,'' he announces. Boucar is the director of the antifraud unit for the Belgian federal police. A genial 44-year-old, he works in a small, plain office in Brussels that is strewn with dozens of passports. It's only 10 a.m., but it has already been a busy day -- there has been an urgent call from an Interpol agent in Berlin, and another from a security officer on a Dutch cruise ship. Each wanted information from Boucar about suspicious Belgian passports. Every few minutes, a uniformed cop wanders through with a question about a suspect document. ''No good,'' he says with disgust upon being handed an Italian ID card. Lousy fakes annoy Boucar; they are not worthy of his connoisseur's eye. Boucar's colleague Thierry Descamps steps into his office. He is holding a fax. Descamps nods to the phone and mentions the name of a Belgian police officer on the antiterrorism task force. Boucar grabs the phone and his face becomes suddenly serious -- the inner cop emerges. While Boucar listens on the phone, he turns to his computer and calls up a database nicknamed Braingate, which is the Belgian police's repository of 1.4 million stolen and fraudulent documents from all over the world. The antiterrorism cop is calling about two Sri Lankans, Nicolas Sebastianpillai and Varunalingam Arudthevan, who were arrested in Faro, Portugal, on Sept. 12, en route to New York. They were traveling on Belgian passports -- stolen ones, that is. (Portuguese security detected a fake stamp on their passports and contacted the Belgian police, who found the passport numbers in Braingate.) Interpol investigators soon began aggressively pursuing suspected links between the men and the Tamil Tigers, the violent Sri Lankan terrorist group. Now the antiterrorism cop wants to know how they got their hands on these Belgian passports. Boucar punches in the numbers of the passports confiscated by the police in Portugal: EC 503103 and EC 503104. Boucar learns that these two passports were stolen in March, in transit from Belgium to Madagascar: a batch of 25 blank passports was lifted out of a supposedly secure diplomatic pouch. Of all forms of passport fraud, this is one of the most frightening. Only the very best counterfeits make it past airport security. But authentic blank passports, when filled out correctly, are extremely difficult to detect. Virtually the only way to trip up a person traveling on an authentic passport is if he makes an error filling it out or if the passport number turns up in a database of stolen documents. That's why Braingate is so invaluable; without it, the Sri Lankans might well have made it all the way to New York. Boucar searches Braingate for more information. He tells the cop on the other end of the line that he can find no evidence that the other 23 passports stolen in the same batch have been used by terrorists -- or anyone else, for that matter. Of course, that doesn't mean they haven't been, Boucar tells me. It just means nobody has been caught yet trying to use them. In fact, they have almost surely been sold on the black market, providing two dozen fresh opportunities for terrorists to sneak across international borders. These 23 passports, Boucar admits, are hardly the only Belgian passports circulating on the black market. In fact, his country has quietly become the global capital of identity fraud. According to the Belgian police, 19,050 blank Belgian passports have been stolen since 1990. This is probably some kind of record, although other problem countries, like Italy, Argentina and South Africa, refuse to confirm numbers. All these Belgian passports were not stolen in a few grand heists. Rather, small stashes were grabbed from various town halls, embassies, consulates and honorary consulates. Sold on the black market for as much as $7,500, they have subsequently been used by human traffickers, sex traffickers, gun runners and drug dealers, not to mention terrorists. Indeed, for terrorists making excursions outside the Middle East, Belgian passports are often the document of choice. Ahmed Ressam, the Algerian convicted of plotting to blow up Los Angeles International Airport in 1999, trafficked in a number of false passports, at least one of which was linked to a theft from a town hall in Belgium. And the two members of a Qaeda cell who assassinated the Northern Alliance leader Ahmed Shah Massoud just before Sept. 11 traveled from Brussels to London to Karachi on stolen Belgian passports. Until this fall, Belgium's passport troubles were little noticed. The Massoud murder, however, exposed the country's problem to the world. It was a huge embarrassment for a small, chronically insecure country that has been working hard to cast itself as one of the economic and political capitals of the New Europe. After Sept. 11, Belgian investigators immediately began tracking down clues. The passports used by the Massoud assassins, Boucar discovered, were stolen in two separate break-ins: one at the Belgian consulate in Strasbourg, France, on June 26, 1999, when 45 passports were stolen, and another a few months later, on Nov. 11, 1999, when 20 were stolen from the Belgian Embassy in The Hague. The Belgian police are now desperately trying to tighten up security. But even if they succeed, Boucar will be busy for years to come. Terrorists are too determined and the desire for fake passports is too great. Moreover, thousands of stolen Belgian documents remain circulating around the world. Boucar looks up from his computer and gives me a weary look. ''Since Sept. 11,'' he says, ''it has been chaos around here.'' Belgium is, at first glance, a most unlikely spot for chaos. But its longstanding reputation as a sleepy gateway between France and Northern Europe is precisely what has made it attractive to criminals. ''Brussels is at the crossroads of Europe, and an enormous amount of human traffic passes through it,'' says Jonathan M. Winer, a former State Department official and an international-crime expert. ''As a result, Belgium is the place where all sorts of crime seems to settle: drugs, human trafficking, prostitution and identity fraud.'' To get a feeling for this criminal nexus, all you have to do is take a walk along the gritty boulevards around the Gare du Midi in Brussels. The neighborhood's main thoroughfare, Boulevard Maurice Lemonnier, is known to locals as Kandahar Lane. Spits of glistening meat turn in the windows of restaurants, and Middle Eastern music blares from CD shops. The whole neighborhood feels wired to another world: cabins du telephone offer cheap, untraceable communications; Internet cafes let you surf the Web anonymously for two euros an hour; travel shops advertise weekly bus-and-ferry service to Tangier. According to investigators, it was here at the Dar Salaam hotel that Richard Reid, the accused ''shoe bomber,'' recently spent 10 days plotting to blow up an American Airlines jet. (As if to underscore Belgium's reputation as the back office of terrorism, when Reid was arrested, a map of Brussels was found in his jacket pocket.) The Dar Salaam is more flophouse than hotel, with lots of old linoleum and chipped paint and a cafe on the ground floor that is jammed with Arab men smoking and drinking tea. A few steps away is Marrakech, an Internet cafe where Reid apparently made arrangements to pick up explosives. On the same block is another terrorist landmark: Le Nil, the restaurant where, on Sept. 19, Belgian police officers found chemicals that had supposedly been stored there by members of a Tunisian network linked to Al Qaeda. Investigators suspect that the chemicals -- 220 pounds of sulfur and 16 gallons of acetone -- were going to be used to build a bomb to blow up the United States Embassy in Paris. Just across another boulevard from the Dar Salaam is a row of shadowy bars and hotels that face the southern side of the train station. This is the end of Arab turf and, according to the Belgian police, the beginning of a neighborhood controlled by the Albanian mob. The bars and hotels here all have a forsaken look and all seem to be populated by desperate Eastern European men. Here the games are human trafficking, sex trafficking and false documents. ''If you want a passport, this is where you begin to make inquiries,'' says Herman Lefief, a Belgian investigator. The process is never quick, especially if you are a foreigner or unknown to the sellers. Luk Alloo, a Dutch television journalist who recently purchased a middling-quality counterfeit Belgian passport for $1,500 as part of an undercover investigation, spent three months working similar mob-controlled bars in Antwerp before he found anyone who trusted him enough to get him a passport. ''They never keep anything on the premises,'' Alloo says. ''They have connections, who have connections, who have connections. It's an elaborate operation.'' Until recently, many of those connections eventually led to a little bar about two miles away on the Chausee de Ninove in the Anderlecht district of Brussels. Anderlecht is a gritty landscape of warehouses, falafel joints and muffler shops, but the bar itself is a cheerful enough place; there's a pool table in the center of the room, and video machines blink quietly against one wall. But according to the Belgian police, this bar was -- and may still be -- the base of operations for an Albanian mobster whom Belgian cops refer to as ''M.'' (For legal reasons, they will not allow his name to be published.) From his bar stool, M. ran what investigators say was one of the largest organized stolen-passport rings in Europe. M. bought and sold thousands of blanks on the black market. His prices ranged from a few hundred dollars for an easy-to-get Albanian passport to $5,000 or more for a newly stolen Belgian or French passport. Investigators have also linked M. to dozens of break-ins at embassies and consulates in Germany, the Netherlands and France. According to the Belgian police, M.'s network is typical of the complex link between organized crime, passport fraud and terrorism in Belgium. One afternoon in the lounge of the Belgian federal police building, an investigator named Daniel Traweels draws me a picture to help me visualize how it works. He sketches four circles across the top of the page, labeling them P for prostitution, H for human trafficking, D for drugs and T for terrorism. Below, Traweels draws four more circles, identifying them as Romanians, Albanians and other Eastern Europeans who specialize in burglary and document manipulation. In the middle, he draws another circle and connects the circles above and below to the center; he labels it M. ''It's a network,'' Traweels explains. ''He is the middleman. The circles on the top, the buyers, they are of every race: Chinese, Russian, Arab. We have Jewish mobsters who work with Arabs, Arabs who work with Albanians, North Africans who deal with Jews. There is no prejudice in this business.'' But there is specialization, Traweels explains. The Africans are mostly involved in money laundering. The Moroccans are involved in car-jackings, robberies. The Eastern Europeans, especially the Albanians, are expert burglars and safecrackers. These patterns rarely vary. Arabs don't get involved in burglary, nor do terrorist cells attempt large-scale passport theft. ''They leave the dirty work to the experts,'' Traweels says. Belgium's troubles with stolen blank passports really began only in 1995. At the time, Europe was in the midst of a push toward the creation of a unified state -- the European Union. As part of this transformation, European leaders decided to do away with almost all border controls within Western Europe. In theory, this was meant to simplify travel and, like the introduction of the euro currency, promote the idea of Europe as a coherent economic power. In practice, the lack of borders has also benefited criminals. A network of Albanians, many of them fleeing the war in the Balkans, found that Belgium was an ideal place to set up shop. Many of them got involved in importing human beings, especially young girls they could force into prostitution. For that, they needed passports. Although counterfeit documents were readily available in Bangkok -- one large counterfeiting operation was run by an ex-K.G.B. agent in Thailand -- the quality was often poor. Eventually, many of these Albanian outlaws, including M., discovered that instead of counterfeiting passports, it was much easier (and more profitable) to steal blanks. The Belgians made it particularly easy for them. The country's long history of provincial rule -- it didn't become an independent nation until 1831 -- meant that the mayors of tiny communities enjoyed enormous power. One of their perks of office was the ability to distribute passports; for decades, blank Belgian passports were stored in the 600 or so town halls around the country. Often, security amounted to nothing more elaborate than a locked door. In 1996 alone, 3,600 blank passports were stolen, bit by bit. In some cases, the thieves had to drill their way into a heavy safe to get to the passports -- and if they couldn't crack it, they ripped the safe right out of the wall and carted the whole thing off. In other cases, like a break-in at a town hall in Tongeren, the thieves simply helped themselves to a safe key that had thoughtlessly been left in a desk drawer. Usually there were no witnesses; the burglars left their tools behind, but little else, making the crime difficult to solve -- especially by the local cops, who, as one Belgian federal police officer put it, ''were not terribly worried about the loss of a hundred passports -- they just ordered more.'' Ultimately, it was pressure from the United States that finally persuaded the Belgians to crack down. Back in 1991, Belgium had been admitted to the United States visa-waiver program, which allows citizens from 29 friendly countries to enter this country without applying for a visa. But the fact that blank Belgian passports were being carted off by the truckload alarmed officials in the States. (The United States does not have a problem with passport theft; fewer than 50 blanks issued since 1990 remain unaccounted for.) By 1997, Belgium's troubles with stolen blanks had gotten so out of hand that United States officials threatened to kick the country out of the visa-waiver program. In 1998, Belgian officials began removing blank passports from town halls and storing them in an ultrasecure building in downtown Brussels. Passports are now distributed by courier, in a system similar to America's. But that didn't end Belgium's problems. Criminals like M. simply shifted their operations to Belgian consulates and embassies, which were equally insecure, and where hundreds of blanks continued to be stored. The old Belgian Embassy in The Hague, where one of the Massoud passports was stolen, was a typical case. By 18th-century standards, the charming brick town house is solid and secure. By 21st-century standards, it's a joke: there are no bars on the front windows, and the locks look as if they could be jimmied with a screwdriver. Belgium has 110 embassies and consulates worldwide, some more secure than others. It's no wonder that burglars find them so inviting. Last year, the Belgian Embassy in The Hague was finally moved to a secure building across the street from a police station. As for the stolen passports, they quickly vanish into the criminal underground. The 506 Belgian passports that were stolen from the consulate in Cologne in August 1999 have been found all over the world -- Madrid, Istanbul, Rotterdam, Lagos, Bangkok, Islamabad -- and have been used in a wide variety of crimes, from drug dealing to human trafficking. (Belgian authorities won't say if any ended up in the hands of terrorists.) The passports stolen in Strasbourg and The Hague were used for illegal entry into Congo, China and Morocco; another was found in a house in Rotterdam where three men suspected to have links with Al Qaeda were arrested after Sept. 11. In the case of M., the cops got lucky. Last January, while executing a search warrant in Brussels on an unrelated case involving a 31-year-old Romanian, they turned up a trove of passport-trafficking goods: typewriters, scanners, immigration stamps for 56 countries, various identity documents (including a Spanish ID card, sans photo, filled out in the name of Bill Clinton) and some 150 stolen blanks -- including 43 Belgian, as well as others from Sweden, Greece and Germany. Most important, however, they found documents and phone records suggesting that the Romanian was one of the main passport suppliers for M. Investigators staked out the bar where M. conducted business. They logged his arrivals and exits; they tapped his cellphone. They concluded that his network included 50 to 60 people in Belgium, France and the Netherlands. But ultimately M. was too slick for them. After four months of surveillance, 140 Belgian cops moved in last April to bust his operation. They hoped to nail not only M. but also several notorious passport thieves and safecrackers. It didn't happen. Stashes of cash were found, but the police failed to uncover any major cache of forged or stolen documents. M. himself was clean; searches of his apartment and car turned up nothing more damning than a gun and a bulletproof vest. M. was held in custody for two months, and he bragged to investigators that he had 30 million Belgian francs hidden in an overseas account that they could never find. And they couldn't. In the end, M. was charged with nothing more serious than consorting with a known criminal organization. Given the almost imperceptible speed of the Belgian courts, he will stand trial in two or three years. Until then, M. is back on the street and, presumably, back in business. Alain Boucar is extraordinarily proud of Belgium's new high-tech passport. Flipping through one and pointing out its many security features, he's as giddy as a new father showing off his child: ''It's a very beautiful design, don't you think?'' he says, holding it up to the light. Indeed it is. Thanks largely to this new passport, which Boucar helped design and which was introduced last March, M.'s business probably isn't quite as breezy today as it was last year. By all accounts, it's one of the most secure passports in the world. On the first page there's a graphic illustrating five key security features, including a laser-cut pinhole image of the passport holder, a watermark of King Albert II and an optically variable image of Belgium (which changes from green to blue depending on the viewing angle). ''Most border-control officers have one minute or less to look at a passport and determine if it is genuine,'' Boucar says. ''With this, at least they know what they're looking for.'' This new passport is a triumph for Belgium and a sign that it is taking its problems with passport fraud seriously. Even if characters like M. get their hands on blank versions of this passport, because of features like a digitized photo they will be much more difficult to fill in convincingly. Other countries, including the United States, are similarly upgrading their passports. Still, it will be years before these new passports make it into wide circulation. Until then, we're stuck with the old documents. As an example, I show Boucar my United States passport. ''How easy would it be for you to put someone else's picture in here?'' Boucar examines it. It's a standard United States passport, issued eight years ago, with a laminated photo page. ''Five minutes.'' He sticks his thumbnail into a corner of the laminate, showing me how you can peel it back. (You can loosen the laminate by sticking it in the freezer or a microwave oven -- it depends on the type of laminate -- or, better yet, by dissolving the adhesive with Undu, a product that is easily ordered on the Internet.) Boucar then points to the little blue emblem, called a guilloche, that overlaps the photo and the passport page and is supposed to make the photo difficult to remove. ''You might see a little line here. But if I do a good job, you would not notice.'' Of course, that person would have to be around the same age, height and weight as me, but Boucar's point is well taken: doing a passable job of doctoring a typical passport is not very hard. Boucar then explains the tricks criminals use to fill in stolen blanks: how they feed passports into laser printers, for example. Or how they can create a perfectly good dry stamp -- an inkless stamp that leaves an embossed image on paper and is used to authenticate the passports of many countries -- by placing an old vinyl record over a passport marked with a real seal, then heating the record with an iron; the record is then pressed onto a fresh passport. Candle wax also works. As for ink stamps, they pose no challenge at all. Years ago, forgers would cut a fresh potato in half and use it to transfer a stamp from one passport to another. Today ''you just scan the page of a passport into a computer, print it out, then take it to a copy shop,'' Boucar says. ''They'll make you a rubber stamp in two minutes.'' Boucar is something of a heretic in law enforcement circles, in which open discussion of such techniques is frowned upon, lest forgers get any new ideas. Boucar says that's nonsense. ''The forgers already know everything,'' he says. ''It's the rest of the world that we must educate.'' Indeed, bearers of false documents often seem to know more about their business than many border guards. They know what kinds of questions will be asked by consular officers (for example, ''Who is the prime minister of Belgium?'') and what suspicious mannerisms to avoid. And experienced border-hoppers are experts at finding the weak link in the system. If Portugal is cracking down, they'll try entering Europe through Greece; later, they'll move on to Spain. They send patsies through first to test security. They know to carry bank statements (forged ones) and other supporting documents. Still, even the best make stupid mistakes. They print out a blank stolen passport in the wrong typeface. Or they misspell a word. One of the biggest arrests connected with the Sept. 11 attacks came in Dubai, when a passport official noticed some sloppy forgery on the French passport of Djamel Beghal. Beghal was arrested and interrogated; information he provided led to the breakup of a large European terrorist cell, including the arrest in Brussels of Nizar Trabelsi, a Tunisian whom Beghal identified as the leader in a plot to bomb the United States Embassy in Paris. In a perfect world, every traveler at every port of entry would get similarly close scrutiny. In the real world, however, that's impossible. The sheer volume of humans crossing borders every day -- some 30 million foreigners cross the United States' each month -- suggests that even where strict border controls are in place, not every traveler is going to get a careful look. What's more, immigration officers, like airline security personnel, tend to be underpaid and underprepared for the complexity of their job. There are 16 different versions of the United States passport alone in circulation. It takes a genuine passport scholar like Boucar to be able to detect the difference between a real and a fake passport from, say, Uzbekistan, not to mention whether every entry and exit stamp is authentic. As border traffic grows, then, often the only thing standing between a terrorist and downtown Manhattan is a database. The State Department and the I.N.S. share a vast system that contains, among other things, basic biographical information, like date of birth, of United States passport and visa holders. It also tracks blank stolen passports reported around the world as well as information about known terrorists and other high-level criminals. Every time a person enters the United States at one of the major ports of entry, his passport number is checked by the database. (At least it's supposed to be.) The I.N.S. also has a separate database called the Lookout system, which is its own record of stolen passports and intelligence information. These databases are useful tools, but they're still not foolproof. ''What you have to keep in mind,'' cautions Tom Furey, consul general at the United States Embassy in London, ''is the massive information overload.'' London is as good a place to see the strengths and weakness of this system as anywhere. The embassy there is one of the busiest in the world, issuing about 175,000 nonimmigrant visas a year to travelers from 188 different countries. It also issues 25,000 passports a year, mostly to United States citizens whose passports have been lost or stolen. I recently spent an afternoon in London watching the consular officers interview visa applicants, and I learned that the State Department's database is pretty good when it comes to basic information -- detecting, for example, whether an applicant's birth date matches his name, or determining if someone is lying about whether he has ever visited the United States before. Also, if he is traveling on a passport that was stolen, say, six months ago in a country that the United States has good relations with, he will probably be caught. But I also learned that there is a whole lot this database won't reveal. If a person has been convicted of a serious crime in another country, for example, it probably won't show up in the database. I watched one consular officer turn away a man who wanted to visit the United States after learning that the man had recently been convicted in England of sexually molesting his 8-year-old stepdaughter. The only reason the consular officer knew about it, however, was that the man brazenly told him about it when he was asked if he had ever been convicted of any crimes. Zacarias Moussaoui, the so-called 20th hijacker, recently indicted on six counts of conspiracy, was on a terrorist-watch list in France but was nonetheless able to enter the United States without question. When it comes to stolen passports, the situation gets even more complex. To begin with, not every country shares information about stolen passports with us. And even when they are reported, there is a time lag between when the passports are stolen and when they are reported stolen. In the Massoud case, Belgian authorities sent out a fax on the break-in in The Hague six days after the burglary; the alert about the Strasbourg theft didn't go out until almost six weeks after the break-in. In theory, the passport numbers should have been entered into databases immediately -- most people sophisticated enough to travel on a blank stolen passport know it needs to be used quickly. However, one antifraud investigator in the State Department says he was not aware of these stolen-passport numbers until ''the middle of the summer'' -- nearly a year after the passports were stolen. The closer you look, the scarier it gets. One example: Alain Boucar says that his database lists the numbers of 24,851 blank stolen Italian passports. Jim Hesse, a chief intelligence officer for the I.N.S., says that the United States Lookout system lists about 6,000. Why the discrepancy? Are there 18,000 stolen blank Italian passports drifting around out there that the United States doesn't know about? Or is Boucar's database wrong? Boucar insists that his numbers are accurate; Hesse trusts his. The only people who really know for sure are the Italians. ''We do not discuss stolen passports,'' a spokesman at the Italian Embassy in Washington says. Given these discrepancies, it's no surprise that the United States visa-waiver program has come under fire since Sept. 11. At a Senate hearing in October, a Justice Department official testified that during a review of a random sample of 1,067 passports stolen from visa-waiver countries, the Justice Department found that almost 10 percent had been used to enter the United States successfully. More than half of the stolen passports were not listed in the I.N.S.'s Lookout database. Of course, that's our problem, not Belgium's. It's easy to forget that when it comes right down to it, even a country like Belgium, with which the United States has a long and amicable relationship, sees this issue through an entirely different lens. Politically, Belgium now takes passport fraud seriously because it reeks of political corruption and bumbling bureaucracy -- not exactly the image the country wants to project. But practically, the loss of a few hundred passports here and there is hardly a matter of grave concern. After all, the people who usually use these passports are not coming into Belgium to wreak havoc there. Their crimes, whatever they are, are usually committed elsewhere. Like terrorism. It's chilling how often it is pointed out to me in Brussels that although terrorists may be passing through Belgium -- or using Belgium as a base of operations, or assuming Belgian identities to slip into other countries -- they aren't killing people or blowing up buildings in Belgium. ''Strictly speaking,'' boasts Glenn Audenaert, the plain-spoken chief of the Belgian federal police, ''Belgium does not have a problem with terrorism. You have a problem with terrorism.'' Jeff Goodell is the author of ''Sunnyvale: The Rise and Fall of a Silicon Valley Family.'' 4807 From: McIntyre Date: Fri Feb 15, 2002 6:08pm Subject: Black Hat Briefings (Vegas) Call for Papers Well folks, it's about that time. Papers and presentations are now being accepted for the Black Hat Briefings 2002 conference. The conference is held from July 31-August 1, 2002 at the Caesars Palace Hotel and Resort in Las Vegas, NV, USA. Papers and requests to speak will be received and reviewed until May 1, 2002. IPlease read the full announcement at: http://www.blackhat.com/html/bh-usa-02/bh-usa-02-cfp.html 4808 From: James M. Atkinson Date: Fri Feb 15, 2002 11:49pm Subject: NEW PUBLIC SAFETY APPLICATIONS AND BROADBAND INTERNET ACCESS AMONG USES ENVISIONED BY FCC AUTHORIZATION OF ULTRA-WIDEBAND TECHNOLOGY http://www.fcc.gov/Bureaus/Engineering_Technology/News_Releases/2002/nret0203.html Federal Communications Commission 445 12th Street, S.W. Washington, D.C. 20554News media information 202 / 418-0500 TTY: 1-888-835-5322 Internet: http://www.fcc.gov ftp.fcc.gov ------------------------------------------------------------------------ This is an unofficial announcement of Commission action. Release of the full text of a Commission order constitutes official action. See MCI v. FCC. 515 F 2d 385 (D.C. Circ 1974). ------------------------------------------------------------------------ FOR IMMEDIATE RELEASE February 14, 2002NEWS MEDIA CONTACT: David Fiske at (202) 418-0513 NEW PUBLIC SAFETY APPLICATIONS AND BROADBAND INTERNET ACCESS AMONG USES ENVISIONED BY FCC AUTHORIZATION OF ULTRA-WIDEBAND TECHNOLOGY Washington, D.C. - The Federal Communication Commission (FCC) adopted today a First Report and Order that permits the marketing and operation of certain types of new products incorporating ultra-wideband ("UWB") technology. UWB technology holds great promise for a vast array of new applications that have the potential to provide significant benefits for public safety, businesses and consumers in a variety of applications such as radar imaging of objects buried under the ground or behind walls and short-range, high-speed data transmissions. UWB devices operate by employing very narrow or short duration pulses that result in very large or wideband transmission bandwidths. With appropriate technical standards, UWB devices can operate using spectrum occupied by existing radio services without causing interference, thereby permitting scarce spectrum resources to be used more efficiently. This First Report and Order ("Order") includes standards designed to ensure that existing and planned radio services, particularly safety services, are adequately protected. The FCC will act vigorously to enforce the rules and act quickly on any reports of interference. The standards adopted today represent a cautious first step with UWB technology. These standards are based in large measure on standards that the National Telecommunications and Information Administration ("NTIA") believes are necessary to protect against interference to vital federal government operations. Since there is no production UWB equipment available and there is little operational experience with the impact of UWB on other radio services, the Commission chose in this First Report and Order to err on the side of conservatism in setting emission limits when there were unresolved interference issues. The Commission intends within the next six to twelve months to review the standards for UWB devices and issue a further notice of proposed rule making to explore more flexible standards and address the operation of additional types of UWB operations and technology. *Imaging Systems: Provides for the operation of GPRs and other imaging devices under Part 15 of the Commission's rules subject to certain frequency and power limitations. The operators of imaging devices must be eligible for licensing under Part 90 of our rules, except that medical imaging devices may be operated by a licensed health care practitioner. At the request of NTIA, the FCC will notify or coordinate with NTIA prior to the operation of all imaging systems. Imaging systems include: *Ground Penetrating Radar Systems: GPRs must be operated below 960 MHz or in the frequency band 3.1-10.6 GHz. GPRs operate only when in contact with or within close proximity of, the ground for the purpose of detecting or obtaining the images of buried objects. The energy from the GPR is intentionally directed down into the ground for this purpose. Operation is restricted to law enforcement, fire and rescue organizations, to scientific research institutions, to commercial mining companies, and to construction companies. *Wall Imaging Systems: Wall-imaging systems must be operated below 960 MHz or in the frequency band 3.1-10.6 GHz. Wall-imaging systems are designed to detect the location of objects contained within a "wall," such as a concrete structure, the side of a bridge, or the wall of a mine. Operation is restricted to law enforcement, fire and rescue organizations, to scientific research institutions, to commercial mining companies, and to construction companies. *Through-wall Imaging Systems: These systems must be operated below 960 MHz or in the frequency band 1.99-10.6 GHz. Through-wall imaging systems detect the location or movement of persons or objects that are located on the other side of a structure such as a wall. Operation is limited to law enforcement, fire and rescue organizations. *Medical Systems: These devices must be operated in the frequency band 3.1-10.6 GHz. A medical imaging system may be used for a variety of health applications to "see" inside the body of a person or animal. Operation must be at the direction of, or under the supervision of, a licensed health care practitioner. *Surveillance Systems: Although technically these devices are not imaging systems, for regulatory purposes they will be treated in the same way as through-wall imaging and will be permitted to operate in the frequency band 1.99-10.6 GHz. Surveillance systems operate as "security fences" by establishing a stationary RF perimeter field and detecting the intrusion of persons or objects in that field. Operation is limited to law enforcement, fire and rescue organizations, to public utilities and to industrial entities. *Vehicular Radar Systems: Provides for the operation of vehicular radar systems in the 24 GHz band using directional antennas on terrestrial transportation vehicles provided the center frequency of the emission and the frequency at which the highest radiated emission occurs are greater than 24.075 GHz. These devices are able to detect the location and movement of objects near a vehicle, enabling features such as near collision avoidance, improved airbag activation, and suspension systems that better respond to road conditions. *Communications and Measurement Systems: Provides for use of a wide variety of other UWB devices, such as high-speed home and business networking devices as well as storage tank measurement devices under Part 15 of the Commission's rules subject to certain frequency and power limitations. The devices must operate in the frequency band 3.1-10.6 GHz. The equipment must be designed to ensure that operation can only occur indoors or it must consist of hand-held devices that may be employed for such activities as peer-to-peer operation. Action by the Commission February 14, 2002, by First Report and Order (FCC 02-48). Chairman Powell, Commissioners Abernathy, Copps and Martin, with Commissioners Abernathy, Copps and Martin issuing separate statements. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4809 From: Steve Uhrig Date: Sat Feb 16, 2002 0:03am Subject: Security? Huh! This is something I posted to a Minox list when we got off on a security tangent. LX = the model of Minox camera I carry always. If anyone attempts to do penetration studies like this, make CERTAIN the person who hired you is instantly available by telephone, AND you carry the original of a dated and signed authorization specifically detailing why you are there and that you are authorized to do anything or possess anything in fulfillment of your contract. You do not want to spend a day in the local lockup while you wait for your lawyer to track down your client. I can promise you no one else will care nor will the system care in the slightest about contacting your client or taking care of medical needs or anything like that. ==================== I did a penetration study of a government facility within the last several days (no clues when or where). They knew it was going down on that day, but not by whom. I had not been in the building in months. They made a big show of checking my boot heels for the metal taps which of course tripped the metal detector, my largish belt buckle, X-rayed my aluminum cane, completely missed my black LX as I wrapped it in what looked like a well used handkerchief in their little wicker basket and none of them would lower themselves to inspect it. That LX could have been my Case pocket knife or, God forbid, a box cutter or nail file. I had an empty leather holster for a small revolver plainly visible on my belt. They didn't make a single comment on it. If I see an empty holster on someone, I damn well want to know where the weapon is (and in my opinion the safest place for it generally is in the holster). I was going to tell them I had left it in my truck to avoid problems and see if they would admit they had no security in the parking garage nor ID of particular cars. Neither did anyone think to question my carry permit, none of which are valid in DC. After passing these heavy layers of security without incident, I went into the men's room on the first floor and lowered down through the window some string I had previously wrapped around my upper forearm. I had a confederate outside the building tie a pistol-shaped TV remote control to the line and I pulled it back up into the men's room. Previously I had placed a paper label on the remote saying 'this could have been a weapon'. I left it on the CSO's (Cognizant Security Officer's) desk. And I'm not even clever, neither was I slipping Fatimah a hundred bucks to conceal something for me. As an experiment, I did shaving cream several video cameras along my route, and in the hour or so I was in the building, no one bothered to inspect them. The shaving cream was very visible and the facility was in full swing. I dragged a trash can over and stood on it to shaving cream the one camera. Later in my after action report, the cameras merely had been written up to be checked the next day for proper operation by the technicians. I carried the can of shaving cream in my briefcase, and no one questioned that, which is suspicious considering I have a full beard. If I had really been trying to impress the place, I would have read the frequencies of their small area coverage (radio) repeater, and programmed a potent mobile radio in my van to jam coverage of their commo system. I am positive they had no backup, and the only frequency they had other than the repeater was talkaround on the repeater output, and in that building talkaround had no range. I also could have put out a decoy call of some sort and diverted the majority of security to the other end of the facility. I knew it would work and frankly it was not necessary to prove it. The door to the telephone closet was unlocked. I walked in and stole the SMDR report from the printer. I could, in seconds, have disabled all internal and external phone communications into and out of the facility. With a bit more effort I could have jammed their cell phones. It's all eyewash. Security is nonexistent. It's a bank vault door on a grass hut. Although I am not willing to do it as a pure experiment to prove a point, I am virtually certain I could arrange to gain access to a handgun inside the secured area of any public airport in the country. Federalizing security is a BIG mistake. Name one thing the government does properly and efficiently. There may be a few things where they are reasonably effective, like Secret Service dignitary protection, but certainly not efficient. Pay the contractors so they can afford to hire decent people, rework procurement so 250,000 hour a year contracts are not won and lost on a nickel an hour, mandate some training standards, equipment standards, and work out something like bonuses to the officers who have the minimum number of sick days in a quarter or a year, a substantial cash award to the shift with the lowest vehicle expenses. give the Captain on each shift a bunch of signed $50 checks he could hand out at his discretion to officers showing some pride in their appearance, attentiveness to their work and courtesy to visitors, etc. I could write a program like this on contract, we'd have reasonable security and it would be FAR cheaper than the federal government could pull it off. I could go on and on. But you don't want to hear it. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4810 From: A Grudko Date: Sat Feb 16, 2002 3:35am Subject: Photo Radar Countermeasures * Serious stuff first then some related weekend black humour: 1) We had a product on sale here for a few months which actually defeated the dreaded speed camera. First, I'm not a speed devotee on public roads. Even before my car accident (caused by a speeder on the wrong side of the road) I was a fairly conservative driver. Secondly, as a former LEO and Porsche Club weekend race driver there are clearly times when it is appropriate to drive fast - if you have the skill. So I do not promote speeding. As jma said, the best defence is to not break the law. This being said, the product was a (approx) 5mm thick number plate cover made of a clear material with (I guess) micron thin black vertical stripes through the thickness, spaced about 5mm apart. Viewed from 0 degrees (i.e. directly behind) on you could clearly read the licence number, but as you moved left or right the vertical stripes occluded the plate until you got to 45 degrees, when it blacked out. As the roadside cameras photograph at an angle these plate covers worked. 2) To my knowledge radar/laser detectors are not illegal here in SA and they are openly on sale. I don't use one but I did test one about 5 years ago. This model gave off frequent false alarms which I concluded were caused by the microwave links between GSM cell phone masts. - Original Message - > Actually, Spain is the most dangerous place to drive an automobile in the world. I'd challenge that :-) . I've driven in Spain and felt perfectly safe compared to Johannesburg. Not only do we have horrendous accidents (over 10 000 people killed a year on the roads) , we have a phenomenon known as the 'Kombi Taxi'. This creature is a mutated 9 seater mini bus which somehow seats up to 22 people. * It does not require brakes, mirrors, licence plates, a silencer (muffler), lights or a qualified driver. Windows and body panels are optional. * It can operate continually for 18 hours a day and never needs a service. * Repairs are done at the roadside by mechanics who qualified in a prison workshop and who know how to make a Toyota part work on any other make. * The tyres do not require any tread and the spare was traded for a tank of petrol. * The only required controls are the accelerator and the horn. This amazing vehicle can drive on sidewalks and in emergency lanes, reverse at high speed out of a traffic jam, cross fields, drive through roadside fences, go the wrong way down a one way street. But there is a more serious side to our taxi industry. In Spain, do you have taxi drivers carrying unlicensed AK47s & 9mmps? We do - and they use them! So called taxi wars flare up between rival groups/companies which result in dozens of dead passengers and bystanders every year. A terrible testimony to man's greed and inhumanity. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time a 4811 From: A Grudko Date: Sat Feb 16, 2002 5:56am Subject: Re: Security? Huh! - Original Message - > If anyone attempts to do penetration studies like this, make CERTAIN the > person who hired you is instantly available by telephone ABSOLUTLY - '97 I was tasked with obtaining possible evidence from a Johannesburg hotel room occupied by my client's employee at their cost, so we had legal right of access to the room given reasonable expectations of privacy etc. 3 days in a row I gained access with no problem, but the evidence was not there. Day 4 a security guard caught me. There was no way I'd assault a guard so we went to the security manager, who did not buy my story. I phoned but the client was in a meeting! I got through to my wife and told her to penetrate the corporate veil - fast ! Meanwhile the police appeared, cautioned me, took my firearm (which I had volunteered). Ten minutes later the client 'phoned and it was all sorted out and I was released. >> You do not want to spend a day in the local lockup while you wait for your lawyer to track down your client. Been there twice, luckilly a 'private suite' both times (I don't want toshare a cell with a Mike Tyson clone). On occasion 2, in 1990, I told the jailer I was carrying a handgun. His answer, 'You won't do anything stupid will you?'. I spent 1.5 hours in Krugersdorp lockup with a loaded 15 shot 9mm on my hip!! > ...could have been ... God forbid, a box cutter or nail file. Coming soon - worldwide registration of Martial Arts practitioners. If you have trained in Judo, Karatie, etc, Wrestling or Boxing you will not be allowed to fly unless you are a member of the WWF, 'cos then we know you're a fake and no threat to national security in Lesotho (small African country). > I had an empty leather holster for a small revolver plainly visible on my > belt. They didn't make a single comment on it. If I see an empty holster > on someone, I damn well want to know where the weapon is... So now you expect logic from airport security? Oy Vey! About 4 years ago singer Michael Jackson arrived at Johannesburg International Airport.As he got off the plane dozens of creaming teenage girls appeared, having somehow penetrated security. If teenage girls can do it who else can? (Things may have improved since we worked at JIA) Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time > And I'm not even clever, neither was I slipping Fatimah a hundred bucks > to conceal something for me. > > As an experiment, I did shaving cream several video cameras along my > route, and in the hour or so I was in the building, no one bothered to > inspect them. The shaving cream was very visible and the facility was in > full swing. I dragged a trash can over and stood on it to shaving cream > the one camera. Later in my after action report, the cameras merely had > been written up to be checked the next day for proper operation by the > technicians. I carried the can of shaving cream in my briefcase, and no > one questioned that, which is suspicious considering I have a full beard. > > If I had really been trying to impress the place, I would have read the > frequencies of their small area coverage (radio) repeater, and programmed > a potent mobile radio in my van to jam coverage of their commo system. I > am positive they had no backup, and the only frequency they had other > than the repeater was talkaround on the repeater output, and in that > building talkaround had no range. I also could have put out a decoy call > of some sort and diverted the majority of security to the other end of > the facility. I knew it would work and frankly it was not necessary to > prove it. > > The door to the telephone closet was unlocked. I walked in and stole the > SMDR report from the printer. I could, in seconds, have disabled all > internal and external phone communications into and out of the facility. > With a bit more effort I could have jammed their cell phones. > > It's all eyewash. Security is nonexistent. It's a bank vault door on a > grass hut. > > Although I am not willing to do it as a pure experiment to prove a point, > I am virtually certain I could arrange to > gain access to a handgun inside the secured area of any public airport in > the country. > > Federalizing security is a BIG mistake. Name one thing the government > does properly and efficiently. There > may be a few things where they are reasonably effective, like Secret > Service dignitary protection, but certainly > not efficient. Pay the contractors so they can afford to hire decent > people, rework procurement so 250,000 hour > a year contracts are not won and lost on a nickel an hour, mandate some > training standards, equipment > standards, and work out something like bonuses to the officers who have > the minimum number of sick days in > a quarter or a year, a substantial cash award to the shift with the > lowest vehicle expenses. give the Captain on > each shift a bunch of signed $50 checks he could hand out at his > discretion to officers showing some pride in > their appearance, attentiveness to their work and courtesy to visitors, > etc. I could write a program like this on contract, we'd have reasonable > security and it would be FAR cheaper than the federal government could > pull it off. > > I could go on and on. But you don't want to hear it. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4812 From: A Grudko Date: Sat Feb 16, 2002 4:43am Subject: Re: NY Times: How to Fake a Passport (10-Feb-2002) - Original Message - From: Justin T. Fanning > How to Fake a Passport >> This is probably some kind of record, although other problem > countries, like Italy, Argentina and South Africa, refuse to confirm > numbers. In the mid 90s we investigated fake IDs and passports used to get contracts for our emerging cellphone business. Corrupt government officials were issuing totally genuine, usable documents (someone else's name, your photo) for: SA ID - SAR 50 ($9 then) SA Passport - SAR 500 ($90 then) And it goes on today. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time 4813 From: Shawn Hughes Date: Sat Feb 16, 2002 11:24am Subject: Re: Digest Number 861 Mike, The ability to detect RADAR detectors does exist in the United States. Jurisdictions that forbid the use of detectors, and commercial vehicle enforcement guys have them. I forget the actual name brand, (I think Decatur Electronics is one) but my understanding is that it picks up the signature from the, uh, I want to say tank circuit, but I think it may actually be a mixer oscillator circuit. [ Been a while since I studied transmitter theory. Sorry. :O( ] Anyway, it's sensitive to those emissions like the detectors that can pick up the bias oscillator in a fancy tape recorder. Never used one in the field, suppose it has very mixed results. Something else, too; I don't know if it's been mentioned, even if the items did work, FCC says that anything that intentionally intereferes with an authorized transmission (e.g., RADAR / LIDAR) is illegal, and could get you in trouble for possessing. Shawn 4814 From: Justin T. Fanning Date: Sat Feb 16, 2002 7:14pm Subject: WSJ: The spy next door (Told you my next posting would be more on track... JF) http://www.news-observer.com/monday/business/rtp_nc/Story/909513p-907182c.html The spy next door By BROOKS BARNES, February 11, 2002 The Wall Street Journal Most days, Cindy Sciacca spends her free time at home baking, canning vegetables and finger-painting with her daughter. So why is this mild-mannered Mom buying a miniature video camera to install inside her mailbox? "If there's a terrorist living on my block," says the accountant assistant in Ukiah, Calif., "I'm sure not going to wait to hear about it on the news." Close the curtains: Americans are taking surveillance to a whole new level. Driven by newfound suspicions after Sept. 11, a small but quickly growing number of freelance spies are installing gadgets that were unheard of in the home even a year or so ago -- and whose prices are surprisingly low. Those tiny earphones that Secret Service members use? They're on sale for about $60. Other companies are selling transmitters that track the whereabouts of the family car, gadgets that detect phone taps and video cameras thin enough to slide under doors. One company even offers a lie detector for the home. In all, sales are up 30 percent to 60 percent since last year at spy-gear stores across the country, helping turn security and surveillance into a $5 billion industry. Los Angeles' Bolide International says it has sold 3,200 Spycams in the past two months -- double the number at this time last year. Counter Spy Shops -- a chain that sells everything from $800 sew-on tracking devices to that $4,900 "portable truth machine" --saw orders triple this fall. And SpyWorld, in Carson City, Nev., says sales of counterspy products -- they help you figure out if someone's watching you -- are up 20 percent since September. Of course, all of these gadgets have strong detractors among private citizens and privacy experts. And while there are legal uses for these products, some also have applications that are against the law in many states. On a more practical level, some would-be James Bonds have discovered that the devices either don't work well, or that it's really not worth snooping in the first place. (That camera in Sciacca's mailbox that was supposed to flush out terrorists? It caught the neighbor's black Lab digging in her yard.) Still, a growing number of buyers are giving these devices a try, if only because the drumbeat of upsetting news, from terrorism and anthrax to war, has heightened fears. "The paranoia levels right now are absolutely staggering," says Andrew Moe, owner of Spycam Surveillance Equipment in San Diego. In the past, people couldn't have responded this way; spy cameras, tiny recorders and night-vision goggles either hadn't been developed for home use or were prohibitively expensive. Now they're being snapped up by everyone from security-minded homeowners to mistrusting spouses. Parents are taking to them as much as any group to make sure their children are safe -- or at least doing what they're told. Among the hot sellers: a tiny $800 chip that slips into a backpack and transmits junior's whereabouts to a hand-held device back home. There's also The Ghost, a finger-size microphone that catches conversations clearly, even from inside a shirt pocket. And for the ultimate 007 experience, a company called Armortek International will outfit your car to lay down tacks, tear gas or oil slicks, or shock whoever touches the door. "We sell about 20 or 30 cars with all the bells and whistles each year," says Armortek owner Clint Murphy. (Most go to South America, he says, but a handful stay in the United States.) Mike O'Bannon's spy arsenal was far more modest. The Bakersfield, Calif., software salesman used KeyKatcher, a $59 device that tracks activity on a computer keyboard, to find out that his teenage son Matt was skipping school. (Matt had e-mailed a friend about his plans to spend second period in a city park.) "My son was a little surprised to see me at the park, too," O'Bannon says. "He still has no idea how I busted him." Is all of this legal? Surprisingly, the government doesn't provide as much protection as you might think: Parents can track minor children, and videotaping in your own home, property or business is almost always legal -- even without the subject's knowledge, says Los Angeles privacy lawyer Scott Feldmann. How about recording phone conversations? Everyday folks can do it in 41 states -- as long as one of the parties knows the call is being recorded. (The strictest state: Massachusetts, where secretly recording a conversation can come with a $10,000 fine and a five-year prison term.) Before the terrorist attacks, many states were working to beef up spying laws, but busy lawmakers have put much of that legislation on the back burner. For now, average citizens who dabble in covert surveillance are more likely to face civil lawsuits on other charges -- privacy violations, trespassing or even burglary. In one closely watched case a landlord in Bay Shore, N.Y., was arrested in November for allegedly planting a camera disguised as a smoke detector in a female tenant's bedroom. The charge: burglary. The landlord's lawyer denies any wrongdoing on his client's part. As far as the busy spy shops are concerned, virtually every retailer has a policy that boils down to: We just sell the stuff. "Macy's sells knives," says Arielle Jamil, a general manager for Counter Spy Shops. "But you can't sue Macy's if somebody stabs you with it." Using surveillance devices without breaking the law, she says, is "the customer's responsibility." Legal issues aside, sometimes the results are disappointing. Motion detectors can be set off by a rogue tricycle. Lie-detector experts say at-home tests are easy to fool. And you better hope your husband doesn't go to have his oil changed if you have a tracking device installed under his car. While most spy-gadget retailers and manufacturers concede that some devices require careful use, they defend their products. Besides, says Howard Goldman, whose company makes and sells under-the-car tracking systems, most mechanics "aren't observant enough to notice" the transmitters. And of course, critics ranging from psychiatrists to privacy advocates say routine use of surveillance devices is paranoid, unhealthy and generally creepy. "It's not anywhere close to acceptable behavior in a civilized society," says Jeffrey Rosen, author of "The Unwanted Gaze" and a constitutional-law professor at George Washington University. "This orgy of voyeurism is hardly justified by fears about security." So what do you do if you're afraid of being spied on? Well, there's always counterspying. Dwight Des Rosiers, a helicopter pilot in Anchorage, Alaska, bought a $35 software program that helps him scour government-agency databases for his name. "These days," he says, "the government is spying on us all." And then there's Thomas Crowley, a bartender at New York's Bar 89 restaurant. He recently discovered that, with advancing technology making these devices cheaper and easier to hide, almost anything's possible in the spy game. There are even video cameras in neckties, like the one Crowley recently went shopping for ($500, in paisley). What will he do with it? "Wouldn't you like to know?" he says. 4815 From: Fernando Martins Date: Sun Feb 17, 2002 8:12am Subject: Sicur 2002 http://www.sicur.ifema.es/default_i.html Anyone going to Madrid, 26 February - 1 March? SICUR 2002 - The 13th edition of the International Security, Safety and Fire Exhibition will take place at the Juan Carlos I Exhibition Centre between 26th February and 1st March. SECTORS . Security against intrusion, robbery and aggression . Fire Prevention, detection and extinction . Safety and hygiene at work. . Traffic and Transport security and safety . Natural risk control services and equipment . Nuclear safety and Security. . Security in Information Systems. . Institutions and Agencies . Specialized literature FM 4816 From: Fernando Martins Date: Sun Feb 17, 2002 7:17am Subject: RE: NEW PUBLIC SAFETY APPLICATIONS AND BROADBAND INTERNET ACCESS AMONG USES ENVISIONED BY FCC AUTHORIZATION OF ULTRA-WIDEBAND TECHNOLOGY I have some questions about this ... My interest is in the use of UWB for surveillance systems. a) Where can I get more technical details about UWB? b) What most likely vendors will have this kind of new products sooner? c) What kind of technics an intruder may use against this defense? d) What complementary defenses should be applied? Thanks in advance for any answers FM 4817 From: James M. Atkinson Date: Sun Feb 17, 2002 8:03pm Subject: CIA Showcases Array Of Spy Gadgets http://www.guardian.co.uk/uslatest/story/0,1282,-1525936,00.html CIA Showcases Array Of Spy Gadgets Sunday February 17, 2002 7:40 PM SIMI VALLEY, Calif. (AP) - For the first time, the public is getting a large scale view of the CIA's and KGB's real-life James Bond gadgets, from a replica of the Russians' deadly poison-dart umbrella to some of the Amercians' most ingeniously concealed cameras. The exhibit, which opened to the public Sunday at the Ronald Reagan Presidential Library, includes dozens of items borrowed from the CIA's collection in Langley, Va., many of them never before shown to the public. ``Questions have been asked about why we invest so much money in the intelligence community,'' said Lloyd Salvetti, director of the CIA's Center for the Study of Intelligence. ``We thought we should team with the president's library to get out our message about why we exist.'' The exhibit also includes items from private collector Keith Melton, and features some fictitious materials, as well. There's the shoe-phone Don Adams, as secret agent Maxwell Smart, wore in the 1960s television comedy series ``Get Smart,'' and the Dr. Evil ring Mike Myers wore in the film ``Austin Powers International Man of Mystery.'' Also on display is a pair of Diana Rigg's leather pants from the hit British TV spy series ``The Avengers.'' The real spy equipment dates as far back as the Revolutionary War. Among the cameras on display is one from 1885 that could be concealed on a person's body. Others, from World War I, were mounted on carrier pigeons. A popular Cold War version slipped into the back of a leather glove. The world's first microdot, a document shrunken down to a tiny point, is also on display. It dates back to 1852. >From the early days of the CIA's predecessor, the Office of Strategic Services, there are tire spikes, bombs and ``liberator pistols.'' The latter were mass produced for $1.72 each and dropped to resistance fighters during World War II. ``Some of the very same techniques used during World War II are being used in Afghanistan today,'' said Toni Hiley, curator of the exhibit and of the CIA museum at Langley, though she declined to elaborate. Spy gadgets from the other side are on display as well, including a replica of a large wooden seal of the United States that was a gift from the Soviet Union to Moscow's U.S. Embassy in 1945. It hung over the ambassador's desk for seven years before the listening device was discovered. Many of the gadgets used by the Soviet Union and the United States look remarkably similar. But one device CIA officials say they never had was a version of the KGB's deadly umbrella that was used by an unknown assailant to kill Bulgarian dissident Georgi Markov in London in 1978. A model of the umbrella is part of the display. The pinnacle of the display, Salvetti said, is the leather binder in which the president receives his daily intelligence reports. Until the early 1990s, the very existence of such briefings was classified. The empty binder is on loan from the White House for the length of the exhibit, which runs until July 14. ^--- On the Net: Reagan Library: http://www.reaganlibrary.net/ CIA: http://www.cia.gov/ Guardian Unlimited © Guardian Newspapers Limited 2002 -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4818 From: David Alexander Date: Mon Feb 18, 2002 2:52am Subject: dangerous drivers >From: DrPepper >Subject: Re: Photo Radar Countermeasures > >Actually, Spain is the most dangerous place to >drive an automobile in the world. >The seem to have no sense of danger out on >the highways, and lethal accidents are very common > Try Rome, I wouldn't set out into that traffic in anything less well protected than a Main Battle Tank. Oh, and a lot of Prozac... _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4819 From: David Alexander Date: Mon Feb 18, 2002 3:23am Subject: re: radar detectors It doesn't matter how good your detector is, they will still get you... This is a true story: About 12 years ago I was talking to an American drag-racer friend of mine who boasted that the cops couldn't get him for speeding. He said he had a police radio scanner, another on the helicopter frequency, a radar detector and a CB. That would warn him of anything. A few months later I saw him again and he told me "The b*stards got me in New Mexico with a stopwatch and I lost my licence" I would be lying if I said I had not laughed till I cried. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4820 From: Michael Puchol Date: Mon Feb 18, 2002 8:23am Subject: Re: Photo Radar Countermeasures > Actually, Spain is the most dangerous place to > drive an automobile in the world. > The seem to have no sense of danger out on > the highways, and lethal accidents are very common I'd actually say it's Portugal, aswell as a good number of African countries. In Portugal the method seems to be that if you drive slow, you do so half-side of your car into the curb - thus leaving a 'virtual' third lane where fast traffic can overtake, even in bends with NO visibility. This way they can fit three cars in the space meant for two.... Another interesting thing I've observed is that, having spent several years in the UK, and having seen that the driving there is a LOT more sensible than in Spain, you really must see English tourists with rented cars in the Balearic islands - they are even more reckless than the locals (also applies to tourists from other countries, not just the UK). Logic dictates either that: a) The air in Spain has something that turns calm and law-abiding drivers into complete maniacs. b) The laws in the UK and other EU countries are much more strict AND they are enforced. I'd go for b) - in Spain it's very easy to get away with traffic violations. Most people just don't pay fines, and as the system is really slow, they end up forgotten. Until the new law came in effect a couple of weeks ago, if you killed someone with a car while driving recklessly, you'd get at the most a six-month suspension of your license - which is pathetic. All the best, Mike 4821 From: Ed Naylor Date: Mon Feb 18, 2002 11:31am Subject: ULTRA WIDEBAND UPDATE /5/ ZDNet http://zdnet.com.com/2100-1105-839310.html Ultrawideband: Rescuers left in the lurch? Ben Charny February 15, 2002 Firefighters and law enforcement agencies are likely the losers from this week's Federal Communications Commission decision allowing the sale of products based on ultrawideband, a superfast wireless signal. When the FCC on Thursday decided to make ultrawideband (UWB) available commercially, it set a limit on how powerful the signal can be. The FCC explained the limitations were to help allay fears that UWB's powerful signals would interfere with military operations or broadcasts from television and radio stations. As a result, companies like Florian Wireless and Time Domain say the UWB equipment they are each developing for rescue workers, with some already in trials, won't be powerful enough to be of much use. [[part of item deleted]] An FCC spokesman could not be reached for comment Friday. Some FCC sources acknowledge the new rules might weaken the signal's strength, but they are unsure if companies have conducted appropriate tests. UWB technology provides a faster and more secure way of sending wireless transmissions. Automakers could use the technology to build collision avoidance systems or improve airbags. Consumer products, from laptops to personal digital assistants, could use the equipment to send and receive video or audio. One of its other proposed uses was for fire and rescue personnel. The powerful UWB signal can chew through flames, smoke and building materials to provide the firefighter's three-dimensional location at all times, and it can be used to help map the inside of a burning building. It also sends back the firefighter's heart rate, and the temperature around him, which can be used to decide firefighting tactics. Houston rescue workers have been using UWB technology in trials, and Time Domain was granted a waiver by the FCC in 2000 to sell 2,500 of its "Radar Vision" equipment to law enforcement agencies. "Radar Vision" uses UWB signals to spot motion behind walls, giving an edge to officers confronting a hostage situation, for instance. A handful of police agencies are testing UWB equipment now, with the aim of possibly using it in the future. But "the products they have now won't be legal to operate under these rules," Ross said. The company doubts that the equipment they've been developing will be as effective under the FCC's new rules, Ross said. UWB wireless networks now won't be able to pinpoint someone's location as effectively, Florian Wireless Chief Executive Brian Valania said. [[part of item deleted]] Houston rescue workers were expected to start using this equipment from Florian Wireless by May or June of this year, he said. He doesn't know if the deal will go forward. © 2002 (ZDNet) CNET Networks, Inc. -- -- -- -- -- 4822 From: Michael Puchol Date: Mon Feb 18, 2002 4:21pm Subject: Re: Sicur 2002 Well, for anyone that is going, there should be a demo of the vehicle tracking system I developed in the Kenwood stand - a good friend & colleague of mine will be at the stand, as I will be busy having my first baby boy (well, my wife will be having it, I will be fainting around the room I guess) - scheduled arrival on the 28th of Feb :-)) Cheers all, Mike ----- Original Message ----- From: "Fernando Martins" To: Sent: Sunday, February 17, 2002 3:12 PM Subject: [TSCM-L] Sicur 2002 > > http://www.sicur.ifema.es/default_i.html > > Anyone going to Madrid, 26 February - 1 March? > > SICUR 2002 - The 13th edition of the International Security, Safety and > Fire Exhibition will take place at the Juan Carlos I Exhibition Centre > between 26th February and 1st March. > SECTORS > . Security against intrusion, robbery and aggression > . Fire Prevention, detection and extinction > . Safety and hygiene at work. > . Traffic and Transport security and safety > . Natural risk control services and equipment > . Nuclear safety and Security. > . Security in Information Systems. > . Institutions and Agencies > . Specialized literature > > FM > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4823 From: Date: Mon Feb 18, 2002 5:30am Subject: Driving I would nominate Saudi Arabia as the worst with children driving high power cars. And a total disregard of speed limits, etc. Whatever Allah wills is the norm, if he wants you to have an accident you will. As far as tourists go the adage only 2 cars can go anywhere, A Range Rover and a hire car. Brian [Non-text portions of this message have been removed] 4824 From: Date: Mon Feb 18, 2002 3:39am Subject: Re: Photo Radar Countermeasures > Actually, Spain is the most dangerous place to > drive an automobile in the world. > The seem to have no sense of danger out on > the highways, and lethal accidents are very common If there was one place to avoid, I would say it's Egypt. I believe their drivers test is to drive 15 feet forward, 15 feet in reverse. I think I read it in the Guinness Book of Records as the easiest drivers test. Robert Pickett Pickett Investigative Agency 503-589-0268 or 866-589-4 A PI (4274) http://www.pickettinvestigativeagency.com We accept PayPal! 4825 From: James M. Atkinson Date: Mon Feb 18, 2002 6:33pm Subject: Focus-Spy tech goes on show http://uk.news.yahoo.com/020218/80/cshc6.html Monday February 18, 01:11 PM Focus-Spy tech goes on show By Kevin Krolicki LOS ANGELES (Reuters) - Hollywood loves a good spy and the feeling is mutual -- now the studios and "The Company," as the CIA is sometimes known, are marking more than a half-century of mutual fascination with the largest public display ever of spy gadgets, both real and imagined. The exhibit, which opened at the Ronald Reagan Presidential Library near Los Angeles on Saturday, ranges from the whimsical to the deadly, everything from the shoe phone made famous by Don Adams in the TV show "Get Smart" to a KGB umbrella used to shoot poison-tipped darts of a kind once used to assassinate a Bulgarian dissident in London. The show, "Secrets from the CIA, KGB and Hollywood," also includes the tarantula that threatened James Bond in "Dr. No," Emma Peal's leather pants from "The Avengers," and a 19th century spy camera designed to be strapped to a pigeon. The blend of fact and fiction is fitting, given the way that the Cold War clandestine productions sometimes followed the lead of the celluloid spooks and sometimes anticipated them in ways that their Hollywood creators never imagined. THE SPY WHO CAME IN FROM THE MOVIES "Many of the people who work for the CIA grew up on these spy shows just like I did," said Danny Biederman, a screenwriter, whose lifelong fascination with the genre prompted the collection of more than 4,000 props and gizmos on partial display. Biederman loaned his souvenirs to the CIA two years ago for an eyes-only exhibit at the agency's headquarters in Virginia. Now, the CIA museum (motto: "The Best Museum You've Never Seen") has taken that show to the public at the Reagan Library, along with a sampling of spy artifacts from the National Archives and the private collection of Keith Melton. The real-world spy gear on display ranges from a hollowed-out bullet used during the America Revolution to hide secret messages to a replica of an elaborate carved seal presented by the Soviet Union to the U.S. Ambassador shortly after the Second World War, complete with hidden listening device. "There's a progression here of the development of the technology of espionage," said Lloyd Salveti, the director of the CIA's Center for the Study of Intelligence, on hand for the exhibit opening in Simi Valley, California. The CIA's purpose in sponsoring the exhibit is to stress the role the intelligence service has played in presidential decision-making, Salvetti said. To that end, one of the binders used for President George W. Bush's daily CIA briefings is on hand, emptied of course of its sensitive contents. But the bigger question raised by the exhibit may be how much the Hollywood spy genre borrowed from events and where it anticipated or shaped the way the spy game has been played. British author Ian Fleming, who created the archetypal spy in James Bond, had also been a British naval intelligence officer, an important precedent in blurring the lines between modern spy fact and fiction, Biederman said. Or consider that the CIA's real-life Office of Technical Services, where covers are created and a new generation of spy gadgets made, has a creative motto that would make any movie studio proud: "Imagine what is possible -- then prepare to be amazed." CLOAK AND DAGGERS Spies have even played movie people, most famously in 1979 when Iranian militants stormed the U.S. Embassy in Tehran and held some 50 hostages. As the incident unfolded, six U.S. diplomats managed to find refuge in the nearby Canadian Embassy, prompting a successful CIA-directed plan to smuggle them out by sending agents into Iran disguised as a film crew. "This would not have been possible without the close cooperation of the patriotic people of Hollywood," said Salvetti. Biederman, who lives in Los Angeles with his wife and three children Ilya, Moriah Flint and Bond all named for fictional spies, said some in the agency also shared his love for TV classics like "The Man from U.N.C.L.E." Some CIA agents told him that in the 1960s, "they would be watching 'Mission Impossible' and saying 'Why can't we come up with something like this?'" -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4826 From: Robert Dyk Date: Mon Feb 18, 2002 9:08pm Subject: ISDN Polytel System While out this evening I discovered a bridge tap set up on a PolyTel video conferencing system. The bridge was built out in a telephone closet from the 3 ISDN lines that were connected to the video conferencing system. The bridges were terminated on a BIX RJ11 adapter block with three phone cords (one per line) still connected. No other hardware was present. The original patch from the vertical system to the horizontal cabling was intact with the secondary loops punched over top of the original patch, (not allowed on a BIX setup). I can only think of illegitimate reasons to do this. Is anyone on the list familiar with the Polytel and or what is required to compromise the video conference on this triple bonded ISDN setup. Thanks in advance for any input. Robert Dyk dyk@c... 4827 From: tek492p Date: Mon Feb 18, 2002 11:05pm Subject: Re: ISDN Polytel System --- In TSCM-L@y..., "Robert Dyk" wrote: The > bridges were terminated on a BIX RJ11 adapter block with three phone cords > (one per line) still connected. No other hardware was present. Could this (RJ11 adapter block) be used for testing purposes, and not an actual bridge tap? Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 4828 From: Date: Mon Feb 18, 2002 7:03pm Subject: counter countre measures From a NMA member, REPOSTING This is a warning for all radar detector users. The NMA recently learned that there is a new wave of radar detector detectors on the market. These devices actually exceed the capabilities of the previous VG-2 detector. This new technology is enabling law enforcement to detect your radar detector. We realize this may not be a problem to most drivers. However, this can be a big problem for commercial truck drivers (who are prohibited by federal law to utilize radar detectors) and to anyone traveling in Virginia, Washington DC, and some parts of Canada. These areas prohibit the use of radar detectors and with this new technology, the police will know if you have one or not. While this is not earth shattering news, the NMA hopes that this will help drivers avoid the citations in areas where detectors are prohibited. Eric Skrum Communications Director National Motorists Association 608/849-6000 nma@m... www.motorists.org Advocating, Protecting, and Representing the Rights of North American Motorists 4829 From: Steve Uhrig Date: Tue Feb 19, 2002 0:14am Subject: Absolutely outrageous The security industry has some of the most incredibly ignorant morons imaginable. I happened to notice this in the wire services a few minutes ago. I am literally speechless. Maybe for the first time in my life. Has the industry come to this? The following was on the tail end of an article about some guy who got caught with some firecracker type pyros at LAX (Los Angeles International). ==================== "In an unrelated incident at New York's La Guardia Airport, a flight that had left for Cleveland was forced to return after it was discovered a passenger was not properly screened. A concourse was evacuated and everyone was screened again." ==================== Whomever is in charge of Security at La Guardia ought to work the rest of his live in irons to pay for the waste of money, time, and most of all the inconvenience to the passengers on this flight. Make me emperor and I'd have him in a pillory 24 hours a day in the main terminal. And there'd be an ample supply of baskets full of rotten fruit. Maybe I'd put him in a cage in series with the septic system. If I had the money, I'd start an airline where I'd issue weapons to passengers who wanted them. Since we'd be off the ground and out of their jurisdictions, I would thumb my nose at any government comments. And my airline would be the safest one in the world. A CONCOURSE was evacuated? The idiot who made that decision could get the same warm wet feeling by wetting his pants. ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4830 From: Lt. Aaron D. Osgood Date: Tue Feb 19, 2002 7:28am Subject: Polytel Could be that the in house "Phone Guy" doesn't understand ISDN and went looking for dial tone in the wrong places. Aaron D. Osgood Omega Services ? Wired & Wireless Telecommunications Consulting ? Telco Vendor Relations Management 67 Field Road Falmouth, ME 04105 TEL: 207-781-7441 FAX: 207-781-8067 E Page: 2078315829@m... AlphaPage: 888-413-3030 PIN 19589# OzCom@m... 4831 From: James M. Atkinson Date: Tue Feb 19, 2002 8:00am Subject: British marines invade Spain by mistake British marines invade Spain by mistake Story filed: 14:27 Monday 18th February 2002 Press Association/Ananova Defence chiefs have apologised after a detachment of British commandos accidentally "invaded" Spain. The 20 Royal Marines, based near Arbroath, roared up a beach in their amphibious landing craft and leapt ashore brandishing assault rifles and mortars. Bemused Spanish fishermen in the town of La Linea de la Concepcion watched as 45 Commando began deploying tactically in the sand. In the end, two local policemen took it upon themselves to point out to the marines that Gibraltar - the intended target of their seaborne landing exercise - was actually a little further on down the coast. There was apparently a brief flurry of apologies from the red-faced commandos before the men jumped back into their craft and motored further south. The gaffe comes at a time of delicate negotiations over the future of Gibraltar, which was taken by Britain in 1704. Nine years later The Rock was ceded to Britain for ever under the Treaty of Utrecht. A Ministry of Defence spokesman said the "regrettable" incident happened during an exercise by Royal Marines travelling on HMS Ocean, the Royal Navy's helicopter and commando carrier. "In the course of the exercise, a landing craft meant to land in Gibraltar, but made it a few yards down the beach, on the Spanish side," he said. "There is much embarrassment, the error is regretted and lessons have been learned. They were informed of their error by local policemen and spent only about five minutes on the beach." He added: "We were not trying to take Spain and have no plans to do so." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4832 From: Robert Dyk Date: Tue Feb 19, 2002 8:07am Subject: RE: Absolutely outrageous Steve, Thank you for being the voice of reason in a sea of ignorant paranoia. If you form the airline, I'll buy the first ticket... Robert Dyk dyk@c... From: John McCain Date: Fri Feb 16, 2001 4:09pm Subject: RE: Cell phones (Getting off topic..) Yep, I think it's straying a bit from TSCM, but hate to see the discussion end before I have MY say :) 1. I think auto drivers who are distracted with cell phones should be charged with reckless driving... which is what they are actually doing; not with talking on a cell phone. 2. In the real world, I'm not an "executive"or even a "big shot". Hell, I rarely even wear a suit any more, but many times I'm the one charged with making technical decisions. And, I'm sometimes the only person with the tidbit of technical information that's needed. I've often been on an airplane or business trip when being in contact could save someone an additional over-night out of town, or in some cases save someone from flying across the country to solve a problem. Having use of the cell phone when flying commercial would be an economical, appropriate use of technology for our business needs. 3. I often wish there was a penalty for "uncivil or impolite use of a cell phone in public areas", especially theaters and restaurants. I haven't seen a cell phone that you couldn't get a vibrating ringer for, yet so few people are considerate enough to use them. 4. My complaint about the flight restrictions of PEDs is that I'd sure like to use my R10 when flying. It'd make a dull flight much more interesting for me. And, if RF from these devices interfered with the pilots instrumentation, I'm not sure I really want to be on that plane. We know how dense the RF is around airports. OK, thanks for listening. Cheers, JohnM Manager, Corporate Security Voice: 217-352-3207 Data Comm for Business, Inc. Fax: 217-352-0350 807 Pioneer Web: http://www.dcbnet.com Champaign, IL. 61820 Email: Jmccain@d... 2493 From: minerva close-protection Date: Fri Feb 16, 2001 5:44pm Subject: RE: Fw: ARROGRANCE James and Group, A question for the group. Have any of you guys ever worked on TSCM assignments in Ireland? I will risk an outburst of Irish jokes, as this is a serious question. The sitrep here is that any TSCM or any form of covert assignment is taken with due regard to the possibility of the TSCM/ Covert surevillance team encountering subversives ect. during their tasks. I would be interested in hearing the views of anyone who has worked here. We are an Irish company with offices in the UK and Dublin and our experience on the ground shows very little activity by non Irish/UK firms in evidence in Ireland. Any comments would be most welcome as we would like to establish a link with any firm operating in Ireland from the US. or Europe. I enjoy the discussions and humor of the group, well done to all concerned! Regards to all, Paul de Cogan MD The Minerva Group. >From: "Robert G. Ferrell" >Reply-To: "Robert G. Ferrell" >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] Fw: ARROGRANCE >Date: Fri, 16 Feb 2001 10:18:45 -0600 (CST) > > >No -it's not. Every version of this story changes.. > > > >By the way, Lincoln has never sailed off of Newfoundland. > >I became fascinated by this urban legend a few years ago and spent too much >time researching it. The first version I've been able to find intact >dates to the World War II era, but there are rumors that it can be traced >to >as far back as the 19th century, except of course that the communications >were by flag or lantern, not voice... > >It seems that sailors, or perhaps harried journalists in search of a >piece of good filler, update the story every so often with modern ship >names and contemporary political references. Quite an interesting >phenomenon. > >Cheers, > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... >======================================== > Who goeth without humor goeth unarmed. >======================================== > _________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. 2494 From: James M. Atkinson, Comm-Eng Date: Sat Feb 17, 2001 10:54am Subject: Adam and Eve [Humor] Adam was walking around the garden of Eden feeling very lonely, so God asked him, "What is wrong with you?" Adam said he didn't have anyone to talk to. God said that He was going to make Adam a companion and that it would be a woman. He said, "This person will gather food for you, cook for you, and when you discover clothing she'll wash it for you. She will always agree with every decision you make. She will bear your children and never ask you to get up in the middle of the night to take care of them. She will not nag you and will always be the first to admit she was wrong when you've had a disagreement. She will never have a headache and will freely give you love and passion whenever you need it." Adam asked God, "What will a woman like this cost?" God replied, "An arm and a leg." Then Adam asked, "What can I get for a rib?" The rest is history.... -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2495 From: Andre Holmes <1ach@g...> Date: Sat Feb 17, 2001 6:52pm Subject: COMPUTER PROTECTION Greetings to the List I was alerted at 5.03am to a Trojan attack. It was a Netbus trojan IP 211.59.180.71 Port 12345 PING(211.59.180.71):16 data bytes 24 bytes from 211.59.180.71: icmp_seq=0 ttl=111 time=249.1ms 24 bytes from 211.59.180.71: icmp_ seq=1ttl=111 time=260.7ms 24 bytes from 211.59.180.71: icmp_ seq=2 ttl=111 time=239.7ms 3 packets transmitted.3 packets received.0% packet loss round-trip min/avg/max = 239.7/249.8/260.7 ms Address assigned to Asia-Pacific users. APNIC database. Im sending these to you for reference incase you get hit. [Non-text portions of this message have been removed] 2496 From: Andre Holmes <1ach@g...> Date: Sat Feb 17, 2001 8:10pm Subject: Trojan Horse Ports List Trojan Horse Ports List NiteRyders Reference Desk Trojan Horse Ports Well Known Trojans Default ports used by some known trojan horses: And now links to desriptions of the trojans and fixes for them: port 21 - Back Construction, Blade Runner, Doly Trojan, Fore, FTP trojan, Invisible FTP, Larva, WebEx, WinCrash port 25 - Ajan, Antigen, Email Password Sender, Haebu Coceda (= Naebi), Happy 99, Kuang2, ProMail trojan, Shtrilitz, Stealth, Tapiras, Terminator, WinPC, WinSpy port 31 - Agent 31, Hackers Paradise, Masters Paradise port 41 - DeepThroat 1.0 - 3.1 + Mod (Foreplay) port 48 - DRAT v1.0 - 3.0b port 50 - DRAT port 59 - DMSetup port 79 - Firehotcker port 80 - Executor, RingZero port 99 - Hidden Port port 110 - ProMail trojan port 113 - Kazimas port 119 - Happy 99 port 121 - JammerKillah port 137 - NetBios Name(DoS attack) port 138 - NetBios Datagram(DoS attack) port 139 - (TCP) Netbios session (DoS attacks) port 139 - (UDP) Netbios session (DoS attacks) port 146 - (TCP) Infector 1.3 port 421 - TCP Wrappers port 456 - (TCP) - Hackers Paradise port 531 - (TCP) - Rasmin port 555 - (UDP) - Ini-Killer, NeTAdmin, Phase Zero, Stealth Spy port 555 - (TCP) - Phase Zero port 666 - (UDP) - Attack FTP, Back Construction, Cain & Abel, Satanz Backdoor, ServeU, Shadow Phyre port 911 - Dark Shadow port 999 - DeepThroat, WinSatan port 1001 - (UDP) - Silencer, WebEx port 1010 - Doly Trojan 1.1 - 1.7 (SE) port 1011 - Doly Trojan port 1012 - Doly Trojan port 1015 - Doly Trojan port 1024 - NetSpy 1.0 - 2.0 port 1042 - (TCP) - Bla 1.0 - 2.0 port 1045 - (TCP) - Rasmin port 1090 - (TCP) - Xtreme port 1170 - (TCP) - Psyber Stream Server, Streaming Audio trojan, Voice port 1234 - (UDP) - Ultors Trojan port 1243 - (TCP) - BackDoor-G, SubSeven, SubSeven Apocalypse port 1245 - (UDP) - VooDoo Doll port 1269 - (TCP) - Mavericks Matrix port 1349 - (UDP) - BO DLL port 1492 - (TCP) - FTP99CMP port 1509 - (TCP) - Psyber Streaming Server port 1600 - (TCP) - Shivka-Burka port 1807 - (UDP) - Spy-Sender port 1981 - (TCP) - Shockrave port 1999 - BackDoor 2.00 - 2.03 port 1999 - (TCP) - TransScout port 2000 - TransScout port 2001 - (TCP) - Trojan Cow 1.0 port 2001 - TransScout Transmission Scout v1.1 - 1.2 port 2001 - Der Spaeher 3 Der Spaeher v3.0 port 2002 - TransScout port 2003 - TransScout port 2004 - TransScout port 2005 - TransScout port 2023 - (TCP) - Ripper port 2086 - (TCP) - Netscape/Corba exploit port 2115 - (UDP) - Bugs port 2140 - (UDP) - Deep Throat v1.3 server port 2140 - (TCP) - The Invasor, Deep throat v2.0 port 2140 - (UDP) - Deep Throat 1.3 KeyLogger port 2155 - (TCP) - Illusion Mailer port 2283 - (TCP) - HVL Rat 5.30 port 2400 - PortD port 2565 - (TCP) - Striker port 2583 - (TCP) - WinCrash2 port 2600 - Digital RootBeer port 2801 - (TCP) - Phineas Phucker port 2989 - (UDP) - RAT port 3024 - (UDP) - WinCrash 1.03 port 3128 - RingZero port 3129 - Masters Paradise 9.x port 3150 - (UDP) - Deep Throat, The Invasor port 3459 - Eclipse 2000 port 3700 - (UDP) - Portal of Doom port 3791 - (TCP) - Total Eclypse port 3801 - (UDP) - Eclypse 1.0 port 4092 - (UDP) - WinCrash-alt port 4321 - BoBo 1.0 - 2.0 port 4567 - (TCP) - File Nail port 4590 - (TCP) - ICQ-Trojan port 5000 - (UDP) - Bubbel, Back Door Setup, Sockets de Troie/socket23 port 5001 - (UDP) - Back Door Setup, Sockets de Troie/socket23 port 5011 - (TCP) - One of the Last Trojans (OOTLT) port 5031 - (TCP) - Net Metropolitan port 5321 - (UDP) - Firehotcker port 5400 - (UDP) - Blade Runner, Back Construction port 5401 - (UDP) - Blade Runner, Back Construction port 5402 - (UDP) - Blade Runner, Back Construction port 5550 - (TCP) - Xtcp 2.0 - 2.1 port 5521 - (TCP) - Illusion Mailer port 5550 - (TCP) - X-Tcp Trojan port 5555 - (TCP) - ServeMe port 5556 - (TCP) - BO Facil port 5557 - (TCP) - BO Facil port 5569 - (TCP) - Robo-Hack port 5742 - (UDP) - WinCrash port 6400 - (TCP) - The Thing port 6669 - (TCP) - Vampire 1.0 - 1.2 port 6670 - (TCP) - DeepThroat port 6771 - (TCP) - DeepThroat port 6776 - (TCP) - BackDoor-G, SubSeven port 6838 - (UDP) - Mstream (Attacker to handler) port 6683 - (UDP) DeltaSource v0.5 - 0.7 port 6912 - Shit Heep (not port 69123!) port 6939 - (TCP) - Indoctrination 0.1 - 0.11 port 6969 - GateCrasher, Priority, IRC 3 port 6970 - GateCrasher 1.0 - 1.2 port 7000 - (UDP) - Remote Grab, Kazimas port 7300 - (UDP) - NetMonitor port 7301 - (UDP) - NetMonitor port 7302 - (UDP) - NetMonitor port 7303 - (UDP) - NetMonitor port 7304 - (UDP) - NetMonitor port 7305 - (UDP) - NetMonitor port 7306 - (UDP) - NetMonitor port 7307 - (UDP) - NetMonitor port 7308 - (UDP) - NetMonitor port 7789 - (UDP) - Back Door Setup, ICKiller port 8080 - RingZero port 8989 - Recon, recon2, xcon port 9090 - Tst2, telnet server port 9400 - InCommand 1.0 - 1.4 port 9872 - (TCP) - Portal of Doom port 9873 - Portal of Doom port 9874 - Portal of Doom port 9875 - Portal of Doom port 9876 - Cyber Attacker port 9878 - TransScout port 9989 - (TCP) - iNi-Killer 2.0 - 3.0 port 9999 - (TCP) - theprayer1 port 10067 - (UDP) - Portal of Doom port 10101 - BrainSpy Vbeta port 10167 - (UDP) - Portal of Doom port 10520 - Acid Shivers + LMacid port 10607 - (TCP) - Coma 1.09 port 10666 - (TCP) - ambush port 11000 - (TCP) - Senna Spy port 11223 - (TCP) - Progenic trojan 1.0 - 1.3 port 12076 - (TCP) - Gjammer port 12223 - (UDP) - Hack 99 KeyLogger port 12223 - (TCP) - Hack 99 port 12345 - (UDP) - GabanBus, NetBus, Pie Bill Gates, X-bill port 12346 - (TCP) - GabanBus, NetBus, X-bill port 12361 - (TCP) - Whack-a-mole port 12362 - (TCP) - Whack-a-mole port 12631 - WhackJob port 13000 - Senna Spy port 16660 - (TCP) - stacheldraht port 16969 - (TCP) - Priority (Beta) port 17300 - (TCP) - Kuang2 The Virus port 20000 - (UDP) - Millennium 1.0 - 2.0 port 20001 - (UDP) - Millennium port 20034 - (TCP) - NetBus 2 Pro port 20203 - (TCP) - Logged, chupacabra port 21544 - (TCP) - GirlFriend 1.3x (Including Patch 1 and 2) port 22222 - (TCP) - Prosiak port 23456 - (TCP) - Evil FTP, Ugly FTP, Whack Job port 23476 - Donald Dick 1.52 - 1.55 port 23477 - Donald Dick port 26274 - (UDP) - Delta Source port 27444 - (UDP) - trinoo port 27665 - (TCP) - trinoo port 29891 - (UDP) - The Unexplained port 30029 - AOL Trojan port 30100 - (TCP) - NetSphere 1.0 - 1.31337 port 30101 - (TCP) - NetSphere port 30102 - (TCP) - NetSphere port 30133 - (TCP) - NetSphere final port 30303 - Sockets de Troi = socket23 port 30999 - (TCP0 - Kuang2 port 31335 - (UDP) - trinoo port 31336 - Bo Whack port 31337 - (TCP) - Baron Night, BO client, BO2, Bo Facil port 31337 - (UDP) - BackFire, Back Orifice, DeepBO port 31338 - (UDP) - Back Orifice, DeepBO port 31339 - (TCP) - Netspy port 31339 - (UDP) - NetSpy DK port 31554 - (TCP) - Schwindler is from portugal port 31666 - (UDP) - BOWhack port 31785 - (TCP) - Hack 'a' Tack 1.0 - 2000 port 31787 - (TCP) - Hack 'a' Tack port 31788 - (TCP) - Hack 'a' Tack port 31789 - (UDP) - Hack 'a' Tack port 31791 - (UDP) - Hack 'a' Tack port 31792 - (UDP) - Hack 'a' Tack port 32418 - Acid Battery v1.0 port 33333 - Blakharaz, Prosiak port 33577 - PsychWard port 33777 - PsychWard port 33911 - (TCP) - Spirit 2001a port 34324 - (TCP) - BigGluck, TN port 40412 - (TCP) - The Spy port 40421 - (UDP) - Agent 40421, Masters Paradise port 40422 - (UDP) - Masters Paradise port 40423 - (UDP) - Masters Paradise port 40426 - (UDP) - Masters Paradise port 47262 - (UDP) - Delta Source port 50505 - (UDP) - Sockets de Troie = socket23 port 50766 - (UDP) - Schwindler 1.82 port 53001 - (TCP) - Remote Windows Shutdown port 54320 - Back Orifice 2000 port 54321 - (TCP) - School Bus port 54321 - (UDP) - Back Orifice 2000 port 57341 - (TCP) - netraider 0.0 port 58339 - ButtFunnel port 60000 - Deep Throat port 60068 - Xzip 6000068 port 61348 - (TCP) - Bunker-Hill Trojan port 61466 - (TCP) - Telecommando port 61603 - (TCP) - Bunker-Hill Trojan port 63485 - (TCP) - Bunker-Hill Trojan port 65000 - (UDP) - Devil v1.3 port 65000 - (TCP) - Devil port 65000 - (TCP) - stacheldraht port 65432 - The Traitor port 65432 - (UDP) - The Traitor port 65535 - RC, ICE [Non-text portions of this message have been removed] 2497 From: James M. Atkinson, Comm-Eng Date: Sat Feb 17, 2001 8:26pm Subject: Re: COMPUTER PROTECTION At 7:52 PM -0500 2/17/01, Andre Holmes wrote: >Greetings to the List > >I was alerted at 5.03am to a Trojan attack. > >It was a Netbus trojan > >IP 211.59.180.71 > >Port 12345 > >PING(211.59.180.71):16 data bytes >24 bytes from 211.59.180.71: icmp_seq=0 ttl=111 time=249.1ms >24 bytes from 211.59.180.71: icmp_ seq=1ttl=111 time=260.7ms >24 bytes from 211.59.180.71: icmp_ seq=2 ttl=111 time=239.7ms > >3 packets transmitted.3 packets received.0% packet loss >round-trip min/avg/max = 239.7/249.8/260.7 ms > >Address assigned to Asia-Pacific users. >APNIC database. > >Im sending these to you for reference incase you get hit. Andre, When you send an IP address ALWAYS remember to include the DNS name associated with the IP address you are reporting, plus a trace route session with either the suspect address or related upstream information otherwise the report is of minimal use). -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2498 From: James M. Atkinson, Comm-Eng Date: Sat Feb 17, 2001 8:29pm Subject: Re: Trojan Horse Ports List At 9:10 PM -0500 2/17/01, Andre Holmes wrote: >Trojan Horse Ports List > > > NiteRyders Reference Desk > >Trojan Horse Ports > > Well Known Trojans > Default ports used by some known trojan horses: > And now links to desriptions of the trojans and fixes for them: > > port 21 - Back Construction, Blade Runner, Doly Trojan, Fore, >FTP trojan, Invisible FTP, Larva, WebEx, WinCrash [snip] Er... Just because your computer alerted on activity on a port does not mean that port was being used to pass a virus or trojan. Monitor the activity and see what is actually going on. -jma -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2499 From: James M. Atkinson, Comm-Eng Date: Sat Feb 17, 2001 8:40pm Subject: Man accused of spying on boys Man accused of spying on boys http://www.ananova.com/news/story/sm_211279.html?menu= A US man has been arrested for allegedly spying on two boys using a surveillance system. The 42-year-old has been charged with burglary, theft, trespassing and eavesdropping in the state of New York. Police say he installed listening equipment to eavesdrop on the teenage boys and videotaped them from his home, near Albany. Last updated: 21:34 Saturday 17th February 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2500 From: Talisker Date: Sun Feb 18, 2001 7:11am Subject: Re: COMPUTER PROTECTION Andre I suspect that rather than being under an attack, you being being scanned to see whether you had been trojaned. An analogy I often use is that of a car thief walking down the street looking in car windows to see if the car is unlocked. Yes it's annoying, but unless your car is unlocked there's nothing really to worry about. If the probing is persistant then check it out, but in my experience most ISPs will not react if you alert them to one of their users scanning you. In reality if the ISP were to cut the user off, they would just log straight back on under another fictious username. The best defence for home PCs is to: 1. Never, open any email attachments unless you are expecting them, even then quarantine them and virus check them before use. 2. Keep your virus checker up to date, there are many such as CAI's that are free for personal use, including updates http://antivirus.cai.com 3. Use a personal firewall, again there are many that are free, Tiny and ZoneAlarm are my favourites for Windows. just my 2 cents Take Care Andy http://www.networkintrusion.co.uk Talisker's Network Security Tools List Security Tools Notification http://groups.yahoo.com/group/security-tools/join ----- Original Message ----- From: "Andre Holmes" <1ach@g...> To: Sent: Sunday, February 18, 2001 12:52 AM Subject: [TSCM-L] COMPUTER PROTECTION > Greetings to the List > > I was alerted at 5.03am to a Trojan attack. > > It was a Netbus trojan > > IP 211.59.180.71 > > Port 12345 > > PING(211.59.180.71):16 data bytes > 24 bytes from 211.59.180.71: icmp_seq=0 ttl=111 time=249.1ms > 24 bytes from 211.59.180.71: icmp_ seq=1ttl=111 time=260.7ms > 24 bytes from 211.59.180.71: icmp_ seq=2 ttl=111 time=239.7ms > > 3 packets transmitted.3 packets received.0% packet loss > round-trip min/avg/max = 239.7/249.8/260.7 ms > > Address assigned to Asia-Pacific users. > APNIC database. > > Im sending these to you for reference incase you get hit. > > > > > [Non-text portions of this message have been removed] > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 2501 From: James M. Atkinson, Comm-Eng Date: Sun Feb 18, 2001 1:11pm Subject: BEFORE and AFTER MARRIAGE BEFORE and AFTER MARRIAGE Before - You take my breath away. After - I feel like I'm suffocating. Before - Twice a night. After - Twice a month. Before - She loves the way I take control of a Situation. After - She called me a controlling, manipulative, egomaniac. Before - Ricky & Lucy. After - Fred & Ethel. Before - Saturday Night Live. After - Monday Night Football. Before - He makes me feel like a million dollars. After - If I had a dime for every stupid thing he's done... Before - Don't Stop. After - Don't Start. Before - The Sound of Music. After - The Sound of Silence. Before - Is that all you are eating? After - Maybe you should just have a salad, honey. Before - Wheel of Fortune. After - Jeopardy. Before - It's like living a dream. After - It's a nightmare. Before - $60/dozen. After - $1.50/stem. Before - Turbocharged. After - Needs a jump-start Before - We agree on everything! After - Doesn't she have a mind of her own? Before - Victoria's Secret. After - Fruit of the Loom. Before - Feathers & handcuffs. After - Ball and chain. Before - Idol. After - Idle. Before - He's lost without me. After - Why can't he ask for directions? Before - When together, time stands still. After - This relationship is going nowhere. Before - Croissant and cappuccino. After - Bagels and instant coffee. Before - Oysters. After - Fishsticks. Before - I can hardly believe we found each other. After - How the hell did I end up with someone like you? Before - Romeo and Juliet. After - Bill and Hillary.. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2502 From: James M. Atkinson, Comm-Eng Date: Sun Feb 18, 2001 1:15pm Subject: MI5 and police ordered illegal break-ins at mosques MI5 and police ordered illegal break-ins at mosques Jason Burke, chief reporter Sunday February 18, 2001 The Observer http://www.observer.co.uk/uk_news/story/0,6903,439636,00.html British security services ordered illegal burglaries in Muslim places of worship to gather information on alleged Islamic militants, a key MI5 and police informer has told The Observer . In one of the most detailed descriptions of secret operations on the British mainland, Reda Hassaine, an Algerian former journalist, has revealed how he infiltrated the tight-knit community of Islamic militants in the UK for MI5 and the Special Branch, the police squad with responsibility for gathering information on suspected terrorists. Hassaine, an asylum-seeker, disclosed how officers blackmailed him into carrying out the burglaries by threatening him with expulsion if he refused. They also advised him on how to defraud the British welfare system to enhance his meagre earnings from them. The revelations will deeply embarrass the security services and lead to further accusations of incompetence as yet another operative tells his story. It will also raise serious questions about the services' dealings with vulnerable groups like asylum-seekers. 'Any suggestion that asylum applications could be contingent on "co-operating" with the UK security services raises the most serious concerns,' a spokesman for Amnesty, the human rights group, said. During two years as an informer, Hassaine was asked to steal scores of documents from senior preachers at mosques in north London. Some were communiquÈs from extremist groups overseas; others were seemingly innocuous. Hassaine, 37, even told his handlers about a dirty tricks campaign against Muslim militants in London being run by the French intelligence service, the DGSE. Though it too involved burglaries of mosques and Islamic groups' premises as well as the funding of a newspaper supporting the terrorist Osama bin Laden, Hassaine was advised to help the French. Though Hassaine has been badly beaten by Muslim hardliners and now faces almost daily death threats, the Home Office has refused his asylum application. Guardian Unlimited © Guardian Newspapers Limited 2001 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2503 From: James M. Atkinson, Comm-Eng Date: Sun Feb 18, 2001 1:21pm Subject: EVEN ESPIONAGE IS AN ATTRACTION IN D.C. I SPY... http://www.chicagotribune.com/leisure/travel/printedition/article/0,2669,SAV-0102180079,FF.html EVEN ESPIONAGE IS AN ATTRACTION IN D.C. By Vernon Loeb The Washington Post February 18, 2001 WASHINGTON -- Seven blocks on R Street in Georgetown are all that separate the rise and the fall of American intelligence, from the mansion of World War II spy master William "Wild Bill" Donovan to the mailbox where CIA traitor Aldrich Ames left signals in chalk for his Soviet handlers. David Major calls it "Spy Street," and it's one of the attractions on the "SpyDrive," a tour of 30 Washington espionage sites that twists and turns through most of the major spy cases of the past 50 years, with running commentary by Major and his sidekick, Oleg Kalugin. Major spent a career chasing foreign spies for the FBI, ultimately becoming counterintelligence adviser at the Reagan White House. Kalugin was a Soviet spy in Washington--the youngest major general in KGB history. "What we're going to show you is buildings and monuments," Major says. But "you're going to see it through the eyes of a counterintelligence officer and an intelligence collector." The SpyDrive is a commercial spinoff of a tour Major started running several years ago for corporate executives and U.S. government personnel to make the point that the nation's capital has long been a major playground for all manner of foreign spies--and still is. "Since this is the most important city in the world, it is a very, very viable target," says Major, a stout, bearded man in a black leather jacket. "This is not something stuck in the past. It faces every single one of us in the future." What he's trying to tell his busload of spy tourists, many of whom have a certain law enforcement look, is that a little paranoia isn't necessarily a bad thing, especially if you're an executive steeped in trade secrets or a government official with a security clearance. If you think you're being followed on the streets of Washington, maybe you are. "Russian espionage is now on the rise," says the small, dapper Kalugin, now a permanent resident alien who works as an instructor at Major's training firm in suburban Alexandria, Va., the Centre for Counterintelligence and Security Studies. "The U.S. used to be Enemy No. 1. Now it is Priority No. 1." There is, of course, no more famous monument to espionage in Washington than the old Soviet Embassy on 16th Street, now the Russian ambassador's residence. Kalugin calls it "the hub of intelligence operations in this country." Major points to the front door that three of the most damaging American spies--Ames, Navy warrant officer John Walker and National Security Agency employee Ronald Pelton--walked through to begin their careers in treason. Then he directs attention down an alley north of the embassy at the back door, where the Soviets spirited Walker and Pelton out of the building to avoid detection by an FBI surveillance team. On K Street in Georgetown, famous espionage terrain, the tour passes Chadwick's, the pub where Ames handed over seven pounds of top-secret material to his KGB handler, including the names of 20 CIA assets in the Soviet bloc, 10 of whom were subsequently executed. Then there's Martin's Tavern on Wisconsin Avenue, where Vassar graduate and Soviet courier Elizabeth Bentley operated in the '30s and '40s. Just a block up Wisconsin, there's Au Pied de Cochon, the French bistro where KGB defector Vitaly Yurchenko bolted from his CIA handlers in 1985, walked to the new Soviet Embassy at the top of the hill and un-defected--a route retraced by the SpyDrive bus. There's debate to this day about whether Yurchenko was a legitimate defector or a KGB plant. But Kalugin--who debriefed Yurchenko upon his return to Moscow--says the KGB believed he was a genuine defector who simply grew disenchanted as a ward of the CIA. Kalugin worked for 12 years as a spy in Washington before returning home to run the KGB's foreign counterintelligence program. He was elected to the Russian parliament in 1990 after the fall of the Soviet Union before returning to the United States as part of a joint venture with AT&T. "Now I am back to the old trade that I never thought I would resume again," says Kalugin, who is still a Russian citizen. "But old habits never die." On R Street--"one of the spy streets in Washington," Major says--the bus slows in front of the former home of "Wild Bill" Donovan, director of the Office of Strategic Services, forerunner of the CIA, during World War II. Just up the street is Dumbarton Oaks, the 19th Century mansion and surrounding gardens described on some tours as an important research library in Byzantine and medieval studies. On the SpyDrive, it's the place where Navy analyst and convicted spy Jonathan Pollard met his Israeli handler. Farther down, at 37th and R, is the famous blue mailbox: Ames' "signal site." The CIA malcontent, who started spying in 1985, would mark the box with chalk so the KGB would know to check a prearranged "dead drop" for a new cache of top-secret reports. It's just a plain blue mailbox now. What makes the SpyDrive an intriguing jaunt through town is its mix of buildings like Alger Hiss' row house at 2905 P St. NW, and monuments like a spot on Sheridan Circle--"right where that red car is right now," Major says--where a car bomb planted by Gen. Augusto Pinochet's intelligence service in 1976 killed former Chilean diplomat Orlando Letelier and his American colleague Ronni Moffitt. There's Mitchell Park, where fired CIA officer Edward Lee Howard sat for hours in October 1983, pondering whether to betray his country, before walking to the nearby Soviet Trade Mission and formally becoming a spy. And at 2800 Wisconsin Ave. is what Major calls the "Jennifer Miles tryst apartment," named after the South African intelligence officer who spied in Washington for the Cubans in the late 1960s before the FBI caught her and expelled her. The tour passes the embassies of Hungary and the Czech Republic on the edge of Rock Creek Park, which Major says presented a particularly difficult surveillance problem for the FBI during the Cold War. Isolated in a wooded ravine, he says, there was no place to park a surveillance van and eavesdrop on the two aggressive communist spy services. The solution: the quaint, charming old stone building called the Art Barn by the park, where local and emerging artists exhibited their work. During the Cold War, Major explains, the Art Barn's attic was a major intercept station, full of antennas and other sophisticated listening devices. As the bus heads back downtown, Kalugin ranks the former Soviet bloc spy agencies, rating the East Germans as the most efficient, the Bulgarians as the most obedient and the Hungarians as the least effective. But the more things change, he says, the more they stay the same. "The Cold War is over," Kalugin says at tour's end. "Some of the old practices of the Cold War are no longer with us. On the other hand, it would be naive to believe that since the collapse of the U.S.S.R., espionage has stopped. In fact, espionage will go on as long as national interest exists. This is a never-ending story, and you have heard only part of it." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2504 From: minerva close-protection Date: Fri Feb 16, 2001 5:43pm Subject: RE: Fw: ARROGRANCE James and Group, A question for the group. Have any of you guys ever worked on TSCM assignments in Ireland? I will risk an outburst of Irish jokes, as this is a serious question. The sitrep here is that any TSCM or any form of covert assignment is taken with due regard to the possibility of the TSCM/ Covert surevillance team encountering subversives ect. during their tasks. I would be interested in hearing the views of anyone who has worked here. We are an Irish company with offices in the UK and Dublin and our experience on the ground shows very little activity by non Irish/UK firms in evidence in Ireland. Any comments would be most welcome as we would like to establish a link with any firm operating in Ireland from the US. or Europe. I enjoy the discussions and humor of the group, weel done to all concerned! Regards to all, Paul de Cogan MD The Minerva Group. >From: "Robert G. Ferrell" >Reply-To: "Robert G. Ferrell" >To: TSCM-L@yahoogroups.com >Subject: RE: [TSCM-L] Fw: ARROGRANCE >Date: Fri, 16 Feb 2001 10:18:45 -0600 (CST) > > >No -it's not. Every version of this story changes.. > > > >By the way, Lincoln has never sailed off of Newfoundland. > >I became fascinated by this urban legend a few years ago and spent too much >time researching it. The first version I've been able to find intact >dates to the World War II era, but there are rumors that it can be traced >to >as far back as the 19th century, except of course that the communications >were by flag or lantern, not voice... > >It seems that sailors, or perhaps harried journalists in search of a >piece of good filler, update the story every so often with modern ship >names and contemporary political references. Quite an interesting >phenomenon. > >Cheers, > >RGF > >Robert G. Ferrell, CISSP >Information Systems Security Officer >National Business Center >U. S. Dept. of the Interior >Robert_G_Ferrell@n... >======================================== > Who goeth without humor goeth unarmed. >======================================== > _________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com. 2505 From: David Alexander Date: Mon Feb 19, 2001 4:47am Subject: humour - 3 stages of married life The 3 stages of married life: Tri-weekly Try weekly Try weakly David Alexander Bookham Technology plc DDI: 01235 837823 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2506 From: David Alexander Date: Mon Feb 19, 2001 3:06am Subject: re: Is Phone Interference Phony? I read the submission on airborne interference allegedly caused by electronic interference, such as cellphones & laptops. There are a couple of points that have not been mentioned: Modern aircraft are very complex electronic systems (I speak as an ex RAF fighter pilot). The author is right to say it is difficult to reliably reproduce symptoms. In the meantime I don't want any airline or anyone else playing fast-and-loose with my life while I'm sitting in the back. It is a risk that is manageable by saying 'don't use them' until such time as we do have proof, one way or the other. It also strikes me that, with a legal system so ludicrously out of control as the American one (and I'm quoting several American friends there - not just the opinion of an 'd*mn foreigner') - if anything untoward were to happen that could even possibly be blamed on there not being such a policy, there would be more lawyers/attorneys/whatever descend on that airline than they could imagine in their worst nightmares. just my 2c. David Alexander Bookham Technology plc DDI: 01235 837823 David.Alexander@B... ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 2507 From: Robert G. Ferrell Date: Tue Feb 20, 2001 8:12am Subject: Re: Trojan Horse Ports List >Trojan Horse Ports List If you'd like a more comprehensive mapping of both legitimate services and trojans to ports, see my searchable ports database at http://rgfsparc.cr.usgs.gov:8090/sysadmin/ports.html Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2508 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 10:47am Subject: FBI Agent Robert Philip Hanssen Arraigned on Espionage Charges FBI agent arraigned on spy charges Authorities say Hanssen did "extreme" damage to the United States during the past 10 years, passing secrets to Russia, NBC News' Pete Williams reports. NBC NEWS AND WIRE REPORTS WASHINGTON, Feb. 20 - A senior FBI counterintelligence expert appeared in court Tuesday to face charges that he spied for Moscow for more than a decade. Agent Robert Philip Hanssen - just the third FBI agent ever arrested on espionage charges - slipped secrets to the Russians while he was assigned to spy on Moscow's U.S. Embassy and other Russian outposts, sources told NBC News. HANSSEN, A 27-year agency veteran who spent most of his career as a counterspy, was arrested Sunday night at his home in Vienna, Va., shortly after leaving a package of classified material at a nearby park, sources said. He appeared Tuesday in federal court in Alexandria, Va., for arraignment on espionage charges. Attorney General John Ashcroft, FBI Director Louis Freeh and CIA Director George Tenet scheduled an early afternoon news conference to discuss the arrest. The sources told NBC News, which broke the story of Hanssen's arrest early Tuesday, that Hanssen had done "extreme damage" to the United States. They also said agency officials had been aware of the spying for the past several months. SUSPECT ASSIGNED TO SURVEILLANCE Hanssen, 56, was a senior agent assigned to surveillance of the Russian Embassy in Washington and other Moscow missions to the United States, including one in New York. Officials said among the secrets Hanssen allegedly disclosed include methods the United States uses to conduct electronic surveillance. Officials said Hanssen, who also worked for the U.S. State Department in Washington before returning to the FBI, may have confirmed for the Russians information originally given to them by CIA spy Aldrich Ames about the identity of U.S. intelligence sources overseas, some of whom were then executed. Russian officials in Moscow had no immediate comment on the arrest. "As of now, we do not have information about this," said Foreign Ministry spokesman Vladimir Oshurkov. White House spokesman Ari Fleischer said President Bush considers the allegations "disturbing." Officials said Hanssen's senior status in counterspying put him in an ideal position to uncover information and to make sure his tracks were covered. The sources said investigators believe Hanssen, who is married and has six children, kept his identity secret from his Russian handlers. The four contacts identified in the Washington area knew him only by code name, and recently acquired KGB documents indicate that even senior Russian intelligence officials knew him that way, too, the sources said. CONNECTION TO BUGGING CASE? Intelligence sources told NBC News that they believe Hanssen also had a "tangential connection" to the planting of an electronic eavesdropping device discovered in late 1999 in a State Department conference room. Agents searched Hanssen's suburban home in Virginia after his arrest late Sunday. Federal officials indicated they have not been able to determine whether Hanssen acted for political reasons or for personal gain. They say the Russians were paying him, but that he had no obvious debts and hadn't been on any spending sprees. Underscoring the gravity of the case, former FBI Director William Webster has been named to lead a blue-ribbon panel that will assess the impact of the alleged espionage, an FBI source told The Associated Press. Nancy Cullen, a neighbor, described Hanssen's neighborhood as being in shock with news of the arrest. "They go to church every Sunday - if that means anything - loading all six kids into the van." She said the Hanssens were regulars at the Memorial Day block party and called Hanssen "very attractive ... not overly gregarious." Hanssen is only the third FBI agent ever accused of spying. In 1997, Earl Pitts, who was stationed at the FBI Academy in Quantico, Va., was sentenced to 27 years in prison after admitting he spied for Moscow during and after the Cold War. The only other FBI agent ever caught spying was Richard W. Miller, a Los Angeles agent who was arrested in 1984 and later sentenced to 20 years in prison. Last year, a former Army officer was accused of spying for the Soviet Union and Russia for 25 years. Prosecutors said retired Army Reserve Col. George Trofimoff, who was a civilian intelligence employee, was captured on one tape putting his hand to his heart and telling an undercover agent posing as a Russian agent: "I'm not American in here." NBC News Correspondent Pete Williams and NBC News Producer Robert Windrem, MSNBC.com's Mike Brunker and The Associated Press contributed to this report. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2509 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 1:15pm Subject: 27-year FBI veteran accused of spying - Suspect charged with passing information, identifying double agents 27-year FBI veteran accused of spying Suspect charged with passing information, identifying double agents February 20, 2001 Web posted at: 1:44 p.m. EST (1844 GMT) WASHINGTON (CNN) -- Veteran FBI agent Robert Philip Hanssen was charged Tuesday with passing classified documents to Russia and with identifying for Russian intelligence three KGB agents who were working for the United States as double agents. The 27-year FBI veteran, appearing before U.S. District Court Judge Theresa Buchanan in Alexandria to hear the charges against him two days after his arrest, was ordered held without bond until he appears again in court on March 5. A spokesman for the Russian Embassy in Washington had no comment on the allegations. "Individuals who commit treasonous acts against the United States will be held fully accountable," Attorney General John Ashcroft said at a Tuesday afternoon news conference. "I will devote whatever resources are necessary within the department to ensure that justice is done in this case and any other case like it," he added. Ashcroft said attempts by other governments to obtain U.S. secrets "are as intense today as they have ever been." "The FBI entrusted him with some of its most sensitive matters. And the U.S. government relied upon him for his service and his integrity. He, as charged, abused and betrayed that trust. The crimes alleged are an affront not only to his fellow FBI employees, but to the American people," said FBI Director Louis Freeh. Freeh said the bureau has not yet determined how badly U.S. interests were damaged by the espionage Hanssen is suspected of carrying out. In addition, former FBI and CIA chief William Webster will lead a comprehensive review of U.S. counterintelligence procedures and security in the wake of Hanssen's arrest, Ashcroft said. Hanssen was charged with passing top-secret documents to Soviet agents on March 20, 1989, as part of "a conspiracy to cause injury to the United States and an advantage to a foreign government, namely the USSR." Hanssen, a 56-year-old father of six, was charged with fingering the three double agents on October 1, 1985. Court documents also alleged that he was paid $1.4 million from 1985 until his arrest on Sunday. Hanssen's attorney, Plato Cacheris, described his client as "quite upset" and "very emotional" and said he was not guilty of the charges against him. If convicted, Hanssen could face life imprisonment or -- under special circumstances -- the death penalty. Steep fines could also be imposed. Attorney represented convicted CIA spy Hanssen spent most of his career in counter-intelligence operations designed to catch spies. His most recent assignment was with the State Department, where his job was to help ferret out Russian spies. Hanssen's high security clearance and sensitive job assignments gave him access to details of U.S. security operations, including methods the United States used to conduct electronic surveillance. Sources told CNN that Hanssen would have been in position to warn the Russians if the United States suspected anyone of spying. FBI officials said Hanssen may have also allowed the Russians to cross-check and confirm the names of U.S. intelligence agents supplied to them by Aldrich Ames, a CIA employee arrested in 1997 and convicted of spying for the Russians. At least 10 of the agents fingered by Ames were executed. Cacheris, Hanssen's attorney, also represented Ames. Four-month surveillance The charges filed against Hanssen were based on a 110-page affidavit outlining his alleged activities. One source told CNN that the FBI obtained documents from the KGB, the Russian intelligence service, that pointed to Hanssen as a mole inside the FBI. Agents kept Hanssen under surveillance for at least four months before arresting him Sunday at a park in Vienna, Virginia, after he allegedly dropped classified documents into a "dead box" where they could be picked up by Russian agents. An FBI official said the Russians paid Hanssen "substantial amounts" for his information. Former Deputy Attorney General George Terwilliger told CNN that "no case like this would be brought unless it was very, very strong." Bush orders inquiry Because of Hanssen's position and high security clearance, U.S. officials moved quickly to determine the extent of damage his alleged activities may have caused. Aides to President George W. Bush said the damage may be "considerable, potentially quite serious," and that the president had approved the recommendation for an independent review involving the CIA, State and Justice Departments. Plans for that operation were to be announced later on Tuesday. William Webster, a former head of both the CIA and FBI, was expected to be appointed to head the blue-ribbon panel to conduct the review. CNN Correspondents Jeanne Meserve, Steve Harrigan, Eileen O'Connor, David Ensor and Kelli Arena contributed to this report. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2510 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 1:21pm Subject: FBI Press Release On the Arrest of FBI Special Agent Robert Philip Hanssen For Immediate Release February 20, 2001 Washington D.C. FBI National Press Office Attorney General John Ashcroft, FBI Director Louis J. Freeh and United States Attorney Helen Fahey announced today that a veteran FBI counterintelligence Agent was arrested Sunday by the FBI and charged with committing espionage by providing highly classified national security information to Russia and the former Soviet Union. At the time of the arrest at a park in Vienna, Virginia, Robert Philip Hanssen, age 56, was clandestinely placing a package containing highly classified information at a pre-arranged, or "dead drop," site for pick-up by his Russian handlers. Hanssen had previously received substantial sums of money from the Russians for the information he disclosed to them. FBI Director Louis J. Freeh expressed both outrage and sadness. He said the charges, if proven, represent "the most serious violations of law -- and threat to national security." "A betrayal of trust by an FBI Agent, who is not only sworn to enforce the law but specifically to help protect our nation's security, is particularly abhorrent. This kind of criminal conduct represents the most traitorous action imaginable against a country governed by the Rule of Law. It also strikes at the heart of everything the FBI represents -- the commitment of over 28,000 honest and dedicated men and women in the FBI who work diligently to earn the trust and confidence of the American people every day." "These kinds of cases are the most difficult, sensitive and sophisticated imaginable. I am immensely proud of the men and women of the FBI who conducted this investigation. Their actions represent counterintelligence at its very best, reflecting dedication to both principle and mission. It is not an easy assignment to investigate a colleague, but they did so unhesitatingly, quietly and securely." Hanssen was charged in a criminal complaint filed in Federal court in Alexandria, Virginia, with espionage and conspiracy to commit espionage, violations that carry a possible punishment of life in prison, and under certain circumstances, the death penalty. Following the arrest, FBI Agents began searching Hanssen's residence, automobiles and workspace for additional evidence. A detailed affidavit, filed in support of the criminal complaint and search warrants, provides a troubling account of how Hanssen first volunteered to furnish highly sensitive documents to KGB intelligence officers assigned to the Soviet embassy in Washington, D.C. The affidavit chronicles the systematic transfer of highly classified national security and counterintelligence information by Hanssen in exchange for diamonds and cash worth more than $600,000. Hanssen's activities also have links to other, earlier espionage and national security investigations including the Aldrich Ames and Felix Bloch cases, according to the affidavit. The affidavit alleges that on over 20 separate occasions, Hanssen clandestinely left packages for the KGB, and its successor agency, the SVR, at dead drop sites in the Washington area. He also provided over two dozen computer diskettes containing additional disclosures of information. Overall, Hanssen gave the KGB/SVR more than 6,000 pages of valuable documentary material, according to the affidavit. The affidavit alleges that Hanssen compromised numerous human sources of the U.S. Intelligence Community, dozens of classified U.S. Government documents, including "Top Secret" and "codeword" documents, and technical operations of extraordinary importance and value. It also alleges that Hanssen compromised FBI counterintelligence investigative techniques, sources, methods and operations, and disclosed to the KGB the FBI's secret investigation of Felix Bloch, a foreign service officer, for espionage. Freeh said that although no formal damage assessment could be conducted before the arrest without jeopardizing the investigation, it is believed that the damage will be exceptionally grave. During the time of his alleged illegal activities, Hanssen was assigned to New York and Washington, D.C., where he held key counterintelligence positions. As a result of his assignments, Hanssen had direct and legitimate access to voluminous information about sensitive programs and operations. As the complaint alleges, Hanssen effectively used his training, expertise and experience as a counterintelligence Agent to avoid detection, to include keeping his identity and place of employment from his Russian handlers and avoiding all the customary "tradecraft" and travel usually associated with espionage. The turning point in this investigation came when the FBI was able to secure original Russian documentation of an American spy who appeared to the FBI to be Hanssen, which subsequent investigation confirmed. Freeh said the investigation that led to the charges is a direct result of the combined and continuing FBI/CIA effort ongoing for many years to identify additional foreign penetrations of the U.S. intelligence community. The investigation of Hanssen was conducted by the FBI with direct assistance from the CIA, Department of State and the Justice Department, and represents an aggressive and creative effort which led to this counterintelligence success. Freeh said, "We appreciate the unhesitating leadership and support of Attorney General John Ashcroft from the moment he took office." Freeh also expressed his gratitude to Helen Fahey, United States Attorney for the Eastern District of Virginia, Assistant United States Attorney Randy Bellows, and senior Justice Department officials Robert Mueller, Frances Fragos Townsend, John Dion and Laura Ingersoll for their contributions to the case. United States Attorney Fahey said, "In the past decade, it has been our unfortunate duty to prosecute a number of espionage cases -- Ames, Pitts, Nicholson, Squillacote, Kim, Boone, and others. With each case, we hope it will be the last. Today, however with the arrest of Robert Hanssen, we begin again the process of bringing to justice a U.S. Government official charged with the most egregious violations of the public trust. The full resources of the Department of Justice will be devoted to ensuring that those persons who would betray their country and the people of the United States are prosecuted and severely punished." "I want to express my appreciation for the outstanding work done by the National Security Division and the Washington Field Office of the FBI in this investigation. Their superlative work in this extraordinarily sensitive and important investigation is testament to their professionalism and dedication. We also express our deep appreciation for the outstanding assistance provided by the Internal Security Section of the Criminal Division of the Department of Justice." Freeh and CIA Director George Tenet kept the Intelligence Committees of Congress, because of the clear national security and foreign policy implications, informed about the case. As a result of Hanssen's actions, Freeh has ordered a comprehensive review of information and personnel security programs in the FBI. Former FBI Director and Director of Central Intelligence William H. Webster will lead the review. Webster, currently in private law practice, brings a "unique experience and background in government management and counterintelligence," Freeh said. "Moreover, the respect he enjoys throughout the intelligence community and elsewhere in government is second to none. Judge Webster will have complete access and whatever resources that are necessary to complete the task and will report directly to Attorney General Ashcroft and me. I will share his report with the National Security Council and then Congress as well," Freeh said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2511 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 1:21pm Subject: Statement of FBI Director Louis J. Freeh On the Arrest of FBI Special Agent Robert Philip Hanssen For Immediate Release February 20, 2001 Washington D.C. FBI National Press Office Statement of FBI Director Louis J. Freeh On the Arrest of FBI Special Agent Robert Philip Hanssen Sunday night the FBI arrested Robert Philip Hanssen who has been charged with committing espionage. Hanssen is a Special Agent of the FBI with a long career in counterintelligence. The investigation that led to these charges is the direct result of the longstanding FBI/CIA efforts, ongoing since the Aldrich Ames case, to identify additional foreign penetrations of the United States Intelligence Community. The investigation of Hanssen was conducted by the FBI in partnership with the CIA, the Department of State, and, of course, the Justice Department. The complaint alleges that Hanssen conspired to and did commit espionage for Russia and the former Soviet Union. The actions alleged date back as far as 1985 and, with the possible exception of several years in the 1990s, continued until his arrest on Sunday. He was arrested while in the process of using a "dead drop" to clandestinely provide numerous classified documents to his Russian handler. It is alleged that Hanssen provided to the former Soviet Union and subsequently to Russia substantial volumes of highly classified information that he acquired during the course of his job responsibilities in counterintelligence. In return, he received large sums of money and other remuneration. The complaint alleges that he received over $600,000. The full extent of the damage done is yet unknown because no accurate damage assessment could be conducted without jeopardizing the investigation. We believe it was exceptionally grave. The criminal conduct alleged represents the most traitorous actions imaginable against a country governed by the Rule of Law. As difficult as this moment is for the FBI and for the country, I am immensely proud of the men and women who conducted this investigation. Their actions represent counterintelligence at its very best and under the most difficult and sensitive of circumstances. Literally, Hanssen's colleagues and coworkers at the FBI conducted this investigation and did so quietly, securely and without hesitation. Much of what these men and women did remains undisclosed but their success and that of their CIA counterparts represents unparalleled expertise and dedication to both principle and mission. The complaint alleges that Hanssen, using the code name "Ramon," engaged in espionage by providing highly classified information to the KGB and its successor agency, the SVR, using encrypted communications, dead drops, and other clandestine techniques. The information he is alleged to have provided compromised numerous human sources, technical operations, counterintelligence techniques, sources and methods, and investigations, including the Felix Bloch investigation. The affidavit alleges that Hanssen voluntarily became an agent of the KGB in 1985 while assigned to the intelligence division at the FBI field office in New York City as supervisor of a foreign counterintelligence squad. Hanssen allegedly began spying for the Soviets in 1985 when, in his first letter to the KGB, he volunteered information that compromised several sensitive techniques. He also independently disclosed the identity of two KGB officials who, first compromised by Aldrich Ames, had been recruited by the U.S. Government to serve as "agents in place" at the Soviet Embassy in Washington. When these two KGB officials returned to Moscow, they were tried and convicted on espionage charges and executed. Hanssen subsequently was assigned to a variety of national security posts that legitimately provided him access to classified information relating to the former Soviet Union and Russia. As a result of these assignments within the FBI, Hanssen gained access to some of the most sensitive and highly classified information in the United States Government. To be very clear on this issue, at no time was he authorized to communicate information to agents of the KGB/SVR. Nor can there be any doubt that he was keenly aware of the gravity of his traitorous actions. He later wrote to his KGB handler, speaking about the severity with which U.S. laws punishes his alleged actions, and acknowledging "...I know far better than most what minefields are laid and the risks." Hanssen was detailed to the Office of Foreign Missions at the Department of State from 1995 to 2000. The complaint, however, does not allege any compromises by him at the State Department. In one letter to his Russian handlers, Hanssen complains about lost opportunities to alert them that the FBI had discovered the microphone hidden at the State Department, known then by the FBI but apparently not by Hanssen as being monitored by a Russian intelligence officer. In this assignment, however, Hanssen did continue to have access to sensitive FBI information as he remained assigned to the FBI's National Security Division and routinely dealt with sensitive and classified matters. For many years, the CIA and FBI have been aggressively engaged in a sustained analytical effort to identify foreign penetrations of the Intelligence Community. That effort is complemented by substantial FBI proactive investigation of foreign service intelligence officers here and by the critical work done by the CIA. Because of these coordinated efforts, the FBI was able to secure original Russian documentation of an American spy who appeared to the FBI to be Hanssen -- a premise that was soon to be confirmed when Hanssen was identified by the FBI as having clandestinely communicated with Russian intelligence officers. As alleged in the complaint, computer forensic analysis, substantial covert surveillance, court authorized searches and other sensitive techniques revealed that Hanssen has routinely accessed FBI records and clandestinely provided those records and other classified information to Russian intelligence officers. As alleged, he did so using a variety of sophisticated means of communication, encryption, and dead drops. Further, the complaint alleges that Hanssen, using his training and experience to protect himself from discovery by the FBI, never met face-to-face with his Russian handlers, never revealed to them his true identity or where he worked, constantly checked FBI records for signs he and the drop sites he was using were being investigated, refused any foreign travel to meet with the Russians, and even declined to accept any "trade craft." Hanssen never displayed outward signs that he was receiving large amounts of unexplained cash. He was, after all, a trained counterintelligence specialist. For these reasons, the FBI learned of his true identity before the Russians; they are learning of it only now. Even without knowing who he was or where he worked, Hanssen's value to the Russians was clear both by the substantial sums of money paid and the prestigious awards given to their own agents for Hanssen's operation. While this arrest represents a counterintelligence investigative success, the complaint alleges that Hanssen located and removed undetected from the FBI substantial quantities of information that he was able to access as a result of his assignments. None of the internal information or personnel security measures in place alerted those charged with internal security to his activities. In short, the trusted insider betrayed his trust without detection. While the risk that an employee of the United States Government will betray his country can never be eliminated, there must be more that the FBI can do to protect itself from such an occurrence. I have asked Judge William H. Webster, and he has graciously agreed, to examine thoroughly the internal security functions and procedures of the FBI and recommend improvements. Judge Webster is uniquely qualified as a former FBI Director, CIA Director and Director of Central Intelligence to undertake this review. This is particularly timely as we move to the next generation of automation to support the FBI's information infrastructure. Judge Webster and anyone he selects to assist him will have complete access and whatever resources are necessary to complete this task. He will report directly to the Attorney General and me and we will share his report with the National Security Council and Congress. I intend to act swiftly on his recommendations. Before concluding, I would like to take this opportunity to thank Director of Central Intelligence George Tenet for the cooperation and assistance of his agency in this investigation. Through our cooperative efforts, the FBI and CIA were able to learn the true identity of "Ramon" and the FBI was able to conduct a solid investigation. Our joint efforts over the last several years and specifically in this case should give pause to those contemplating betrayal of the Nation's trust. Without the current unprecedented level of trust and cooperation between the CIA and FBI, making this case would not have been possible. Nor would many other intelligence and counterintelligence accomplishments that routinely but quietly contribute to the security of this Nation. Through Attorney General John Ashcroft, I would like to thank the Department of Justice and the U.S. Attorney's Office for the Eastern District of Virginia. The level of support and expertise from Acting Deputy Attorney General Robert Mueller, Counsel for Intelligence Policy Frances Fragos Townsend, U.S. Attorney Helen Fahey and Assistant United States Attorney Randy Bellows is superb. We particularly appreciate the unhesitating leadership and support of Attorney General Ashcroft from the moment he took office. Director Tenet and I have briefed the intelligence committees of Congress because of the clear national security implications. As Director of the FBI, I am proud of the courageous men and women of the FBI who each day make enormous sacrifices in serving their country. They have committed their lives to public service and to upholding the high standards of the FBI. Since becoming Director over seven years ago, I have administered the FBI oath to each graduating class of Special Agents at the FBI Academy. Each time, I share the pride and sanctity of those words when new agents swear to "support and defend the Constitution of the United States against all enemies, foreign and domestic" and to "bear true faith and allegiance to the same." Regrettably, I stand here today both saddened and outraged. An FBI Agent who raised his right hand and spoke those words over 25 years ago has been charged today with violating that oath in the most egregious and reprehensible manner imaginable. The FBI entrusted him with some of the most sensitive secrets of the United States Government and instead of being humbled by this honor, Hanssen has allegedly abused and betrayed that trust. The crimes alleged are an affront not only to his fellow FBI employees but to the American people, not to mention the pain and suffering he has brought upon his family. Our hearts go out to them. I take solace and satisfaction, however, that the FBI succeeded in this investigation. As an agency, we lived up to our responsibility, regardless of how painful it might be. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2512 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 1:24pm Subject: Another Spy suspect is arrested - This one is in Sweden Spy suspect is arrested February 20, 2001 Web posted at: 1:34 PM EST (1834 GMT) STOCKHOLM, Sweden -- Security police have arrested a man suspected of espionage, a spokesperson for Sweden's security police, Sapo, has confirmed to CNN Sweden. According to the tabloid Expressen, the man is believed to have been spying for Russia, although the Swedish Defence Ministry said the affair did not involve the Swedish military or the military industry. The report comes at a sensitive time for Sweden, a month before Russian President Vladimir Putin visits for the first time. The alleged spy worked for Swedish-Swiss industrial giant ABB (Asea Brown Boveri). Charlie Nordblom, senior information manager at ABB in Sweden told CNN: "We have been informed by prosecutors that an employee at ABB has been arrested suspected of espionage. "We assisted the Swedish security police ahead of the arrest." He declined to say what post the arrested person held. Likewise, Swedish security police have declined to give any details on his identity, the time period in question, what the espionage was directed against or how the suspect¥s activities were disclosed. Christian Democrat leader Alf Svensson said Tuesday that the affair would affect Swedish-Russian relations. ABB is one of the largest industrial, energy and automation companies in the world. The ABB Group employs about 160,000 people in more than 100 countries and serves customers in power transmission and distribution; automation; oil, gas, and petrochemicals; building technologies; financial services and IT applications. Threats against Sweden from spies have in recent years been redirected from military issues to commercial, technological and industrial interests. The case is the first in Sweden involving Russia or the Soviet Union in more than two decades, and the fifth since the end of World War II. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2513 From: Mike F Date: Tue Feb 20, 2001 5:57pm Subject: NSA's Security Enhanced Since I finally do have Linux on my computer, this Version of Linux sounds Interesting. http://www.nsa.gov/selinux/ later4,mike f [Non-text portions of this message have been removed] 2514 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:20pm Subject: FBI Says Suspect Agent Well Trained FBI Says Suspect Agent Well Trained http://www.worldnews.com/?action=display&article=5844221&template=worldnews/search.txt&index=recent The Associated Press, Tue 20 Feb 2001 WASHINGTON (AP) ≠ Robert Philip Hanssen was supposed to be a spy of sorts in his own country, keeping tabs on the comings and goings of foreign diplomats. The veteran FBI agent was trained all too well. The very professionalism the Chicago native brought to the task helped him operate without detection for more than a decade as a spy for Moscow, the FBI says. A father of six living in a middle-class Virginia suburb, Hanssen knew how to hide his identity even from his handlers and how to watch the FBI to see if it was watching him, authorities said after charging him with espionage. He was aware, too, of how severe the treatment can be for caught spies. ``I know far better than most what mine fields are laid and the risks,'' Hanssen wrote to a KGB handler, according to correspondence quoted by FBI Director Louis Freeh. For all his anger, Freeh paid what sounded like grudging compliments to techniques the former Chicago police officer and 25-year FBI veteran ≠ a student of Russian in college ≠ is alleged to have used. ``In short, the trusted insider betrayed his trust without detection,'' Freeh said. For Hanssen, an FBI career that began with his taking the agency's oath ended in a Virginia park Sunday night, where colleagues read him his Miranda rights. Nothing special set him apart in his Vienna, Va., neighborhood, say the neighbors, although one complained that he let his dog roam and create a nuisance. Hanssen, 56, made a home for himself, his wife and their children in a $300,000 split-level, brick-and-cedar house with a one-car garage, a Ford Taurus and that other symbol of suburban living ≠ a minivan. A basketball hoop is in the driveway. Hanssen's wife, Bernadette, teaches religion part-time at a local Catholic high school, and the family came regularly to block parties, such as the one every Memorial Day. ``Not overly gregarious,'' Nancy Cullen said of him. She lives several doors down from the Hanssens in a cul-de-sac she describes as ``our town hall.'' When neighbor called neighbor to share the news of his arrest, the reaction was, ``No way,'' Cullen said. ``I've been in his house. I've never seen any Soviet flags or anything like that, if that's what you're asking,'' said Matt Bennett, who lives across the street. The government says Hanssen had a long relationship with the Soviet Union and the Russians, dating back to 1985, while assigned to the intelligence division of the FBI field office in New York City. Operating under the code name ``Ramon,'' Hanssen kept his real identity a secret even from his Russian handlers, who did not find out his name or who employed him until his arrest was disclosed, Freeh said. Hanssen also checked his agency's own security systems to see whether authorities had any suspicions about him ≠ which they apparently did not until late last year. ``He was, after all, a trained counterintelligence specialist,'' Freeh said. From February 1995 until January, Hanssen was the FBI's senior representative to the State Department's Office of Foreign Missions, where he oversaw an interagency counterintelligence group. He was returned to FBI headquarters last month in a newly created position designed so that the bureau could monitor his daily activities without alerting him to its investigation. Hanssen apparently contemplated several careers before settling on one in law enforcement. He earned a bachelor's degree in chemistry from Knox College in Galesburg, Ill., in 1966, according to the government's information. He then studied dentistry at Northwestern until 1968 before receiving a master's in accounting from the university in 1971. He became a certified public accountant in 1973. He worked as a junior accountant at a Chicago firm from 1971 to 1972, when he joined the city police department as an investigator in the financial section of its inspection division. Hanssen joined the FBI in January 1976, and served initially in Indiana before assignments that took him back and forth between offices in New York and the Washington headquarters. ≠≠≠ Associated Press writer Matt Barakat in northern Virginia contributed to this report. Copyright 2001 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2515 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:22pm Subject: FBI Russia spy caused "grave" damage [Note: The use of the work "Grave" indicates that he was passing Top Secret information to his handlers.] FBI Russia spy caused "grave" damage http://uk.news.yahoo.com/010220/80/b4fs8.html By Sue Pleming WASHINGTON (Reuters) - An FBI counter-intelligence expert was charged on Tuesday with betraying Soviet double agents and of selling secrets to Moscow in what experts called one of the worst espionage cases in recent U.S. history. Robert Philip Hanssen was arrested on Sunday after FBI agents watched him drop off a package of classified information at a park near his northern Virginia home, which was to be picked up by his Russian handlers. FBI director Louis Freeh said Hanssen, a 25-year FBI veteran, had access to some of the "most sensitive and highly classified information" in the U.S. government. Hanssen, 56, who has six children, was alleged to have been paid $1.4 million (970,000 pounds) by the Russians in cash and diamonds. Prosecutors said he could face a possible death sentence for each of two formal charges laid against him. Formal charges filed against him at a federal court in Arlington, Virginia on Tuesday related to two incidents toward the end of the Cold War. One claimed Hanssen made available classified documents to the KGB in March, 1989 and the other said that in October 1985 he betrayed three Russian KGB agents who were also working for the United States. Freeh said Hanssen's spying continued until his arrest on Sunday with a break in the 1990s. "The criminal conduct alleged represents the most traitorous actions imaginable against a country governed by the rule of law," Freeh said. No full damage assessment had yet been made, to avoid jeopardising the investigation, Freeh said, but added: "We believe it was exceptionally grave." Freeh displayed photographs of various drop-off locations used by Hanssen as well as a photograph Freeh said showed a package containing $50,000 in cash which had been waiting for the agent at a pick-up point in a park in Arlington. SHOCKED AND SURPRISE Agents who arrested him said he seemed "shocked and surprised" when he was caught because he thought he had been so careful, Freeh said. Using the code name "Ramon," Freeh said Hanssen provided highly classified information to the KGB and its successor agency, the SVR, using encrypted communication, dead drops and other clandestine techniques. He said Hanssen independently disclosed the identity of two KGB officials who, first compromised by convicted CIA spy Aldrich Ames, had been recruited by the U.S. government at the Soviet embassy in Washington. "When these two KGB officials returned to Moscow, they were tried and convicted on espionage charges and executed," Freeh said. President George W. Bush said he was deeply disturbed by what he described as "extremely serious" allegations. On a visit to St Louis, Bush said: "This has been a difficult day for those who love our country and especially for those who serve our country in law enforcement and the intelligence community." Bush said he had the "utmost confidence" in Freeh, contrasting with a lukewarm backing by former President Bill Clinton. Freeh, who said he was "saddened and outraged" by the case, praised his staff for tracking down Hanssen. He announced that former CIA and FBI Director William Webster would conduct a full review to see where security had been breached. SILENT AND SOLEMN At his arraignment in federal court, Hanssen, dressed in a black turtle neck, black shirt and grey slacks and looking weary, was silent and solemn as the two charges were read out. Defence lawyer Plato Cacheris said he planned at this stage to plead not guilty, adding that his client was "emotional" and quite "upset" by the case against him. Attorney General John Ashcroft said the arrest of Hanssen should remind every American that their country was an "international target in a dangerous world." "In fact espionage operations designed to steal vital secrets of the United States are as intense today as they ever have been," Ashcroft told a news conference. In Moscow, spokesmen for both the Ministry of Foreign Affairs and Foreign Intelligence Service said they had no details on the case and they did not comment on matters of this type. Freeh said an internal FBI investigation began late last year after an internal intelligence audit revealed the presence of a mole in the agency. The United States then secretly obtained Russian documents that led them to suspect Hanssen. Hanssen's most recent job has been working out of FBI headquarters in Washington. His previous posts included performing surveillance on Russian government missions to the United States. He was also assigned to helping the State Department resolve a string of recent security problems, including the discovery of a listening device in a conference room that was monitored by a Russian agent in his car nearby. Freeh said the complaint against Hanssen did not allege any compromises by him at the State Department. The FBI veteran had, in fact, complained of "lost opportunities" to alert his Russian handlers that the FBI found the listening device. Hanssen is the third FBI agent in history to be arrested on charges of spying for the Russians. The others were Richard Miller, in the mid-1980s, and Earl Pitts, a lawyer who was convicted in the late 1990s. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2516 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:23pm Subject: FBI Spy Case Like Life Imitating Art FBI Spy Case Like Life Imitating Art http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,745450,00.html Tuesday February 20, 2001 10:40 pm WASHINGTON (AP) - The government's case against FBI agent Robert Philip Hanssen seems like reality imitating art, spy novel material that includes executed double-agents, package drops along park footbridges and payments in diamonds. All going on for 15 years. Hanssen, 56, only the third FBI agent ever accused of spying, was accused Tuesday of espionage and conspiracy to commit espionage. In one of many letters quoted in an FBI affidavit, Hanssen was alleged to have written to his Russian handlers on Nov. 17, 2000, of his possible fate if caught: ``Recent changes in U.S. law now attach the death penalty to my help to you as you know, so I do take some risk.'' The allegations of a Hanssen relationship with the Soviet KGB intelligence agency and its successor, the SVR, included both bizarre and lighter moments. There was contact through use of a newspaper ad purporting to sell a 1971 Dodge that ``needs engine work,'' the FBI affidavit said. When the KGB asked how Hanssen would explain the diamonds he received, the agent was ready to tell everyone they came from his grandmother, it said. In a Dec. 25 message from the Russians, the American was offered ``Christmas greetings from the KGB,'' according to the documents. And to show appreciation in another instance, the Russians were said to have quoted poetry: ``What's our life, if full of care. You have no time to stop and stare?'' ``You've managed to slow down the speed of your running life to send us a message. And we appreciate it,'' the Russians were quoted as saying in the affidavit. They also commended Hanssen for ``your superb sense of humor and your sharp-as-a-razor mind,'' it said. According to the FBI, Hanssen's spying began with an Oct. 1, 1985, letter to a KGB official in the United States. ``Soon I will send a box of documents. ... They are from certain of the most sensitive and highly compartmented projects of the U.S. intelligence community,'' wrote the man the Russians knew as ``B.'' ``I believe they are sufficient to justify a $100,000 payment to me,'' Hanssen allegedly said in the letter included in the affidavit. The letter said the KGB had ``recently suffered some setbacks'' and warned that three Russian agents ``have been recruited by our 'special services,''' the affidavit said, adding that Hanssen identified the three, and two eventually were executed. Mostly using footbridges at parks in Washington's Virginia suburbs, the FBI alleged, Hanssen would signal the Russians of a package drop with a vertical white adhesive tape, and the Russians would respond with a piece of horizontal adhesive tape. On March 3, 1986, it said, Hanssen wrote the Russians that money wasn't always the best form of payment. ``As far as the funds are concerned, I have little need for more than the $100,000. It merely provides a difficulty since I cannot spend it, store it or invest it easily without triping (sic) 'drug money' warning bells,'' the letter said. ``Perhaps some diamonds as security to my children and some good will'' would be better, it said. On June 30, 1986, authorities said, Hanssen wrote: ``If you wish to continue our discussions, please have someone run an advertisement in the Washington Times'' saying: ``Dodge Diplomat, 1971, needs engine work, $1,000.'' According to the affidavit, Hanssen said he would respond: ``I will say, 'Hello, my name is Ramon. I am calling about the car you offered for sale in the Times.' You will respond, 'I m sorry, but the man with the car is not here, can I get your number?''' Several weeks later, an angry Hanssen allegedly wrote his contacts after a missed package exchange: ``I found the site empty. Empty bothers me.'' The FBI said it was Hanssen who ruined an investigation of a U.S. foreign service officer, Felix Bloch, by disclosing the probe to the Russians. Bloch then received a call saying his Soviet contact ``cannot see you in the near future'' because ``he is sick'' and ``a contagious disease is suspected,'' the affidavit said. ``The FBI was unable further to develop its investigation of Bloch,'' it said. All this was playing well in Moscow, where in 1989 the KGB officers involved in the operation allegedly involving Hanssen won the highly coveted Order of the Red Banner, Order of the Red Star and the Medal for Excellent Service. But the FBI said that by last March, a Hanssen letter to the Russians showed a man in despair. ``I have come about as close as I ever want to come to sacrificing myself to help you and I get silence,'' Hanssen allegedly wrote. ``I hate silence. ... Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2517 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:25pm Subject: FBI Agent Accused of Russia Spying FBI Agent Accused of Russia Spying http://newsroom.compuserve.com/nr/editorial.asp?floc=NT-SL1-FBISPY&idq=/cp/news/cntopics/slot2/slot2.asp&PageView=POL&CoView=&BTM=H By KAREN GULLO Associated Press Writer WASHINGTON (AP) -- A veteran FBI agent has been arrested on an espionage charge, accused of spying for Russia, the FBI said Tuesday. The agent, Robert Philip Hanssen, was arrested at his home in Vienna, Va., Sunday night, said FBI spokesman Bill Carter. He was to be arraigned later Tuesday in U.S. District Court in Alexandria, Va. Attorney General John Ashcroft and CIA Director George Tenet scheduled an early afternoon news conference to discuss the arrest. Although the FBI refused to provide details immediately, NBC News and CNN said Hanssen has been an FBI agent 27 years and had worked for a major part of his career in counterintelligence -- spying on Russian government outposts in the United States. He worked out of the FBI's Washington headquarters and also had been assigned to the State Department. NBC said Hanssen was arrested shortly after FBI agents saw him deposit a package of classified information at a "dead drop'' in a Virginia park. The network quoted FBI officials as saying that among secrets disclosed by Hanssen included U.S. methods for conducting electronic surveillance. He also may have confirmed for the Russians information originally supplied to them by convicted CIA spy Aldrich Ames. NBC said Hanssen is accused of causing extreme damage to U.S. security. Nancy Cullen, a neighbor, described Hanssen's neighborhood as being in shock with news of the arrest. "They go to church every Sunday -- if that means anything -- loading all six kids into the van.'' She said the Hanssens were regulars at the Memorial Day block party and called Hanssen "very attractive ... not overly gregarious.'' Last year a former Army officer was accused of spying for the Soviet Union and Russia for 25 years. Prosecutors said retired Army Reserve Col. George Trofimoff, who was a civilian intelligence employee, was captured on one tape putting his hand to his heart and telling an undercover agent posing as a Russian agent: "I'm not American in here.'' 20-Feb-01 08:22 EST -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2518 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 6:25pm Subject: F.B.I. Arrests Veteran Agent for Suspicion of Espionage February 20, 2001 F.B.I. Arrests Veteran Agent for Suspicion of Espionage http://www.nytimes.com/reuters/national/20WIRE-SPY.html By REUTERS WASHINGTON - A 27-year veteran of the Federal Bureau of Investigation has been arrested on suspicion of spying for Russia for the past 15 years, the FBI said Tuesday. FBI spokeswoman Jill Stillman said FBI agent Robert Philip Hanssen was arrested Sunday at his home outside Washington after he allegedly dropped off a package of classified information at a park in northern Virginia. "He was arrested for espionage," Stillman told Reuters, adding that Hanssen was due to appear in federal court at 11 a.m. EST in Alexandria, Virginia. Money motivated Hanssen to spy for Russia, FBI officials said. "The damage is significant," one U.S. official said on condition of anonymity. "The kinds of things he compromised involved documents, sources, operations." Among the secrets Hanssen, a counter-terrorism expert, allegedly disclosed were methods the United States uses to conduct electronic surveillance, the FBI said. Neighbors of Hanssen in Vienna, Virginia, described him as a composed, dedicated, hard-working man who went to church every Sunday with his wife and six children. FBI chief Louis Freeh was due to give a news conference at 12:45 p.m. Tuesday to provide details about the arrest and Hanssen's alleged spying activities. In Moscow, spokesmen for both the Ministry of Foreign Affairs and Foreign Intelligence Service said they had no details on the case and that they did not comment on matters of this type. PREVIOUS AGENT'S INFORMATION The FBI said Hanssen also may have confirmed for the Russians information originally given to them by convicted American super spy Aldrich Ames, a veteran officer for the Central Intelligence Agency who betrayed many U.S. agents in the former Soviet Union. Hanssen was initially suspected of being a spy for Russia several months ago after an internal intelligence audit revealed the presence of a mole in the FBI. The United States then secretly obtained Russian documents that led them to suspect Hanssen, the FBI said. Hanssen's most recent job has been working out of FBI headquarters in Washington. His previous posts included performing surveillance on Russian government missions to the United States. He was also assigned to helping the State Department resolve a string of recent security problems, including the discovery of a listening device in a conference room that was monitored by a Russian agent in his car nearby. It is unclear whether Hanssen was involved in any of the security breaches at the State Department. He becomes the third FBI agent in history to be arrested on charges of spying for the Russians. The others were Richard Miller, in the mid-1980s, and Earl Pitts, a lawyer who was convicted in the late 1990s. Hanssen's neighbor, Nancy Cullen, said she was surprised by the arrest and had never suspected he was anything but a "dedicated, hard-working guy". "We are all in shock this morning," said Cullen. "They are just the best of neighbors," she said in an interview with CNN. Cullen said the Hanssens did not appear to have any financial problems and did not live beyond their means. "None of our houses are very fabulous ... They've had the same van for 10 or 12 years. I said "Bonnie get yourself a new van'," said Cullen of her conversation recently with Hanssen's wife Bonnie. Cullen described the couple's children as very polite, well-schooled people. "It's just all so sad," she said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2519 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 7:51pm Subject: The allegations against Hanssen The allegations against Hanssen ------------------------------------------------------------------------ The following are excerpts of the allegations from the affidavit, as transcribed by The Associated Press: --- SUMMARY OF INVESTIGATION -The results of this investigation to date indicate that there is probable cause to believe that, beginning in 1985 and continuing to the present, Robert Philip Hanssen (hereinafter "Hanssen"), a United States citizen, has conspired with officers and agents of the Union of Soviet Socialist Republics (hereinafter "USSR" or "Soviet Union") and with its principal successor state, the Russian Federation (hereinafter "Russia") to commit espionage against the United States on behalf of a foreign government, specifically the Soviet Union or Russia, and has in fact engaged in such espionage. -The evidence establishes that between 1985 and the present, Hanssen - who the KGB/SVR referred to as "B" - has engaged in the following conduct in violation of (federal laws) 18 U.S.C. 794 (a) and (c): --- -(a) He compromised numerous human sources of the United States Intelligence Community. Three of these sources were compromised by both Hanssen and former CIA officer Aldrich Ames, resulting in their arrest, imprisonment and, as to two individuals, execution. Hanssen compromised these three individuals expressly in order to enhance his own security and enable him to continue spying against the United States. -(b) He compromised dozens of United States Government classified documents, including documents concerning the National MASINT (Measurement and Signature Intelligence) Program (classified TOP SECRET/SCI), the United States Double Agent Program (classified SECRET), the FBI Double Agent Program (classified TOP SECRET), the United States Intelligence Community's Comprehensive Compendium of Future Intelligence Requirements (classified TOP SECRET), a study concerning KGB recruitment operations against the CIA (classified SECRET), an assessment of the KGB's effort to gather information concerning certain United States nuclear programs (classified TOP SECRET), a CIA analysis of the KGB's First Chief Directorate (classified SECRET), a highly classified and tightly restricted analysis of the foreign threat to a specific named highly compartmented classified United States Government program (classified TOP SECRET/SCI), and other classified documents of exceptional sensitivity. --- -(c) He compromised United States Intelligence Community technical operations of extraordinary importance and value. This included specific electronic surveillance and monitoring techniques and precise targets of the United States Intelligence Community. In one case, he compromised an entire technical program of enormous value, expense and importance to the United States Government. In several other cases, he compromised the United States Intelligence Community's specific communications intelligence capabilities, as well as several specific targets. -(d) He compromised numerous FBI counterintelligence investigative techniques, sources, methods and operations, and FBI operational practices and activities targeted against the KGB/SVR. He also advised the KGB/SVR as to specific methods of operation that were secure from FBI surveillance and warned the KGB/SVR as to certain methods of operation which were subject to FBI surveillance. --- -(e) He disclosed to the KGB the FBI's secret investigation of Felix Bloch, a Foreign Service Officer, for espionage, which led the KGB to warn Bloch that he was under investigation, and completely compromise the investigation. --- -(f) Hanssen's conspiratorial activities continue to the present. Hanssen continues to monitor a particular SVR signal site, doing so on numerous occasions in December 2000, January 2001 and February 2001. A recent search of Hanssen's personal vehicle, pursuant to court authorization, disclosed a number of classified secret documents, entries in a personal journal concerning matters relating to the instant investigation, and items typically used to mark signal sites. It has also been determined that HANSSEN continues to attempt to ascertain whether he has become the subject of FBI investigative interest, including checking FBI records to determine whether there have been recent entries as to his own name, his home address or the signal site. --- -(g) Over the course of Hanssen's espionage activities, he communicated on numerous occasions with KGB/SVR personnel. This Affidavit cites 27 letters he sent to the KGB/SVR, and it describes 33 packages the KGB/SVR left for Hanssen at secret locations, and 22 packages Hanssen left for the KGB/SVR at secret locations. The Affidavit also describes two telephone conversations Hanssen had with KGB personnel. The Affidavit describes 26 computer diskettes that Hanssen passed to the KGB/SVR, containing additional disclosures of information, and 12 diskettes that the KGB/SVR passed to "B." Hanssen provided the KGB/SVR more than 6,000 pages of documentary material. -(h) For his services to the KGB/SVR, Hanssen was paid over $600,000 in cash and diamonds. In addition, the KGB/SVR placed funds in escrow in a Moscow bank on Hanssen's behalf. Some time in the last two years, the KGB/SVR informed Hanssen that the escrowed funds are now worth at least $800,000. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2520 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 7:51pm Subject: FBI Agent Accused of Spying FBI Agent Accused of Spying http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,745621,00.html Wednesday February 21, 2001 12:10 am WASHINGTON (AP) - A veteran FBI agent was accused Tuesday of spying for Russia for more than 15 years, betraying three Russian undercover agents to Moscow and disclosing volumes of U.S. secrets in return for diamonds and up to $1.4 million. The FBI director called the case ``the most traitorous actions imaginable.'' Robert Philip Hanssen, 56, the father of six, was only the third FBI agent ever accused of espionage. President Bush called it ``a difficult day,'' particularly for the law enforcement and intelligence communities. Hanssen, a 25-year FBI agent, was arrested Sunday night at a park in suburban Virginia after dropping a package of documents for his Russian contacts, authorities said. FBI agents confiscated $50,000 hidden for him at a nearby drop site. Hanssen provided Moscow with the identities of two KGB officials who had been recruited by the U.S. government to serve as agents in-place at the Soviet Embassy in Washington, FBI Director Louis Freeh said. The agents, whose names were first compromised by Aldrich Ames, were tried on espionage charges on their return to Moscow and executed. A third KGB official identified by Hanssen was imprisoned but ultimately released, Freeh said. Ames pleaded guilty to spying for the Soviet Union in 1994. Operating under the codename Ramon, Hanssen kept his identity and occupation secret from the Russians, Freeh said. He said Hanssen frequently ran his name, address and his drop sites through FBI computers to see if they had raised any alarms. Sen. Richard Shelby, R-Ala., who said he was briefed on the case a week to 10 days ago as chairman of the Senate Select Committee on Intelligence, said Hanssen may have caused grave harm. ``This could be a very, very, very serious case of espionage,'' Shelby said in a telephone interview from Alabama. ``Here's an agent who is a veteran of the FBI, who's been doing counterintelligence for a long time. He knows a lot. He could have given them a lot.'' Hanssen provided the KGB and its successor agency, SVR, with information since 1985 on top secret U.S. intelligence and counterintelligence activities, including investigative techniques, sources, technical operations, double agents and targets of U.S. intelligence, according to a 100-page FBI affidavit He also tipped off the KGB to the FBI's secret investigation of Felix Bloch, a foreign service agent suspected of spying for Moscow in 1989, the FBI said. The KGB was then able to warn Bloch, the agency said. Justice Department prosecutors were never able to find key evidence that Bloch passed secret documents. Freeh said the extent of damage, while still being assessed, looked to be ``exceptionally grave.'' He added, ``The criminal conduct alleged represents the most traitorous actions imaginable against a country.'' Bush, in a statement that he read to reporters on Air Force One, said that even in the post-Cold War era, espionage is a serious threat to U.S. national security. ``Allegations of espionage are a reminder that we live in a dangerous world, a world that sometimes does not share American values,'' said Bush. ``To anyone who would betray its trust, I warn you, we'll find you and we'll bring you to justice.'' Attorney General John Ashcroft echoed the warning, saying, ``The espionage operations designed to steal vital secrets of the United States are as intense today as they have ever been.'' There's always a risk that an agent with access to top secret information and knowledge of internal security procedures can breach the system, but Freeh said security measures need to be tightened and ordered an internal review, to be headed by former FBI and CIA Director William Webster. ``We don't say, at this stage ... that we have a system that can prevent this type of conduct,'' said Freeh. Hanssen had been spying since 1985, the FBI alleged. It began investigating him at the end of last year, Freeh said. According to the affidavit, Hanssen became an agent of the KGB while he was assigned to the intelligence division of the FBI field office in New York City as supervisor of a foreign counterintelligence squad. The FBI director said agents on Sunday covertly intercepted $50,000 in cash left for Hanssen to pick up. Overall, Freeh said, Hanssen had received more than $650,000 in cash, as well as diamonds, and an additional $800,000 had been set aside for him in an overseas escrow account. ``This was his bread and butter for many, many years,'' said Freeh. Hanssen kept his identity a secret even from the Russians, who did not learn his name or his employer until his arrest, Freeh said. He apparently came under FBI suspicion only late last year. ``The trusted insider betrayed his trust without detection,'' Freeh said. Freeh credited the government for catching Hanssen ``red-handed'' in turning over secret documents but could not explain how an agent was able to work for the Russians undetected for 15 years. Some of Hanssen's contacts have been identified, said Freeh. Hanssen was charged with espionage and conspiracy to commit espionage after an investigation conducted by the FBI, the CIA, the State Department and the Justice Department. Assistant U.S. Attorney Randy Bellows said Hanssen could face the death penalty if convicted and could be fined up to $2.8 million - twice his alleged personal gain from the activities of which he is accused. The FBI agent was charged with passing classified documents to agents for the KGB on March 20, 1989, with the intent of injuring the United States. The charges contended that Hanssen had been spying since October 1985. A hearing was set for March 5. Plato Cacheris, Hanssen's attorney, said he believes federal authorities ``always talk like they have a great case, but we'll see.'' Asked how Hanssen would plead, Cacheris said ``at this point not guilty,'' but he added ``it's very embryonic.'' Cacheris, asked if Hanssen's case was related to that of Ames, replied: ``There's not a connection but there is some relevant material.'' Nancy Cullen, a neighbor, described Hanssen's neighborhood as being in shock with news of the arrest. ``They go to church every Sunday - if that means anything.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2521 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 7:52pm Subject: The FBI spy inspired by Kim Philby The FBI spy inspired by Kim Philby http://www.excite.co.uk/news/story/UKOnlineReportTopNews/IIMFFH54301_2001-02-20_23-30-10_B186379 20/02/01 23:30 By Deborah Zabarenko WASHINGTON (Reuters) - Motivated by an adolescent brush with the story of British double agent Kim Philby, Robert Philip Hanssen allegedly spent much of his FBI career in cloak-and-dagger spying for the Soviet Union and Russia. >From the start, Hanssen was obsessed with security, according to an affidavit supporting federal espionage charges against him. He was arraigned on Tuesday, with a preliminary hearing set for March 5. "My identity and actual position in the community must be left unstated to ensure my security," Hanssen wrote in a note to a Soviet official based in Washington in October 1985. "I must warn of certain risks to my security of which you may not be aware." In that earliest listed contact in the document, Hanssen said Soviet intelligence had "suffered some setbacks," and provided the names of three KGB agents he said had been recruited by the United States, the affidavit said. Two of these agents were later executed. Promising more information in this typed note, which was sent through the U.S. mail, Hanssen asked for $100,000 and set up a coded system to conceal the scheduling of communications: "I will add six (you subtract six) from stated months, days and times in both directions of future communications." Under this system, February 20 would become August 26, and 6 p.m. would become midnight. Later that month, Hanssen allegedly offered signals using white adhesive tape on a signpost near his home in northern Virginia just outside Washington. A horizontal line of tape would mean he was ready to get a KGB package; a vertical piece of tape would mean the drop had occurred; a subsequent horizontal piece of tape would mean the package was received. Such dead drops -- in which the two sides never saw each other -- were the norm during his 15 years working with Soviet and Russian intelligence, the affidavit alleged, and documents said the Russians never knew who their contact was. He initially signed off simply as "B," but later used the aliases "Ramon Garcia," "Jim Baker" and "G. Robertson." He sometimes hinted at changes in his life, such as promotions or travel or family obligations. But he never used his real name. Cash payments of tens of thousands of dollars were sometimes included in the KGB drops, the affidavit said, and while Hanssen found these welcome, he was wary. SUGGESTED PAYMENT IN DIAMONDS "I have little need or utility for more than the 100,000 (dollars)," he allegedly wrote. "It merely provides a difficulty since I cannot spend it, store it or invest it easily without tripping 'drug warning' bells. Perhaps some diamonds as security to my children and some good will so that when the time comes, you will accept my senior services as a guest lecturer. Eventually, I would appreciate an escape plan. Nothing lasts forever." He eventually received $600,000 in cash and diamonds from the Soviets and Russians, the affidavit said; in addition, an escrow account was opened for him in Moscow that eventually was valued at more than $800,000, making his total gain $1.4 million. Under U.S. law, his fine could be double that if convicted; he could also be imprisoned for life or executed. Trained as an accountant, with experience as an investigator in the financial section of the Chicago Police Department, the 56-year-old father of six took his oath of office with the FBI in 1976. But he told his Russian "friends" that he was moved to embark on his course as a double agent as a teenager. "I decided on this course when I was 14 years old," he wrote, according to the affidavit. British turncoat Philby defected to the Soviet Union in 1963 just before being exposed as a spy who had not only damaged Britain but also the United States. "I'd read Philby's book," Hanssen wrote. "Now that is insane, eh! My only hesitations were my security concerns under uncertainty. I hate uncertainty." Using dead drops, Hanssen provided details of defence information, national security information and other matters. What had begun with the homespun signals of tape on signposts, and eventually moved on to such simple signals as different coloured thumbtacks that were visible from slowly moving vehicles also included encrypted computer diskettes. Hanssen, an expert in computer technology, suggested last year that they move on to coded communications through personal digital assistants: "I have a Palm III, which is actually a fairly capable computer. The VII version comes with wireless internet capability built in ... Such a device might even serve for rapid transmittal of substantial material in digital form." His worries about security prompted him to reject any meetings abroad because, according to writings cited in the affidavit, "I must answer too many questions from family, friends and government, plus it is a cardinal sign of a spy." He had disparaging words for the FBI -- "Generally speaking you overestimate the FBI's capacity to interdict you" -- and for the United States in general. "The U.S. can be errantly likened to a powerfully built but retarded child, potentially dangerous, but young, immature and easily manipulated," he wrote, according to the affidavit. "But don't be fooled by that appearance. It is also one which can turn ingenious quickly, like an idiot savant, once convinced of a goal." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Robert C. Motzer <1RCM@e...> Date: Thu Feb 17, 2000 9:34am Subject: Re: Digest Number 186 I also would like to reply to the book reports posted in Digest #186. In doing so I will try to avoid any 'defending of his honor' writings like that which I am sure many others on this list who know Glenn Whidden most certainly must be contemplating. Instead I will simply offer my own personal 'book review' of "The Ear" in an attempt to give those on the list who do not know of Glenn and his writings an opposing view to consider. And to Kevin Murray - Amen to all of your comments, you saved me quite a bit of typing! I too own and have read all of the books referenced by the reviewer. With "The Ear" series I think that one needs to keep in mind the original purpose of that particular three volume set of books. As the reviewer himself stated, "...he has the amazing ability to take a moderately complex topic and write it so that anyone can understand it". Therein lies the key to any fair evaluation of "The Ear" series of books themselves - cost and content included. For it is my understanding that this series of books was originally produced to be used within Glenn's TSCM training courses. Those courses are open to both the 'novice' who is 'just starting to learn' TSCM as well as to the 'pro' who is simply seeking to 'broaden or refresh' his already-established knowledge base. The series was then only later also offered as a 'stand alone' venue simply to honor the many requests for it from those who for various reasons could not take Glenn's course in person. Having taken the course myself I will admit to a certain bit of bios here. However, for the sake of objectivity one only needs to take a look at the prices of some other 'course materials' that are able to be obtained without one actually 'taking' the applicable course itself (and admittedly it is rather tough to find very many of these at all within any discipline, let alone TSCM ). When one does so I believe that for the most part it becomes very clear that the price of Glenn's books often pale in comparison. And please keep in mind that with the preceding statement I am talking about real courses that take a considerable amount of hours and effort for one to complete - not one or two day seminars. Several years ago I was fortunate enough to have been afforded some most excellent TSCM training by my employer. But what I had lacked after completing that training was any kind of 'diploma' to show perspective clients as a testament to my bona fides when soliciting business for my 'night job'. And so that is precisely why I took Glenn's course and had to 'buy' the books referenced in the first place. To me having a diploma with Glenn's name on it was well worth the cost of the books that accompanied the course. What I thought that I was going to wind up learning from those books was secondary. However, after I finished the course (and had read all three books from cover to cover more than a few times) I came to realize that I had in fact learned quite a number of things that my employer's training had failed to teach me. But then again I also had freely availed myself of the give and take 'learning experience' that Glenn offers in support of all of his books - whether it be via e-mail, telephone or however else one chooses to correspond with him. And so perhaps along with the other 'book review criteria' that Kevin mentioned we should also add something like 'personal value to the reviewer' to the list. For in the end isn't that really the true measure of the cost vs. return factor for any book one buys? To me personally all of Glenn's books ("The Ear" most especially) were quite reasonable in price when I consider overall what I got out of them. But on the other hand I have purchased several other TSCM-related books, some for as little as $20, that in my opinion were in of themselves extremely 'overpriced'. To each his own. And as for the Taylor, Udovich book: without a doubt it is a very informative, well written, fact-filled, extremely educational, etc., etc. TEXTBOOK / REFERENCE BOOK. And to that end it is exactly the same as most other books in that broad category - whether they be for TSCM 'education' purposes or for a pre-med biology class ..... much higher-priced then one would like and thinks that they should be, but purchased none-the-less at that inflated price simply because of their very nature. So in essence doesn't that make the Taylor, Udovich book absolutely the same as the reviewer has declared Glenn Whidden's "The Ear" series to be. But then again - that's just my opinion ... thanks for considering it. Just another "Bob" 32 From: Eddy Payne Date: Fri Feb 18, 2000 8:10am Subject: INTRODUCTION Hello Gentlemen, Myself (Eddy Payne) and Chris Claypole would like to thank Mr James M Atkinson for allowing us to join the TSCM community. Whilst we appreciate that this community is aimed at TSCM operation in America and we are UK based, we are truly an international company with clients both at home and overseas. Therefore the cross fertilisation of ideas and working practices will I hope, be of benefit to us all. Chris is our Operations Manager and I am our Research and Development Manager. Between us we have over sixty years of experience in military and government departments. Our background has been with Special Forces, special operations, communications and special projects throughout the world. Our Company, Labyrinth International, is still yet in its infancy having only been formed since the beginning of 1999 and whilst our core business is TSCM, our Company ethos is ìTechnical Solutions for Technical Problemsî. Thank you for taking the time to read this, our introduction to the group. Eddy Payne EJPayne@e... Chris Claypole cclaypole@t... 33 From: Dawn Star Date: Fri Feb 18, 2000 5:53pm Subject: switch software manipulation Dear Charles Patterson, I read your breakout box posting, I remember back in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in those days we had to sort out all combinations of the 25 pairs which were then fed to a vector scope . I still have that unit but have not needed to use it in the last ten years. Electronic phone systems are simpler in the sense of less pairs but more dangerous in that the on site switch can be manipulated in software. In many cases you must dump the software and compare it for covert modifications This is no easy task being so many switches and software, but this is a business for the meticulous...unless you are prepared to hear your words on tape " Yes Mr.Gotti we tested your lines and they're clean...no problem" Best, Roger [Non-text portions of this message have been removed] 34 From: Paul de Cogan Date: Sun Feb 20, 2000 1:35pm Subject: Re: INTRODUCTION Dear Edie & Chris, Best of luck and cotiuing sucess to your ventures , From the Minerva (TSCM Team ) Group. Paul de Cogan. >From: "Eddy Payne" >Reply-To: TSCM-L@onelist.com >To: "TSCM-L" >CC: "Tim Graham" >Subject: [TSCM-L] INTRODUCTION >Date: Fri, 18 Feb 2000 14:10:04 -0000 > >Hello Gentlemen, > >Myself (Eddy Payne) and Chris Claypole would like to thank Mr James M >Atkinson for allowing us to join the TSCM community. Whilst we appreciate >that this community is aimed at TSCM operation in America and we are UK >based, we are truly an international company with clients both at home and >overseas. Therefore the cross fertilisation of ideas and working practices >will I hope, be of benefit to us all. Chris is our Operations Manager and >I >am our Research and Development Manager. Between us we have over sixty >years >of experience in military and government departments. Our background has >been with Special Forces, special operations, communications and special >projects throughout the world. > >Our Company, Labyrinth International, is still yet in its infancy having >only been formed since the beginning of 1999 and whilst our core business >is >TSCM, our Company ethos is ìTechnical Solutions for Technical Problemsî. > >Thank you for taking the time to read this, our introduction to the group. > >Eddy Payne EJPayne@e... >Chris Claypole cclaypole@t... > > > > > > > > > ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com 35 From: Charles Patterson Date: Sun Feb 20, 2000 2:42pm Subject: Re: switch software manipulation Another problem with some of the more poorly designed electronic switches is that you can mess 'em up if you short out the wrong pair. In the small office variety, the Intertel GMX will blow it's master fuse if you short an extension pair, a Panasonic analog system can drop all co calls if a data pair is shorted! as you say, a job for the meticulous. charles ----- Original Message ----- From: Dawn Star To: Sent: Friday, February 18, 2000 6:53 PM Subject: [TSCM-L] switch software manipulation > > From: "Dawn Star" > > Dear Charles Patterson, I read your breakout box posting, I remember back in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in those days we had to sort out all combinations of the 25 pairs which were then fed to a vector scope . I still have that unit but have not needed to use it in the last ten years. Electronic phone systems are simpler in the sense of less pairs but more dangerous in that the on site switch can be manipulated in software. In many cases you must dump the software and compare it for covert modifications This is no easy task being so many switches and software, but this is a business for the meticulous...unless you are prepared to hear your words on tape " Yes Mr.Gotti we tested your lines and they're clean...no problem" > Best, Roger > > > [Non-text portions of this message have been removed] > > > ------------------------------------------------------------------------ > Shop the web for great deals. Save on Computers, > electronics, Home furnishings and more. > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 36 From: Jay Coote Date: Fri Feb 4, 2005 3:39pm Subject: Re: switch software manipulation Not that this would ever happen to be, but I know of a fellow who performed a sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. The hapless and tired sweeper blew a fuse in the client's ESU, and I am certain he had that sinking feeling as he realized the time and the unusual type of the fuse. Fortunately, a thoughtful telephone technician left some spares. Jay Coote ---------- > From: "Charles Patterson" > > Another problem with some of the more poorly designed electronic switches is > that you can mess 'em up if you short out the wrong pair. In the small > office variety, the Intertel GMX will blow it's master fuse if you short an > extension pair, a Panasonic analog system can drop all co calls if a data > pair is shorted! > > as you say, a job for the meticulous. > > charles > > > ----- Original Message ----- > From: Dawn Star > To: > Sent: Friday, February 18, 2000 6:53 PM > Subject: [TSCM-L] switch software manipulation > > > > > > From: "Dawn Star" > > > > Dear Charles Patterson, I read your breakout box posting, I remember back > in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in > those days we had to sort out all combinations of the 25 pairs which were > then fed to a vector scope . I still have that unit but have not needed to > use it in the last ten years. Electronic phone systems are simpler in the > sense of less pairs but more dangerous in that the on site switch can be > manipulated in software. In many cases you must dump the software and > compare it for covert modifications This is no easy task being so many > switches and software, but this is a business for the meticulous...unless > you are prepared to hear your words on tape " Yes Mr.Gotti we tested your > lines and they're clean...no problem" > > Best, Roger > > > > > > [Non-text portions of this message have been removed] > > > > > > ------------------------------------------------------------------------ > > Shop the web for great deals. Save on Computers, > > electronics, Home furnishings and more. > > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ------------------------------------------------------------------------ > You have a voice mail message waiting for you at iHello.com: > http://click.egroups.com/1/1381/1/_/_/_/951080721/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > 37 From: Trace Carpenter Date: Mon Feb 21, 2000 0:12pm Subject: Re: switch software manipulation I haven't been in the office much lately, so I haven't followed this tread very closely. Therefore I apologize if this is redundant, however if monitoring the wire pair for audio passage is the problem, you can build a fantastic little interface out of a 1:1 transformer and a non polarized capacitor. Both available at your local RadShk for a couple of bucks. You can even use a three pair RJ surface jack as a project box for the interface. We use them all the time when we're bringing audio from one source to another to keep from getting that nasty hum that you'll often get from dissimilar grounds. In fact we came up with it for use in an East Texas radio station that was having that hum problem with their equipment that they used to put callers on the air. They're cheap, easy and the nice thing is that since the transformer is a 1:1 and the cap is non polarized, there is no wrong way to hook it up and your equipment is totally isolated from the wire pairs. Like I said, I haven't been able to follow this tread lately so if this answer doesn't fit the original question, please accept my apologies. Jay Coote wrote: > From: "Jay Coote" > > Not that this would ever happen to be, but I know of a fellow who performed a > sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. > The hapless and tired sweeper blew a fuse in the client's ESU, and I am > certain he had that sinking feeling as he realized the time and the unusual type > of the fuse. Fortunately, a thoughtful telephone technician left some spares. > > Jay Coote > > ---------- > > From: "Charles Patterson" > > > > Another problem with some of the more poorly designed electronic switches is > > that you can mess 'em up if you short out the wrong pair. In the small > > office variety, the Intertel GMX will blow it's master fuse if you short an > > extension pair, a Panasonic analog system can drop all co calls if a data > > pair is shorted! > > > > as you say, a job for the meticulous. > > > > charles > > > > > > ----- Original Message ----- > > From: Dawn Star > > To: > > Sent: Friday, February 18, 2000 6:53 PM > > Subject: [TSCM-L] switch software manipulation > > > > > > > > > > From: "Dawn Star" > > > > > > Dear Charles Patterson, I read your breakout box posting, I remember back > > in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in > > those days we had to sort out all combinations of the 25 pairs which were > > then fed to a vector scope . I still have that unit but have not needed to > > use it in the last ten years. Electronic phone systems are simpler in the > > sense of less pairs but more dangerous in that the on site switch can be > > manipulated in software. In many cases you must dump the software and > > compare it for covert modifications This is no easy task being so many > > switches and software, but this is a business for the meticulous...unless > > you are prepared to hear your words on tape " Yes Mr.Gotti we tested your > > lines and they're clean...no problem" > > > Best, Roger > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > > > ------------------------------------------------------------------------ > > > Shop the web for great deals. Save on Computers, > > > electronics, Home furnishings and more. > > > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > ------------------------------------------------------------------------ > > You have a voice mail message waiting for you at iHello.com: > > http://click.egroups.com/1/1381/1/_/_/_/951080721/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > > ------------------------------------------------------------------------ > Get what you deserve with NextCard Visa! ZERO! Rates as low as > 0.0% Intro APR, online balance transfers, Rewards Points, no > hidden fees, and much more! Get NextCard today and get the credit > you deserve! Apply now! Get your NextCard Visa at: > http://click.egroups.com/1/966/1/_/_/_/951152904/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 38 From: Hoffman Date: Mon Feb 21, 2000 8:48am Subject: Government intruding on security industry; again. Here is a miscellanous piece of information which I picked up while reading this months issue of "Security" magazine [1]. I'm following up on the details and will post more if If I find out anything relevant. (Incidentally, this article just gives me an excuse to discuss something which I've wanted to talk about for a while. I feel it is a gross injustice to free trade in this country. Also, I think the majority has a really lopsided view about so-called privacy in this country.. People have become so accustomed to video camers in this country that we no longer view them as "privacy invasive"; yet somehow people have a problem with audio.) It appears that once again, some individuals within the government are taking it upon themselves to interfere with the free trade of lawful business. This time US DoJ is reported to be conducting investigations of CCTV manufacturers (or more likely resellers, aka "the little guy") who sell units with USC 18, 119 capabilities (aka "Title III"; although I dont know why people keep using that phrase, as it does not seem to apply anymore.) Anyone who knows security products well and follows the industry closely, knows that these CCTV units with audio capability are quite popular, and have become moreso in the last few years. We're not talking "under the table dealings" by some tiny manufacturer in his secret spy laboratory. Major CCTV manufacturers are making these units and have been selling them for what I view as very legitimate security uses. And we're not just talking "intercoms" here. We know what people are using this stuff for. The hypocrisy in this country just reeks in my opinion. We've got a whole lot of really dumb people in my opinion who have absolutely no problem with the fact that virtually no CCTV laws exist (not on the federal level; and even on the state level, such laws are scarce). People seem to have no problem whatsoever with the fact that CCTV can (and has been) installed in bathrooms, dressing rooms, etc.. as long as it is business that is doing the snooping for "legitimate security concerns".. Yet, as soon as we talk audio capability, all of a sudden the nutcases come out of the woodwork and complain about "privacy violations"; gimme a break. Talk about double-standards. Anyway, so we'll just sit back and wait to see who gets arrested. My bet is that as usual; the government will pick the easiest targets; aka "the little guy". The govt won't go after the manufacturers, as they rarely do, such is the case when the govt has bullied little "spy shops", but refuse to go after the manufacturers of audio intercept equipment who are selling this eqpt to the spy shops (and dont tell me that only Japanese companies are making this stuff because thats bullshit. I know virtually every company that makes Title III goods, and only a modest fraction of it is from Japan or Europe.) Right now, the DoJ (who is coordinating US Customs) claim they will only go after manufacturers of equipment who's products clearly violate 2515 (i.e. products where it is clear that the unit is intended to covertly intercept audio... as opposed to cameras that have intercom capabilities. ) [1] Security, page 25, February 2000. http://www.securitymagazine.com - Alan Hoffman 39 From: Steve Uhrig Date: Mon Feb 21, 2000 9:00am Subject: Used surveillance, TSCM, commo equip FS Hello list, We have updated our list of used equipment for sale. http://www.swssec.com/used.html Latest listing of used surveillance, countersurveillance, communication, X-ray, direction finding/tracking, full coverage receivers, a 3D 35mm camera, UV stuff, covert transmitters, super high powered video transmitters, surveillance van stuff. And a high voltage transformer for making really big sparks. http://www.swssec.com/used.html Credit cards accepted. Also looking to buy used equipment similar to above. Please search through your inventory and email me a list of anything related you have to sell. Tks .... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 40 From: Perry Myers Date: Mon Feb 21, 2000 11:16am Subject: RE: switch software manipulation I too have had such embarrassing moments and have scrambled to Radio Shack in an effort to find a fuse replacement. I now warn my clients ahead of time that this is a potential issue and to make sure that if the phone system uses fuses, to have some extras on hand. Even if they don't, they can't say you did not warn them! Perry D. Myers, CFE Myers Service, Inc. Investigations email: perry@d... For information on investigative services visit our web site: www.detectiveservices.com This e-mail is strictly confidential. If you receive this email in error, please forward to info@d.... -----Original Message----- From: Jay Coote [mailto:TSCM@j...] Sent: None To: TSCM-L@onelist.com; TSCM-L@onelist.com Subject: Re: [TSCM-L] switch software manipulation From: "Jay Coote" Not that this would ever happen to be, but I know of a fellow who performed a sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. The hapless and tired sweeper blew a fuse in the client's ESU, and I am certain he had that sinking feeling as he realized the time and the unusual type of the fuse. Fortunately, a thoughtful telephone technician left some spares. Jay Coote ---------- > From: "Charles Patterson" > > Another problem with some of the more poorly designed electronic switches is > that you can mess 'em up if you short out the wrong pair. In the small > office variety, the Intertel GMX will blow it's master fuse if you short an > extension pair, a Panasonic analog system can drop all co calls if a data > pair is shorted! > > as you say, a job for the meticulous. > > charles > > > ----- Original Message ----- > From: Dawn Star > To: > Sent: Friday, February 18, 2000 6:53 PM > Subject: [TSCM-L] switch software manipulation > > > > > > From: "Dawn Star" > > > > Dear Charles Patterson, I read your breakout box posting, I remember back > in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in > those days we had to sort out all combinations of the 25 pairs which were > then fed to a vector scope . I still have that unit but have not needed to > use it in the last ten years. Electronic phone systems are simpler in the > sense of less pairs but more dangerous in that the on site switch can be > manipulated in software. In many cases you must dump the software and > compare it for covert modifications This is no easy task being so many > switches and software, but this is a business for the meticulous...unless > you are prepared to hear your words on tape " Yes Mr.Gotti we tested your > lines and they're clean...no problem" > > Best, Roger > > > > > > [Non-text portions of this message have been removed] > > > > > > ------------------------------------------------------------------------ > > Shop the web for great deals. Save on Computers, > > electronics, Home furnishings and more. > > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ------------------------------------------------------------------------ > You have a voice mail message waiting for you at iHello.com: > http://click.egroups.com/1/1381/1/_/_/_/951080721/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > ------------------------------------------------------------------------ Get what you deserve with NextCard Visa! ZERO! Rates as low as 0.0% Intro APR, online balance transfers, Rewards Points, no hidden fees, and much more! Get NextCard today and get the credit you deserve! Apply now! Get your NextCard Visa at: http://click.egroups.com/1/966/1/_/_/_/951152904/ ------------------------------------------------------------------------ ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.onelist.com/community/TSCM-L or email your subscription request to: subTSCM-L@t... =================================================== TSKS 41 From: Dawn Star Date: Mon Feb 21, 2000 0:33pm Subject: renegade taps Back in the eighties I busted some of these taps, http://pd.co.la.ca.us/index.htm what does the TSCM community have to say about these activities. Do the targets have fourth and fifth amendment rights, is every citizen entitled to TSCM services as a matter of right? What say you? Roger [Non-text portions of this message have been removed] 42 From: Rocco Rosano Date: Mon Feb 21, 2000 0:48pm Subject: Re: switch software manipulation Et Al: Jay is correct. The "Isolation Box" has been in use for over 40 years. I have seen several different versions of it; but I believe Jay's description is very accurate. There are a number of ways to "pick-off" information from cable bundles and pairs, depending on the kind of physical access you have and, most importantly, how good your amplifiers are in terms of signal-to-noise and low frequency filtering. In the old days, a Zetron Amp was extremely good, but there where some applications that the Dektor Amp was superior. I, on more than one occasion, used a Dektor and a magnetic probe to detect audio frequencies carrying intelligence classified information to the outside world. No direct connection to the line was necessary. This same technique is not possible with a Zetron, which cost much more, because of a design characteristic. Rocco Rosano Reynoldsburg, Ohio mailto:roccorosano@a... Trace Carpenter wrote: > From: Trace Carpenter > > I haven't been in the office much lately, so I haven't followed this tread very > closely. Therefore I apologize if this is redundant, however if monitoring the wire > pair for audio passage is the problem, you can build a fantastic little interface > out of a 1:1 transformer and a non polarized capacitor. Both available at your > local RadShk for a couple of bucks. You can even use a three pair RJ surface jack > as a project box for the interface. > > We use them all the time when we're bringing audio from one source to another to > keep from getting that nasty hum that you'll often get from dissimilar grounds. In > fact we came up with it for use in an East Texas radio station that was having that > hum problem with their equipment that they used to put callers on the air. They're > cheap, easy and the nice thing is that since the transformer is a 1:1 and the cap is > non polarized, there is no wrong way to hook it up and your equipment is totally > isolated from the wire pairs. > > Like I said, I haven't been able to follow this tread lately so if this answer > doesn't fit the original question, please accept my apologies. > > Jay Coote wrote: > > > From: "Jay Coote" > > > > Not that this would ever happen to be, but I know of a fellow who performed a > > sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. > > The hapless and tired sweeper blew a fuse in the client's ESU, and I am > > certain he had that sinking feeling as he realized the time and the unusual type > > of the fuse. Fortunately, a thoughtful telephone technician left some spares. > > > > Jay Coote > > > > ---------- > > > From: "Charles Patterson" > > > > > > Another problem with some of the more poorly designed electronic switches is > > > that you can mess 'em up if you short out the wrong pair. In the small > > > office variety, the Intertel GMX will blow it's master fuse if you short an > > > extension pair, a Panasonic analog system can drop all co calls if a data > > > pair is shorted! > > > > > > as you say, a job for the meticulous. > > > > > > charles > > > > > > > > > ----- Original Message ----- > > > From: Dawn Star > > > To: > > > Sent: Friday, February 18, 2000 6:53 PM > > > Subject: [TSCM-L] switch software manipulation > > > > > > > > > > > > > > From: "Dawn Star" > > > > > > > > Dear Charles Patterson, I read your breakout box posting, I remember back > > > in 1973 I purchased a MLJ 101 which was a sequencer built in a suitcase, in > > > those days we had to sort out all combinations of the 25 pairs which were > > > then fed to a vector scope . I still have that unit but have not needed to > > > use it in the last ten years. Electronic phone systems are simpler in the > > > sense of less pairs but more dangerous in that the on site switch can be > > > manipulated in software. In many cases you must dump the software and > > > compare it for covert modifications This is no easy task being so many > > > switches and software, but this is a business for the meticulous...unless > > > you are prepared to hear your words on tape " Yes Mr.Gotti we tested your > > > lines and they're clean...no problem" > > > > Best, Roger > > > > > > > > > > > > [Non-text portions of this message have been removed] > > > > > > > > > > > > ------------------------------------------------------------------------ > > > > Shop the web for great deals. Save on Computers, > > > > electronics, Home furnishings and more. > > > > http://click.egroups.com/1/1559/1/_/_/_/951025472/ > > > > ------------------------------------------------------------------------ > > > > > > > > ======================================================== > > > > TSCM-L Technical Security Mailing List > > > > "In a multitude of counselors there is strength" > > > > > > > > To subscribe to the TSCM-L mailing list visit: > > > > http://www.onelist.com/community/TSCM-L > > > > > > > > or email your subscription request to: > > > > subTSCM-L@t... > > > > =================================================== TSKS > > > > > > > > > > > > > ------------------------------------------------------------------------ > > > You have a voice mail message waiting for you at iHello.com: > > > http://click.egroups.com/1/1381/1/_/_/_/951080721/ > > > ------------------------------------------------------------------------ > > > > > > ======================================================== > > > TSCM-L Technical Security Mailing List > > > "In a multitude of counselors there is strength" > > > > > > To subscribe to the TSCM-L mailing list visit: > > > http://www.onelist.com/community/TSCM-L > > > > > > or email your subscription request to: > > > subTSCM-L@t... > > > =================================================== TSKS > > > > > > > > > > ------------------------------------------------------------------------ > > Get what you deserve with NextCard Visa! ZERO! Rates as low as > > 0.0% Intro APR, online balance transfers, Rewards Points, no > > hidden fees, and much more! Get NextCard today and get the credit > > you deserve! Apply now! Get your NextCard Visa at: > > http://click.egroups.com/1/966/1/_/_/_/951152904/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > -- > *Trace Carpenter > *2926 Maple Ave., Ste. 200 > *Dallas, Texas 75201 > *214.828.4520; 214.740-0112 Facsimile > *Because the fly on the wall might not be the only bug in the room.ô > > ------------------------------------------------------------------------ > Promote Health & Earn Extra Income! Join the Rainbow Light Affiliate > Program. Sell leading brands of premium nutritionals. Earn 15% > commission + 33% on commissions of those you refer to us. > http://click.egroups.com/1/1634/1/_/_/_/951156738/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 43 From: Robert C. Motzer <1RCM@M...> Date: Mon Feb 21, 2000 5:04am Subject: Re: Digest Number 188 I just thought that I'd offer-up an idea to the breakout box project of Charles and Jay. A few months ago I also built such a box utilizing the Radio Shack 12 position rotary switches (no other reason than they were just simply easier to get). I wired-up the first 8 'clicks' (and labeled them 1-8) to dual 8 pin jacks in parallel so that pair testing can be done on this set-up for both 8 and 6 pin cords. As for the remaining 4 'clicks' - well I simply wired them up to dual standard 4 pin jacks (also paralleled) and labeled them A-D. I use this side when I'm testing POTS basic residential stuff. You'd be surprised how quickly the amount of extra knob turns saved mounts up! Just another 'Bob'. 44 From: Rocco Rosano Date: Mon Feb 21, 2000 7:10pm Subject: Re: renegade taps Dawn Star, Et Al: A security service is just like anything else; a service for hire. All security services are assumed to have some legal basis, that is, they must operate within the law. Just as a criminal element of society is entitled to legal council, so every one is permitted to have security services; to the extent that they can afford those extraordinary services which are over and above that provided to the general public. Privacy issues are probably one of the most unusual set of rights that American law has ever attempted to address. TSCM can be used in the public good, or as a service to defeat public services (law enforcement). As can any other legal oriented service you can imagine. To date, I know of no special ethics applied to the TSCM service programs. TSCM is not nearly as sophisticated and integrated into the social fabric of America as one might think. Rocco Rosano Reynoldsburg, Ohio mailto:roccorosano@a... Dawn Star wrote: > From: "Dawn Star" > > Back in the eighties I busted some of these taps, http://pd.co.la.ca.us/index.htm what does the TSCM community have to say about these activities. Do the targets have fourth and fifth amendment rights, is every citizen entitled to TSCM services as a matter of right? What say you? > > Roger > > [Non-text portions of this message have been removed] > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 0.0% > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > http://click.egroups.com/1/911/1/_/_/_/951175653/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 45 From: Date: Mon Feb 21, 2000 8:12pm Subject: Re: Mailing List Please remove us from your mailing list. Thnk you W A. 46 From: Date: Mon Feb 21, 2000 8:14pm Subject: Mailing List Please remove us from your mailing list. Thak you, W.A. 47 From: Date: Mon Feb 21, 2000 8:18pm Subject: Mailing List Please remove us from your mailing list. Thank you, W.A. 48 From: Date: Mon Feb 21, 2000 8:20pm Subject: Mailing List Please remove us from your mailing list. Thank you. W.A. 49 From: Date: Mon Feb 21, 2000 8:22pm Subject: Mailing list Please remove us from your mailing list. Tank you, W.A. 50 From: Date: Mon Feb 21, 2000 8:30pm Subject: Mailing LIst Please remove us from your mailing list. Thank you, W.A. 51 From: James M. Atkinson, Comm-Eng Date: Mon Feb 21, 2000 8:48pm Subject: Re: Book Review - Glenn Whidden At 12:09 PM -0500 2/12/00, Hoffman wrote: >From: "Hoffman" > > I like to write amateur book reviews and I thought >that I might share several of my book reviews with >this TSCM-L mailing list. What an outstanding idea, I would encourage your reviews > You see alot of books on countermeasures, and you >wonder if it is worth ponying up large sums of cash for >a book of questionable content. Some of Mr. Whiddens >publications are a perfect example of overpriced books. >In his defense though, I will say that Whidden is >one of the best educational writers I have ever >seen out of the thousands of books in my personal >library. In his publication, "The Ear" (grossly overpriced), >he has the amazing ability to take a moderately complex >topic (to a laymen) and write it so that anyone can >understand it. Anyway.. I'll post some of my reviews >at random within the next week. I have all of Glenns books, and I would like to point out that I feel that they are very fairly price, and very well written. Keep in mind that Glenns books are HIGHLY specialized, and as such he is entitled to sell them at a fair price. Also, I would love to see Glenn publish other titles, and cover more advanced topics. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 52 From: James M. Atkinson, Comm-Eng Date: Mon Feb 21, 2000 9:09pm Subject: Re: Digest Number 188 At 6:04 AM -0500 2/21/00, Robert C. Motzer wrote: >From: "Robert C. Motzer" <1RCM@M...> > > I just thought that I'd offer-up an idea to the breakout box project of >Charles and Jay. A few months ago I also built such a box utilizing the >Radio Shack 12 position rotary switches (no other reason than they were just >simply easier to get). I wired-up the first 8 'clicks' (and labeled them >1-8) to dual 8 pin jacks in parallel so that pair testing can be done on >this set-up for both 8 and 6 pin cords. As for the remaining 4 'clicks' - >well I simply wired them up to dual standard 4 pin jacks (also paralleled) >and labeled them A-D. I use this side when I'm testing POTS basic >residential stuff. You'd be surprised how quickly the amount of extra knob >turns saved mounts up! > >Just another 'Bob'. If I might suggest that you wire that 9th position for an earth ground, and the 10th for electrical ground. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 53 From: Jay Coote Date: Fri Feb 4, 2005 3:39pm Subject: VLF Upconvertor Query Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, for carrier currents? What model are you using and are you doing anything to protect the U/C, such as a back-to-back diodes on the input....? A U/C will let you receive below the 100-Khz bottom limit of many receivers and it will also help some receivers which have less sensitivity below 1.6 MHz by design. I've been using a Ralph Burhans U/C design from Popular Communications, which appeared in the mid to late 1980's. Originally designed to allow VLF listening in a 4.0-4.5 MHz receiver for hobbyists.... Jay Coote TSCM@j... 54 From: James M. Atkinson, Comm-Eng Date: Mon Feb 21, 2000 9:45pm Subject: Re: Used surveillance, TSCM, commo equip FS At 10:00 AM -0500 2/21/00, Steve Uhrig wrote: >From: "Steve Uhrig" > >Hello list, > >We have updated our list of used equipment for sale. > >http://www.swssec.com/used.html > >Latest listing of used surveillance, countersurveillance, >communication, X-ray, direction finding/tracking, full coverage >receivers, a 3D 35mm camera, UV stuff, covert transmitters, >super high powered video transmitters, surveillance van stuff. > >And a high voltage transformer for making really big sparks. > >http://www.swssec.com/used.html > >Credit cards accepted. Also looking to buy used equipment >similar to above. Please search through your inventory and email >me a list of anything related you have to sell. > >Tks .... Steve I would encourage list members to visit the used equipment page on Steves website. His prices are really good, and he has an excellent reputation for a fair deal. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 55 From: Charles Patterson Date: Mon Feb 21, 2000 10:35pm Subject: Re: VLF Upconvertor Query Jay, what's at the heart of the upconvertor circuit you use? (or better yet, do you still have a schematic around?) I have a Radio Shack portable scanning shortwave radio that has a bottom limit of 150 kHz. It out performed Marty Kaiser's carrier current detector as long as the source had strong harmonics above 150. It also works at detecting the "PhoneJack" carrier current phone extensions, one I tested puts out a signal around 2.3 mHz. I was surprised to find it that high. You could also see it on the spectrum analyzer but it's a little harder to carry around. Charles cp@t... ----- Original Message ----- From: Jay Coote To: Sent: Monday, February 21, 2000 10:35 PM Subject: [TSCM-L] VLF Upconvertor Query > > From: "Jay Coote" > > Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, > for carrier currents? What model are you using and are you doing anything > to protect the U/C, such as a back-to-back diodes on the input....? > > A U/C will let you receive below the 100-Khz bottom limit of many receivers and > it will also help some receivers which have less sensitivity below 1.6 MHz by design. > > I've been using a Ralph Burhans U/C design from Popular Communications, which appeared in the mid to late 1980's. Originally designed to allow VLF listening in a 4.0-4.5 MHz receiver for hobbyists.... > > Jay Coote > TSCM@j... > > > ------------------------------------------------------------------------ > Get what you deserve with NextCard Visa! ZERO! Rates as low as 0.0% > Intro or 9.9% Fixed APR, online balance transfers, Rewards Points, > no hidden fees, and much more! Get NextCard today and get the credit > you deserve! Apply now! Get your NextCard Visa at: > http://click.egroups.com/1/914/1/_/_/_/951190521/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 56 From: James M. Atkinson, Comm-Eng Date: Mon Feb 21, 2000 11:36pm Subject: Re: VLF Upconvertor Query At 10:38 PM -0500 2/21/00, Jay Coote wrote: >From: "Jay Coote" > >Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, >for carrier currents? What model are you using and are you doing anything >to protect the U/C, such as a back-to-back diodes on the input....? > >A U/C will let you receive below the 100-Khz bottom limit of many >receivers and >it will also help some receivers which have less sensitivity below 1.6 MHz >by design. > >I've been using a Ralph Burhans U/C design from Popular Communications, >which appeared in the mid to late 1980's. Originally designed to allow >VLF listening in a 4.0-4.5 MHz receiver for hobbyists.... > >Jay Coote >TSCM@j... Two caps in series with incoming fused lines (up to 600 volts), then into a five pole high pass filter (110 dB+ attenuation at 60 Hz), then an MOV, and crossed (field replaceable) diodes. Signal then passed though an optional (external) 32 dB LNA, and run into a switched four port splitter. First port is band passed for audio from 100 Hz up to 15 kHz with a series of fifth order eliptic filters to further kill off 50/60 Hz and 2nd/3rd harmonics. tunable quad channel comb filter, followed by an AGC 0-22 dB circuit. The first port allows audio to be plucked off of a 120, 220, 240, or 600 volt AC circuit (single or dual phase). Recently added dual inputs for a reference signal which can be adjusted for phase and delay. Dumped into either an O'scope and/or Spectrum analyser. This first port may also be used as a simple TSCM audio amplifier. The second port passes 5 kHz to 500 kHz, and has a 15.734/15 kHz switched comb filter, and a dual channel tunable comb filter. Two reference signals from remote magnetic loops may be subtracted from signal under analysis which can be adjust for phase and delay. Signal then boosted by a 0-22 dB AGC circuit and dumped into either an O'scope and/or Spectrum analyser. Third port is RF above 500 kHz to 50 MHz. Six passive bandpass filters may be applied (or bypassed). Dumped directly into SA Fourth port is RF from 50 MHz to 1 GHz (practical to about 450 MHz). Six passive bandpass filters may be applied (or bypassed). Dumped directly into SA Entire contraption is handheld, with an optional external LNA. I currently prefer to use a spectrum analyser instead of a receiver for carrier current analysis, but it's a matter of personal preference. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 57 From: Jordan Ulery Date: Tue Feb 22, 2000 8:18am Subject: Re: renegade taps From reading the releases on this line and those of NCISS, it appears that privacy is the "hot button" issue of the next decade. TSCM may not have to deal directly with the effect of 'you can't do that it violates my privacy' complaints as much as skip tracers and PIs do, but it is a problem. I can only urge each of you to join with the local and regional PI associations and even consider joining NCISS, to keep informed. Also, do not hesitate to write, email or call your federal reps and senators to let them know that in a free society, public actions are public and that is what keeps us free. Legal and ethic behavior will go a long way to defuse the allegations that we are spies and out to get people. We may 'spy' but for legitimate and legal reasons. We are part of the business, legal and insurance communities and as such serve society at may levels. PI Magazine recently ran their annual PI Day with the theme, "Its TIme for the Truth." They are correct, its time the general population knew what we all do, in one field or another. It is either an open society, or a closed society. I, for one, like a free, open and accessible society, even if I must surrender some of my personal rights for the commonweal. Steve says we ponder weak and weary. Weary we may be, but not weak if we all work together, despite our specialty, to prevent the trampling of individual rights under the banner of 'privacy.' In the world of privacy the only thing with any rights is the government and that is wrong. Just an opinion, thank you for your consideration. Rocco Rosano wrote: > From: Rocco Rosano > > Dawn Star, Et Al: > > A security service is just like anything else; a service for hire. All security services > are assumed to have some legal basis, that is, they must operate within the law. > Just as a criminal element of society is entitled to legal council, so every one is > permitted to have security services; to the extent that they can afford those > extraordinary services which are over and above that provided to the general public. > > Privacy issues are probably one of the most unusual set of rights that American law > has ever attempted to address. TSCM can be used in the public good, or as a > service to defeat public services (law enforcement). As can any other legal oriented > service you can imagine. > > To date, I know of no special ethics applied to the TSCM service programs. > TSCM is not nearly as sophisticated and integrated into the social fabric of America > as one might think. > > Rocco Rosano > Reynoldsburg, Ohio > mailto:roccorosano@a... > > Dawn Star wrote: > > > From: "Dawn Star" > > > > Back in the eighties I busted some of these taps, http://pd.co.la.ca.us/index.htm what does the TSCM community have to say about these activities. Do the targets have fourth and fifth amendment rights, is every citizen entitled to TSCM services as a matter of right? What say you? > > > > Roger > > > > [Non-text portions of this message have been removed] > > > > ------------------------------------------------------------------------ > > GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 0.0% > > Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! > > http://click.egroups.com/1/911/1/_/_/_/951175653/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates > as low as 0.0% Intro APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/967/1/_/_/_/951182691/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS [Non-text portions of this message have been removed] 58 From: MICROSEARCH Date: Tue Feb 22, 2000 9:06am Subject: Re: VLF Upconvertor Query Jay, I tried a VLF converter from Palomar Engineering. They always have ads in QST magazine, but I will look up the information for you if you want me to. I've used the converter with my Avcom spec analyzer, and it works very well. I prefer to use a Kaiser SCD5 because of the size and weight considerations. Glenn Whidden also make a carrier current receiver which is supposed to be outstanding. I may purchase one this year. Best regards, Rick Hofmann, CCO, CPP PI16998 MICROSEARCH - Technical Surveillance Countermeasures - Counterespionage P.O.Box 2084 - Cypress, Ca. 90630 714-952-3812 Fax:714-209-0037 ----- Original Message ----- From: Jay Coote To: Sent: February 21, 2000 9:35 PM Subject: [TSCM-L] VLF Upconvertor Query > From: "Jay Coote" > > Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, > for carrier currents? What model are you using and are you doing anything > to protect the U/C, such as a back-to-back diodes on the input....? > > A U/C will let you receive below the 100-Khz bottom limit of many receivers and > it will also help some receivers which have less sensitivity below 1.6 MHz by design. > > I've been using a Ralph Burhans U/C design from Popular Communications, which appeared in the mid to late 1980's. Originally designed to allow VLF listening in a 4.0-4.5 MHz receiver for hobbyists.... > > Jay Coote > TSCM@j... > > > ------------------------------------------------------------------------ > Get what you deserve with NextCard Visa! ZERO! Rates as low as 0.0% > Intro or 9.9% Fixed APR, online balance transfers, Rewards Points, > no hidden fees, and much more! Get NextCard today and get the credit > you deserve! Apply now! Get your NextCard Visa at: > http://click.egroups.com/1/914/1/_/_/_/951190521/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 59 From: Dawn Star Date: Tue Feb 22, 2000 11:25am Subject: fuses The problem is not so much fuses but input cards shut down in some switches for the slightest voltage changes and many require software reset to bring them back up. Roger Jay Coote wrote: > From: "Jay Coote" > > Not that this would ever happen to be, but I know of a fellow who performed a > sweep in the corporate offices of a company at "oh-dark-thirty" in the morning. > The hapless and tired sweeper blew a fuse in the client's ESU, and I am > certain he had that sinking feeling as he realized the time and the unusual type > of the fuse. Fortunately, a thoughtful telephone technician left some spares. > > Jay Coote > > ---------- > > From: "Charles Patterson" > > > > Another problem with some of the more poorly designed electronic switches is > > that you can mess 'em up if you short out the wrong pair. In the small > > office variety, the Intertel GMX will blow it's master fuse if you short an > > extension pair, a Panasonic analog system can drop all co calls if a data > > pair is shorted! > > > > as you say, a job for the meticulous. > > > > charles [Non-text portions of this message have been removed] 60 From: Jay Coote Date: Fri Feb 4, 2005 3:39pm Subject: Re: VLF Upconvertor Query Charles & the List; Hope I still have my schematics and notes! The VLF UC was in Popular Communications in the mid- or late 1980's; by Ralph Burhans. It used an FET and IC with 4 MHz IF... (I think).... I'll have to find the specifics. Jay Coote TSCM@j... ---------- > From: "Charles Patterson" > > Jay, > > what's at the heart of the upconvertor circuit you use? (or better yet, do > you still have a schematic around?) > > I have a Radio Shack portable scanning shortwave radio that has a bottom > limit of 150 kHz. It out performed Marty Kaiser's carrier current detector > as long as the source had strong harmonics above 150. It also works at > detecting the "PhoneJack" carrier current phone extensions, one I tested > puts out a signal around 2.3 mHz. I was surprised to find it that high. > You could also see it on the spectrum analyzer but it's a little harder to > carry around. > > Charles > > cp@t... > > ----- Original Message ----- > From: Jay Coote > To: > Sent: Monday, February 21, 2000 10:35 PM > Subject: [TSCM-L] VLF Upconvertor Query > > > > > > From: "Jay Coote" > > > > Anyone using a VLF upconvertor ahead of their 0.100-2000 MHz receiver, > > for carrier currents? What model are you using and are you doing anything > > to protect the U/C, such as a back-to-back diodes on the input....? > > > > A U/C will let you receive below the 100-Khz bottom limit of many > receivers and > > it will also help some receivers which have less sensitivity below 1.6 MHz > by design. > > > > I've been using a Ralph Burhans U/C design from Popular Communications, > which appeared in the mid to late 1980's. Originally designed to allow VLF > listening in a 4.0-4.5 MHz receiver for hobbyists.... > > > > Jay Coote > > TSCM@j... > > > > > > ------------------------------------------------------------------------ > > Get what you deserve with NextCard Visa! ZERO! Rates as low as 0.0% > > Intro or 9.9% Fixed APR, online balance transfers, Rewards Points, > > no hidden fees, and much more! Get NextCard today and get the credit > > you deserve! Apply now! Get your NextCard Visa at: > > http://click.egroups.com/1/914/1/_/_/_/951190521/ > > ------------------------------------------------------------------------ > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.onelist.com/community/TSCM-L > > > > or email your subscription request to: > > subTSCM-L@t... > > =================================================== TSKS > > > > > ------------------------------------------------------------------------ > Get what you deserve with NextCard Visa! Rates as low as 2.9% > Intro or 9.9% Fixed APR, online balance transfers, Rewards Points, > no hidden fees, and much more! Get NextCard today and get the > credit you deserve! Apply now! Get your NextCard Visa at: > http://click.egroups.com/1/913/1/_/_/_/951192478/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > From: Date: Tue Feb 19, 2002 9:14am Subject: Re: ISDN Polytel System Hi Robert, Interesting question. Let me start with a big disclaimer. I am familiar with Polycom and PictureTel video teleconferencing equipment, but have not heard of PolyTel. Also, I was not able to understand what you meant here... > The original patch from the vertical system to the horizontal cabling was intact with the secondary loops punched over top of the original patch, (not allowed on a BIX setup). > Given all that, and the fact that 3-ISDN line systems are similar, here is a guess... Ask the client if this is a new installation, or if they have upgraded from an older system. Here's why... Older systems had their ISDN terminal adapters (TA) separate from the video teleconferencing equipment. The TAs were usually stored in the telephone closets. In the latest generation of teleconferencing equipment TAs are incorporated into the equipment. What you came across might be remnants of a previous generation hook-up. If the client never had a previous system, we're back to square one. Please let me know what you find out. Thank you, Kevin -- Kevin D. Murray - CPP, CFE, BCFE [Murray Associates] Counterespionage Consultants to Business & Government Eavesdropping Detection Specialists www.spybusters.com Robert Dyk wrote: > While out this evening I discovered a bridge tap set up on a PolyTel video > conferencing system. The bridge was built out in a telephone closet from > the 3 ISDN lines that were connected to the video conferencing system. The > bridges were terminated on a BIX RJ11 adapter block with three phone cords > (one per line) still connected. No other hardware was present. The > original patch from the vertical system to the horizontal cabling was intact > with the secondary loops punched over top of the original patch, (not > allowed on a BIX setup). I can only think of illegitimate reasons to do > this. Is anyone on the list familiar with the Polytel and or what is > required to compromise the video conference on this triple bonded ISDN > setup. > > Thanks in advance for any input. > > Robert Dyk > dyk@c... 4834 From: Hawkspirit Date: Tue Feb 19, 2002 10:28am Subject: win what where What is the best procedure to locate this software in a suspect computer? Roger http://www.winwhatwhere.com/w3i4/index.htm New Software Alarms Privacy Advocates Posted - February 17, 2002 7:08pm www.katv.com Seattle, Wash. (AP) - Right now, your boss, your spouse or the government could secretly be reading all your typed words - even the ones you deleted - while surreptitiously snapping your picture. Sound alarming? The man who makes it possible is the first to agree. "It's horrifying!" said Richard Eaton, who develops, markets and even answers the technical help line for WinWhatWhere Corp. software. "I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky 48-year-old with a diamond stud earring. "Every time I add a feature into it, usually it's something that I've fought for a long time." His qualms haven't stopped him from selling the product, though - more than 200,000 copies of it, to everyone from suspicious spouses to the FBI. And Eaton is building ever-more-detailed monitoring tricks into his Investigator software. The latest version, released this month, can snap pictures from a WebCam, save screen shots and read keystrokes in multiple languages. Investigator already can read every e-mail, instant message and document you send and receive, even if you delete - or never even saved - what you typed. The $99 downloadable program runs "hidden in plain sight." It changes names every so often, and files containing the information it gathers are given arbitrary old dates to make them difficult to find. The monitor can choose to have a user's every move sent to an e-mail address, or the program can be instructed to look for keywords like "boss," "pornography" or "terrorist" and only send records when it finds those prompts. Software like Investigator was virtually unknown two years ago. Now it's become a lucrative niche market, attracting plenty of competitors and at least one product that aims to track down the snooping software itself. Federal investigators in Seattle used Investigator to snag suspected Russian computer hackers, one of whom was recently convicted on 20 counts including conspiracy, various computer crimes and fraud. Another, similar product was used in the FBI's investigation of alleged mobster Nicodemo Scarfo Jr. A Maywood, N.J., security firm called Corporate Defense Strategies used Investigator at an import/export firm to snare two employees who were selling company merchandise and pocketing the cash. CDS President Jeff Prusan has since used it to help clients catch employees who send out resumes, download pornography or spend their shifts playing games. "It's unfortunate that it has come to this, but I've always believed that it's better to know what's going on than not," Prusan said. Miki Compson, a computer consultant and mother of four in Severn, Md., used Investigator to track computer correspondence from a suspicious person who she said ended up stalking her daughter. She's recommended it to other parents whose kids were corresponding with adults and defends the practice as a safety measure. Eaton says he wouldn't likely use it on his own two children - "I'd talk to them!" - but he also doesn't feel comfortable telling people what to do with his invention. And although he hates to hear tales of deception in the fast-growing market of spouse tracking online, he wouldn't tell people not to do it. "I'm selling a hammer," he said. "They can beat nails with it, or their dog." If someone calls with proof the software is being used nefariously, Eaton said he'll show the person how to remove it. Ari Schwartz, associate director for the Center for Democracy and Technology, said there are legitimate uses for the product, such as catching employees engaging in fraud or child pornography. But Schwartz recommends that employers inform their staffs if monitoring for certain activities is occurring. He also urges spouses and parents to think about the repercussions before using such software at home. "If your relationship is at the point where you feel that you need to spy on your spouse, is this the best way to repair your relationship or perhaps (should) you be going to therapy?" he said. In most cases, Schwartz said, snooping software is not illegal. But "we think morally there are some very large issues with (employers) tracking the personal habits of their employees." A self-taught programmer who says he barely graduated from high school, Eaton stumbled on the idea for Investigator when he wrote a tracker program to help him find and repair software bugs. He started selling it as a snooper product around 1997. Eaton still runs the company much like he did five years ago - from his home in the eastern Washington town of Kennewick. His wife handles the bookkeeping while he burns the CDs, answers the help line and runs the Web site. Occasionally, Eaton also checks his own Investigator logs - and is always disturbed by the amount of time he spends online. "When I look at my logs during the day, I think I need to fire myself," he said. 4835 From: David Alexander Date: Tue Feb 19, 2002 10:48am Subject: re: British marines 'invade' Spain >"There is much embarrassment, the error is regretted and lessons have been >learned. They were informed of their error by local policemen and spent >only about five minutes on the beach." > >He added: "We were not trying to take Spain and have no plans to do so." 1. Disclaimer: That's not to say we couldn't if we wanted to 2. Have you any idea how much beer that will cost those marines ? ______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4836 From: Steve Uhrig Date: Tue Feb 19, 2002 10:32am Subject: Re: win what where Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > What is the best procedure to locate this software in a suspect computer? > New Software Alarms Privacy Advocates Ad-Aware works extremely well according to reports, and I use it personally. Shareware too. www.lavasoftusa.com. I mentioned this on another list, and about fifteen (of the 600+/-) members found something on their machines. John Dvorak reviewed it in PC Magazine last month, and HE found 26 hidden nasty programs on his machine using Ad-Aware AFTER he had tried several commercially available packages he had purchased for review. It WILL detect keystroke loggers. The thing also is like a virus detection package in that the authors update it regularly as new threats are discovered. And it is shareware, so free to try. NOT free to use indefinitely. Highly recommended. And don't forget something like Zone Alarm firewall if you have DSL, cable modem or otherwise always connected. Even dial up users need a firewall. If you use ICS you need the paid professional version, otherwise the free Zone Alarm is OK. Any search engine, and practically zero learning curve. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 4837 From: James M. Atkinson Date: Tue Feb 19, 2002 11:28am Subject: Re: win what where Simple, Perform an audit to identify all processes running (or potentially running) on the machine, Then run Norton Disk Doctor to find (but not repair) file fragments, Then screen the system software for any kind of executable code that can not be accounted for. You can also use a number of freeware packages that target and ferret out the executables, and in some cases good virus detection software will flag it as a Trojan. If you are on your toes you can simply look for the cache file that this software creates and just search for the invisible or hidden files by name. The only wrinkle is that the mere possession of this software is a federal felony as the Justice Department considers it a violation of Title 18. It would not at all surprise me to hear (after a few months) that DOJ rolled up a few hundred PI's who used the SW in a nation wide sting operation. [cough-cough] -jma At 8:28 AM -0800 2/19/02, Hawkspirit wrote: >What is the best procedure to locate this software in a suspect >computer? Roger > >http://www.winwhatwhere.com/w3i4/index.htm > >New Software Alarms Privacy Advocates >Posted - February 17, 2002 7:08pm >www.katv.com > >Seattle, Wash. (AP) - Right now, your boss, your spouse or the government >could secretly be reading all your typed words - even the ones you deleted >- while surreptitiously snapping your picture. > >Sound alarming? The man who makes it possible is the first to agree. > >"It's horrifying!" said Richard Eaton, who develops, markets and even >answers the technical help line for WinWhatWhere Corp. software. > >"I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky >48-year-old with a diamond stud earring. "Every time I add a feature into >it, usually it's something that I've fought for a long time." > >His qualms haven't stopped him from selling the product, though - more than >200,000 copies of it, to everyone from suspicious spouses to the FBI. > >And Eaton is building ever-more-detailed monitoring tricks into his >Investigator software. The latest version, released this month, can snap >pictures from a WebCam, save screen shots and read keystrokes in multiple >languages. > >Investigator already can read every e-mail, instant message and document >you send and receive, even if you delete - or never even saved - what you >typed. > >The $99 downloadable program runs "hidden in plain sight." It changes names >every so often, and files containing the information it gathers are given >arbitrary old dates to make them difficult to find. > >The monitor can choose to have a user's every move sent to an e-mail >address, or the program can be instructed to look for keywords like "boss," >"pornography" or "terrorist" and only send records when it finds those >prompts. > >Software like Investigator was virtually unknown two years ago. Now it's >become a lucrative niche market, attracting plenty of competitors and at >least one product that aims to track down the snooping software itself. > >Federal investigators in Seattle used Investigator to snag suspected >Russian computer hackers, one of whom was recently convicted on 20 counts >including conspiracy, various computer crimes and fraud. > >Another, similar product was used in the FBI's investigation of alleged >mobster Nicodemo Scarfo Jr. > >A Maywood, N.J., security firm called Corporate Defense Strategies used >Investigator at an import/export firm to snare two employees who were >selling company merchandise and pocketing the cash. > >CDS President Jeff Prusan has since used it to help clients catch employees >who send out resumes, download pornography or spend their shifts playing >games. > >"It's unfortunate that it has come to this, but I've always believed that >it's better to know what's going on than not," Prusan said. > >Miki Compson, a computer consultant and mother of four in Severn, Md., used >Investigator to track computer correspondence from a suspicious person who >she said ended up stalking her daughter. > >She's recommended it to other parents whose kids were corresponding with >adults and defends the practice as a safety measure. > >Eaton says he wouldn't likely use it on his own two children - "I'd talk to >them!" - but he also doesn't feel comfortable telling people what to do >with his invention. > >And although he hates to hear tales of deception in the fast-growing market >of spouse tracking online, he wouldn't tell people not to do it. > >"I'm selling a hammer," he said. "They can beat nails with it, or their dog." > >If someone calls with proof the software is being used nefariously, Eaton >said he'll show the person how to remove it. > >Ari Schwartz, associate director for the Center for Democracy and >Technology, said there are legitimate uses for the product, such as >catching employees engaging in fraud or child pornography. > >But Schwartz recommends that employers inform their staffs if monitoring >for certain activities is occurring. He also urges spouses and parents to >think about the repercussions before using such software at home. > >"If your relationship is at the point where you feel that you need to spy >on your spouse, is this the best way to repair your relationship or perhaps >(should) you be going to therapy?" he said. > >In most cases, Schwartz said, snooping software is not illegal. But "we >think morally there are some very large issues with (employers) tracking >the personal habits of their employees." > >A self-taught programmer who says he barely graduated from high school, >Eaton stumbled on the idea for Investigator when he wrote a tracker program >to help him find and repair software bugs. > >He started selling it as a snooper product around 1997. > >Eaton still runs the company much like he did five years ago - from his >home in the eastern Washington town of Kennewick. His wife handles the >bookkeeping while he burns the CDs, answers the help line and runs the Web >site. > >Occasionally, Eaton also checks his own Investigator logs - and is always >disturbed by the amount of time he spends online. > >"When I look at my logs during the day, I think I need to fire myself," he >said. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4838 From: A.Lizard Date: Tue Feb 19, 2002 0:25pm Subject: Wisconsin bugs to become protected species? Paging Aimee. . . what does this proposed law *really* mean? A.Lizard Date: Mon, 18 Feb 2002 16:03:16 -0600 From: Ben Masel Subject: (Wisconsin) AB 435 Tampering with a security device or surveillance device and providing penalties Assembly Criminal Justice Commitee hearing Wed 1 PM Room 417 N State Capitol Analysis from Legislative Reference Bureau "Current law provides various penalties for damaging or misappropriating the property of another. This bill prohibits a person from tampering with a security device or surveillance device that is owned by another by disconnecting, altering, dismantling, damaging, covering up, removing, or destroying the device without the consent of the owner and with the intent either to cause the device to become inoperative or to interfere with or circumvent the operation of the device. A person who violates the prohibition created in the bill may be fined not more than $500 or imprisoned for not more than 30 days or both, except that a person may be fined not more than $10,000 or imprisoned for not more than five years or both if the person violates the prohibition with the intent to make it less likely that another felony will be detected or that a person who commits another felony will be identified with the felony. The bill also provides that a person charged with violating the prohibition created in the bill has a defense to the charge if he or she tampered with a surveillance device that is installed or used with the intent to observe any nude or partially nude person without the consent of the person observed." _____________________________________ Full text: http://folio.legis.state.wi.us/cgi-bin/om_isapi.dll?clientID=88503&infobase=billhist.nfo&j1=AB435&jump=AB435 So it would seem there is no Defence if the surveillance device is installed for any other illegal purpose. Are these guys as dumb as they look? Criminal Justice Committee members: Representatives Suder, chairperson, Gundrum, vice chairperson, Bies, J. Fitzgerald, Jeskewitz, F. Lasee, Loeffelholz, Owens, Staskunas, Wood, Young, ColÛn, Sherman, and Boyle. ________________________________________ ben I am not currently Licensed to Practice in this State. ________________________________________ X-Sender: declan@m... X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Tue, 19 Feb 2002 10:13:45 -0500 To: politech@p... From: Declan McCullagh Subject: FC: John Gilmore and others on Wisconsin's proposed pro-spycam law Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-politech@p... Precedence: bulk Reply-To: declan@w... X-URL: Politech is at http://www.politechbot.com/ X-Author: Declan McCullagh is at http://www.mccullagh.org/ X-News-Site: Cluebot is at http://www.cluebot.com/ Status: Previous Politech message: "Wisconsin may ban disabling spycams -- except for hidden sexcams" http://www.politechbot.com/p-03154.html --- To: mann@e..., declan@w..., gnu@t... Subject: FC: Wisconsin may ban disabling spycams Date: Tue, 19 Feb 2002 01:48:02 -0800 From: John Gilmore Why do they want to pass the new law? Because current law only makes it a crime to *damage* or *misappropriate* a camera. If you merely put a piece of cardboard in front of it, or some duct tape over it, or unplug it, that isn't a crime today. But tomorrow it could get you five years in prison. SHEEP, WAKE UP! The police state is coming; it's already here if you act like the cops have all the rights and you have none. Like all of you people being herded into the pens at all the airports, with nary a bleat. The only real security is in the grave -- and the totalitarian control that the Bush team is hastily assembling, while you are silent, will assist your entry into that blissful state. The only useful part about this proposed law is that it should protect citizens who are using cameras to record the illegal activities of law enforcement officials. Any cop who seizes, breaks, or disables a protester's camera would go to prison for five years -- assuming that any DA would indict any cop for everyday activities, which is a hollow fantasy 99.9% of the time. If you publish this, the cops will make sure to write an exception into the law for themselves anyway. Note that the "intent" of the camera is what matters; if they put it into a bathroom "for security" then disabling it is a crime, while if they put it into a bathroom "to ogle you" then disabling it is legal (after they arrest you and try you for it). The 9/11 attack has certainly brought out all the scum of the earth, with their "put US in control of YOU" schemes to improve the world. you would think that while fighting against the Taliban's tight control of its populace, we wouldn't be imposing similar controls on our own population. But the irony seems to be lost on the sheeple. John --- Date: Tue, 19 Feb 2002 03:08:18 -0800 To: declan@w..., Ben Masel From: Bill Stewart Subject: Re: FC: Wisconsin may ban disabling spycams and audio bugs -- except for hidden sexcams Cc: politech@p... Declan - the best reason for a new law here is to not only ban *damaging* spycams, audio bugs, location trackers, etc., which they say is already banned, but to also ban *disabling* them or otherwise tampering with legitimately installed surveillance devices, and also to create a large penalty for disabling them with intent to not evade being identified or caught when committing future felonies. But it has more serious problems than that. Ben - We know you're a man with nothing to hide [...quasi-insider reference:-)...] I'm also not a lawyer, but I have played a politician on TV. The proposed law is written in classic "Amend State Code section 324-21384 by adding the following words after paragraph 3" style, and the web links don't make it easy to follow, but a couple of things jump out: 1 - The language is overbroad (though the law isn't as broad as the summary.) It not only covers physical devices (the clear intent), but also software, e.g. surveillance applications on computers, whether installed by the user, another owner, malware such as viruses, and possibly even the FBI keyloggers recently used against the Mafia. And it appears to change the balance of laws restricting and supporting use of surveillance cameras and audio surveillance, with very little examination of the impacts, beyond the obvious exemption for disabling voyeur cameras. 2 - It may be worth looking up s. 942.08 (2), to see if that's just an anti-peeping-tom law (the legislative analysis about looking at nude people), or if it's about something more general like use of surveillance cameras. And just because that's the only exemption to the proposed law referenced in the legislative analysis, that doesn't mean it's your only defense - it means that's a nearly-guaranteed defense, but otherwise you may need to argue a case in court, with whatever legal representation you can afford, to convince a judge or jury that your action was reasonable, and you may be unsuccessful. 3 - The proposal doesn't say *anything* about the owner of the property where the camera or audio or other bug is *located* - just the owner of the bug. The probable goal of the law is to cover spycams and bugs that people plant on their own property or in businesses for which they work (e.g. low-level manager planting spycams to look at his underlings), but that's not the only case. *** If somebody plants a spycam or audio bug in *your* house or car, this bill appears to forbid you to disable it because you don't own it. That probably wasn't the intent of the law, but it's the effect, even though it's clearly unreasonable. That includes bugs planted by criminals other than peeping toms, such as burglars who want to know when you're not home, wiretaps on your phones, whether planted by criminals, police with warrants, police operating illegally without warrants, obsessive ex- boyfriends, or detectives hired by your suspicious not-yet-ex-spouse (if the bug belongs to the detective, not the spouse), peeping toms who only want to *listen* to you have sex (because they can see in your back window without a camera), nosy neighbors, your kids' friends, stalkers, and so on. 4 - There are a whole variety of workplace environment issues that this law impinges on that may be affected by other law, but which this proposed law doesn't address or coordinate with. For instance, an employer trying to prevent employee theft usually has a legitimate reason to install spycams at work, as well as obvious cameras to deter non-employee robbers and burglars, but there may be federal or state regulations limiting an employer's right to use spycams or audio bugs for other reasons, and installation of spycams and audio bugs by low-level managers without the authorization from the business's owner or corporate officers may have legal restrictions. In unionized businesses, there are almost certainly union contract issues, and even non-union businesses can be covered by specific workplace privacy laws and expectations of privacy. This proposed law ignores all of thee issues. 5 - Employer/employee privacy issues extend beyond the workplace, and some employers have in the past attempted to control or discover employee behavior outside their offices. While standard surveillance cameras aren't usually relevant, and traditional audio bugs aren't often used in employees' cars or briefcases, the cost and size have reduced substantially as technology has advanced, and for employees who carry laptops home or use desktop home computers to work from home, audio surveillance is just another software application, like a word processor or voice dictation software. If your employer installs bugging software on your laptop, it appears that this law forbids you to uninstall it or even to turn off the microphone when you're not at the office. And many new laptops come with video cameras built in. Video cameras on computers are becoming common and cheap - a $29 camera is good enough for simple videoconferences, so businesses are often buying them for office use, instead of or in addition to better cameras that cost thousands of dollars, and employees who work from home often have them for personal use as well as occasional work use. Just as microphones on laptops can be audio bugs, depending on software, a camera on a PC can be a surveillance camera depending on who turns it on. If you shut down your computer at night, is that a misdemeanor? *** 6 - This proposed law also forbids disabling bugs or spycams when you don't know who the owner is. This is especially an issue for bugs and cameras discovered at the workplace - obviously the camera mounted on the wall is official, but was the camera in the light fixture or the audio wiretap software you found on your PC put there by your competitor trying to steal your next chip design, or by an email virus that said it would play a fun game, like that animated Christmas tree that said it was from Melissa, or was your employer trying to find who's leaking the chip design to your competitor? You could ask your boss, and maybe he'd tell you, but maybe the marketing department installed it because they don't trust your boss either. Are you allowed to remove it? How can you tell if that would be illegal? 7 - The proposed law also doesn't include exemptions for government offices - including police stations as well as defense contractors or universities working on sensitive material. While authors such as David Brin ("The Transparent Society") make strong arguments about the need for government activities to be carried out in public to prevent abuses, there are balances that need to be made between an arrestee's need for privacy when talking to his lawyer in a police station and the Internal Affairs department spying on potentially bad cops. 8 - This proposed law doesn't address locations such as hotels or other places that have a strong expectation of privacy. A security camera in a hotel or bank lobby to deter theft isn't a problem - but a camera in the ceiling of a hotel room is, and even though a reasonable person would expect that such a camera was installed by a voyeur and subject to the law's exemptions, it's not clear that it's legal to cover it up without proof. In most cases, someone who covered up such a camera wouldn't be charged, but if police are investigating potential prostitution at a hotel, someone who covered up a camera might be charged with violating this proposed law even though such actions were perfectly reasonable. The proposed law may seem reasonable on its face, but it needs a lot of work before it's something that's ready for a legislature to adopt. Bill Stewart, San Francisco, CA. --- Date: Tue, 19 Feb 2002 07:44:56 -0500 To: declan@w... From: "J.D. Abolins" Subject: Re: FC: Wisconsin may ban disabling spycams -- except for hidden sexcams Cc: grayson Barber At 10:52 PM 2/18/02 -0500, you wrote: > [Of course if "current law" really does provide > "various penalties for damaging or misappropriating" > someone else's property, why -- except to pad the > resumes of legislators -- do we need *new* laws? > --Declan] Ah, there are people who'll say we need to send the message that surveillance is paramount to security and the new law is needed to get the message out. I'll have to look at the exact text of the law but I already see a big problem with its wording. >"Current law provides various penalties for damaging or misappropriating > the property of another. This bill prohibits a person from tampering > with a security device or surveillance device that is owned by another > by disconnecting, altering, dismantling, damaging, covering up, > removing, or destroying the device without the consent of the owner and > with the intent either to cause the device to become inoperative or to > interfere with or circumvent the operation of the device. "...interfere with or circumvent the operation of the device." leaves a wide opening for surprising results. At first glance, it could look like the interference/circumvention only entails direct action to the spycam and its supporting systems. But if the "operation" of the device is interpreted to mean the successful capture of the intended "imagescape" then indirect acts could be covered. If, for example, a person wears a mask, puts up a blocking screen, or --if the spycam looks into your home-- closing the curtains. it would interfere/circumvent the operation of the spycam in this interpretation. (Somewhere in between would be the "blinding of some types of cameras by shining bright lights at it. Shine that MAG Light at a spycam, get fined or go to jail.) Sounds far fetched that any court or government body would hold such an interpretation? Several year ago, the Wall Street Journal gave an example of interference/circumvention interpretations in regards to the Endangered Species Act. An inventor developed a coyote repellent sheep dip. Looked like a great help for ranchers and, by lessening an incentive for wiping out the beasties, for the coyotes. The USEPA determined that the coyote repellent violated the ESA. How? It interferes with predatory behavior of animals. One of the interesting things in the exclusions for the spycam protection law is an apparent lack of consideration for the scope of view of the camera. The assumptions seems to be that the cams view the premises associated with the spycam's use. But some cams can view more than those premises. A parking lot cam might pick up other properties. If the spycam's owners have property protection for the cam, the other property owners have the option of circumventing the gaze of the spycam into their properties. (This could be interesting if the law results in the abrogation of other property owners rights in the name of protecting surveillence as a principle.) J.D. Abolins (not an attorney) --- ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. Declan McCullagh's photographs are at http://www.mccullagh.org/ To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ ------------------------------------------------------------------------- ************************************************************************ new voicemail number,ask if you need it. Personal Web site http://www.ecis.com/~alizard Disaster prep info: http://www.ecis.com/~alizard/y2k.html Littleton Killings: http://www.ecis.com/~alizard/littleto.html backup address (if ALL else fails) alizard@o... IF YOU USE PGP, UPGRADE NOW! A major bug has been discovered in PGP, the new version with the bug fixed is available NOW. PGP 6.5.8 key available by request,keyserver,or on my Web site For e-mail privacy, download PGP from http://www.pgpi.org PGPfone v1.02 and v2.1 available for secure voice conferencing, get your own (W9x,NT,Mac) at http://www.pgpi.org/products/nai/pgpfone/ ************************************************************************ 4839 From: Michael Puchol Date: Tue Feb 19, 2002 2:40pm Subject: Re: win what where The answers already given are quite correct - if you want to go a bit further, you can use tools such as WinHex to inspect disks, RAM, etc. It is widely used in computer forensics, I've found it really useful in many ocasions. One sure way to detect keystroke loggers is to have a debugger like SoftIce, and set memory traps on windows calls to disk access - basically the debugger will let you know when a particular word you type is put to hard disk by ANY software running. This can trigger false alarms, but if you manage it carefully it can be very powerful. The best way to set this up on a suspect computer is to get the debugger to watch for disk access containing a particular string, which you can then simply type in Notepad - instantly revealing if there is anything funny going on. Cheers, Mike ----- Original Message ----- From: "Hawkspirit" To: Sent: Tuesday, February 19, 2002 5:28 PM Subject: [TSCM-L] win what where > What is the best procedure to locate this software in a suspect computer? Roger > > http://www.winwhatwhere.com/w3i4/index.htm > > New Software Alarms Privacy Advocates > Posted - February 17, 2002 7:08pm > www.katv.com > > Seattle, Wash. (AP) - Right now, your boss, your spouse or the government > could secretly be reading all your typed words - even the ones you deleted > - while surreptitiously snapping your picture. > > Sound alarming? The man who makes it possible is the first to agree. > > "It's horrifying!" said Richard Eaton, who develops, markets and even > answers the technical help line for WinWhatWhere Corp. software. > > "I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky > 48-year-old with a diamond stud earring. "Every time I add a feature into > it, usually it's something that I've fought for a long time." > > His qualms haven't stopped him from selling the product, though - more than > 200,000 copies of it, to everyone from suspicious spouses to the FBI. > > And Eaton is building ever-more-detailed monitoring tricks into his > Investigator software. The latest version, released this month, can snap > pictures from a WebCam, save screen shots and read keystrokes in multiple > languages. > > Investigator already can read every e-mail, instant message and document > you send and receive, even if you delete - or never even saved - what you > typed. > > The $99 downloadable program runs "hidden in plain sight." It changes names > every so often, and files containing the information it gathers are given > arbitrary old dates to make them difficult to find. > > The monitor can choose to have a user's every move sent to an e-mail > address, or the program can be instructed to look for keywords like "boss," > "pornography" or "terrorist" and only send records when it finds those > prompts. > > Software like Investigator was virtually unknown two years ago. Now it's > become a lucrative niche market, attracting plenty of competitors and at > least one product that aims to track down the snooping software itself. > > Federal investigators in Seattle used Investigator to snag suspected > Russian computer hackers, one of whom was recently convicted on 20 counts > including conspiracy, various computer crimes and fraud. > > Another, similar product was used in the FBI's investigation of alleged > mobster Nicodemo Scarfo Jr. > > A Maywood, N.J., security firm called Corporate Defense Strategies used > Investigator at an import/export firm to snare two employees who were > selling company merchandise and pocketing the cash. > > CDS President Jeff Prusan has since used it to help clients catch employees > who send out resumes, download pornography or spend their shifts playing > games. > > "It's unfortunate that it has come to this, but I've always believed that > it's better to know what's going on than not," Prusan said. > > Miki Compson, a computer consultant and mother of four in Severn, Md., used > Investigator to track computer correspondence from a suspicious person who > she said ended up stalking her daughter. > > She's recommended it to other parents whose kids were corresponding with > adults and defends the practice as a safety measure. > > Eaton says he wouldn't likely use it on his own two children - "I'd talk to > them!" - but he also doesn't feel comfortable telling people what to do > with his invention. > > And although he hates to hear tales of deception in the fast-growing market > of spouse tracking online, he wouldn't tell people not to do it. > > "I'm selling a hammer," he said. "They can beat nails with it, or their dog." > > If someone calls with proof the software is being used nefariously, Eaton > said he'll show the person how to remove it. > > Ari Schwartz, associate director for the Center for Democracy and > Technology, said there are legitimate uses for the product, such as > catching employees engaging in fraud or child pornography. > > But Schwartz recommends that employers inform their staffs if monitoring > for certain activities is occurring. He also urges spouses and parents to > think about the repercussions before using such software at home. > > "If your relationship is at the point where you feel that you need to spy > on your spouse, is this the best way to repair your relationship or perhaps > (should) you be going to therapy?" he said. > > In most cases, Schwartz said, snooping software is not illegal. But "we > think morally there are some very large issues with (employers) tracking > the personal habits of their employees." > > A self-taught programmer who says he barely graduated from high school, > Eaton stumbled on the idea for Investigator when he wrote a tracker program > to help him find and repair software bugs. > > He started selling it as a snooper product around 1997. > > Eaton still runs the company much like he did five years ago - from his > home in the eastern Washington town of Kennewick. His wife handles the > bookkeeping while he burns the CDs, answers the help line and runs the Web > site. > > Occasionally, Eaton also checks his own Investigator logs - and is always > disturbed by the amount of time he spends online. > > "When I look at my logs during the day, I think I need to fire myself," he > said. > > > > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > 4840 From: Perry Myers Date: Tue Feb 19, 2002 11:39am Subject: RE: Re: win what where I use Ad-Aware 5.62 and it does NOT find the Spector or E-Blaster Products. -----Original Message----- From: Steve Uhrig [mailto:steve@s...] Sent: Tuesday, February 19, 2002 10:32 AM To: tscm-l@yahoogroups.com Subject: [TSCM-L] Re: win what where Once upon a midnight dreary, Hawkspirit pondered, weak and weary: > What is the best procedure to locate this software in a suspect computer? > New Software Alarms Privacy Advocates Ad-Aware works extremely well according to reports, and I use it personally. Shareware too. www.lavasoftusa.com. I mentioned this on another list, and about fifteen (of the 600+/-) members found something on their machines. John Dvorak reviewed it in PC Magazine last month, and HE found 26 hidden nasty programs on his machine using Ad-Aware AFTER he had tried several commercially available packages he had purchased for review. It WILL detect keystroke loggers. The thing also is like a virus detection package in that the authors update it regularly as new threats are discovered. And it is shareware, so free to try. NOT free to use indefinitely. Highly recommended. And don't forget something like Zone Alarm firewall if you have DSL, cable modem or otherwise always connected. Even dial up users need a firewall. If you use ICS you need the paid professional version, otherwise the free Zone Alarm is OK. Any search engine, and practically zero learning curve. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4841 From: Date: Tue Feb 19, 2002 4:21pm Subject: Humor - Signs You Have BeenDrinking TooMch Cofee! Signs that you've been drinking too much java... Juan Valdez names his donkey after you. You ski uphill. You get a speeding ticket even when you're parked. You have a bumper sticker that says: "Coffee drinkers are good in the sack." You answer the door before people knock. You just completed another sweater and you don't know how to knit. You grind your coffee beans in your mouth. You have to watch videos in fast-forward. You can take a picture of yourself from ten feet away without using the timer. You lick your coffeepot clean. You spend every vacation visiting "Maxwell House." You're the employee of the month at the local coffeehouse and you don't even work there. The nurse needs a scientific calculator to take your pulse. Your T-shirt says, "Decaffeinated coffee is the devil's coffee." You're so jittery that people use your hands to blend their margaritas. You can type sixty words per minute with your feet. You can jump-start your car without cables. Cocaine is a downer. All your kids are named "Joe." Your only source of nutrition comes from "Sweet & Low." You go to AA meetings just for the free coffee. Starbucks owns the mortgage on your house. HAVE A GREAT DAY !!! Please Note: No trees were destroyed in the sending of this contaminant free message We do concede, a significant number of electrons may have been inconvenienced. : >) 4842 From: Perry Myers Date: Tue Feb 19, 2002 10:37am Subject: RE: win what where I don't know about this particular program but E-Blaster can only be found by one of two ways that I am aware of: 1 - hit the hot keys that were assigned in default to bring up the password screen. If the hot keys were changed as they can easily be, then this will not work. 2 - Start the installation process using a copy of the software. If in the first two or three installation screens, there appears a check box that asks if you wish to remove a previous installation. If this doesn't appear, it is not installed. You can abort the installation at this point. With Spector, it can be discovered as follows: Upon installation of Spector 2.2, if already installed, it will bring you to the password box, which you must enter to gain program access. You can also check to see if Spector is still saved to the default location on the hard drive: windows>systems>ieext. Not sure if these programs work the same way but if they do, locating them may be a similar process. You just need to carry all the different spy softwares in the CM kit. Perry D. Myers, CFE President & CEO E-mail: perry@d... MSI Detective Services Myers Service, Inc. Corporate Headquarters 2076 N. Elston Ave. Suite 200 Chicago, IL. 60614-3940 Phone 773-342-8300 Facsimile 773-486-4430 Professional Investigators Since 1959 Investigations Nationwide 24 Hour Availability www.detectiveservices.com -----Original Message----- From: Hawkspirit [mailto:hawkspirit@e...] Sent: Tuesday, February 19, 2002 10:28 AM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] win what where What is the best procedure to locate this software in a suspect computer? Roger http://www.winwhatwhere.com/w3i4/index.htm New Software Alarms Privacy Advocates Posted - February 17, 2002 7:08pm www.katv.com Seattle, Wash. (AP) - Right now, your boss, your spouse or the government could secretly be reading all your typed words - even the ones you deleted - while surreptitiously snapping your picture. Sound alarming? The man who makes it possible is the first to agree. "It's horrifying!" said Richard Eaton, who develops, markets and even answers the technical help line for WinWhatWhere Corp. software. "I'm Mr. Guard-My-Privacy, so it's kind of ironic," said Eaton, a lanky 48-year-old with a diamond stud earring. "Every time I add a feature into it, usually it's something that I've fought for a long time." His qualms haven't stopped him from selling the product, though - more than 200,000 copies of it, to everyone from suspicious spouses to the FBI. And Eaton is building ever-more-detailed monitoring tricks into his Investigator software. The latest version, released this month, can snap pictures from a WebCam, save screen shots and read keystrokes in multiple languages. Investigator already can read every e-mail, instant message and document you send and receive, even if you delete - or never even saved - what you typed. The $99 downloadable program runs "hidden in plain sight." It changes names every so often, and files containing the information it gathers are given arbitrary old dates to make them difficult to find. The monitor can choose to have a user's every move sent to an e-mail address, or the program can be instructed to look for keywords like "boss," "pornography" or "terrorist" and only send records when it finds those prompts. Software like Investigator was virtually unknown two years ago. Now it's become a lucrative niche market, attracting plenty of competitors and at least one product that aims to track down the snooping software itself. Federal investigators in Seattle used Investigator to snag suspected Russian computer hackers, one of whom was recently convicted on 20 counts including conspiracy, various computer crimes and fraud. Another, similar product was used in the FBI's investigation of alleged mobster Nicodemo Scarfo Jr. A Maywood, N.J., security firm called Corporate Defense Strategies used Investigator at an import/export firm to snare two employees who were selling company merchandise and pocketing the cash. CDS President Jeff Prusan has since used it to help clients catch employees who send out resumes, download pornography or spend their shifts playing games. "It's unfortunate that it has come to this, but I've always believed that it's better to know what's going on than not," Prusan said. Miki Compson, a computer consultant and mother of four in Severn, Md., used Investigator to track computer correspondence from a suspicious person who she said ended up stalking her daughter. She's recommended it to other parents whose kids were corresponding with adults and defends the practice as a safety measure. Eaton says he wouldn't likely use it on his own two children - "I'd talk to them!" - but he also doesn't feel comfortable telling people what to do with his invention. And although he hates to hear tales of deception in the fast-growing market of spouse tracking online, he wouldn't tell people not to do it. "I'm selling a hammer," he said. "They can beat nails with it, or their dog." If someone calls with proof the software is being used nefariously, Eaton said he'll show the person how to remove it. Ari Schwartz, associate director for the Center for Democracy and Technology, said there are legitimate uses for the product, such as catching employees engaging in fraud or child pornography. But Schwartz recommends that employers inform their staffs if monitoring for certain activities is occurring. He also urges spouses and parents to think about the repercussions before using such software at home. "If your relationship is at the point where you feel that you need to spy on your spouse, is this the best way to repair your relationship or perhaps (should) you be going to therapy?" he said. In most cases, Schwartz said, snooping software is not illegal. But "we think morally there are some very large issues with (employers) tracking the personal habits of their employees." A self-taught programmer who says he barely graduated from high school, Eaton stumbled on the idea for Investigator when he wrote a tracker program to help him find and repair software bugs. He started selling it as a snooper product around 1997. Eaton still runs the company much like he did five years ago - from his home in the eastern Washington town of Kennewick. His wife handles the bookkeeping while he burns the CDs, answers the help line and runs the Web site. Occasionally, Eaton also checks his own Investigator logs - and is always disturbed by the amount of time he spends online. "When I look at my logs during the day, I think I need to fire myself," he said. ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 4843 From: Fernando Martins Date: Tue Feb 19, 2002 3:47pm Subject: RE: re: British marines 'invade' Spain I beleive the marines already knew the cost of those beers, since only drunk they can miss what is rock (and a huge as you may know) from what is sand (wich the close they have is in Andaluzia)... Probably they just looked for a soft place to jump, and at the time a rock was not such a place. I have a theory that they were surfing in Tarifa, and didn't came from Gibraltar, but from that beautiful bay ... I saw that amateur movie with them, and the look on their faces was more like "*uck!! this is not the rock yet!!" :> Anyway, as for invaders, I was once inside their base at the top of the rock ... Drunk after visiting the monkeys and nobody did nothing ... Or they just understood well my problem, as I can guees from their last experience LOL FM ª -----Original Message----- ª From: David Alexander [mailto:david.alexander@b...] ª Sent: terÁa-feira, 19 de Fevereiro de 2002 16:49 ª To: 'TSCM submissions' ª Subject: [TSCM-L] re: British marines 'invade' Spain ª ª ª >"There is much embarrassment, the error is regretted and ª lessons have ª >been learned. They were informed of their error by local ª policemen and ª >spent only about five minutes on the beach." ª > ª >He added: "We were not trying to take Spain and have no plans to do ª >so." ª ª 1. Disclaimer: That's not to say we couldn't if we wanted to ª 2. Have you any idea how much beer that will cost ª those marines ? ______________________________ David ª Alexander M.INSTIS Global Infrastructure Director Bookham ª Technology plc ª Tel: +44 (0) 1327 356264 ª Mobile: +44 (0) 7799 881284 ª Fax: +44 (0) 1327 356775 ª http://www.bookham.com ª ª ª ª ============================================================== ª ========= ª This e-mail is intended for the person it is addressed to ª only. The information contained in it may be confidential ª and/or protected by law. If you are not the intended ª recipient of this message, you must not make any use of this ª information, or copy or show it to any person. Please contact ª us immediately to tell us that you have received this e-mail, ª and return the original to us. Any use, forwarding, printing ª or copying of this message is strictly prohibited. ª ª No part of this message can be considered a request for goods ª or services. ª ============================================================== ª ========= ª Any questions about Bookham's E-Mail service should be ª directed to postmaster@b.... ª ª ª ------------------------ Yahoo! Groups Sponsor ª ---------------------~--> Sponsored by VeriSign - The Value ª of Trust When building an e-commerce site, you want to start ª with a secure foundation. Learn how with VeriSign's FREE ª Guide. http://us.click.yahoo.com/kWSNbC/XdiDAA/yigFAA/kgFolB/TM ª -------------------------------------------------------------- ª -------~-> ª ª ======================================================== ª TSCM-L Technical Security Mailing List ª "In a multitude of counselors there is strength" ª ª To subscribe to the TSCM-L mailing list visit: ª http://www.yahoogroups.com/community/TSCM-L ª ª It is by caffeine alone I set my mind in motion. ª It is by the juice of Star Bucks that thoughts acquire ª speed, the hands acquire shaking, the shaking is a warning. ª It is by caffeine alone I set my mind in motion. ª =================================================== TSKS ª ª Your use of Yahoo! Groups is subject to ª http://docs.yahoo.com/info/terms/ ª ª ª 4844 From: tek492p Date: Tue Feb 19, 2002 8:00pm Subject: Re: Absolutely outrageous --- In TSCM-L@y..., "Steve Uhrig" wrote: > The security industry has some of the most incredibly ignorant morons > imaginable. > > I am literally speechless. Maybe for the first time in my life. > A concourse was evacuated and > everyone was screened again." > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* There is some sort of security breach everyday at some airport somewhere in the United States. Some stories make it to the news media, some do not. As long as we have the same minimum wage employees (making them federal employees does NOT increase their I.Q.) this problem will continue. Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 4845 From: Aimee Farr Date: Tue Feb 19, 2002 10:09pm Subject: "Tampering with a security device." > Paging Aimee. . . what does this proposed law *really* mean? > A.Lizard Hm. A question for the courts. Non-legally -- this law would do more damage to security interests than anything they could possibly dream up. Simply "passing a law" is not a solution to people intent on B&E, etc. I'm of the opinion this could be aimed at something else, possibly dissent populations and "surveillance saboteurs," or ..."surveillance subversion" -- whatever the buzzword will be. If so, these people don't understand the nature of political dissent or workforce sabotage. I think it could be better-drafted so as to protect legitimate interests. I would like to know what interest drafted this bill. ~Aimee 4846 From: Aimee Farr Date: Tue Feb 19, 2002 10:59pm Subject: "TSCM SURVIVOR" WHEN: When you least expect it. WHERE: 600 sq. mi. remote island. WHAT: 100 of us, attending a conference on a remote urban island, in a small strip hotel. The island is suddenly invaded by a heretofore unknown enemy. We retreat to the hotel to decide what to do, as the entire island goes dark. Our laptops: struck dumb. Electronics: all fried. SIT: I look at all of you, and scream hysterically, "SAVE ME, PEOPLE!" Urhrig slaps me, not so much to bring me to my senses, but because he's always wanted to. Standing behind me: 100 beautiful, bikini-clad natives, with looks of desperation on their faces, and tears in their doe-like eyes. They would speak, but they're mute. You recognize that your chances of survival are slim, hearing explosions in the distance. And, the truth is, we all lied about where we were going, because the hotel doubles as an exotic retreat in the off-season, and we wanted cheap rates. Suddenly, a handsome, mysterious man (you can't be mysterious and not handsome -- if you are, we call you something else) in a dark suit rises in the back of the hotel bar. He says, "I have a cache of weapons, and a five hideouts in the jungle." Atkinson jumps up, and declares war on the enemy. With his handy bag of tricks, he slithers around to check out the situation. After we drag him back inside, we learn he eyeballed enemy forces...he says, "maybe 15,000." He directs the native women to oil their bodies, so they can pose on the beach as a distraction, allowing us to make our escape into the jungle on foot, following a power utility path that runs the length of the island. We initial plan is to disperse, heading out for the five primitive jungle hideouts. Zig-zag between the five jungle hideouts is about 100 miles, through heavy jungle, crawling with really icky stuff, including one nudist colony of questionable allegiance. What we've got: 1. your BASIC travel kits. 2. typical strip hotel stuff. 3. one small, bare-essentials convenience store. 4. guns and ammunition, if we can get to them. 5. 1 native guide. 6. not much time. Just some of what we don't have: 1. a way to communicate between the 5 jungle hideouts. I run to my room screaming. I'm viewed under the crack of the door tying a bedsheet to a curtain rod, about to wave the flag of surrender, and reveal our location.....unless I hear some good ideas about _what to grab_ and _what to do_! YOU have been elected leader of one of the 5 groups. Your orders? *tick-tock, tick-tock* 4847 From: James M. Atkinson Date: Tue Feb 19, 2002 10:31pm Subject: Re: "Tampering with a security device." At 10:09 PM -0600 2/19/02, Aimee Farr wrote: > > Paging Aimee. . . what does this proposed law *really* mean? >> A.Lizard > >Hm. A question for the courts. > >Non-legally -- this law would do more damage to security interests than >anything they could possibly dream up. Simply "passing a law" is not a >solution to people intent on B&E, etc. I'm of the opinion this could be >aimed at something else, possibly dissent populations and "surveillance >saboteurs," or ..."surveillance subversion" -- whatever the buzzword will >be. If so, these people don't understand the nature of political dissent or >workforce sabotage. > >I think it could be better-drafted so as to protect legitimate interests. > >I would like to know what interest drafted this bill. > >~Aimee The intention of the statute is to stop shoplifter from tampering with "Inventory Control Tags" and the related support systems. I does not appear to have anything to do with bugs and wiretaps. -jma -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4848 From: William Knowles Date: Wed Feb 20, 2002 0:53am Subject: Re: A new record On Fri, 15 Feb 2002, Steve Uhrig wrote: > A new record has been set. > > This week I referred seven people to the following website in lieu of > using my services: > > http://zapatopi.net/afdb.html For the more technically savvy kooks, you should also recommend that if they use M$ for an OS to yank out that hard drive, buy a new hard drive, and install Tinfoil Hat Linux. :) http://tinfoilhat.cultists.net/ - WK *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 4849 From: Matthew Paulsen Date: Wed Feb 20, 2002 2:51am Subject: RE: Re: Absolutely outrageous From http://www.avsec.com Cronology of airport / airline reports from Airwatch page of ASI day/month/year/location/info formatted. This timeline covers less than a month below. Their website goes back to 9/99 listings. 04/10/2001 NEW DELHI An Alliance Air flight landed in New Delhi with both passengers and crew believing the flight had been hijacked. Air traffic control advised the crew that they had received reports that a hijack was in progress. The problem started with a hoax call but was exacerbated by miscommunication. 04/10/2001BLACK SEA A Siberian Airlines Tu-154 en route from Tel Aviv to Novosibirsk in Siberia exploded over the Black Sea. At the time this issue of ASI went to print it is believed that all 76 passengers and crew were killed, 51 of whom were Israelis. Whilst there is speculation that this was a terrorist act, most believe that a stray missile fired by the Ukranian military during a training exercise was the actual cause. 29/09/2001PARIS Air France suspended all flights in and out of Paris-Orly airport following anonymous threats. The terminals were evacuated until police established the threat was a hoax 29/09/2001MONTPELLIER The airport was closed following a bomb threat. 27/09/2001LOS ANGELES Shortly after Air Canada flight AC 792 departed for Toronto, Javid Naghani, an Iranian citizen resident in the US, was apprehended smoking in the toilet. The passenger became verbally abusive and uttered an anti-American threat, causing the aircraft to return to Los Angeles under escort by the US Air Force. 27/09/2001MOSCOW According to Russia's Interfax news agency, 9 tons of explosives and 594 detonators were found, in Moscow, on a cargo plane bound for Kazakhstan from Vienna, Austria. The cargo was allegedly sent by Spain's Union Espanol to the Kazakhstan Corporation 26/09/2001SEOUL A passenger sent a friend a joke text message on his mobile phone indicating that he was on a hijacked Japan Airlines flight en route to Seoul from Kansai. The friend, believing the message, contacted the authorities who met the man off the flight in Seoul 25/09/2001NAIROBI A Kenya Airways plane, en route to Dar es Salaam, returned to Nairobi following a telephone bomb threa 22/09/2001LOS ANGELES An American Airlines flight bound for Mexico City was turned back to Los Angeles International Airport after the FBI received a threat 19/09/2001DUBAI A British passenger aboard a Cathay Pacific flight en route to Hong Kong via Kuwait was arrested following a threat he made, when refused additional alcohol based on his intoxicated state, that a bomb was on board the aircraft 17/09/2001GOOSE BAY A Virgin Airlines flight en route from Heathrow to New York diverted to Newfoundland following a bomb threat. 4 Canadian jet fighters escorted the aircraft to Goose Bay, Canada 16/09/2001FRANKFURT A Singapore Airlines flight returned to Frankfurt following the discovery of a note in the toilets warning that a bomb was on board 16/09/2001TORONTO A 21-year-old Australian, Sinan Safett Acar, travelling to Paris on Air France was arrested in Toronto after joking he had a bomb in his suitcase. He was later given a 60 day gaol sentence. 16/09/2001SRI LANKA 20 explosive-laden boats with suicidal Tamil Tiger guerillas on board attacked a ship, carrying 1,200 Sri Lankan soldiers, off the coast in Trincomalee, northeast of Colombo. 6 guerillas were killed and 40 soldiers were wounded 15/09/2001HOUSTON Constantinos Carpis, aged 36, was arrested having told American Airlines ticket agents at Houston that he had a nuclear bomb in his baggage. He was travelling to his home in Australia. 14/09/2001AUCKLAND A 55-year old employee of New Zealand's prison service was arrested as he boarded a flight at Auckland for Palmerston North. He had allegedly joked with a friend about having a bomb in his bag 14/09/2001NEWCASTLE A man was arrested at Teeside International airport, having claimed that he had Semtex explosives in his pockets. He was travelling to Tenerife 13/09/2001ORLANDO Orlando International Airport was evacuated following a bomb threat. The fire department's bomb squad examined bags left in the terminal and determined there was no bomb 12/09/2001SINGAPORE A Singapore Airlines flight routed to Johannesburg from Singapore was delayed following the receipt of a hoax bomb threat. The threat was allegedly sent by e-mail from a New Zealander employed by IBM -----Original Message----- From: tek492p [mailto:tek492p@y...] Sent: Tuesday, February 19, 2002 6:00 PM To: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Absolutely outrageous --- In TSCM-L@y..., "Steve Uhrig" wrote: > The security industry has some of the most incredibly ignorant morons > imaginable. > > I am literally speechless. Maybe for the first time in my life. > A concourse was evacuated and > everyone was screened again." > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* There is some sort of security breach everyday at some airport somewhere in the United States. Some stories make it to the news media, some do not. As long as we have the same minimum wage employees (making them federal employees does NOT increase their I.Q.) this problem will continue. Jack Lindauer Intertect TSCM services Los Angeles (818) 831-0515 Yahoo! Groups Sponsor ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service. 4850 From: Robert Dyk Date: Wed Feb 20, 2002 8:10am Subject: RE: "TSCM SURVIVOR" Is this relevant to the common cause ? Robert Dyk dyk@c... 4851 From: greendots . Date: Tue Feb 19, 2002 9:44pm Subject: symmetrical time Tomorrow, Wednesday, 20 February 2002, will be a historic moment in time. When the 24 hour clock ticks on 8:02 p.m. on Wednesday, 20 February 2002, then time, day, month, and year will read in perfect symmetry: 2002, 2002, 2002. To be more precise - 20:02, 20/02, 2002. A symmetrical pattern has only happened once in the past, a little over a thousand years ago. The exact moment was 10:01 a.m. on 10 January 1001. A balanced pattern will never occur again. _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp. 4852 From: James M. Atkinson Date: Wed Feb 20, 2002 8:43am Subject: Polygraph Screening in Light of the Robert Hanssen Espionage Investigation http://antipolygraph.org/documents/richardson-memo-02-2001.shtml ------------------------------------------------------------------------ About a week after the 18 February 2001 arrest of FBI agent Robert P. Hanssen on espionage charges, the FBI's then senior scientific expert on polygraphy, Dr. Drew C. Richardson, sent the following memo to FBI Director Louis Freeh, the Deputy Director, the Assistant Director in Charge of the Laboratory Division, and two Section Chiefs within the Laboratory Division. He received no written or other reply. See also Dr. Richardson's 27 September 1997 opening statement on polygraph screening before the U.S. Senate Committee on the Judiciary's Subcommittee on Administrative Oversight and the Courts, his 17 October 2001 presentation before the National Academy of Sciences' Study to Review the Scientific Evidence on the Polygraph, and his 28 January 2002 polygraph countermeasure challenge to the polygraph community. ------------------------------------------------------------------------ "Polygraph Screening in Light of the Robert Hanssen Espionage Investigation" Over the last week, the world has learned of the Robert Hanssen Espionage investigation. I, as is the case for most of the lay public and for most employees of the FBI, do not know Mr. Hanssen nor have I had any connection to or knowledge of the investigation that led to his arrest. Before I directly address the subject of this note, I would like to comment on a few peripheral issues so as to alleviate any confusion about what my thoughts are on these subjects or motivation for putting these present thoughts into writing. If the allegations are proven to be true, they represent a heinous betrayal of trust and an unbelievable criminal action on the part of one of our own with profound national security implications for our country. Admittedly, even the retelling of this story is shocking, even prior to its having been formally proved in a judicial setting. Two questions recently asked in the aftermath by the lay press are "How could this have occurred over fifteen plus years and go undetected through the vast majority of that time?" and "What steps should the FBI take to substantially reduce the likelihood of this happening again?" Contained within the context of the last question are frequently occurring references to polygraph screening of Bureau employees and whether or not the FBI is out of step with others in the Intelligence Community with regard to its current polygraph policies. I very strongly believe that the last question and answer are completely irrelevant and that the only meaningful question seeks to address whether the members of the "community" are in line with reason and logic, not with each other. With an appropriately crafted question in mind, it may well be that the answer would have the majority conforming to the practices of the minority, and not the reverse. The rhetoric of recent days has suggested that the "problem" lies within "the culture" of the Bureau, which has traditionally been reluctant to impose polygraph screening programs on its employees. In spite of the recent espionage debacle, I believe this area concerns what "is right" and not that which "is a problem" within the Bureau and that furthermore this has nothing to do with "the culture" of the FBI, but its collective intelligence and discernment which has properly led to it having resisted imposing polygraph screening programs on its employees. In the balance of this note, I will attempt to present the viewpoint of myself and others who are deeply concerned with national security and believe that answers to the aforementioned questions need to be provided, but strongly believe that it is critically important that logic prevail in this time of shock and dismay. There no doubt exists pressure from various sources to "do something" and to quickly take some action, albeit, perhaps even an irrational action. If one is to examine the lay press and editorial accounts of the past week, this pressure has already begun in earnest. The situation reminds one of the relevant temptation as described by and attributed to Salman Rushdie: "When thinking becomes excessively painful, action yields the fastest remedy." It is the sincere hope of this author that this note will support those who have refused to take such action in the past and are resolute in opposing it in the future. The question has frequently arisen as to whether Mr. Hanssen was administered polygraph exams during the period of alleged espionage and/or during his FBI career. This question is then followed with suggested analysis about what effect his having been given a polygraph exam(s) would have had on the course of this investigation and whether any of this demonstrates a need to change the present Bureau policy of not routinely administering polygraph exams to its employees. Again, as with most other questions regarding Mr. Hanssen, I do not have personal or other knowledge as to whether he has been given polygraph exams. The logic of the issue does not require that I do. Either he was or he was not. If he was, then he like so many other traitors was allowed to continue his activities following having been found non-deceptive on an exam(s). If he was not administered an exam(s), in a rather perverse sort of (lack of) logic, it has been suggested that this demonstrates that Bureau employees should be given them in the future. Should the latter situation exist, i.e., that Hanssen had not been polygraphed, I suggest it be viewed in the context of he, likewise, was most likely not subjected to astrological chart readings, palm readings, tea leaf readings, or the readings of entrails as practiced by the ancient Romans. There now exists no more compelling reason to institute a program of wide spread polygraphy than there does implementation of any of these other divining activities. Aside from and in addition to there being no cause for such precipitous action, I strongly believe (as I have stated before in the case of FBI applicants) that there is NO evidence whatsoever that polygraph screening has any validity as a diagnostic tool. In addition to the general considerations and relevant scientific community opinion(s) I have raised before in connection with applicant screening, I believe a detailed analysis of the issues of polygraph sensitivity and specificity through the principles of Bayesian statistics and receiver operator curves (admittedly, well beyond the scope of this note and its form) will completely debunk the notion that this tool has any validity. For reasons that I have previously provided, I further feel that any notions of a deterrent effect and utility in obtaining confessions/admissions for polygraph screening are at best, far overstated. On a final note regarding validity, a very prestigious panel assembled by the National Academy of Sciences has just undertaken (for the US Government) an analysis of the validity of polygraph screening. Whether this panel ultimately concludes (as I believe it likely will), as do I about polygraph validity, I think it will be considered premature (if not presumptuous and ultimately embarrassing to the Bureau) for a new polygraph screening program to be instituted before this group has hardly begun its work. In the analysis of the merits of a given program, it is logical that the cost/benefit ratio of that program be examined. Such is true for a polygraph screening program as well. If as I and others claim, polygraph screening has no validity has a diagnostic tool, then its benefit will be exceedingly low and the costs associated with such a program would also have to be exceedingly low to make the cost/benefit ratio acceptable and a basis for instituting or continuing such a program. In fact the potential costs are quite the opposite---very high. The aforementioned statistical analysis that I referred to would indicate that with assumptions made most favorable to polygraphy, that one could expect to have roughly 50 to 100 times as many false positive determinations (i.e., an innocent employee wrongly found to be deceptive on a polygraph examination) as true positives (e.g., a spy found to be deceptive and therefore identified). Although one can reduce the number of false positives (i.e., increase specificity), it is impossible to do this without reducing the sensitivity of the test, making it almost virtually impossible that under such conditions a spy will be identified as a result of a polygraph exam. At the very least any false positive results will invariably lead to careers being sidelined, but will most likely lead to some careers and lives being ruined. I would call to your attention the case of Mr. Mark Mallah, a former special agent of the FBI who claims to have been wrongly accused of activities related to espionage. This investigation stemmed from what may well have been false positive polygraph results. In addition to other materials available to you, I would refer you to Mr. Mallah's personal account of these matters (http://www.antipolygraph.org/statements/statement-002.shtml). Although I suspect that every effort would be expended to reduce the number of false positives (with the aforementioned and necessary accompanying loss of sensitivity), false positives will occur and some of our employees will be victimized. I will say as strongly as I possibly can that a reasonable cost to benefit ratio analysis of polygraph screening will indicate that such a program is altogether unviable. But on a hypothetical plane, I would pose the question to you: "Even if polygraph had a high benefit (ability to catch spies, which I adamantly claim it does not), and ergo a more acceptable cost to benefit ratio, how many spies would we have to catch to justify the ruining of one employee's (and his family's) life? Or conversely, how many lives would we be willing to ruin to catch one spy? These are ethical decisions, not scientific considerations, but ones that would have to be made and taken responsibility for. The good news is that the moral dilemma I pose for you is really not one at all. The necessary benefit (test sensitivity) to require such an ethical choice is not real or present, leaving you, the Director, and other executives not having to face this excruciating choice. I would like to close on a personal note. I intend to retire from the FBI in the next several months. Amongst many other things, I plan to become engaged in both the scientific inquiry and public discourse surrounding polygraph screening. As such, I suppose it could be said that I do not have a personal stake in whether polygraph screening is implemented or not in the Bureau and that I could easily and perhaps wisely save my commentary for my post Bureau life. Although I suppose it is tempting to do so, I believe that because decisions will/are being made imminently and because the welfare of those I care for and will leave behind with my retirement is at stake, I cannot in good conscience remain silent on this issue. Although I don't expect my views to be singularly compelling (nor should they be) in the overall decision-making process you are undertaking, I do appreciate any consideration you might give this viewpoint. Sincerely yours, Dr. Drew C. Richardson Supervisory Special Agent FBI Laboratory -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4853 From: Marty Kaiser Date: Wed Feb 20, 2002 4:01am Subject: Fw: [INTELNET-L] Interesting In case you are interested, below is the affidavit for arrest and search of Robert Hanssen, FBI traitor. http://www.fas.org/irp/ops/ci/hanssen_affidavit.html http://www.fas.org/irp/ops/ci/hanssen_affidavit2.htmlGet more from the Web. 4854 From: Richard Thieme Date: Wed Feb 20, 2002 9:54am Subject: Re: "Tampering with a security device." I live in Wisconsin and am waiting to hear back from my state representative about this bill. RT At 10:09 PM 2/19/02 -0600, Aimee Farr wrote: >> Paging Aimee. . . what does this proposed law *really* mean? >> A.Lizard > >Hm. A question for the courts. > >Non-legally -- this law would do more damage to security interests than >anything they could possibly dream up. Simply "passing a law" is not a >solution to people intent on B&E, etc. I'm of the opinion this could be >aimed at something else, possibly dissent populations and "surveillance >saboteurs," or ..."surveillance subversion" -- whatever the buzzword will >be. If so, these people don't understand the nature of political dissent or >workforce sabotage. > >I think it could be better-drafted so as to protect legitimate interests. > >I would like to know what interest drafted this bill. > >~Aimee > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 4855 From: Aimee Farr Date: Wed Feb 20, 2002 9:54am Subject: RE: "Tampering with a security device." I did not read all of your post, and have it confused with something else. (Nothing to do w/ bugs, etc.) Sorry, I crossed threads from another channel! ~Aimee > -----Original Message----- > From: Aimee Farr [mailto:aimee.farr@p...] > Sent: Tuesday, February 19, 2002 10:10 PM > To: TSCM-L-yahoogroups.com > Subject: [TSCM-L] "Tampering with a security device." > > > > Paging Aimee. . . what does this proposed law *really* mean? > > A.Lizard > > Hm. A question for the courts. > > Non-legally -- this law would do more damage to security interests than > anything they could possibly dream up. Simply "passing a law" is not a > solution to people intent on B&E, etc. I'm of the opinion this could be > aimed at something else, possibly dissent populations and "surveillance > saboteurs," or ..."surveillance subversion" -- whatever the buzzword will > be. If so, these people don't understand the nature of political > dissent or > workforce sabotage. > > I think it could be better-drafted so as to protect legitimate interests. > > I would like to know what interest drafted this bill. > > ~Aimee > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > 4856 From: A Grudko Date: Wed Feb 20, 2002 8:08am Subject: "Tampering with a security device." - Original Message - From: James M. Atkinson > > The intention of the statute is to stop shoplifter from tampering > with "Inventory Control Tags" and the related support systems. > I does not appear to have anything to do with bugs and wiretaps. There was a passingly interesting and technically distorted discourse in the media here last month about active VQRP RF (431Mhz) digital ID tags being used in government premises is SA. The media tried to make out that one political party was tracking the movements of all others and implied an evil Orwellian conspirasy when in fact the installers were just trying to reduce rampant theft and security breaches. Remember 'The Man From Uncle'? If you bypassed the secret chamber behind the tailor's shop without the triangular yellow tag you were tortured dead meat, or worse, had to listen to one of Mr Alexander's monalogues. I think that was a CBS classified Marty Kaiser c. 1964 system. :-) Can this 2002 system be abused? Of course - so can water. Andy Grudko D.P.M., Grad I.S, (S.A.) - Grudko Associates - www.grudko.com , Est. 1981 International business intelligence and investigations - ICQ 146498943 Johannesburg (+27 11) 465 9673 - 465 1487 (Fax), Pretoria (+27 12) 244 0255 - 244 0256 (Fax) SACI, WAD, CALI, SAMLF, UKPIN, AFIO (OS), IWWA, PRETrust, AmChamCom When you need it done right - first time e 4857 From: David Alexander Date: Thu Feb 21, 2002 2:30am Subject: "TSCM SURVIVOR" >YOU have been elected leader of one of the 5 groups. > >Your orders? > >*tick-tock, tick-tock* Tell everyone not to panic, your alarm clock will go off any second and you'll wake up. _______________________________ David Alexander M.INSTIS Global Infrastructure Director Bookham Technology plc Tel: +44 (0) 1327 356264 Mobile: +44 (0) 7799 881284 Fax: +44 (0) 1327 356775 http://www.bookham.com ======================================================================= This e-mail is intended for the person it is addressed to only. The information contained in it may be confidential and/or protected by law. If you are not the intended recipient of this message, you must not make any use of this information, or copy or show it to any person. Please contact us immediately to tell us that you have received this e-mail, and return the original to us. Any use, forwarding, printing or copying of this message is strictly prohibited. No part of this message can be considered a request for goods or services. ======================================================================= Any questions about Bookham's E-Mail service should be directed to postmaster@b.... 4858 From: Rob Muessel Date: Thu Feb 21, 2002 8:45am Subject: Equipment for sale A colleague contacted me about a set of ISA equipment he'd like to sell. It consists of 1. ECR 1 Receiver w/haliburton case 2. Frequency extenders up to 7ghz. 3. Chart recorder in haliburton case 4. NJD-4 Non Linear junction detector 5. Carrier Current detector w/case and sound source All are in good, if not excellent, shape with low miles. Price is reasonable. Contact me off the list for details if you are interested. -- Rob Muessel, Director email: rmuessel@t... TSCM Technical Services Phone: 203-354-9040 11 Bayberry Lane Fax: 203-354-9041 Norwalk, CT 06851 USA 4859 From: James M. Atkinson Date: Thu Feb 21, 2002 10:11am Subject: A Cow Story TRADITIONAL CAPITALISM: You have two cows. You sell one and buy a bull. Your herd multiplies, and the economy grows. You sell them and retire on the income. ENRON VENTURE CAPITALISM: You have two cows. You sell three of them to your publicly listed company, using letters of credit opened by your brother-in-law at the bank, then execute a debt/equity swap with an associated general offer so that you get all four cows back, with a tax exemption for five cows. The milk rights of the six cows are transferred via an intermediary to a Cayman Island company secretly owned by the majority shareholder who sells the rights to all seven cows back to your listed company. The annual report says the company owns eight cows, with an option on one more. Sell one cow to buy a new president of the United States, leaving you with nine cows. No balance sheet provided with the release. The public buys your bull. ARTHUR ANDERSON, LLC You have 2 cows. You shred all documents that Enron has any cows, take 2 cows from Enron for payment for consulting the cows, and attest that Enron has 9 cows. AN AMERICAN CORPORATION You have two cows. You sell one, and force the other to produce the milk of four cows. You are surprised when the cow drops dead. FRENCH CORPORATION You have two cows. You go on strike because you want three cows. A JAPANESE CORPORATION You have two cows. You redesign them so they are one-tenth the size of an ordinary cow and produce twenty times the milk. You then create clever cow cartoon images called Cowkimon and market them World-Wide. A GERMAN CORPORATION You have two cows. You re-engineer them so they live for 100 years, eat once a month, and milk themselves. A BRITISH CORPORATION You have two cows. Both are mad. AN ITALIAN CORPORATION You have two cows, but you don't know where they are. You break for lunch. A RUSSIAN CORPORATION You have two cows. You count them and learn you have five cows. You count them again and learn you have 42 cows. You count them again and learn you have 12 cows. You stop counting cows and open another bottle of vodka. A SWISS CORPORATION You have 5000 cows, none of which belong to you. You charge others for storing them. A HINDU CORPORATION You have two cows. You worship them. A CHINESE CORPORATION You have two cows. You have 300 people milking them. You claim full employment, high bovine productivity, and arrest the newsman who reported the numbers. AN ISRAELI CORPORATION So, there are these two Jewish cows, right? They open a milk factory, an ice cream store, and then sell the movie rights. They send their calves to Harvard to become doctors. So, who needs people? AN ARKANSAS CORPORATION You have two cows. That one on the left is kinda cute. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4860 From: kirk Date: Thu Feb 21, 2002 11:25am Subject: Re: A Cow Story Dear kind-hearted friends... Now that the holiday season has passed, please look into your heart to help those in need. Enron executives in our very own country are living at or just below the seven-figure salary level. And, as if that weren't bad enough, they will be deprived of it as a result of the bankruptcy and current SEC investigation. But now, you can help! For only $20,835 a month, about $694.50 a day (that's less than the cost of a large screen projection TV) you can help an Enron executive remain economically viable during his time of need. This contribution by no means solves the problem, but it's a start! Almost $700 may not seem like a lot of money to you, but to an Enron exec it could mean the difference between a vacation spent sucking ass in DC, golfing in Florida or a Mediterranean cruise. For you, seven hundred dollars is nothing more than rent, a car note or mortgage payments. But to an Enron exec $700 will almost replace his per diem. Your commitment of less than $700 a day will enable an Enron exec to buy that home entertainment center, trade in the year-old Lexus for a new Ferrari, or enjoy a weekend in Rio. HOW WILL I KNOW I'M HELPING? Each month, you will receive a complete financial report on the exec you sponsor. Detailed information about his stocks, bonds, 401(k), real estate, and other investment holdings will be mailed to your home. You'll also get information on how he plans to invest his golden parachute. Imagine the joy as you watch your executive's portfolio double or triple! Plus, upon signing up for this program, you will receive a photo of the exec (unsigned-for a signed photo, please include an additional $50.00). Put the photo on your refrigerator to remind you of other peoples' suffering. HOW WILL HE KNOW I'M HELPING? Your Enron exec will be told that he has a SPECIAL FRIEND who just wants to help in a time of need. Although the exec won't know your name, he will be able to make collect calls to your home via a special operator just in case additional funds are needed for unexpected expenses. YES, I WANT TO HELP! I would like to sponsor an Enron executive. My preference is checked below: [ ] Mid-level Manager [ ] Director [ ] Vice President (Higher cost; please specify which department) [ ] President (Even higher cost; please specify which department) [ ] CEO (Contribution:: Average Enron janitor monthly salary x 700) [ ] Entire Company [ ] I'll sponsor an Exec most in need. Please select one for me. *It's just that easy so do it now!* Please charge the account listed below ___________ per day and send me a picture of the Enron executive I have sponsored, along with my very own Enron "Keep America Strong; Sponsor an Enron Exec: Ask Me How!" t-shirt to wear proudly. And thank you so very much! ---------- Original Message ---------------------------------- From: "James M. Atkinson" Date: Thu, 21 Feb 2002 11:11:56 -0500 > >TRADITIONAL CAPITALISM: You have two cows. You sell one and buy a >bull. Your herd multiplies, and the economy grows. You sell them and >retire on the income. > >ENRON VENTURE CAPITALISM: You have two cows. You sell three of them >to your publicly listed company, using letters of credit opened by >your brother-in-law at the bank, then execute a debt/equity swap with >an associated general offer so that you get all four cows back, with >a tax exemption for five cows. The milk rights of the six cows are >transferred via an intermediary to a Cayman Island company secretly >owned by the majority shareholder who sells the rights to all seven >cows back to your listed company. The annual report says the company >owns eight cows, with an option on one more. Sell one cow to buy a >new president of the United States, leaving you with nine cows. No >balance sheet provided with the release. The public buys your bull. > >ARTHUR ANDERSON, LLC You have 2 cows. You shred all documents that >Enron has any cows, take 2 cows from Enron for payment for consulting >the cows, and attest that Enron has 9 cows. > >AN AMERICAN CORPORATION You have two cows. You sell one, and force >the other to produce the milk of four cows. You are surprised when >the cow drops dead. > >FRENCH CORPORATION You have two cows. You go on strike because you >want three cows. > >A JAPANESE CORPORATION You have two cows. You redesign them so they >are one-tenth the size of an ordinary cow and produce twenty times >the milk. You then create clever cow cartoon images called Cowkimon >and market them World-Wide. > >A GERMAN CORPORATION You have two cows. You re-engineer them so they >live for 100 years, eat once a month, and milk themselves. > >A BRITISH CORPORATION You have two cows. Both are mad. > >AN ITALIAN CORPORATION You have two cows, but you don't know where >they are. You break for lunch. > >A RUSSIAN CORPORATION You have two cows. You count them and learn you >have five cows. You count them again and learn you have 42 cows. You >count them again and learn you have 12 cows. You stop counting cows >and open another bottle of vodka. > >A SWISS CORPORATION You have 5000 cows, none of which belong to you. >You charge others for storing them. > >A HINDU CORPORATION You have two cows. You worship them. > >A CHINESE CORPORATION You have two cows. You have 300 people milking >them. You claim full employment, high bovine productivity, and arrest >the newsman who reported the numbers. > >AN ISRAELI CORPORATION So, there are these two Jewish cows, right? >They open a milk factory, an ice cream store, and then sell the movie >rights. They send their calves to Harvard to become doctors. So, who >needs people? > >AN ARKANSAS CORPORATION You have two cows. That one on the left is kinda cute. >-- > >-------------------------------------------------------------------------------------------------- >The First, The Largest, The Most Popular, and The Most Complete TSCM, >Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. >-------------------------------------------------------------------------------------------------- > James M. AtkinsonPhone: (978) 381-9111 > Granite Island GroupFax: > 127 Eastern Avenue #291http://www.tscm.com/ > Gloucester, MA 01931-8008mailto:jmatk@tscm.com >-------------------------------------------------------------------------------------------------- > People sleep peaceably in their beds at night only because rough > men stand ready to do violence on their behalf. - George Orwell > -------------------------------------------------------------------------------------------------- > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > -- Kirk Adirim President TACTRONIX Tactical Electronics for Critical Missions 8497 Sunset Boulevard #28 West Hollywood, CA 90069 USA E: kirk@t... T: 323-650-2880 F: 310-388-5886 W: www.tactronix.com -- 4861 From: James M. Atkinson Date: Thu Feb 21, 2002 10:36pm Subject: It speaks for itself. It speaks for itself. Because I drove the night shift, my cab became a moving confessional. Passengers climbed in, sat behind me in total anonymity, and told me about their lives. I encountered people whose lives amazed me, ennobled me, made me laugh and weep. But none touched me more than a woman I picked up late one August night. When I arrived at 2:30 a.m., the building was dark except for a single light in a ground floor window. Under these circumstances, many drivers would just honk once or twice, wait a minute, then drive away. But I had seen too many impoverished people who depended on taxis as their only means of transportation. Unless a situation smelled of danger, I always went to the door. This passenger might be someone who needs my assistance, I reasoned to myself. So I walked to the door and knocked. "Just a minute," answered a frail, elderly voice. (I could hear something being dragged across the floor.) After a long pause, the door opened. A small woman in her 80s stood before me. She was wearing a print dress and a pillbox hat with a veil pinned on it, like somebody out of a 1940's movie. By her side was a small nylon suitcase. The apartment looked as if no one had lived in it for years. All the furniture was covered with sheets. There were no clocks on the walls, no knickknacks or utensils on the counters. In the corner was a cardboard box filled with photos and glassware. "Would you carry my bag out to the car?" she said. I took the suitcase to the cab, then returned to assist the woman. She took my arm and we walked slowly toward the curb. She kept thanking me for my kindness. "It's nothing," I told her. "I just try to treat my passengers the way I would want my mother treated." "Oh, you're such a good boy," she said. When we got in the cab, she gave me an address, then asked, "Could you drive through downtown?" "It's not the shortest way," I answered quickly. "Oh, I don't mind," she said. "I'm in no hurry. I'm on my way to a hospice." I looked in the rear view mirror. Her eyes were glistening. "I don't have any family left," she continued. "The doctor says I don't have very long.." I quietly reached over and shut off the meter. "What route would you like me to take?" I asked. For the next two hours, we drove through the city. She showed me the building where she had once worked as an elevator operator. We drove through the neighborhood where she and her husband had lived when they were newlyweds. She had me pull up in front of a furniture warehouse that had once been a ballroom where she had gone dancing as a girl. Sometimes she'd ask me to slow in front of a particular building or corner and would sit staring into the darkness, saying nothing. As the first hint of sun was creasing the horizon, she suddenly said, "I'm tired. Let's go now." We drove in silence to the address she had given me. It was a low building, like a small convalescent home, with a driveway that passed under a portico. Two orderlies came out to the cab as soon as we pulled up. They were solicitous and intent, watching her every move. They must have been expecting her. I opened the trunk and took the small suitcase to the door. The woman was already seated in a wheelchair. "How much do I owe you?" she asked, reaching into her purse. "Nothing," I said. "You have to make a living," she answered. "There are other passengers," I responded. Almost without thinking, I bent and gave her a hug. She held onto me tightly. "You gave an old woman a little moment of joy," she said. "Thank you." I squeezed her hand, then walked into the dim morning light. Behind me, a door shut. It was the sound of the closing of a life. I didn't pick up any more passengers that shift. I drove aimlessly, lost in thought. For the rest of that day, I could hardly talk. What if that woman had gotten an angry driver, or one who was impatient at the end his shift? What if I had refused to take the run, or had honked once, then driven away? On a quick review, I don't think that I have done anything more important in my life. We're conditioned to think that our lives revolve around great moments. But great moments often catch us unaware--beautifully wrapped in what others may consider a small one. People may not remember exactly what you did, or what you said, ...but they will always remember how you made them feel. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. AtkinsonPhone: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf. - George Orwell -------------------------------------------------------------------------------------------------- 4862 From: Aimee Farr Date: Fri Feb 22, 2002 10:12pm Subject: Whoops. [Moral lesson. ~Aimee] US v. YANG (02/20/02 - No. 00-3125, 00-3126, 00-3150) Where the defendants believed the information they conspired and attempted to steal was a trade secret, the fact that the information was not an actual trade secret was irrelevant, as the defense of impossibility is unavailable to defendants charged under the Economic Espionage Act of 1996, 18 U.S.C. sections 1832(a)(4) and (5). To read the full text of this opinion, go to: http://laws.lp.findlaw.com/6th/02a0062p.html From: R. Snyder Date: Wed Feb 19, 2003 8:51am Subject: Re: Taking a byte out of Baghdad The popular press likes to use the term "virus" rather loosely. Given the ubiquitous usage of TCP/IP over twisted-pair ethernet, many potential vulnerabilities could be exploited without specific knowledge of computer OS's. For example, with sufficient knowledge of a printer's network interface, a trojan-horse DOS capability could be installed in the printer. A printer would be a logical candidate for such an attack, as it would be in the perfect position to become acquainted with the network addresses of all the computers printing to it. Upon observing the occurrence of a triggering condition, the printer could then begin a DOS attack on the computers on the LAN. Moreover, with more knowledge or assumptions of computer OS's, a printer would be in a position to launch attacks within the LAN via NetBIOS/NetBEUI/IPX. Even without knowledge of the printer's network interface, an additional network interface could easily be bridged across the printer's. Triggering could be conditioned upon network traffic that would be expected to occur on the network (e.g., air defense messages indicating a massive air attack), network traffic that could be induced to occur (e.g., leaking a pseudo-codeword to the enemy with the expectation that they would recite it in their network traffic), or some other phenomenon (e.g., including a radio receiver in the printer responsive to a signal transmitted during the overflight of an EW asset). All of the foregoing would be possible even on a LAN having no connection to the internet. The bottom line is that installing a compromised hardware component in a network is a bad thing, and the possibility of such installation should be met with investigation, not denial. I'm not saying that any of the above would be likely or trivial to implement, but that I see nothing that would place the proposed schemes beyond the realm of possibility given sufficient knowledge, access, and motivation. __________________________________________________ Do you Yahoo!? Yahoo! Shopping - Send Flowers for Valentine's Day http://shopping.yahoo.com 6934 From: Gregory Perry Date: Wed Feb 19, 2003 10:50am Subject: window bounce countermeasure This gadget is pretty neat, takes a standard audio source and modulates it via suction cup to any surface, $29.99. Seems with the right degree of tint and this with a pink noise source would make a great countermeasure against laser listening devices: http://www.thinkgeek.com/electronics/audio/5a15/ Gregory Perry --------------------------------- "There are a thousand hacking at the branches of evil to one who is striking at the root." -- Henry David Thoreau 6935 From: Steve Uhrig Date: Wed Feb 19, 2003 8:19pm Subject: RE: Taking byte from Baghdad On 19 Feb 2003 at 7:54, Kutlin, Josh wrote: > Ok ...thanks to this thread I went out and bought my first shortwave > (DX-399) this past weekend for $30 on closeout. Good price. Welcome to what likely will be a fascinating hobby, and the way many of us started in our careers. > The first thing I realized is that I need a better antenna. Yup. > Did some reading (and rigging) and I realized that the 25 feet of co-ax > (its all I had and the snow closed radio shack) is just not cutting it. There needs to be something at the end of the coax. Coax only couples the receiver to the antenna. Except in rare circumstances in special designs, the coax itself is not the antenna. > My question is and I apologize if it is off topic for this group, but > does any one know where I could find plans to make a cheap active > antenna? It's all radio comm technology, which we all need to know, and antennas are a critical part of this. Not off topic. You do NOT need nor should you use an active antenna. Lots of problems. In 35 years of shortwave listening, I've never used anything other than wire antennas, for both receive and transmit, and I've logged well over 100 countries. Even spoke to the Space Shuttle once, and got a confirmation QSL card (postcard) from NASA. All you need is wire on your receiver. The more the better, but a little hunk of anything will work. I'm playing with a homemade receiver here, literally made on a cakepan with some old tubes from the barn, and all I have is some clipleads tied together and strung up the wall. Am hearing wall to wall stations. Get any scrap of telephone wire, electrical, hookup, anything. The more the better. Throw it out the window. If you're on the ground floor, throw it on top of some bushes. If on an upper floor, just let it hang down. If practical, connect one end to a tree with a piece of rope or plastic something as an insulator. For receive, nothing is critical. For HF, which I presume is where you are interested, just get metal out there. 20 feet will do a lot of good. 50 feet better. 100 feet superb. Capture area is what counts for your initial efforts. That means metal out there. Doesn't have to be heavy gauge wire, either. If you're in an apartment where you need to conceal it, unwind an old transformer to get several hundred feet of very fine wire which can be nearly invisible. Be sure to scrape the varnish off one end before connecting! You don't need a tuner or anything fancy. Just connect the end of the long wire to your antenna terminal. Learn something about HF propogation. Higher frequencies, for example, tend to work better during the day. Lower frequencies open up around sunset. Each band has its own peculiarities, which change from day to day. Learning them is part of the fun. Be patient, tune carefully, and stop and listen. Don't leap all over the bands looking for loud strong stuff. You'll find it, but miss a lot of the interesting lower powered stations. If you get serious, headphones make a difference. Try listening on the amateur (ham) bands, in the evenings 3.5 - 4.0 (80/75 meter wavelength) megacycles, and maybe 7.0 - 7.3 (40 meters) evenings or days. During the day, early on, look up 20 meters and 15 meters. Any issue of the annual Radio Amateur's Handbook will be of tremendous value to you. Monitoring Times magazine (who has a website) will give you some frequencies to tune for starting. Remember to be patient. There's a lot of very fascinating stuff to hear, but you have to be tuning carefully and listening closely to hear it. Practically anyone will hear spy numbers stations and Russian jamming stations which sound like buzzsaws. Sometimes you can hear the foreign broadcast station underneath the jamming the country does not want their people to hear. See if you can find radio station HCJB in Quito, Ecuador, Radio Nederlands in Hilversum, Holland, Deutche Welle in Germany, Radio Havana in Cuba, and good old Voice of America. All are very strong, and found in several places on the dial. Let us know how it goes. Regards ... Steve WA3SWS ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6936 From: Steve Uhrig Date: Wed Feb 19, 2003 8:26pm Subject: Re: window bounce countermeasure On 19 Feb 2003 at 10:50, Gregory Perry wrote: > This gadget is pretty neat, takes a standard audio source and > modulates it via suction cup to any surface, $29.99. Seems with the > right degree of tint and this with a pink noise source would make a > great countermeasure against laser listening devices: Yes, if you have a problem with laser listening devices. I've never seen one and have no concern about them as a hostile threat. Simpler would be just using white (pink) noise from an FM broadcast radio tuned between stations. That's an inexpensive source of nearly pure pink noise. Some years ago, Allied or one of them offered speaker drivers about the size of a fist with a threaded wood screw sticking out. You could thread the driver to sheetrock between studs, put some power in and it did a fairly decent job of reproducing the audio on the wallboard. I put a small plastic container of about 8 ounces onto the thing, fed it with 30 watts of ultrasonic (from an 807 oscillator, no less), and made an ultrasonic cleaner. Worked fine for cleaning small parts. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6937 From: Matt Paulsen Date: Wed Feb 19, 2003 8:57pm Subject: RE: Re: Taking a byte out of Baghdad -----Original Message----- From: R. Snyder [mailto:rds_6@y...] Sent: Wednesday, February 19, 2003 6:52 AM To: dennis.bergstrom@c... Cc: TSCM-L@yahoogroups.com Subject: [TSCM-L] Re: Taking a byte out of Baghdad The popular press likes to use the term "virus" rather loosely. Given the ubiquitous usage of TCP/IP over twisted-pair ethernet, many potential vulnerabilities could be exploited without specific knowledge of A 12 year old can take out a network. It's easy to do and there's not a whole heck of a lot anyone could do to stop it. Give someone $300,000 worth of time and training and it's not a question of if but when. Want to be secure, don't run a network, simple. C2 it. 6938 From: Matt Paulsen Date: Thu Feb 20, 2003 1:13am Subject: Does it get CNN? http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2908353930 6939 From: Hawkspirit Date: Thu Feb 20, 2003 10:20am Subject: Backdoor 11/18/2002 Entry: "NSA BACKDOOR IN EVERY MICROSOFT OPERATING SYSTEM" How NSA access was built into Windows Duncan Campbell Careless mistake reveals subversion of Windows by NSA. A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled. The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA. Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer. ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run crypographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do. Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery. A second key Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY". Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge. A third key?! But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code. Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers. Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors". According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards. "For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers". "How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked. Can the loophole be turned round against the snoopers? Dr van Someren feels that the primary purpose of the NSA key inside Windows may be for legitimate US government use. But he says that there cannot be a legitimate explanation for the third key in Windows 2000 CAPI. "It looks more fishy", he said. Fernandez believes that NSA's built-in loophole can be turned round against the snoopers. The NSA key inside CAPI can be replaced by your own key, and used to sign cryptographic security modules from overseas or unauthorised third parties, unapproved by Microsoft or the NSA. This is exactly what the US government has been trying to prevent. A demonstration "how to do it" program that replaces the NSA key can be found on Cryptonym's website. According to one leading US cryptographer, the IT world should be thankful that the subversion of Windows by NSA has come to light before the arrival of CPUs that handles encrypted instruction sets. These would make the type of discoveries made this month impossible. "Had the next-generation CPU's with encrypted instruction sets already been deployed, we would have never found out about NSAKEY." 6940 From: James M. Atkinson Date: Thu Feb 20, 2003 1:32pm Subject: ACLU asks Supreme Court to hear appeal of wiretap ruling http://www.cnn.com/2003/LAW/02/19/wiretap.appeal/index.html ACLU asks Supreme Court to hear appeal of wiretap ruling From Kevin Bohn CNN Washington Bureau WASHINGTON (CNN) --In what it calls an unprecedented action, the American Civil Liberties Union, along with a coalition of other civil liberties groups, is asking the U.S. Supreme Court to overturn new, more lenient standards for wiretaps in foreign intelligence investigations. The case is unusual because the groups are suing on behalf of people who are under surveillance by the government, but the groups don't know the identities of the people under surveillance, how many people are involved or where they are. The coalition filed its request with the nation's high court Tuesday. If it takes the case, it would be the first opportunity for the Supreme Court to rule on the constitutionality of such wiretaps, known as FISAs for the act they are named after -- the Foreign Intelligence Surveillance Act. Last November the U.S. Foreign Intelligence Surveillance Court of Review, in its first ruling, decided behind closed doors that the Justice Department could meet what the civil rights groups consider more lenient standards in deciding when this type of wiretap could be used. Before the Patriot Act, foreign intelligence had to be a "primary" purpose of the investigation. Now, foreign intelligence has to be a "significant" purpose. The court overseeing the issuance of wiretaps had ruled against that interpretation last year, saying it was too broad. Although the groups petitioning the Supreme Court are not parties to the decision, they argued in their motion they should be allowed to appeal the ruling because the issue "should not be finally adjudicated by courts that sit in secret" and by courts that "allow only the government to appear before them." Justice Department officials emphasize that under law, prosecutors still have to show the court that would grant such wiretaps probable cause that the target of the surveillance is a "foreign power" or an "agent of a foreign power," and that there has been no relaxation of the basic requirements that must be met. "We do not enter into this litigation lightly," said Ziad Asali, president of the American-Arab Anti-Discrimination Committee, one of the groups asking the Supreme Court to take the case. "We firmly believe that these expanded powers erode the functionality and checks and balances of our judicial system." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6941 From: Does it matter Date: Thu Feb 20, 2003 10:17am Subject: Re: Does it get CNN? Interesting. What would you do with that? You get the land and the satellite but what can you do get free cable? listen to things in outer space? Replies are appreciated. --- In TSCM-L@yahoogroups.com, "Matt Paulsen" wrote: > http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=2908353930 6942 From: Stephen Pendergast Date: Thu Feb 20, 2003 1:38pm Subject: Re: Backdoor This may be a hoax. See http://hoaxinfo.com/nsacode.htm The Cryptonym web site http://www.cryptonym.com now comes up with a cryptic message "This page was left blank intentionally." Stephen L Pendergast 619 692-4400 x233 CACI Technologies 1011 Camino Del Rio South Suite 600 San Diego, CA 92108 6943 From: William Knowles Date: Thu Feb 20, 2003 2:27pm Subject: Re: Backdoor On Thu, 20 Feb 2003, Stephen Pendergast wrote: > This may be a hoax. See http://hoaxinfo.com/nsacode.htm > The Cryptonym web site http://www.cryptonym.com now comes up with a cryptic > message > > "This page was left blank intentionally." Its simple in my book, If you have the freedom to chose your operating system and don't trust Microsoft products, don't run it. :) The one necessary evil around here is M$ Office, and we're ramping up to OSX in the next few months. As for Cryptonym, try the Internet Wayback Machine... http://web.archive.org/web/*/http://www.cryptonym.com William Knowles wk@c... > Stephen L Pendergast > 619 692-4400 x233 > CACI Technologies > 1011 Camino Del Rio South Suite 600 > San Diego, CA 92108 *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 6944 From: Steve Uhrig Date: Thu Feb 20, 2003 2:45pm Subject: Re: Does it get CNN? On 20 Feb 2003 at 16:17, Does it matter u12armresl@y... wrote: > What would you do with that? You get the land and the satellite but > what can you do get free cable? listen to things in outer space? This is the antenna you need to get the ranges advertised by the spy shops for 2.4 gig wireless video transmitters and micro powered audio transmitters. Anyone should know that! Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6945 From: Steve Uhrig Date: Thu Feb 20, 2003 2:49pm Subject: Re: ACLU asks Supreme Court to hear appeal of wiretap ruling On 20 Feb 2003 at 14:32, James M. Atkinson wrote: > Justice Department officials emphasize that under law, prosecutors > still have to show the court that would grant such wiretaps probable > cause that the target of the surveillance is a "foreign power" or an > "agent of a foreign power," and that there has been no relaxation of > the basic requirements that must be met. As anyone who has been on the other side of the fence knows, all you need to do to slide through FISA is list a Hispanic surname on your long list of people in the 'Affidavit for Statement of Probable Cause'. Probably would fly with Jesus O'Brien Tortellini Moskowicz. Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 6946 From: Fernando Martins Date: Fri Feb 21, 2003 1:27am Subject: Re: Backdoor hhmmm the NSA Backdoor ... 1999? It was funny at the time that a german company became MS security partner, and while MS was explain them selfs, the german company on his site was offering solutions against that trojan. At the time I was cooperating with that german company, so I remember well that X-File story :> This is something that some crazy kid wrote in those days .... *** Subject: The Alien From Seatle (new X-File series) I wonder if you wonder what i'm wondering ... why Kitetoa and my self now, dedicated ourselfs in helping people about f00d hacks? Because its not a joke ... a joke was the answer i get from Microsoft Brasil about the NSAKey ("all X-Files is what you saying"), so this article is dedicated in his memory. Good Bless You!!!!!! (...) Following the X-Files new : The Alien from Seatle ... here it goes the resume of last episodes... 1# Alien Base in Brasil # http://www.iptvreports.mcmail.com/ic2kreport.htm#_Toc448565556102. In 1994, NSA intercepted phone calls between Thomson-CSF and Brazil concerning SIVAM, a $1.3 billion surveillance system for the Amazon rain forest. The company was alleged to have bribed members of the Brazilian government selection panel. The contract was awarded to the US Raytheon Corporation - who announced afterwards that "the Department of Commerce worked very hard in support of U.S. industry on this project".(69) Raytheon also provide maintenance and engineering services to NSA's ECHELON satellite interception station at Sugar Grove. 2# But ... what is ECHELON? ask Mulder # http://www.uol.com.br/idgnow/busca/0911b3.htm EU could start investigations about a U.S. spy net 09/11/98 The EU is considering an large investigation to find out if NSA is abusing his presence and his power of survailance over the Internet to spy private and goverment institutions. The NSA is responsable for manage a spy program codename Echelon, that came from the Could War. The Comite for Cientific and Technologic Options of European Parlement says that Echelon is a hiden spy worldwide network for communication interceptions like e-mail, phones, faxes, satellite and backbones. (!!!!!!!!!!!) It's all reported in a document "An Avaliation of Political Control Technologies", showing how NSA send intercepted information by satellite to Fort Meade, in Maryland U.S., from a hub based on Menwith Hill (near London UK) Daniel Verton - Federal Computer Week 3# What's a little spying between friends? # http://www.nandotimes.com/technology/story/body/0,1634,89923-142316-981920-0 ,00.html 4# Yeah ... and there is a lunatic spending money with that? bah ...# FY 1999 Defense Budget Documents: http://www.fas.org/man/docs/fy99/topics.htm Documents on Military Spending: http://www.fas.org/man/docs/index.html 5# OK ... now jump to the NSAKey subject or i'll shut this out # http://www.techweb.com/wire/story/TWB19990906S0003 Caspar Bowden said: "Building in a 'back up' key makes no sense unless there is a revocation method for the primary (key). There is no revocation method." http://www.fipr.org/ I don't believe them -- what kind of natural disaster are they talking about? A meteor destroying all the earth's structures?" said Privacy International director general, Simon Davies."Microsoft's argument is inconsistent with its operating procedure -- it could hold a single key in multiple locations, that is a standard security procedure." He added that to compromise user security, "it's not necessary to share access with the NSA -- simply complying with their requirements will do that." http://www.wired.com/news/news/technology/story/21589.html?wnpg=2 The _NSAKEY is one of two such keys buried deep in the cryptography source code of most Windows operating systems. In other reports, Microsoft said that the _NSAKEY is still a Microsoft-controlled key that will serve as a backup in the event that the first key is compromised. That just doesn't make sense, Fernandes said. "If they lost the first key which is the equivalent to them losing the Windows source code, then that would be okay, they could just start using the backup key." Crypto expert Marc Briceno did have another word for it: "feeble." "I must say I do not believe Microsoft's present explanation that the presence of the _NSAKEY corresponds to standard practices in software development," said Marc Briceno, director of the Smartcard Developer Association. (http://www.scard.org/) "There is no technical reason for Microsoft to include a second security module verification key in their operating system ... to mark the passing of export requirements," Briceno said. 6#Le Grand Finale (only for truely hardcore fanatics) Crypto AG: The NSA's Trojan Whore? http://caq.com/cryptogate ********* Don't loose the next episodes ... "While Alien Bill finish his Trojan2000, anonymnous sources that want to keep it that way, indeed had report from a trusted 3rd party the clame for the hack on http://www.trojan2000test.com/" the MP3 version is avaiable on the holly powerfull knowledge base www.antionline.com (tm) ********* Bacano (tm) Esoteric Pizza Research Team (tm) CopyThis8=> (c) 1999 ---------------------------------------------------------------------------- ---- 6947 From: Hawkspirit Date: Fri Feb 21, 2003 11:52am Subject: Sweep Needed Office sweep needed for Houston Texas area, contact me today Friday if possible, I will be out of the office sweeping all weekend. Roger Tolces Electronic Security Co. 323-462-1351 6948 From: James M. Atkinson Date: Fri Feb 21, 2003 10:23pm Subject: AIRLINE TALK All too rarely, airline attendants make an effort to make the in-flight "safety lecture" and their other announcements a bit more entertaining. Here are some real examples that have been heard or reported: ******************************** On a Continental Flight with a very "senior" flight attendant crew, the pilot said, "Ladies and gentlemen, we've reached cruising altitude and will be turning down the cabin lights. This is for your comfort and to enhance the appearance of your flight attendants." ******************************** On landing, the stewardess said, "Please be sure to take all of your belongings. If you're going to leave anything, please make sure it's something we'd like to have." ******************************** There may be 50 ways to leave your lover, but there are only 4 ways out of this airplane" ******************************** "Thank you for flying Delta Business Express. We hope you enjoyed giving us the business as much as we enjoyed taking you for a ride." ******************************** As the plane landed and was coming to a stop at Ronald Reagan, a lone voice came over the loudspeaker: "Whoa, big fella. WHOA!" ******************************** After a particularly rough landing during thunderstorms in Memphis, a flight attendant on a Northwest flight announced, "Please take care when opening the overhead compartments because, after a landing like that, sure as hell everything has shifted." ******************************** From a Southwest Airlines employee: "Welcome aboard Southwest Flight 245 to Tampa. To operate your seat belt, insert the metal tab into the buckle, and pull tight. It works just like every other seat belt; and, if you don't know how to operate one, you probably shouldn't be out in public unsupervised." ******************************** "In the event of a sudden loss of cabin pressure, masks will descend from the ceiling. Stop screaming, grab the mask, and pull it over your face. If you have a small child traveling with you, secure your mask before assisting with theirs. If you are traveling with more than one small child, pick your favorite." ******************************** Weather at our destination is 50 degrees with some broken clouds, but we'll try to have them fixed before we arrive. Thank you, and remember, nobody loves you, or your money, more than Southwest Airlines." ******************************** "Your seat cushions can be used for flotation; and, in the event of an emergency water landing, please paddle to shore and take them with our compliments." ******************************** "Should the cabin lose pressure, oxygen masks are in the overhead area. Please place the bag over your own mouth and nose before assisting children .. or other adults acting like children." ******************************** "As you exit the plane, make sure to gather all of your belongings. Anything left behind will be distributed evenly among the flight attendants. Please do not leave children or spouses." ******************************** And from the pilot during his welcome message: "Delta airlines is pleased to have some of the best flight attendants in the industry. Unfortunately, none of them are on this flight!" ******************************** Heard on Southwest Airlines just after a very hard landing in Salt Lake City: The flight attendant came on the intercom and said, "That was quite a bump, and I know what y'all are thinking. I'm here to tell you it wasn't the airline's fault, it wasn't the pilot's fault, it wasn't the flight attendant's fault ...it was the asphalt." ******************************** Overheard on an American Airlines flight into Amarillo, Texas, on a particularly windy and bumpy day: During the final approach, the Captain was really having to fight it. After an extremely hard landing, the Flight Attendant said, "Ladies and Gentlemen, welcome to Amarillo. Please remain in your seats with your seat belts fastened while the Captain taxis what's left of our airplane to the gate!" ******************************** Another flight attendant's comment on a less than perfect landing:"We ask you to please remain seated as Captain Kangaroo bounces us to the terminal." ******************************** An airline pilot wrote that on this particular flight he had hammered his ship into the runway really hard. The airline had a policy which required the first officer to stand at the door while the Passengers exited, smile, and give them a "Thanks for flying our airline." He said that, in light of his bad landing, he had a hard time looking the passengers in the eye, thinking that someone would have a smart comment. Finally everyone had gotten off except for a little old lady walking with a cane. She said, "Sir, do you mind if I ask you a question?" "Why, no, Ma'am," said the pilot. "What is it?" The little old lady said, "Did we land, or were we shot down?" ******************************** After a real crusher of a landing in Phoenix, the Flight Attendant came on with, "Ladies and Gentlemen, please remain in your seats until Capt. Crash and the Crew have brought the aircraft to a screeching halt against the gate. And, once the tire smoke has cleared and he warning bells are silenced, we'll open the door and you can pick your way through he wreckage to the terminal." ******************************** Part of a flight attendant's arrival announcement: "We'd like to thank you folks for flying with us today. And, the next time you get the insane urge to go blasting through the skies in a pressurized metal tube, we hope you'll think of US Airways." ******************************** A plane was taking off from Kennedy Airport. After it reached comfortable cruising altitude, the captain made an announcement over the intercom, "Ladies and gentlemen, this is your captain speaking. Welcome to Flight Number 293, nonstop from New York to Los Angeles. The weather ahead is good and, therefore, we should have a smooth and uneventful flight. Now sit back and relax... OH, MY GOD!" Silence followed, and after a few minutes, the captain came back on the intercom and said, "Ladies and Gentlemen, I am so sorry if I scared you earlier. While I was talking to you, the flight attendant accidentally spilled a cup of hot coffee in my lap. You should see the front of my pants!" A passenger in Coach yelled, "That's nothing. You should see the back of mine!" ******************************** Heard on a Southwest Airline flight. "Ladies and gentlemen, if you wish to smoke, the smoking section on this airplane is on the wing and if you can light 'em, you can smoke 'em." -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- Vocatus atque non vocatus deus aderit -------------------------------------------------------------------------------------------------- 6949 From: kondrak Date: Sat Feb 22, 2003 4:10am Subject: Heres a weird one.. Have a "customer" who's complaining of surveillance. Did the normal checking of house, work, phones, lan and vehicles... Found nothing of note until I did a UV scan of his cars and SUV. Found a dab of what appears to me to be silastic, (silicone rubber) on both the front windshield, and the back window that fluoresce under long wave Ultra-violet. They were disguised as a bug splot, (highly unusual as this is cold winter time). Both of these are highly UV reactive. I scraped them off and they are on their way to a lab, but they fluoresce under a normal long-wave blacklight, like one would see in a disco. Illuminating them with a medium power UV lamp, (at 100') I could pick them up at about a quarter mile with a rifle-scope trained on them, even though they produced negligible close up indications they were illuminated. Anyone see this stuff before? If so, whom. 6950 From: Mitch D Date: Sat Feb 22, 2003 8:31am Subject: WTB used or new CanonXL1S ( off topic) If anyone on the list has a excellent reliable source for purchasing a new, or has a good used Canon XL1S dig camcorder pls contact me off the list. Thanks Mitch __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - forms, calculators, tips, more http://taxes.yahoo.com/ 6951 From: Matt Paulsen Date: Sat Feb 22, 2003 11:33am Subject: recent incident. Recently had a location that had all the suspicious signs of corporate espionage - ceo's secretary's workstation was attacking the server systems and mis's systems, but no one else. Local antivirus only picked up 1 virus and couldn't wipe it. Tools were showing that the workstation had a keystroke logger in it, as well as it attempting to email to an aol gateway and also attempting smb pipes to propagate - but only to executive and high level network administration systems. Now the first question is, what sort of virus would have a keystroke logger, mail subsystem and propagation system in this manner.. None really... So, a remote scan of the system was done, and it turned out that 4 virii were detected through this method. Long story short - scan once locally, scan twice remotely and don't get too paranoid. 6952 From: kondrak Date: Sat Feb 22, 2003 8:22pm Subject: Re: Fw: Heres a weird one.. Interesting....yes, Isopropyl 70% washed all traces off after the silicone was scraped off with a razor blade. I used surgical gloves when I removed it, so no skin contact occurred. I'll look up that dye...I'm familiar with that kind of usage, used to do ultrasound inspection of graphite materials. At 15:43 2/22/03 -0500, you wrote: >Hi Kondrak >I am a non destructive certified Inspector with General Electric Aircraft >Engines 23YRS >The dye used to be called turco P41 which is non water soluble, you need a >solvent ALCOHOL to completely remove its flurense from the windshield and >your hands. >It does not wash off with soap and water you will need surgical hand soap to >break it down what we call emulsify the chemical. >If its in your cloths it will not wash out you can take them to the dry >cleaners to have them dry cleaned which will remove the dye. > >FPI -FLURENSENT PENETRANT INSPECTION is used in the Aircraft industry to >locate cracks in metals and it can be used on some plastic. >Heat make the dye more illuminate. >The dye can be bought in a spray can easily obtainable. >ANDRE HOLMES >----- Original Message ----- >From: "kondrak" >To: >Sent: Saturday, February 22, 2003 5:10 AM >Subject: [TSCM-L] Heres a weird one.. > > > > Have a "customer" who's complaining of surveillance. > > Did the normal checking of house, work, phones, lan and vehicles... > > > > Found nothing of note until I did a UV scan of his cars and SUV. > > > > Found a dab of what appears to me to be silastic, (silicone rubber) on >both > > the front windshield, and the back window that fluoresce under long wave > > Ultra-violet. They were disguised as a bug splot, (highly unusual as this > > is cold winter time). > > > > Both of these are highly UV reactive. I scraped them off and they are on > > their way to a lab, but they fluoresce under a normal long-wave >blacklight, > > like one would see in a disco. > > > > Illuminating them with a medium power UV lamp, (at 100') I could pick >them > > up at about a quarter mile with a rifle-scope trained on them, even though > > they produced negligible close up indications they were illuminated. > > > > Anyone see this stuff before? If so, whom. > > > > > > > > > > > > > > ======================================================== > > TSCM-L Technical Security Mailing List > > "In a multitude of counselors there is strength" > > > > To subscribe to the TSCM-L mailing list visit: > > http://www.yahoogroups.com/community/TSCM-L > > > > It is by caffeine alone I set my mind in motion. > > It is by the juice of Star Bucks that thoughts acquire speed, > > the hands acquire shaking, the shaking is a warning. > > It is by caffeine alone I set my mind in motion. > > =================================================== TSKS > > > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > > > > 6953 From: Michael Puchol Date: Sun Feb 23, 2003 4:34am Subject: Re: recent incident. Hi Matt, Good advice - I'm going to add my own grain of sand to the paranoia scale. Last night I was at a costumer's offices, where they had reported "unusual activity" in their server and some workstations. Apparently, they had installed McAffee's VirusScan Online, which works by both a real-time system hook detection method, file-access and user-launched scans, combined with automatic updates of the engine and signature files. I've tried it and works reasonably well. In this case, the server had been infected by Code Red (always patch thy systems!), and for whatever reason VirusScan wasn't picking it up. I contacted McAfee support, and to my surprise, their antivirus does NOT support Windows 2000 Server. This seemed strange since I have another server with it installed and it appeared to do it's job - but no. Obviously I was a tad dissapointed with McAffee to even allow installation of the antivirus without any checking of the operating system version (even the most basic installers can do this), thus giving this costumer a false sense of security. Being in a bit of a hurry to get this costumer up and running again, I installed CA's InoculateIT on the server, which successfully picked up the virus (but couldn't delete it), and ran a normal scan of the system. Next week I'll install Symantec's virus scanner, which has centralised management and some other neat features (and works on servers). The moral of the story: always check system requirements before installing an antivirus, firewall, IDS or other security software. If in doubt, ask the manufacturer. If then still in doubt, try it on an isolated test machine before deploying it. Apart from this, I've seen viruses which disable firewall software, install keyloggers, propagate via SMB, etc. This is not uncommon, and it wouldn't be hard to write something which combined some of these 'features'. Regards, Mike ----- Original Message ----- From: "Matt Paulsen" To: Sent: Saturday, February 22, 2003 6:33 PM Subject: [TSCM-L] recent incident. > Recently had a location that had all the suspicious signs of corporate > espionage - ceo's secretary's workstation was attacking the server systems > and mis's systems, but no one else. Local antivirus only picked up 1 virus > and couldn't wipe it. Tools were showing that the workstation had a > keystroke logger in it, as well as it attempting to email to an aol gateway > and also attempting smb pipes to propagate - but only to executive and high > level network administration systems. > > Now the first question is, what sort of virus would have a keystroke logger, > mail subsystem and propagation system in this manner.. None really... So, a > remote scan of the system was done, and it turned out that 4 virii were > detected through this method. > > Long story short - scan once locally, scan twice remotely and don't get too > paranoid. 6954 From: Date: Thu Feb 20, 2003 9:16am Subject: Re: Backdoor In a message dated 2/20/2003 12:14:55 PM Pacific Standard Time, spendergast@c... writes: > > This may be a hoax. No good citizen always trusts his government and Microsoft. [Non-text portions of this message have been removed] 6955 From: Dave Emery Date: Thu Feb 20, 2003 2:47pm Subject: Re: Backdoor On Thu, Feb 20, 2003 at 11:38:23AM -0800, Stephen Pendergast wrote: > > This may be a hoax. See http://hoaxinfo.com/nsacode.htm > The Cryptonym web site http://www.cryptonym.com now comes up with a cryptic > message > "This page was left blank intentionally." > For what little it is worth, the story going around in the crypto research community has been that this was a second backup key provided at the suggestion of NSA (but not by NSA) to handle the contingency that Microsoft's primary code signing key had been compromised or lost. There was quite extensive discussion of this in crypto circles some time ago. -- Dave Emery N1PRE, die@d... DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 6956 From: Dragos Ruiu Date: Fri Feb 21, 2003 4:53am Subject: GPS/GSM tracking Pertinent to an old thread on here, I thought some people here might be interested to know that this month's Circuit Cellar magazine has schematics and construction details for a small self contianed unit that sends GPS positional info with 1-25m resolution every two seconds via GSM SMS messages. cheers, --dr -- dr@k... pgp: http://dragos.com/ kyxpgp http://cansecwest.com 6957 From: Craig Snedden Date: Fri Feb 21, 2003 2:05pm Subject: GSM/Nextel and Roaming (a bit o/t) Hi all, Apologies that this post is a bit off topic, but I am having difficulty in getting an answer to this question and I am sure there is more than enough expertise in this list to provide the answer.... So here goes. I am travelling from the UK to the US (Nevada) next week and have been told (again!) that my triband gsm phone will be fine (yes roaming is enabled etc. etc.) However, I have been told that for the area that I will be in, Nextel is the best carrier. As I understand, Nextel is not a GSM based system, but iDen, therefore my GSM phone, triband or not won't work... Correct assumption? My question is this, do I simply try getting service with a GSM carrier in the area and trust to luck, or do I try to get a Nextel compatible handset and if I do, will my GSM sim chip fit in a Nextel phone...? (I want to be able to get calls in the normal way while I am away from homebase and not have to pick up voicemails by calling from another phone). Having fallen foul of this before (travelling to Florida.... "Oh yes, your phone will work all over Florida..." Only to find that the part of Florida I was in only got PCN coverage!!!) I don't want to be left in the dark again. Any suggestions? Thanks guys, Best regards. Craig --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.456 / Virus Database: 256 - Release Date: 18/02/2003 [Non-text portions of this message have been removed] 6958 From: Ocean Group - MU TSD Date: Sat Feb 22, 2003 10:37am Subject: Bluetooth Security Hi, We've recently been working with a company who's management use wireless bluetooth access by using headsets for their mobile phones. We've been considering weather to add this to our risk evaluations. We did feel that with its power output 0.25mW or so the risk of using it in their offices and on compnay premises was somewhat acceptable. However we concluded that outside the office, in specific high risk scenario's, such as sitting in their car or on a train etc it would allow someone alot of time to work on compromising the situation. Basically I was wondering if anyone has had to deal with this threat and does anyone know of any papers on bluetooth encryption and the strenght of its security implmmentations. If I went on previous wireless implementations, such as the standard wireless lan etc I wouldn't hold alot of faith and would probably have to advise clients not to use it outside of premises etc. At least until I had seen some risk evaluations from some tech labs etc. If I remember rightly even the GSM ciphers, AS1/2? were compromised with a couple of basic PC setups, however GSM isn't on my agenda at the moment but I will revisit it later. Anyway, any thoughts or information links would be appreciated. Kind regards Oisin Ocean Group, Technical Security Division, Ireland. 6959 From: Date: Sat Feb 22, 2003 0:19pm Subject: Rif: recent incident. > Long story short - scan once locally, scan twice remotely and don't get too > paranoid. I beg to differ: the Three Laws of Paranoia clearly state: 1) Paranoia is never enough; 2) When you get sufficiently paranoic , you'll chase false alarms; 3) It's better to chase a false alarm, than not following up. :-) Ciao! Remo Cornali 6960 From: Date: Sat Feb 22, 2003 6:43pm Subject: Re: Heres a weird one.. Scan the house, windows and walls, doors, back of chairs, inside walls with widow exposures. If you have the time, scan the whole house. Scan wardrobe (especially outer garments). Check the shoes. Nothing on the tires? Email me if you need more. At 04:10 2/22/03, kondrak wrote: >Have a "customer" who's complaining of surveillance. >Did the normal checking of house, work, phones, lan and vehicles... > >Found nothing of note until I did a UV scan of his cars and SUV. > >Found a dab of what appears to me to be silastic, (silicone rubber) on both >the front windshield, and the back window that fluoresce under long wave >Ultra-violet. They were disguised as a bug splot, (highly unusual as this >is cold winter time). > >Both of these are highly UV reactive. I scraped them off and they are on >their way to a lab, but they fluoresce under a normal long-wave blacklight, >like one would see in a disco. > >Illuminating them with a medium power UV lamp, (at 100') I could pick them >up at about a quarter mile with a rifle-scope trained on them, even though >they produced negligible close up indications they were illuminated. > >Anyone see this stuff before? If so, whom. > > > > > > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. >=================================================== TSKS > >Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 6961 From: Valance Date: Sun Feb 23, 2003 0:57pm Subject: Re: recent incident. which strain of Code Red did you identify on this server? and just curious, given you ID'd it before McAfee could try, what was the telling symptom that let you know the server was infected? a root.exe file or a hacked index.asp? could netstat find a backdoor on a listening port? the reasons i am curious is that the later Code Red strain is a trojan and anti-virus suites are very limited in their trojan functions. few people know this and think trojans are actually virii and that good ole McAfee will take care of everything. generally, trojans need to be removed manually by editing the registry and deleting the individual polymorphically named files that the registry has generated. and as far as detecting their presence, AV suites are not the best choice. you really need to use an anti-trojan suite like TDS (Trojan Defense Suite), learn the function of all the TCP and UDP ports and how to monitor the ports' behavior on the server. the best site around, i think, to start is: http://tds.diamondcs.com.au/html/danger.htm - you will be able to download trial versions of their software and learn about vulnerable ports and over 20,000 strains of trojans. it's fun. but you know, it sounds like your McAfee guy may not have been the expert about the difference between virii and trojans and responded with anything they thought you might believe rather than actual information. i know McAfee supports Win2000 and it says so on their site: http://www.mcafee.com/myapps/vs7/default.asp#sysReq (VirusScan software system req). however, i know when i used to test trojans for their spy capabilities in the pre-911 days, we had McAfee installed on W98 and it never found any of the trojans we tested, even though some of their names did appear in McAfee's virus definitions list. we would laugh and pin a red PhD, BS sticker on their boxes :) kk --- In TSCM-L@yahoogroups.com, "Michael Puchol" wrote: > Hi Matt, > > Good advice - I'm going to add my own grain of sand to the paranoia scale. > Last night I was at a costumer's offices, where they had reported "unusual > activity" in their server and some workstations. Apparently, they had > installed McAffee's VirusScan Online, which works by both a real- time system > hook detection method, file-access and user-launched scans, combined with > automatic updates of the engine and signature files. I've tried it and works > reasonably well. > > In this case, the server had been infected by Code Red (always patch thy > systems!), and for whatever reason VirusScan wasn't picking it up. I > contacted McAfee support, and to my surprise, their antivirus does NOT > support Windows 2000 Server. This seemed strange since I have another server > with it installed and it appeared to do it's job - but no. Obviously I was a > tad dissapointed with McAffee to even allow installation of the antivirus > without any checking of the operating system version (even the most basic > installers can do this), thus giving this costumer a false sense of > security. > > Being in a bit of a hurry to get this costumer up and running again, I > installed CA's InoculateIT on the server, which successfully picked up the > virus (but couldn't delete it), and ran a normal scan of the system. Next > week I'll install Symantec's virus scanner, which has centralised management > and some other neat features (and works on servers). > > The moral of the story: always check system requirements before installing > an antivirus, firewall, IDS or other security software. If in doubt, ask the > manufacturer. If then still in doubt, try it on an isolated test machine > before deploying it. > > Apart from this, I've seen viruses which disable firewall software, install > keyloggers, propagate via SMB, etc. This is not uncommon, and it wouldn't be > hard to write something which combined some of these 'features'. > > Regards, > > Mike > > > ----- Original Message ----- > From: "Matt Paulsen" > To: > Sent: Saturday, February 22, 2003 6:33 PM > Subject: [TSCM-L] recent incident. > > > > Recently had a location that had all the suspicious signs of corporate > > espionage - ceo's secretary's workstation was attacking the server systems > > and mis's systems, but no one else. Local antivirus only picked up 1 > virus > > and couldn't wipe it. Tools were showing that the workstation had a > > keystroke logger in it, as well as it attempting to email to an aol > gateway > > and also attempting smb pipes to propagate - but only to executive and > high > > level network administration systems. > > > > Now the first question is, what sort of virus would have a keystroke > logger, > > mail subsystem and propagation system in this manner.. None really... So, > a > > remote scan of the system was done, and it turned out that 4 virii were > > detected through this method. > > > > Long story short - scan once locally, scan twice remotely and don't get > too > > paranoid. 6962 From: refmon Date: Sun Feb 23, 2003 4:17pm Subject: re: recent incident Hi, This is my first post here- the name is John Collins; I have been learning a great deal, thank you all. With regard to this virus issue outlined in this thread, while we are not PC or MAC mechanics of the most elite species, we have had some experience with odd PC behaviors and also misbehavior of antivirus programs. We are running mixes of Win95, Win98, Win2000 and using various vintages of Norton Utilities with Antivirus...oddly, the older equipment with the older versions seem much more stable in the long term....less mysteries, less hard crashes. Maybe the older equipment doesn't support the newer viruses? We have a fairly simple, high quality network consisting at this time, of two Dell 2.5GHz P4 PC's a couple of printers, and a CAD plotter in the main office AND a remote lab with two Radisys Telco 5500 server chassis running as plain PC's, 2 Dell PII 266MHz PC's and a local HP AdvanceStack hub. The remote lab prints and plots to the office. The entire system is hung on a DSL modem with a SonicWall Firewall (pretty bulletproof itself, but really poor support experiences). We have experienced several issues with piggy-backed viruses that slip in on downloads and emails...most are snagged by either my AV or Wormguard software. I currently have one PC out of service after a download carrying a fairly violent "thing" that took out all drivers, took antivirus offline, and triggered a reboot. Actually what happened is the registry was trashed and then the reboot restored things automatically except the behavior of AV was highly modified and the "thing" had heavily installed itself. At the first sign of odd behavior, we pull the network connections to isolate the problem ... hopefully. We also periodically back up the registry files in a mis-named directory with the files misnamed so viral sweeps don't find the backups...this is at best a minor help. The Modified AV protected itself from my attempts to shut it off and fought violently with me as I tried to troubleshoot. I finally rebooted in DOS and manually deleted all the AV directories and the registry files. I then rebooted and lo and behold, had a perfectly working PC (that I don't trust)...the Antivirus, to an extent, had been turned against me, or rather the PC. I have had to set up a two-PC-network and recover files of value and rescan the files for viruses, worms, spyware, and trojans. I'm coming up with quite a collection - mostly spyware, one alleged Trojan (not clear...behaves like...), several older viruses including "monkey B", which is at least 6 years old. (The current config/build on this PC is less than 1 year old). This PC will be burned to the ground and rebuilt after preliminary disk-wipes. The disk will then be hung on another scsi PC bus and wiped to a pass depth of about 6 - 8 passes. The PC will then be rebuilt. Oddly enough, all other PC's check clean and exhibit none of the odd behaviors...it seems the single Radisys was targeted. We have also found that as the paranoia level rises, we set our protections tighter and tighter. We're finding you can set too tight to the point where virus scans, cleansweeps, and registry sweeps can mistake innocent software for viruses, etc. Symptoms of this include mysterious halting of accessory operation (driver gets nabbed). I have no pat answers, to be sure, although we are revising our browsing procedures, which have been quite lax, so as to put some common sense out front... in our office we don't have the rampant personal use on the business net problem, but we have leaned very heavily on firewalls and AV and wormguard software. Our immediate goal is to reduce exposure. In addition to common sense browsing, email usage, etc, we are taking to shutting down PC's instead of allowing them to idle during unused periods. Further, we are disabling "auto update" functions in windows, antivirus, etc. Any updates will be managed manually, thus managing trips out on the internet. Additionally, as we wrestle with this stuff, we've learned that a lot of malicious code depends heavily on sharing paths...we are entirely reevaluating our shared resources setup. Obviously, there is no single fix or software package that can deal with this...I do not envy the IT guys in larger companies that do not run constant training and security sweeps. thanks for listening John Collins President, Reference Video, Inc. Oregon _________________________________________________________ Hi Matt, Good advice - I'm going to add my own grain of sand to the paranoia scale. Last night I was at a costumer's offices, where they had reported "unusual activity" in their server and some workstations. Apparently, they had installed McAffee's VirusScan Online, which works by both a real-time system hook detection method, file-access and user-launched scans, combined with automatic updates of the engine and signature files. I've tried it and works reasonably well. In this case, the server had been infected by Code Red (always patch thy systems!), and for whatever reason VirusScan wasn't picking it up. I contacted McAfee support, and to my surprise, their antivirus does NOT support Windows 2000 Server. This seemed strange since I have another server with it installed and it appeared to do it's job - but no. Obviously I was a tad dissapointed with McAffee to even allow installation of the antivirus without any checking of the operating system version (even the most basic installers can do this), thus giving this costumer a false sense of security. Being in a bit of a hurry to get this costumer up and running again, I installed CA's InoculateIT on the server, which successfully picked up the virus (but couldn't delete it), and ran a normal scan of the system. Next week I'll install Symantec's virus scanner, which has centralised management and some other neat features (and works on servers). The moral of the story: always check system requirements before installing an antivirus, firewall, IDS or other security software. If in doubt, ask the manufacturer. If then still in doubt, try it on an isolated test machine before deploying it. Apart from this, I've seen viruses which disable firewall software, install keyloggers, propagate via SMB, etc. This is not uncommon, and it wouldn't be hard to write something which combined some of these 'features'. Regards, Mike ----- Original Message ----- From: "Matt Paulsen" To: Sent: Saturday, February 22, 2003 6:33 PM Subject: [TSCM-L] recent incident. > Recently had a location that had all the suspicious signs of corporate > espionage - ceo's secretary's workstation was attacking the server systems > and mis's systems, but no one else. Local antivirus only picked up 1 virus > and couldn't wipe it. Tools were showing that the workstation had a > keystroke logger in it, as well as it attempting to email to an aol gateway > and also attempting smb pipes to propagate - but only to executive and high > level network administration systems. > > Now the first question is, what sort of virus would have a keystroke logger, > mail subsystem and propagation system in this manner.. None really... So, a > remote scan of the system was done, and it turned out that 4 virii were > detected through this method. > > Long story short - scan once locally, scan twice remotely and don't get too > paranoid. From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 7:56pm Subject: Who's bugging you on the Web? Who's bugging you on the Web? http://www.localbusiness.com/Story/0,1118,NOCITY_639140,00.html INTERNET By Wayne Carter, LocalBusiness.com Feb 20, 2001 08:04 AM ET NEWS ANALYSIS DALLAS, Feb. 20 (LocalBusiness.com) -- Surveillance bugs are to most people the stuff of spy novels and TV and movie crime dramas, but many people are getting bugged every day. But rather than searching frantically for little listening devices planted in their offices, homes and cars to ferret out the intruders, they need only look at their computers. Every time a person visits the Internet, it is likely that they activate what has become known as a Web bug, a small, transparent bit of HTML code that tracks their movements within a site -- sometimes all over the Web -- during a surfing session. Dallas-based Privacy Council, which helps companies protect their privacy and that of their customers on the Web, recently cut a deal with Pittsburgh, Penn.-based iventurelab to provide bug-detection capabilities. Iventurelab runs a Web-based service that detects Web bugs, and Privacy Council will provide that service to its customers. But Privacy Council and iventurelab see bugs as more than a privacy issue. "Part of our methodology is to address security as well as privacy," said Kevin Robertson, Privacy Council's technology vice president. "Web bugs are one of many concerns." Evolution under watch Web bugs, much like cockroaches in the natural world, apparently have been scurrying around from the beginning. HTML is the programming language used to build Web pages, and it's just a matter of using a few special HTML bricks to plant a Web bug on a site. "Those things are known by several names -- bots, applets, bugs -- and they're all little pieces of intelligence that gather information, said Bob Wesolek, chief financial officer at Houston-based Sharp Technology Inc. Bugs are related to cookies, the digital ID tags that Web pages store in people's browsers, but there are key differences. While cookies are used to gather data about Web surfers' habits, they also serve a useful purpose. When a person logs onto a stock-trading portal where they have an account, for instance, a cookie can cause the site to immediately display that person's name and account data. And Web browsers can be set to decline cookies outright or ask for permission to accept them. Web bugs, on the other hand, start surreptitiously gathering data about surfers as soon as they hit a Web page containing a bug. And there is disagreement among experts on just what those bugs are doing. Inquisitiveness or espionage? Ryan Russell, an incident analyst at San Mateo, Calif.-based SecurityFocus.com, said Web bugs are just marketing tools. "All they're interested in is gathering information so they can target marketing [efforts] better," he said. That includes popping up banner ads that should be of interest, among other things. But Tommy Wang, iventurelab's founder and chief executive officer, believes they've become more than that. "We have identified four classes and multiple classes under each type," Wang said. "There are identity tracking devices and some that can steal contact lists and other vital information. They can really access your computer." Wesolek downplayed the likelihood of such capabilities. He said security threats still are mostly from hackers, people looking to use electronic connections to access and manipulate computer systems, not automated spying devices brought in unknowingly from the Web. "We're not aware of any [Web bugs] that are that interactive," he said. "They're limited to doing things using the capabilities of the browser." Russell agreed. "Stealing [information] is a leap, but there is tracking going on," he said. "If you somehow forward [a bug] to other people, they activate the bug, and it can see who else it's going to, and that information can be used to correlate marketing ideas." Jeff Havrilla is an Internet security analyst at the CERT Coordination Center in Carnegie Mellon University's Software Engineering Institute. He said a greater security concern is applications written in Java or ActiveX, which are more powerful than true Web bugs. And while Web browsers can catch such intruders, it's also easy for them to slip past the guard. "The major Web browsers, Netscape and Internet Explorer, can catch those things," he said. "But they [are programmed to] detect Western or Latin characters, and unfamiliar characters may not be detected. And browser defaults are set to download [those applications] without notification. That's something we're trying to make people aware of." Causes for concern While Havrilla agreed that Web bugs are currently harmless aside from privacy concerns, he said creative programming could turn them to more sinister use. Third parties often are aggregating data collected by Web bugs, whether it's a marketing firm hired by the site operator or another company that wants to target the same basic audience as the Website where the bug is planted. Security holes in Web pages could let unscrupulous operators use Web bugs as portals to hit users with unwelcome applications using an unsuspecting Web site as the conduit. And caching, which allows small versions of Web pages and other images to be stored so they'll load faster on subsequent visits, could allow Web bugs to hide in users computers and perform ongoing surveillance. "That might become a security concern, but no one has fully thought that out," Havrilla said. Even if Web bugs never pose more than a minor security threat, Privacy Council believes companies should still take them very seriously. Privacy concerns have many people leery of the Web, and people want to know up front what information is gathered about them and how it's used. That's where privacy policies come into play. Privacy Council believes many companies, especially those that have acquired other companies' Web sites, may be unknowingly violating their own privacy policies by using Web bugs to gather information. "We plan to use [inventurelab] to help companies identify tracking devices they're using intentionally or unintentionally," Robertson said. Wayne Carter covers the Dallas region for LocalBusiness.com. E-mail him with story ideas or comments. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2523 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 8:03pm Subject: US shocked by Russia's £1m FBI spy US shocked by Russia's £1m FBI spy http://www.theherald.co.uk/news/archive/21-2-19101-0-36-18.html ANNETTE McCANN AN FBI counter-intelligence expert was last night charged with spying for Russia to earn £1m in cash and diamonds from the Kremlin. Robert Philip Hanssen, 56, and a father of six, could face the death penalty if he is convicted of involvement in what experts called one of the worst espionage cases in recent US history. His work, which is believed to have involved exposing three Russian intelligence agents in the pay of the US government, two of whom were later executed, could be linked to the notorious case of CIA spy Aldrich Ames. The White House said last night that George W Bush, the US president, had been told of the case before the arrest of Hanssen, who is only the third FBI agent ever to be accused of spying. Mr Bush said anyone who betrayed their country would be rooted out and brought to justice. "Allegations of espionage of an FBI counter-intelligence agent are extremely serious and are deeply disturbing," Mr Bush told reporters aboard Air Force One en route to St Louis. "Allegations of espionage are a reminder that we live in a dangerous world, a world that sometimes does not share American values," Mr Bush said. He had "the utmost confidence" in "the men and women who serve in the FBI, those who represent our country in the CIA and in the Justice Department. "I thank the men and women who proudly serve our country. But anyone who would betray this trust, I warn you, we'll find you and bring you to justice." Mr Hanssen was arrested at his home in the suburbs of Washington on Sunday night shortly after agents saw him deposit a package of classified information at a "dead drop" in a Virginia state park. The Russians, whom Louis Freeh, FBI director, said never knew the real identity of the double agent they code-named "Ramone", left £34,000 at another site on Sunday for Hanssen to collect, but he never reached it. Hanssen had apparently volunteered his services as a spy to the Soviet Union when he was based in New York in 1985. He had been paid in money and diamonds - at least £412,000 in cash over the years. Mr Freeh said last night that Hanssen's alleged conduct "represented the most traitorous actions imaginable", adding that the £34,000 was "his bread and butter for many, many years". John Ashcroft, attorney general, said the actions of the double agent had exposed America as an "international target in a dangerous world". He is accused amongst other charges of disclosing the identity of two KGB officials, who were first compromised by Ames and had been recruited by the government to serve as "agents in place" at the Soviet embassy in Washington. When these two KGB returned to Moscow, they were tried on espionage charges and executed. Mr Ashcroft added: "The arrest of Robert Hanssen for espionage should remind us all and every American should know that our nation, our free society is an international target in a dangerous world. "In fact, the espionage operations designed to steal vital secrets of the United States are as intense today as they have ever been." FBI officials are still assessing the damage of the Hanssen disclosures, but one source said the information he released had caused extreme damage to US security. Plato Cacheris, Hanssen's attorney, said his client would be pleading "at this point not guilty". Meanwhile, Swedish police have detained a suspected spy, reportedly working for Russia. The security police said the suspect worked in trade and industry. -Feb 21st -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2524 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 8:04pm Subject: A bridge too far for FBI agent A bridge too far for FBI agent http://www.theherald.co.uk/news/archive/21-2-19101-0-21-1.html CHRIS STARRS THE man accused of being America's latest spy took teenage inspiration from Kim Philby, the British double agent, and allegedly used old-fashioned fieldcraft to communicate with his masters in the Kremlin. Details of the case against Robert Phillip Hanssen emerge in the court papers presented last night. They tell of dead drops, secret codes, diamond pay-offs, and an individual disparaging of his homeland. His arrest, after a four-month surveillance operation, was also redolent of the old-fashioned cloak and dagger style that has graced many Hollywood thrillers. Mr Hanssen had been due to collect a package containing £34,000 which had been waiting for him at a pick-up point at a bridge in a park in Arlington. The father-of-six never made the collection. His former FBI colleagues had him in custody. Friends and neighbours had been oblivious to the crimes he is alleged to have committed. Nancy Cullen, a friend, said: "They go to church every Sunday - if that means anything - loading all six kids into the van." She said the Hanssens were regulars at local parties, referring to him as "very attractive...not overly gregarious". Trained as an accountant, with experience as an investigator in the financial section of the Chicago Police Department, the 56-year-old took his oath of office with the FBI in 1976. But he told his Russian "friends" that he was moved to embark on his course as a double agent as a teenager. "I decided on this course when I was 14 years old," he wrote, according to the affidavit. Philby defected to the Soviet Union in 1963 just before being exposed as a spy who had not only damaged Britain, but also the US. "I'd read Philby's book," Mr Hanssen wrote. "Now that is insane, eh! My only hesitations were my security concerns under uncertainty. I hate uncertainty." >From the start of his dalliance with Moscow, Mr Hanssen was obsessed with security. In that earliest listed contact, Mr Hanssen said Soviet intelligence had "suffered some setbacks", and provided the names of three KGB agents he said had been recruited by the United States, the affidavit said. Two of these agents were later executed. Promising more information in this typed note, which was sent through the US mail, Hanssen asked for £70,000 and set up a coded system to conceal the scheduling of communications: "I will add six (you subtract six) from stated months, days and times in both directions of future communications." Under this system, February 20 would become August 26, and 6 pm would become midnight. Later that month, Mr Hanssen allegedly offered signals using white adhesive tape on a signpost near his home in northern Virginia just outside Washington. A horizontal line of tape would mean he was ready to get a KGB package; a vertical piece of tape would mean the drop had occurred; a subsequent horizontal piece of tape would mean the package was received. Such dead drops - in which the two sides never saw each other - were the norm during his 15 years working with Soviet and Russian intelligence, the affidavit alleged, and documents said the Russians never knew who their contact was. He initially signed off simply as "B," but later used the aliases "Ramon Garcia", "Jim Baker", and "G Robertson". Cash payments of tens of thousands of dollars were sometimes included in the KGB drops, the affidavit said, and while Mr Hanssen found these welcome, he was wary. "I have little need or utility for more than the 100,000 (dollars)," he allegedly wrote. "It merely provides a difficulty since I cannot spend it, store it, or invest it easily without tripping 'drug warning' bells. "Perhaps some diamonds as security to my children and some goodwill so that, when the time comes, you will accept my senior services as a guest lecturer. Eventually, I would appreciate an escape plan. Nothing lasts forever." He eventually received £400,000 in cash and diamonds from the Soviets and Russians, the affidavit said; in addition, an account was opened for him in Moscow that eventually was valued at £600,000, making his total gain £1m. Using dead drops, Hanssen provided details of defence information, national security information, and other matters. What had begun with the homespun signals of tape on signposts, and eventually moved on to such simple signals as different coloured drawing-pins that were visible from slowly moving vehicles, also included encrypted computer disks. He had disparaging words for the FBI - "Generally speaking you overestimate the FBI's capacity to interdict you" - and for the US in general. "The US can be errantly likened to a powerfully built but retarded child, potentially dangerous, but young, immature and easily manipulated," he wrote. "But don't be fooled by that appearance. It is also one which can turn ingenious quickly, like an idiot savant, once convinced of a goal." -Feb 21st -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2525 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 8:05pm Subject: FBI spy who sold out to Russia 'did megaton damage' Wednesday 21 February 2001 FBI spy who sold out to Russia 'did megaton damage' http://www.telegraph.co.uk/et?ac=003100565149417&rtmo=psIpMe1e&atmo=99999999&pg=/et/01/2/21/wspy21.html By Ben Fenton in Washington BRITISH and American spycatchers were yesterday investigating the damage done by a senior FBI officer charged with spying for Moscow for the past 16 years. Robert Hanssen, a father of six who faces the death penalty if convicted, was described as having done "megaton damage" to American intelligence. His arrest, as he allegedly made a "dead drop" and picked up $50,000 (£33,000) in a park near his home in Virginia on Sunday, sent shock waves through the intelligence communities on both sides of the Atlantic. The arrest came after the FBI obtained documents from the former KGB, but sources said considerable detective work was needed because Hanssen had been able to keep his identity secret from his paymasters. British sources said that intelligence officials from London had been in close contact with their American counterparts to try to discern what Hanssen might have given away that would affect British security. Although Hanssen, 56, worked mainly in the FBI's counter-intelligence sector, watching the activities of foreign diplomats in Washington during his 27-year career, his security clearance was so high that he had access to the highest grade of secrets. One of the two charges formally laid against him in a court in Alexandria, Virginia, yesterday was of betraying in October 1989 the identities of three men who worked as double agents within the ranks of the KGB. The CIA believes that the three were executed by the Soviet Union as a result. Among the details that will be sought by MI5 and MI6 is whether Hanssen could have seen information about agents working for Britain within the Soviet and Russian intelligence structures. The director of the FBI, Louis Freeh, said Hanssen's alleged conduct "represents the most traitorous actions imaginable". The full extent of the damage was not known "because no accurate assessment could be conducted without jeopardising the investigation", he said. But it was believed to be "exceptionally grave". The US Attorney-General, John Ashcroft, said the espionage was "a very serious breach in the security of the United States. Every American should know that our nation, our free society, is an international target in a very dangerous world." In the brief court hearing yesterday, Hanssen was said to have been motivated by money and to have received $1.4 million over the period of his alleged treachery. President Bush said the charges were "extremely serious and deeply disturbing". He said: "Allegations of espionage are a reminder that we live in a dangerous world - a world that sometimes does not share American values." Officials in Washington called Hanssen the Aldrich Ames of the FBI. Ames, arrested in 1994, was a senior CIA officer whose treason is thought to have been the most damaging committed by an American spy. Hanssen is alleged to have confirmed some of Ames's disclosures for the Russians. FBI officers sealed off the large suburban house in Vienna, a commuter town a few miles from Washington, where Hanssen lived with his wife, Bernadette, and their children. He is only the third agent of the FBI, which in espionage matters plays the same role as MI5 in Britain, to be accused of spying. In 1997 Earl Pitts, an instructor at the FBI Academy in Quantico, was sentenced to 27 years' imprisonment after admitting he spied for Moscow during and after the Cold War. Richard Miller, a Los Angeles FBI agent arrested in 1984, was later sentenced to 20 years in prison. The arrest of Hanssen is the latest in a series of intelligence embarrassments for America. Last year a former US army officer was accused of spying for the Soviet Union and later Russia. Prosecutors said Col George Trofimoff had given away military secrets for 25 years. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2526 From: James M. Atkinson, Comm-Eng Date: Tue Feb 20, 2001 10:17pm Subject: Why Espionage? Why Espionage? http://www.abcnews.go.com/sections/us/DailyNews/hanssen_spies010220.html Expert Says Spies Driven By More Than Money By Bryan Robinson Feb. 20 ≠ Robert Hanssen now joins Earl Pitts and Richard Miller as the only FBI agents arrested for spying on their own country. Pitts is serving a 27-year sentence after admitting in 1997 that he spied for Moscow during and after the Cold War. Miller was released in 1994 after serving a reduced sentence for espionage, and now Robert Hanssen could face life in prison ≠ even death ≠ if convicted of multiple counts of espionage. He was arrested today for allegedly spying for the Soviets and Russia for 15 years. What would drive a man to betray his country? FBI officials suggested Hanssen may have been driven by money, saying that he received $1.4 million in cash and jewelry for his services over a 15-year period. But one expert says alleged spies like Hanssen may be driven by more than money. "Generally, what happens with people is that they are getting some kind of monetary payment, but they are driven by the excitement and thrill of doing something and getting away with it," said Patrick Donnelly, professor of sociology and criminologist at the University of Dayton. "As they get deeper into something, they get a sense of satisfaction of doing something with nobody finding out about it." Empowered By Knowledge and the Thrill Spies, Donnelly said, also feel empowered by the information they have access to and perhaps, a rush they feel when they get away with turning over that information. Those who choose to spy on their countries, Donnelly said, are drawn to the thrill of leading a double life and grow more confident the longer they get away with their activities. "In that time [where Hanssen allegedly served as a spy], he's probably having access to the underside of the job. He probably feels safe because he feels like the people around him trust him," Donnelly said. "And he probably got close to his colleagues and got an idea of the type of lives they lead." A letter Hanssen allegedly wrote to his Russian beneficiaries suggests he may have become infatuated with the thrill of a double life as a spy long before joining the FBI. According to an FBI affidavit, Hanssen wrote in the letter: "I decided on this course when I was 14 years old. I read Kim Philby's book." Philby was a notorious British double agent who defected to the Soviet Union nearly 40 years ago. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2527 From: Jeremy Date: Tue Feb 20, 2001 6:34pm Subject: FBI agent It's a shame that someone would sell out his own country for the love of money. It's not like he wasnt bringing down a pretty penny working for the FBI.. 2528 From: Shawn Hughes Date: Wed Feb 21, 2001 11:19am Subject: feds on the cutting edge FBI surveillance systems get digital upgrade Amid ongoing debate over surveillance tools' potential to invade privacy, the FBI is replacing its analog wiretapping equipment with digital systems in all 56 field offices. Under the Digital Storm program, the bureau will replace large reel-to-reel tape recorders with PC specially tuned for audio storage capability. The minimum requirement for running the digital recording applications is an 800-MHz Pentium PC with 256M of RAM and RAID Level 5 storage. About 20 percent of the FBI offices already have the new digital systems. With a budget of $30 million for fiscal 2001, the FBI Laboratory this year will upgrade as many field offices as possible, said Michael T. Elliott, unit chief for telecommunications intercept and collection technology. The bureau plans to finish the conversion to digital by 2003. http://www.gcn.com/vol20_no4/news/3709-1.html Shawn - insert flippant quote here [Non-text portions of this message have been removed] 2529 From: Jesse Thomas Date: Tue Feb 20, 2001 4:33pm Subject: Re: FBI Russia spy caused "grave" damage No offense, but I would have to give my condolences to the former FBI agent for his good work over the many spying years. Unfortunately that line of work is limited in providing information to the Soviets, rather than US citizens. I understand that the type of information disseminated, which includes how the FBI spies on it's own people, makes me a bit confused as to who the 'bad guy' really is. Of course, is is a bit unethical to reveal hard-earned engineering accomplishments to those who have not participated in R&D, nor have earned it. I'm talking about intellectual property here. That would be a crime, as that is the injured party. As far as what is 'grave' damage as caused by the spy act, I doubt if there is any adverse effect on our ability to bomb foreign nations or spy on our own people. > > On a visit to St Louis, Bush said: "This has been a difficult day for those > who love our country and especially for those who serve our country in law > enforcement and the intelligence community." particularly the intelligence community, since that is their jobs > > 2530 From: Shawn Hughes Date: Wed Feb 21, 2001 11:29am Subject: steganography sniffers Secret Messages Come in .Wavs Neil Johnson has a job that's nothing if not unusual: He investigates how to uncover concealed messages embedded in sound and video files. A researcher at Virginia's George Mason University, Johnson is one of a small but growing number of digital detectives working in the field of computer steganalysis -- the science of detecting hidden communications. "I analyze stego tools," said the 32-year-old security specialist who is the associate director of GMU's Center for Secure Information Systems. "I try to find out what can be detected or disabled. I see what their limitations are." http://www.wired.com/news/politics/0,1283,41861,00.html also, http://www.cl.cam.ac.uk/~fapp2/steganography/ Shawn - insert flippant quote here [Non-text portions of this message have been removed] 2531 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:33am Subject: FBI portrays Robert Hanssen's double life A 15-year paradox FBI portrays Robert Hanssen's double life A 15-year paradox http://cgi.usatoday.com/usatonline/20010221/3083038s.htm By Richard Willing and Traci Watson USA TODAY WASHINGTON -- He was the son of a Chicago cop, a quiet type who admired strong leaders, went to Mass on Sundays and occasionally shocked colleagues by spouting profanity-laced quotes from Gen. George S. Patton. But to folks such as I.C. Smith, a onetime colleague in the FBI's counterintelligence division, the lanky, sometimes-disheveled man called Bob Hanssen was still ''not your typical FBI agent.'' Little did they know. Hanssen, charged Tuesday with spying for 15 years on the government he swore to serve, was an apparent paradox, a man of separate and warring loyalties that seem impossible to have coexisted in one slim human frame. A 100-page FBI affidavit, filed in connection with the charges, and interviews with neighbors, relatives and law enforcement sources paint a contradictory picture: On the surface, Hanssen, 56, was a suburban dad, toiling at his government job, joining with his wife, Bonnie, to raise six children in the Washington suburbs, putting them through Catholic schools and colleges, and making the payments on a Ford Taurus, an Isuzu Trooper and a fast-fading Volkswagen van. At the same time, the government says, Hanssen was something else entirely -- a spy for the Soviet Union and its successor, the Russian Federation. They were the sworn enemies of his team, FBI counterintelligence, and, in the case of the U.S.S.R., of his seemingly beloved church. Officials say Hanssen was a spy who profited from his activities, collecting $550,000 in cash, about $50,000 in diamonds and the promise, which he never took seriously, of $800,000 more in a Russian bank account. In court documents unsealed Tuesday, the government says he also harbored the fantasy of retiring from the FBI and relocating to Moscow to teach college courses and train future spies. His boyhood hero, he told his Russian keepers, was the British intellectual- turned-Soviet mole Kim Philby. In the Cold War of the 1950s, Philby did exactly that -- escaped to Moscow. ''Want me to lecture in your 101 course in my old age? I would be a novelty attraction,'' Hanssen wrote to a Russian contact last November. ''I'd decided on this course when I was 14. . . . I read Philby's book.'' That echoed the thought Hanssen expressed in November 1985, after first approaching KGB agents in Washington and volunteering to supply information. He would work, Hanssen wrote the KGB, for money, a few diamonds for his children and ''good will.'' ''So that when the time comes, you will accept (my) senior services as a guest lecturer,'' read the note, found by federal investigators last fall. ''Eventually, I would appreciate an escape plan. (Nothing lasts forever.)'' Policeman's son Hanssen was born April 18, 1944, in Chicago, the son of a policeman who rose to the rank of lieutenant. He was educated at Knox College, a small and selective liberal-arts college in Galesburg, Ill., then studied dentistry and accounting before landing at the FBI. Hanssen's late start -- he was nearly 32 when the bureau swore him in -- meant he was maturer than many recruits. However, the age difference left him with disdain for many he would serve with, bureaucratic types who, he once told the Russians, went ''all wet'' when faced with a decision that they had to make by themselves. In October 1985, Hanssen made just such a decision, the government says, selling Russian intelligence the names of three American-based KGB agents who were working secretly for the FBI. Hanssen had come by the information when working at FBI headquarters in Washington, but he waited until being transferred to New York City before approaching the Russians. The three KGB agents, who also had been betrayed by rogue CIA agent Aldrich Ames, were recalled to Moscow, where two were executed and the third was given a prison sentence. In 1987, Hanssen and his family returned to Vienna, Va., in the Washington suburbs, and have lived there since. By all appearances, their lives were solid and unremarkable. Those who know the Hanssens describe them as a close family. They attended Mass weekly. Four of the children attended Our Lady of Good Counsel Catholic School, which covers kindergarten through eighth grade, in Vienna. Only two of the children remain at home, a comfortable brown frame house with a basketball hoop on the side. Bernadette ''Bonnie'' Wauck, who turns 55 this month, was raised in Park Ridge, Ill., in a family that included eight children. Her father, Leroy Wauck, was a professor at Loyola University in Chicago, a Jesuit institution, where Bonnie earned a bachelor's degree in sociology. She teaches nearly full time at Oakcrest School in McLean, Va., a small Catholic girls' school. Robert and Bonnie met while they both were working in the Chicago area, Leroy Wauck said. An acquaintance who spoke to her Tuesday described Bonnie Hanssen as ''in shock'' after the arrest. She had no notion, the acquaintance said, that her husband was even under suspicion of spying. The Hanssens' son Mark is a politics major at the University of Dallas in Irving, Texas, and their son John attends law school at the University of Notre Dame. One of their daughters is married and has at least one child, said Nancy Cullen, a neighbor of the Hanssens. Devoted mother Bonnie is universally described as a devoted and skillful mother who even recorded a commercial tape about activities a family can do together. ''They're a wonderful family. They've been so concerned about raising their children well,'' said Mary Ann Budnik, CEO of R.B. Media, the company that sells Bonnie Hanssen's tape. ''The more I think about it, the more I think he's being framed.'' Two of Bonnie's sisters live nearby with their husbands and children. One, Jeanne Beglis, lives just a few doors down the street. Wauck said his son-in-law didn't complain about his job. ''It just doesn't make sense,'' he said. ''No one anticipated anything like this.'' The charges read like a continuous drumbeat: * Hanssen is accused of sending 27 letters and 22 packages to the KGB and its successor agency, the SVR. They left 33 bundles, stuffed with thousands of old dollar bills, for him. * Because of him, operations were blown, including the investigation in 1989 of foreign service officer Felix Bloch, who was suspected of spying for the Russians. Hanssen is accused of tipping off the Russians; officials say they believe that the KGB passed the information on to Bloch. And officials say Hanssen passed along names of potential recruits, including a boyhood friend. Amid these events, bits of Hanssen's personality can be spied. He was obsessive about security, blowing off one document drop when the Russians were three minutes late. He had advice for his Russian buddies: Study the methods of the late mayor Richard J. Daley, the boss of Chicago, to learn how to run a government. He offered technical tips, too. Though he used a Palm III organizer, he told the Russians in March 2000, the VII version comes with built- in wireless Internet capability. ''Could be quite effective'' in spying, Hanssen said. He could be humorous. Overconfidence, he warned the Russians, can lead ''cocksure officers'' to ''step in an occasional cowpie.'' ''Message to the translator,'' Hanssen wrote in November 2000. ''Got a good word for 'cowpie'?'' And salty. In December 1991, when a promotion and a new job temporarily sidetracked his spying, he quoted Patton to show the Russians that he was anxious to keep working for them. ''As General Patton said, 'Let's get this over with so we can go kick the (expletive deleted) out of the (expletive deleted) Japanese,' '' Hanssen wrote. Occasionally, the affidavit says, Hansen enjoyed chatting, spy to spy, with his Russian handlers. That $800,000 reportedly set aside for him in the MOST bank in Moscow? He understood, he wrote in November, that it was only an ''accounting notation'' that may or may not be paid ''at some uncertain future.'' No hard feelings, he said. ''We do the same.'' But the job could be frustrating. ''You waste me!'' he complained when the Russians failed to keep in touch. Last year, he told his Russian keepers, he knew all about the discovery of a Russian bug planted in the State Department but had ''no effective way'' of tipping them off quickly. And dangerous. His biggest fear, Hanssen confided, was ''someone like me'' -- an agent on the Russian side with knowledge of Hanssen's spying who decided to work for the Americans. A former CIA counterintelligence expert, Vincent Cannistraro, suspects that that is what happened. Sometimes the work just seemed to be getting to Hanssen. He could get the death penalty if caught, he said. Sometimes, the Russians didn't seem to appreciate the risks he takes. ''I have come about as close as I ever want to come to sacrificing myself to help you,'' he wrote in March 2000. ''Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal. Take your pick. There is insanity in all the answers.'' Some former colleagues are saddened but not shocked that Hanssen may have led a secret life. ''He was kind of a loner, introverted, didn't laugh easily,'' I.C. Smith recalled. ''I could never figure out how he hung on as a headquarters supervisor.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2532 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:36am Subject: Accused spy is a man no one knew Accused spy is a man no one knew http://www.bergen.com/news/spyprofil20010221.htm Wednesday, February 21, 2001 ROBERT HANSSEN http://www.bergen.com/news/images/hansen-robert-022101.jpg By DARLENE SUPERVILLE The Associated Press WASHINGTON -- Robert Philip Hanssen was supposed to be a spy of sorts in his own country, keeping tabs on the comings and goings of foreign diplomats. The veteran FBI agent was trained all too well. The very professionalism the Chicago native brought to the task helped him operate without detection for more than a decade as a spy for Moscow, the FBI says. A father of six living in a middle-class Virginia suburb, Hanssen knew how to hide his identity even from his handlers and how to watch the FBI to see if it was watching him, authorities said after charging him with espionage. He was aware, too, of how severe the treatment can be for caught spies. "I know far better than most what mine fields are laid and the risks," Hanssen wrote to a KGB handler, according to correspondence quoted by FBI Director Louis Freeh. For all his anger, Freeh paid what sounded like grudging compliments to techniques the former Chicago police officer and 25-year FBI veteran, who studied Russian in college, is alleged to have used. "In short, the trusted insider betrayed his trust without detection," Freeh said. For Hanssen, an FBI career that began with his taking the agency's oath ended in a Virginia park Sunday night, where colleagues read him his Miranda rights. * * * Nothing special set him apart in his Vienna, Va., neighborhood, say the neighbors, although one complained that he let his dog roam and create a nuisance. Hanssen, 56, made a home for himself, his wife, and their children in a $300,000 split-level, brick-and-cedar house with a one-car garage, a Ford Taurus, and that other symbol of suburban living -- a minivan. A basketball hoop is in the driveway. Hanssen's wife, Bernadette, teaches religion part time at a Catholic high school, and the family came regularly to block parties, such as the one every Memorial Day. "Not overly gregarious," Nancy Cullen said of him. She lives several doors down from the Hanssens in a cul-de-sac she describes as "our town hall." When neighbor called neighbor to share the news of his arrest, the reaction was, "No way," Cullen said. "I've been in his house. I've never seen any Soviet flags or anything like that, if that's what you're asking," said Matt Bennett, who lives across the street. * * * The government says Hanssen had a long relationship with the Soviet Union and the Russians, dating to 1985, while assigned to the Intelligence Division of the FBI field office in New York City. Operating under the code name "Ramon," Hanssen kept his real identity a secret even from his Russian handlers, who did not find out his name or who employed him until his arrest was disclosed, Freeh said. Hanssen also checked his agency's own security systems to see whether authorities had any suspicions about him -- which they apparently did not until late last year. "He was, after all, a trained counterintelligence specialist," Freeh said. >From February 1995 until January, Hanssen was the FBI's senior representative to the State Department's Office of Foreign Missions, where he oversaw an interagency counterintelligence group. He was returned to FBI headquarters last month in a newly created position designed so that the bureau could monitor his daily activities without alerting him to its investigation. Hanssen apparently contemplated several careers before settling on one in law enforcement. He earned a bachelor's degree in chemistry from Knox College in Galesburg, Ill., in 1966, according to the government's information. He then studied dentistry at Northwestern until 1968 before receiving a master's in accounting from the university in 1971. He became a certified public accountant in 1973. He worked as a junior accountant at a Chicago firm from 1971 to 1972, when he joined the city Police Department as an investigator in the financial section of its inspection division. Hanssen joined the FBI in January 1976, and served initially in Indiana before assignments that took him back and forth between offices in New York and the Washington headquarters. * * * Biography of accused spy NAME -- Robert Philip Hanssen. AGE, BIRTH DATE -- 56; April 18, 1944. EDUCATION -- M.B.A., accounting and information systems, Northwestern University (1971); B.A., chemistry, Knox College, Galesburg, Ill. (1966). Studied dentistry, Northwestern (1966-68). EXPERIENCE: Information Resources Division, FBI headquarters, January 2001- present. FBI's senior representative, Office of Foreign Missions, State Department, Washington, February 1995-January 2001. National Security Division, FBI headquarters, December 1994-February 1995. Temporary assignment, Washington field office, April 1994-December 1994. Chief, National Security Threat List Unit, Intelligence Division, FBI headquarters, January 1992-April 1994. Soviet Operations Section, Intelligence Division, FBI headquarters, July 1991-January 1992. Inspections Staff, FBI headquarters, June 1990-June 1991. Supervisory special agent; Soviet Analytical Unit, Intelligence Division, FBI headquarters, August 1987-June 1990. Intelligence Division, New York City, September 1985-August 1987. Supervisory special agent, Intelligence Division, FBI headquarters, January 1981-September 1985; Criminal and Intelligence divisions, New York City, August 1978- January 1981. Joins FBI, assigned to offices in Indianapolis and Gary, Ind., January 1976-August 1978. FAMILY -- Wife, Bernadette; six children. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2533 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:38am Subject: U.S. officials, agents accused of spying U.S. officials, agents accused of spying http://cgi.usatoday.com/usatonline/20010221/3082886s.htm 2000: Retired Army Reserve colonel George Trofimoff, a civilian intelligence employee, was charged with spying for the Soviet Union and Russia for 25 years. 1997: Earl Pitts, a 13-year FBI veteran, was sentenced to 27 years in prison after pleading guilty to selling information to Russians from 1987 to 1992. 1997: Harold Nicholson, the highest-ranking CIA officer ever arrested for spying, was sentenced to 23 years in prison for selling information to the Russians, including the names of CIA trainees at the agency's school for spies. 1994: Aldrich Ames, a CIA officer, pleaded guilty to selling information to the Russians from 1985 to 1994. The information is thought to have led to the deaths of at least nine U.S. agents. He was sentenced to life in prison. 1989: Felix Bloch, a 30-year career State Department diplomat, was believed to have passed secrets to a Soviet agent in Paris. Bloch was never charged with espionage but was fired in 1990 on grounds that he lied to investigators. 1986: Jonathan Pollard, a civilian Navy intelligence analyst, was sentenced to life in prison for selling information to Israel. 1985: John Walker, a retired Navy officer, was sentenced to life in prison for selling secrets to the Soviets for 18 years. 1985: Edward Howard, a former CIA officer, fled the country as the FBI investigated allegations that he disclosed the identities of CIA agents in Moscow. He still lives in Moscow. 1985: Sharon Scranage, a CIA clerk serving in Ghana, pleaded guilty to giving names of U.S. agents to her Ghanaian boyfriend. 1984: Richard Miller, a Los Angeles FBI agent, was arrested for spying for the Soviets and later sentenced to 20 years in prison. The sentence was later reduced to 13 years. 1951: Julius and Ethel Rosenberg, accused of conspiring to pass atomic secrets to the Soviets, were the last spies to receive the death penalty in the USA. They were executed on June 19, 1953. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2534 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:40am Subject: Case raises questions about FBI's internal security - Agent said to have tracked bureau using its computers Case raises questions about FBI's internal security Agent said to have tracked bureau using its computers http://cgi.usatoday.com/usatonline/20010221/3083032s.htm By Toni Locy USA TODAY WASHINGTON -- FBI Director Louis Freeh called catching veteran agent Robert Hanssen ''red-handed'' selling secrets to the Russians ''a counterintelligence coup.'' But the bottom line is a high-ranking official allegedly got away with espionage for 15 years, and no one had a clue until four months ago. The arrest of Hanssen, 56, an expert on counterintelligence who wasn't subjected to a routine polygraph test for several years, raises serious questions about the FBI's internal security, reputation and future role in counterintelligence and national security, analysts say. As Aldrich Ames was a black eye to the CIA in the 1990s, so is Hanssen to the FBI, which describes him as the worst traitor in its history. ''That Hanssen could do this for 15 years is an absolute earthquake for the FBI and the intelligence community,'' says Emilio Viano, a professor at American University in Washington and an expert on counterintelligence. How Hanssen avoided detection reveals many weaknesses that will be examined by William Webster, a former CIA and FBI director appointed to head a task force to investigate how this could happen. Among those weaknesses is the length of time it took the FBI to find out about Hanssen. Analysts say the case shows that the FBI's internal safeguards should have unmasked Hanssen years ago and that the only way the bureau got on his trail was probably with outside help from Russian spies or a defector who handed over documents from the KGB, the spy agency of the former Soviet Union. Hanssen is portrayed as a cunning operative who used ''good tradecraft,'' spy lingo for eluding detection, and never drew attention to himself with an ostentatious lifestyle, as Ames did. Hanssen doesn't deserve all of the credit, however, law enforcement sources and counterintelligence experts say. Rather, they say, the FBI deserves the blame. Freeh, who fielded questions alone at a news conference, referred repeatedly to the detailed affidavit filed in federal court that laid out Hanssen's activities dating to 1985, when he allegedly offered to sell highly classified documents to the Russians. Freeh, who has headed the agency since 1993, refused to say why he considered the investigation ''a coup,'' but said, ''We did not stumble onto this investigation.'' His statement leads some experts, including Viano, to conclude that the FBI couldn't have done the investigation without access to secret documents from the KGB and its successor agency, the SVR. Viano says the FBI may have gotten many of the details of Hanssen's spying by trading for them. He says many KGB records are being passed around the world's intelligence community. ''The intelligence community is a very small community,'' he says. ''The players are well-known to each other, and both sides are sharing information on the basis of getting a quid pro quo.'' Freeh hinted as much. Through efforts to identify spies that had begun after the Ames arrest, ''the FBI was able to secure original Russian documentation of an American spy who appeared to the FBI to be Hanssen,'' he said. He refused to say, however, where that documentation came from. Analysts see a clue in timing. The FBI began looking at Hanssen in October, the same month that Sergei Tretyakov, a first secretary at the Russian mission to the United Nations, defected. ''It's Tretyakov, but they're not going to say that because they're trying to protect the source,'' says Vince Cannistraro, former CIA counterterrorism director. A law enforcement source familiar with the investigation says a key development occurred when the FBI conducted a secret entry into Hanssen's house and obtained a copy of his computer hard drive. On it were letters Hanssen allegedly wrote to his Russian handlers. The letters were encrypted, but the FBI cracked the code. The arrest comes at a time when the FBI is expanding its role in counterintelligence, opening more than 30 legal attachÈ offices around the world. However, the FBI has been lax about administering periodic, random polygraph tests of employees handling highly classified material, the source says. Hanssen was not administered such a test for the past several years, according to the source. The FBI's lack of a consistent polygraph policy was a sore point with CIA and military intelligence officers whose agencies rely heavily on lie-detector tests to keep tabs on employees, the source says. The FBI, the source says, places little weight on polygraphs because they are inadmissible in court. As an FBI employee, Hanssen was subjected every five years to financial reviews that examine credit and spending habits, but he lived modestly and wasn't given a second look, the source says. Hanssen allegedly watched his back by periodically searching the FBI's computer system to see whether agents in other parts of the agency were on to him. Through computer forensic work, the FBI went back and found he had conducted sweeping searches using his name, address and locations of the document drops he made to his handlers to determine whether investigations had been opened on any of them. In addition to assessing the damage done to national security, Webster's task force will likely examine why the FBI wasn't checking to see whether employees regularly conducted such surreptitious searches -- or whether it could. ''There's no reason for someone to be doing that unless you're guilty of something,'' says Jeffrey Richelson, a senior fellow at the National Security Archive at George Washington University in Washington. The task force also is expected to ask why the FBI wasn't checking to see what materials its employees were reviewing on their computers -- even though the bureau's computer system gives clear warning during sign-ons that it has this capability, the law enforcement source says. Sen. Richard Shelby, R-Ala., chairman of the Senate Select Committee on Intelligence, plans to hold a hearing next week to examine what damage may have been done by Hanssen's alleged cooperation with the Russians. Freeh says that ''at the end of the day, all of our systems probably need to be looked at and probably improved.'' -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2535 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:41am Subject: The man who risked death to betray his country FBI agents begin making sketches outside the Virginia home of Robert Hanssen, accused of spying for Russia. The man who risked death to betray his country http://www.thescotsman.co.uk/world.cfm?id=49304&keyword=the Robert Tait In Washington THE US intelligence community was reeling from a body blow to its credibility yesterday after a senior FBI agent was charged with spying for Moscow for 15 years, inflicting "exceptionally grave" damage on national security. Robert Philip Hanssen, 56, appeared in court accused of selling some of the United States' most sensitive intelligence secrets to the KGB - the spy agency of the former Soviet Union - and its Russian successor. The charges allege that betrayed the identity of three American moles in the KGB, two of whom were subsequently executed. He faces the death penalty or a maximum fine of $2.8 million (about £1.8 million) if convicted. It is alleged that Hanssen, a father-of-six who had been an FBI agent for 27 years, spied for the Soviet Union before its break-up and for Russia thereafter. Louis Freeh, the FBI director, alleged in a news conference yesterday that Hanssen had received $650,000 (£450,000) and diamonds in reward for his espionage work for Moscow. The FBI had accepted a $50,000 package intended for Hanssen, Mr Freeh said. Bureau agents been tracking Hanssen for four months before he was finally arrested on Sunday at a park near his $300,000 suburban Washington home after he had allegedly dropped off a package of classified information. President George Bush reacted by reading out a prepared statement to television cameras aboard Air Force One, the presidential jet. "Allegations of espionage within the FBI are extremely serious and deeply disturbing," he said. "Particularly for the thousands of men and women who work for the FBI and now must deal with allegations that one of their own may have undermined it." He described the allegations as "a reminder that we live in a dangerous world". Mr Bush added: "I thank the men and women who proudly serve our country. But anyone who would betray its trust, I warn you we will find you and bring you to justice." Hanssen is only the third FBI agent to be charged with espionage. Mr Freeh said that his alleged offences were "not only an affront to his fellow FBI agents but also to the American people". Hanssen is charged with passing classified documents to KGB agents on 20 March, 1989, with the intent of injuring the United States. The charges further state that he had voluntarily become a Soviet spy in October 1985, and that his espionage continued until his arrest. Mr Freeh said Hanssen operated under the code name "Ramon" and provided "highly classified information to the KGB and its successor agency, the SVR". He said Hanssen used encrypted communication, dead drops and other clandestine techniques. Mr Freeh further alleged that Hanssen independently disclosed the identity of two KGB officials who initially been compromised by convicted CIA spy Aldridge Ames. The agents had been recruited by the US to serve as "agents in place" at the Soviet embassy in Washington. They were later recalled to the Soviet Union, charged and executed. Mr Freeh said Hanssen's conduct "represented the most traitorous actions imaginable". He said there was no precise measurement of the damage Hanssen's alleged activities had inflicted "because no accurate damage assessment could be conducted without jeopardising the investigation". But he added: "We believe it was exceptionally grave." John Ashcroft, the US attorney general, said: "Individuals who commit treasonous acts against the United States will be held fully accountable. "Every American should know that our nation, our free society is an international target in a dangerous world. "In fact, the espionage operations designed to steal vital secrets of the United States are as intense today as they have ever been." Hanssen appeared at a federal court in Alexandria, a suburb of Washington, yesterday. Dressed in a black turtle neck, black shirt and grey trousers, he was silent and solemn as the charges were read out. He is being defended by one of Washington's premier defence attorneys, Plato Cacheris, who also represented Ames and Monica Lewinsky. Mr Cacheris said Hanssen planned to plead not guilty. He said his client was "emotional" and quite "upset" by the case against him. "The FBI always make out like they've got a great case," Mr Cacheris said. "But we'll see." Hanssen's arrest follows a series of national security embarrassments for the US. Last year, the government's case against the Los Alamos research laboratory physicist, Wen Ho Lee - who had been accused of selling the "crown jewels" of America's nuclear secrets to China - collapsed in a plea bargain. There were also a series of security lapses at the state department, one of which included the disappearance of a diplomat's lap top containing highly sensitive classified information. John Deutch, the former director of the CIA, was also charged with mishandling classified intelligence documents on insecure home computers. He was subsequently pardoned by Bill Clinton. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2536 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 9:44am Subject: Stashes of diamonds. Secret dead drops of classified documents. Swiss bank accounts Still Spy-Vs.-Spy for Russia, U.S. http://www.worldnews.com/?action=display&article=5850176&template=worldnews/search.txt&index=recent The Associated Press, Wed 21 Feb 2001 WASHINGTON (AP) ≠ Stashes of diamonds. Secret ``dead drops'' of classified documents. Swiss bank accounts. The details of FBI agent Robert Hanssen's alleged espionage for Russia read like a Cold War novel but nonetheless provide fresh evidence that the United States and Moscow are still very much engaged in spy-vs.-spy intrigue. ``Intelligence and counterintelligence are with us and will be with us for some time,'' FBI Director Louis Freeh acknowledged Tuesday after announcing Hanssen's arrest. ``This case has got a foot in the past, but part of it has clearly got a foot in the present.'' But why spy now, when the Cold War is for the history books? Russia is no longer seen as the enemy, intelligence experts say, but neither is it embraced as a full-fledged friend. ``One never knows what another country has in mind down the road, and someone who's a friend today may prove to be an enemy tomorrow,'' said Loch Johnson, a University of Georgia political scientist who worked on intelligence for the Clinton White House and congressional committees. Furthermore, he said, ``Russia still has the capacity to destroy the United States in 30 minutes, so that focuses the attention, even though the prospects of that are minimal in the near term.'' Beyond military secrets, the international espionage game targets political and economic information that could give an advantage to one side or another. In the Information Age, ``we have come to understand just how vital information is, regardless of where you get it,'' said Kenneth Allard, a former Army intelligence officer now at the Center for Strategic and International Studies. If anything, tensions between the United States and Russia have been on the rise of late. Twice in the past two weeks, for example, Moscow was rankled when top U.S. officials lumped Russia with Osama bin Laden and China as global threats and complained that it was spreading missile technology to Iran and North Korea. On Tuesday, Attorney General John Ashcroft described America as ``an international target in a dangerous world'' and said espionage operations aimed at the United States are ``as intense today as they have ever been.'' He didn't mention that U.S. espionage remains robust as well. In fact, U.S. spending for spying has been on the increase in recent years, after dropping off after the Cold War, according to Steve Aftergood, an intelligence analyst for the Federation of American Scientists. ``Everybody spies on everybody; that's the rule of thumb,'' said Aftergood. He said U.S. spending on intelligence, estimated at $30 billion this year, is likely to continue to increase as expensive spy satellites need replacing over the next decade. As for Russia, foreign intelligence activities never seem to have flagged under former President Boris Yeltsin, and some analysts have predicted they would increase under his successor, Vladimir Putin, a 15-year KGB veteran. >From U.S. proposals for a new missile defense system, to Russia's yawning technological gap, to NATO's proposed thrust to the East, spies have plenty of work assessing the West's next moves. Even allied nations spy on one another. In one notable case, former Navy analyst Jonathan Pollard was convicted in 1985 of spying on the United States for Israel. More recently, France has complained that a U.S.-led eavesdropping network known as Echelon is being used to snoop on the business of its European allies. U.S. officials have never publicly confirmed the network exists and deny that the United States engages in industrial espionage. Freeh pointed to congressional testimony that nearly two dozen countries use their security services in the United States to gather economic information. For all the sophistication of modern espionage with satellites and the like, there will always be demand for ``human-based intelligence'' ≠ that is, spies who do the type of double dealing now attributed to Hanssen. ``The more things change, the more they stay the same,'' said Allard. ``There's literally no substitute for somebody on the inside.'' And in a friendlier world, it may be easier for moles to rationalize their conduct, reasoning that they're not really jeopardizing national security when they sell out their country. As for all the made-for-TV details of stealthy double agents and dead drops in the Hanssen case, Allard said: ``Guess what? The old tried- and-true methods still work.'' ≠≠≠ On the Net: CIA: http://www.cia.gov Federation of American Scientists' Project on Government Secrecy: http://www.fas.org/sgp/ Copyright 2001 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2537 From: Robert G. Ferrell Date: Wed Feb 21, 2001 10:01am Subject: Re: steganography sniffers >unusual: He investigates how to uncover concealed >messages embedded in sound and video files. I've been considering developing a stego sniffer myself. If that does come to pass (it's not a trivial task), I'll make it available to members of this list. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2538 From: Robert G. Ferrell Date: Wed Feb 21, 2001 10:19am Subject: Re: NSA's Security Enhanced >Since I finally do have Linux on my computer, >this Version of Linux sounds Interesting. >http://www.nsa.gov/selinux/ This is essentially Linux with RACF (OK, that's an oversimplification. But data access granularity is the principal thrust of the kernel mods). I personally would still recommend OpenBSD, at least until SecLinux has been put through the ringer by the hacker community. Cheers, RGF Robert G. Ferrell, CISSP Information Systems Security Officer National Business Center U. S. Dept. of the Interior Robert_G_Ferrell@n... ======================================== Who goeth without humor goeth unarmed. ======================================== 2539 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 2:39pm Subject: Insider knowledge Wednesday, 21 February, 2001, 13:56 GMT Insider knowledge http://news.bbc.co.uk/hi/english/world/americas/newsid_1182000/1182217.stm Urgent questions are being asked about how veteran FBI agent Robert Hanssen, who allegedly sold some of the US Government's most sensitive secrets to Moscow, operated undetected for 15 years. According to senior intelligence officials, one reason is that Robert Philip Hanssen, who worked for the bureau for 27 years, knew the system so well, he managed to avoid arousing suspicion. Revelations about his alleged role at the heart of the FBI's counter intelligence operations in the US, have come as a huge shock. The Bureau is now beginning to assess the potential damage wrought to national security. 'Very experienced' Apart from being indicted for espionage, Mr Hanssen has been charged with betraying three double agents working for the Americans from the Soviet embassy in Washington, Two were executed when they returned to Moscow, while the third was imprisoned. At a news conference on Tuesday, FBI chief Louis Freeh said Mr Hanssen had managed to operate undetected because he was "a very, very experienced intelligence officer". On Wednesday, the New York Times wrote: "The bureau's own security safeguards seem to have been gravely deficient." "Even someone schooled in deception ought not to escape FBI detection for better than a decade of dealing with Russian handlers." According to an FBI affidavit, Mr Hanssen took numerous precautions that only a trained counter-intelligence expert would follow. He refused to meet Soviet (or later Russian) agents in person, either in Washington or abroad, knowing that these agents were often under surveillance and that foreign trips would arouse suspicion. He only used code for dates and places, encrypted computer discs and refused to accept KGB radio transmitters or other spy devices, which, if discovered, would immediately incriminate him. Former FBI director William H Webster, who is assessing the damage to national security, said he knew the bureau's counter-intelligence "matrix" too well. The FBI has acknowledged that a detailed review of its internal security is certain to find flaws in the FBI's procedures for ferreting out spies. The Washington Post says one area that is likely to be scrutinised is the FBI's unwillingness to give lie detector tests to employees on a regular basis. Mr Freeh has not disclosed how Mr Hanssen was finally caught, but there has been speculation that he was betrayed by a Russian source, who handed over his entire KGB dossier to the US. Four-month operation The FBI was first aware that there was a mole several months ago. A joint investigation was launched by the FBI, CIA, the State Department and the Justice Department. Mr Hanssen was kept under surveillance for at least four months. His phone was tapped and his house searched in his absence. FBI agents also covertly intercepted $50,000 in cash, which Russian intelligence officers are believed to have put into a secret location - a "drop" - for Mr Hanssen to pick up later. He was finally arrested on Sunday at a park in Vienna, Virginia, after allegedly dropping off a package of classified information for retrieval by Russian agents. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2540 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 2:41pm Subject: Darwin Awards Update!! From another list member.... who will remain in the shadow... Darwin Awards Update!! The Darwin Awards, for those not familiar, are for those individuals who contribute to the survival of the fittest by eliminating themselves from the gene pool before they have a chance to breed. 1. A young Canadian man, searching for a way of getting drunk cheaply, because he had no money with which to buy alcohol, mixed gasoline with milk. Not surprisingly, this concoction made him ill, and he vomited into the fireplace in his house. The resulting explosion and fire burned his house down, killing both him and his sister. 2. A 34-year-old white male found dead in the basement of his home died of suffocation, according to police. He was approximately 6'2" tall and weighed 225 pounds. He was wearing a pleated skirt, white bra, black and white saddle shoes, and a woman's wig. It appeared that he was trying to create a schoolgirl's uniform look. He was also wearing a military gas mask that had the filter canister removed and a rubber hose attached in its place. The other end of the hose was connected to one end of a hollow wooden tube approx. 12" long and 3" in diameter. The tube's other end was inserted into his rear end for reasons unknown, and was the cause of his suffocation. Police found the task of explaining the circumstances of his death to his family very awkward. 3. Three Brazilian men were flying in a light aircraft at low altitude when another plane approached. It appears that they decided to moon the occupants of the other plane, but lost control of their own aircraft and crashed. They were all found dead in the wreckage with their pants around their ankles. 4. A police officer in Ohio responded to a 911 call. She had no details before arriving, except that someone had reported that his father was not breathing. Upon arrival, the officer found the man face down on the couch, naked. When she rolled him over to check for a pulse and to start CPR, she noticed burn marks around his genitals. After the ambulance arrived and removed the man - who was declared dead on arrival at the hospital - the police made a closer inspection of the couch, and noticed that the man had made a hole between the cushions. Upon flipping the couch over, they discovered what caused his death. Apparently the man had a habit of putting his penis between the cushions, down into the hole and between two electrical sanders (with the sandpaper removed, for obvious reasons). According to the story, after his orgasm the discharge shorted out one of the sanders, electrocuting him. 5. A 27-year-old French woman lost control of her car on a highway near Marseilles and crashed into a tree, seriously injuring her passenger and killing herself. As a commonplace road accident, this would not have qualified for a Darwin nomination, were it not for the fact that the driver's attention had been distracted by her Tamagotchi key ring, which had started urgently beeping for food as she drove along. In an attempt to press the correct buttons to save the Tamagotchi's life, the woman lost her own. 6. A 22-year-old Reston, VA man was found dead after he tried to use octopus straps to bungee jump off a 70-foot railroad trestle. Fairfax County police said Eric Barcia, a fast-food worker, taped a bunch of these straps together,wrapped an end around one foot, anchored the other end to the trestle at Lake Accotink Park, jumped and hit the pavement. Warren Carmichael, a police spokesman, said investigators think Barcia was alone because his car was found nearby. 'The length of the cord that he had assembled was greater than the distance between the trestle and the ground', Carmichael said. Police say the apparent cause of death was 'Major trauma'. 7. A man in Alabama died from rattlesnake bites. It seems that he and a friend were playing a game of catch, using the rattlesnake as a ball. The friend - no doubt, a future Darwin Awards candidate - was hospitalised. 8. Employees in a medium-sized warehouse in west Texas noticed the smellof a gas leak. Sensibly, management evacuated the building, extinguishing all potential sources of ignition (lights, power, etc.). After the building had been evacuated, two technicians from the gas company were dispatched. Upon entering the building, they found they had difficulty navigating in the dark. To their frustration, none of the lights worked. Witnesses later described the sight of one of the technicians reaching into his pocket and retrieving an object, that resembled a cigarette lighter. Upon operation of the lighter-like object, the gas in the warehouse exploded, sending pieces of it up to three miles away. Nothing was found of the technicians, but the lighter was virtually untouched by the explosion. The technician suspected of causing the blast had never been thought of as 'bright' by his peers. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2541 From: Robert G. Ferrell Date: Wed Feb 21, 2001 2:42pm Subject: Re: Darwin Awards Update!! > Nothing was found of the technicians, but the >lighter was virtually untouched by the explosion. The technician >suspected of causing the blast had never been thought of as 'bright' >by his peers. I don't believe this one. Too Warner Brothers. RGF 2542 From: William Knowles Date: Wed Feb 21, 2001 3:45pm Subject: Re: Re: NSA's Security Enhanced On Wed, 21 Feb 2001, Robert G. Ferrell wrote: > >Since I finally do have Linux on my computer, > >this Version of Linux sounds Interesting. > >http://www.nsa.gov/selinux/ > > This is essentially Linux with RACF (OK, that's an > oversimplification. But data access granularity is the principal > thrust of the kernel mods). I personally would still recommend > OpenBSD, at least until SecLinux has been put through the ringer > by the hacker community. Heh, the local Linux users group & a majority of the guys and few gals from the 2600 group near me are too paranoid to start playing with the SELinux since its from the NSA. :) William Knowles wk@c... *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* 2543 From: David Miller Date: Wed Feb 21, 2001 3:01pm Subject: RE: Darwin Awards Update!! Personally I think they all were a little contrived. Not your usual Darwin fare. -----Original Message----- From: Robert G. Ferrell [mailto:rferrell@r...] Sent:Wednesday, February 21, 2001 2:42 PM To:TSCM-L@yahoogroups.com Subject:Re: [TSCM-L] Darwin Awards Update!! > Nothing was found of the technicians, but the >lighter was virtually untouched by the explosion. The technician >suspected of causing the blast had never been thought of as 'bright' >by his peers. I don't believe this one. Too Warner Brothers. RGF 2544 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:52pm Subject: U.S. Diplomats Quizzed on Contact With Alleged Russian Spy U.S. Diplomats Quizzed on Contact With Alleged Russian Spy http://www.russiatoday.com/news.php3?id=294814 WASHINGTON, Feb 21, 2001 -- (Agence France Presse) Federal investigators on Wednesday began interviewing U.S. diplomats who may have known alleged Russian spy Robert Philip Hanssen during his stint at the State Department, officials said. A team of agents from the Federal Bureau of Investigation were quizzing State Department employees who could have come into contact with Hanssen who served as an FBI liaison officer there for a half-decade until last month, they said. "The FBI, as part of their investigation, will be interviewing people here who might have worked with him or known him," a senior department official told AFP. The official, speaking on condition of anonymity, said no State Department employee was suspected of collaborating with Hanssen and that the investigators were mainly interested in learning what diplomatic information could have been compromised. Hanssen, an FBI counter-intelligence agent who was formally charged with espionage on Tuesday, had a second-floor office at the State Department where he coordinated matters involving foreign diplomatic missions with the FBI. His work at the department gave him unfettered access not only to classified information regarding the movement of foreign diplomats and their status but also to secure areas in the headquarters building which has been heavily criticized for security violations. Though Hanssen worked in the department for five years and is alleged to have spied for the former Soviet Union and Russia for more than 15, investigators say they have not yet found evidence he was responsible for any of the deeply embarrassing security lapses there. Over the past three years, the State Department has been been plagued by various incidents including the 1999 discovery of a sophisticated Russian listening device planted in a conference room and the still unsolved January 2000 disappearance of laptop computer containing highly classified data . Those incidents followed one in 1998 in which an unknown man wearing a tweed coat walked into a room six doors from former secretary of state Madeleine Albright's office, picked up a sheaf of classified material and walked out unmolested. "There are some of us that probably would like to see a laptop, a couple of bugs, stacks of documents and a tweed coat turn up in Hanssen's old office here, but that doesn't seem likely," said a State Department official. In fact, according to papers filed in court by prosecutors on Tuesday, Hanssen complained to his Russian handlers about the slowness of their communications, saying he could have alerted them to the discovery of the listening device if they had an improved system. ((c) 2001 Agence France Presse) -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2545 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:53pm Subject: Gaps in Ames Case May Be Filled by F.B.I.'s Own Spy Case February 21, 2001 Gaps in Ames Case May Be Filled by F.B.I.'s Own Spy Case http://www.nytimes.com/2001/02/21/national/21DAMA.html?pagewanted=all By JAMES RISEN WASHINGTON, Feb. 20 ≠ When a Central Intelligence Agency officer, Aldrich H. Ames, was arrested as a spy for Moscow in 1994, critics questioned how the agency could have allowed his espionage to go undetected for nine years. Officials at the Federal Bureau of Investigation helped fuel the criticism with complaints that the C.I.A. had failed to share sensitive information, stifling the investigation. Now the F.B.I. finds the shoe on the other foot, facing questions about how it allowed a senior bureau official to spy for Moscow for nearly twice as long as Mr. Ames had. After the arrest of the F.B.I. official, Robert Philip Hanssen, 56, on Sunday in a suburban Virginia park, where he was suspected of leaving classified material for his Russian handlers, officials are saying he may be the most damaging spy for Moscow since Mr. Ames. In an extensive affidavit released today, the government charged that Mr. Hanssen compromised spies working for the United States, including three Russian K.G.B. officers who had also been betrayed by Mr. Ames. Two of those officers were tried and executed; the third was imprisoned and later released. Mr. Hanssen is also suspected of being the person who tipped off Moscow to the 1989 spy investigation of a State Department official, Felix S. Bloch. The F.B.I. believes that Mr. Bloch was subsequently warned by the K.G.B. Mr. Bloch was never arrested for espionage, but was fired from the State Department. Current and former American officials also say Mr. Hanssen's case may help explain the losses of technical intelligence operations against the Russians for which investigators were never certain that Mr. Ames could be blamed. "This explains a lot," one former official said. "There were things that we thought might have been done by Ames, but we always thought that it was a stretch for Ames to have known about certain programs." Current and former officials say there has been strong suspicion in the intelligence community for several years that the Russians still had at least one high-level agent, possibly more, within the government. But Mr. Hanssen's case is more than just a historical curiosity. As a 25-year F.B.I. veteran who spent most of his career in counterintelligence, Mr. Hanssen had access to a wide array of highly sensitive cases and documents, and the F.B.I. believes he became a frequent user of the bureau's computers to supplement his own knowledge. The F.B.I. director, Louis J. Freeh, said he was troubled that a hostile agent could go undetected for 15 years, while using internal computer systems to protect himself and gain access to sensitive material. Mr. Freeh is reviewing internal security procedures to determine why they failed in this case. According to the government affidavit, Mr. Hanssen volunteered to spy for the Soviet Union in October 1985, just five months after Mr. Ames did, yet he managed to avoid detection for seven years longer. The F.B.I. suggested today that he may have been more successful because his counterintelligence training made him far more knowledgeable about how the F.B.I. detects and catches spies. That training also made him far more careful in his dealings with the Russians. The F.B.I. believes that he never gave the Russians his name or identified his agency. He never even met with his Russian handlers, instead volunteering via letter to a senior K.G.B. officer in Washington. The Hanssen case seems certain to shed light on some of the most celebrated spy cases of the final years of the cold war, cases which many believed were already settled history. Most notably, Mr. Hanssen, officials say, corroborated some of the information that Mr. Ames was providing to the K.G.B., which certainly would have increased Moscow's confidence in the secret material it was receiving from both agents. The government says Mr. Hanssen revealed to the K.G.B. that two of its own officers serving in Washington in the mid-1980's, Valery F. Martinov and Sergei M. Motorin, were working for the F.B.I. In addition, he revealed that Boris Yuzhin, a Soviet intelligence officer in San Francisco in the late 1970's and early 1980's, had been recruited by the F.B.I. Mr. Ames, who volunteered to spy for the Soviets in April 1985, had also revealed the identities of all three by June of that year, the F.B.I. believes. But now it is clear for the first time that the K.G.B. did not rely solely on Mr. Ames for evidence needed to arrest those officers. Mr. Hanssen is suspected of identifying the three K.G.B. agents in October 1985. Mr. Motorin and Mr. Martinov were tried and executed, with Mr. Martinov being lured back to Moscow in November 1985, when he was asked to serve as a member of an honor guard escorting a K.G.B. officer, Vitaly Yurchenko, home after his defection to the United States and his redefection to the Soviet Union. Mr. Yuzhin was arrested in December 1986, imprisoned and then released in 1992. He has resettled in the United States. Mr. Freeh said at a news conference today that Mr. Hanssen used the F.B.I.'s computers to see whether the bureau's counterintelligence investigators were on to him. Mr. Hanssen's easy access to the F.B.I.'s computer system may be one focus of the F.B.I. review. Mr. Hanssen, the government says, was a prodigious spy. In an espionage career that spanned 15 1/2 years, the government charges, he wrote 27 letters to the K.G.B., later the S.V.R., and handed over some 6,000 pages of documentary material. Those documents contained a wide array of United States secrets, the government says, including information about the F.B.I.'s double- agent program, future American intelligence requirements and an assessment of the K.G.B.'s efforts to spy on American nuclear programs. The government charges that he also turned over a top-secret F.B.I. review of information from defectors about Soviet infiltration of the intelligence community. In addition to compromising sensitive technical intelligence operations against the Russians, the affidavit states, Mr. Hanssen betrayed the techniques the F.B.I. used to keep track of Soviet and Russian officers in the United States. For most of the last five years, Mr. Hanssen was the F.B.I.'s chief representative at the State Department, but F.B.I. officials do not believe those were his most productive years as a spy. They do not believe, for example, that he was involved in the Russian operation to plant a listening device in a State Department conference room. The affidavit went on to describe actions that seemed to implicate Mr. Hanssen. In a letter to his Russian handlers in June that was reprinted in the affidavit, Mr. Hanssen made it clear he wanted to be of greater help. He told the Russians that he needed a faster and more secure means of communicating with them, perhaps with a new Palm VII organizer with wireless Internet capability. If he had a faster way to contact the Russians, the letter states, he might have been able to warn Moscow that a listening device had been found at the State Department. "Such matters are why I need rapid communications," the reprinted letter states. "It can save you much grief." At the State Department, Mr. Hanssen may have been out of the daily flow of the most sensitive counterintelligence operations, but he still attended weekly staff meetings of the F.B.I.'s national security division, officials said. The period when Mr. Hanssen had the potential to do his greatest damage came earlier. He volunteered to the K.G.B. while assigned to the F.B.I.'s intelligence division in New York, where he was a supervisor of a counterintelligence squad. Just before he is said to have sent his letter to the Russians, he was a supervisory agent in the intelligence division at F.B.I. headquarters, where he was on a panel dealing with technical projects used by the bureau in counterintelligence. While the F.B.I. did not identify those projects in its affidavit, they may have involved sophisticated electronic means to monitor K.G.B. officers serving in the United States. >From 1987 through 1990, Mr. Hanssen was a supervisor in the F.B.I.'s Soviet analytical unit, and later a program manager in the intelligence division's Soviet operations unit. Perhaps his most sensitive post came in late 1994, when he worked briefly in the office of the F.B.I.'s assistant director for national security, the official in charge of all bureau intelligence operations. That posting came just months after Mr. Ames's arrest, and was at a time when the F.B.I. was gaining the upper hand over the C.I.A. in their long-running war for control over counterintelligence. Former United States intelligence officials noted that after the Ames case, the F.B.I. gained the right of "full visibility" into the C.I.A.'s Russian operations, a move intended to allow the agencies to work jointly and quickly to catch spies. It is unclear whether Mr. Hanssen's espionage benefited from that policy shift. Officials indicated today that Mr. Hanssen was, in turn, betrayed by another spy. They said that late last year a source provided the United States with Russian documents that pointed to Mr. Hanssen. The affidavit released today provided a remarkably detailed account of his career as a Russian agent, information that seemingly could come only from old K.G.B. files. Those Russian documents revealed to the F.B.I. that Moscow did not know Mr. Hanssen's real name ≠ he gave them only code names ≠ and may have learned it only after his arrest. In the past, other spies have worked anonymously as well. For example, Sergei Vorontsov, a K.G.B. officer in Moscow, volunteered to work for the C.I.A. without identifying himself. American intelligence officers did not learn his identity until he was arrested in 1986. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2546 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:54pm Subject: FBI spy case highlights insider threat to corporate data FBI spy case highlights insider threat to corporate data http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO57889,00.html By DAN VERTON (February 21, 2001) A career FBI agent with significant experience and access to FBI IT systems was charged yesterday with spying for Russia since 1985, in what FBI Director Louis Freeh has called the worst case of insider espionage in FBI history. The agent, Robert Phillip Hanssen, is accused of giving Russian intelligence agents highly classified documents and divulging details about American intelligence sources and electronic surveillance operations. In exchange, he allegedly received an estimated $1.4 million in cash and diamonds. According to a 100-page affidavit filed in the U.S. District Court in Alexandria, Va., Hanssen used his access to the FBI's Electronic Case File system, which contains classified information about ongoing FBI investigations, to check if the FBI had been alerted to his activities. Although Hanssen and his Russian handlers relied heavily on traditional spying methods, such as dead drops for exchanging packages anonymously, the case is being touted by the FBI and IT security experts as a harsh lesson in a growing threat to corporate data by insiders. "In short, the trusted insider betrayed his trust without detection," said Freeh, during a press conference yesterday. "He constantly checked FBI records for signs that he and the drop sites he was using were being investigated." Freeh has since ordered that a special panel be formed to review all FBI processes and systems and to study the issue of insider abuse. "The most important lesson to be learned from this incident is that most security breaches are the work of insiders, not outsiders," said Richard Hunter, a security analyst at Stamford, Conn.-based Gartner Group Inc. "This incident is not about cybercrime or hacking per se, but historically, the vast majority of cybercrimes are committed by insiders," said Hunter, who is also a former analyst at the National Security Agency. "Security is not mainly about software or biometrics. First and foremost, it's about people and policies." According to a recent survey of 359 companies by the FBI and the Computer Security Institute (CSI), companies lost more than $50 million in 2000 as a result of unauthorized insider access and insider abuse of IT systems. And while 38% of companies in the FBI/CSI survey reported between one and five incidents of insider abuse, 37% of companies said they didn't know how many security breaches related to insiders had taken place. Hanssen, an expert in counterintelligence methods at the FBI, was detailed to the New York Field Office's intelligence division in 1979 to help establish the FBI's automated counterintelligence database in that office. Investigators characterized Hanssen as having a "high degree of computer technology expertise." Although Hanssen was arrested while dropping off classified hard-copy documents at a predetermined location for his Russian handlers, he made extensive use of computer media, such as encrypted floppy disks, removable storage devices and a Palm II handheld computer, to communicate with Russian intelligence officers, according to the affidavit. In fact, he provided as many as 26 encrypted floppy disks during the course of his espionage activities, it said. The lesson for corporate America "is that companies tend to gain a false sense of security from strong perimeter security," such as firewalls and intrusion detection systems, said Eric Friedberg, a former computer and telecommunications crime coordinator at the U.S. Attorney's Office in New York. "What goes on behind the firewall can be even more damaging because of the degree of access insiders have." Friedberg is now a computer crime consultant at Stroz and Associates, a New York firm founded by Ed Stroz, the former head of the FBI's New York Computer Crimes Squad. During the past six months, Stroz and Associates has worked with half a dozen companies that have been victimized by insiders, said Friedberg. Those cases involved everything from deleted files to trade secrets that were mailed to unauthorized parties and cases where individuals set up competing businesses on the company's own server without the company's knowledge, he said. One way companies can protect themselves from insider abuse is to focus on what their networks can tell them about what is going on inside the company, said Friedberg. He recommended that companies look into artificial intelligence-enabled security software that can tip administrators off to "anomalous activity" on the network. "At the end of the day, all of our systems probably need to be looked at and maybe improved," said FBI Director Freeh. "But at the end of the day, what we rely upon is honest people." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2547 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:56pm Subject: FBI builds case on paper trail FBI builds case on paper trail http://www.detnews.com/2001/nation/0102/21/a05-191021.htm Associated Press FBI agents load computers that were removed from FBI agent Robert Philip Hanssen's home in Vienna, Va., Tuesday. http://www.detnews.com/pix/2001/02/21/a05spy2.jpg By Larry Margasak / Associated Press WASHINGTON -- The government's case against FBI agent Robert Philip Hanssen seems like reality imitating art, spy novel material that includes executed double-agents, package drops along park footbridges and payments in diamonds. All going on for 15 years. Hanssen, 56, only the third FBI agent ever accused of spying, was accused Tuesday of espionage and conspiracy to commit espionage. In one of many letters quoted in an FBI affidavit, Hanssen was alleged to have written to his Russian handlers on Nov. 17, 2000, of his possible fate if caught: "Recent changes in U.S. law now attach the death penalty to my help to you as you know, so I do take some risk." The allegations of a Hanssen relationship with the Soviet KGB intelligence agency and its successor, the SVR, included both bizarre and lighter moments. There was contact through use of a newspaper ad purporting to sell a 1971 Dodge that "needs engine work," the FBI affidavit said. When the KGB asked how Hanssen would explain the diamonds he received, the agent was ready to tell everyone they came from his grandmother, it said. In a Dec. 25 message from the Russians, the American was offered "Christmas greetings from the KGB," according to the documents. And to show appreciation in another instance, the Russians were said to have quoted poetry: "What's our life, if full of care. You have no time to stop and stare?" According to the FBI, Hanssen's spying began with an Oct. 1, 1985, letter to a KGB official in the United States. "Soon I will send a box of documents. ... They are from certain of the most sensitive and highly compartmented projects of the U.S. intelligence community," wrote the man the Russians knew as "B." "I believe they are sufficient to justify a $100,000 payment to me," Hanssen allegedly said in the letter included in the affidavit. Mostly using footbridges at parks in Washington's Virginia suburbs, the FBI alleged, Hanssen would signal the Russians of a package drop with a vertical white adhesive tape, and the Russians would respond with a piece of horizontal adhesive tape. All this was playing well in Moscow, where in 1989 the KGB officers involved in the operation allegedly involving Hanssen won the highly coveted Order of the Red Banner, Order of the Red Star and the Medal for Excellent Service. But the FBI said that by last March, a Hanssen letter to the Russians showed a man in despair. "I have come about as close as I ever want to come to sacrificing myself to help you, and I get silence," Hanssen allegedly wrote. "I hate silence. ... Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2548 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:58pm Subject: Profile: Unassuming double agent? Wednesday, 21 February, 2001, 14:16 GMT Profile: Unassuming double agent? http://news.bbc.co.uk/hi/english/world/americas/newsid_1182000/1182034.stm Robert Philip Hanssen, the FBI agent accused of spying for Russia, was just a few years off retirement at the time of his arrest. He may have felt reasonably confident that he had successfully fooled the intelligence organ of the most powerful country in the world. According to the FBI, over the years he had received over $1.4m in cash, diamonds, and money paid into Russian accounts - enough for him and his family to live in the lap of luxury for the rest of his days. However, Mr Hanssen's lawyer said that "at this point" the suspect planned to plead not guilty to any charges brought against him. After 15 years of allegedly working as a double agent, there were few signs of this cloak-and-dagger existence. He lived in a modest four-bedroom house in a suburb of Virginia, with his wife and six children. The family attended Sunday mass every week, driving to church in a 10-year-old van. Friends and neighbours were shocked by his arrest, describing him as quiet and unassuming. "I never saw them flaunt anything, any kind of wealth," one neighbour, Nancy Powell, told the Washington Post. Motivation Officials investigating the case will want to know what may have motivated a highly intelligent and successful agent to risk his life. Was it the allure of money and diamonds? Was it ideological conviction? Or was there something in his personality that was attracted to subterfuge and the life of the double agent? Letters and documents contained in an FBI affidavit suggest that Mr Hanssen was not overly interested in financial gain. "As far as the funds are concerned, I have little need for more than the $100,000" said a letter apparently written by Hanssen to the Russians. "It merely provides a difficulty since I cannot spend it, store it or invest it easily without tripping 'drug money' warning bells." "Perhaps some diamonds as security to my children and some goodwill would be better," it said. Secret life In another letter Mr Hanssen apparently reveals that he had been attracted to a life of espionage since he was a teenager, and was inspired by the British spy, Kim Philby. "I decided on this course when I was 14 years old," he wrote to his Russian handlers, according to the affidavit. Mr Hanssen grew up in Chicago, and went on to study chemistry, maths and Russian at Knox College in Illinois. His acquaintances described him as aloof, but otherwise a "regular guy". He is said to be a strict father, who limits television watching and walks his dog at night. He is also said to be a member of the Opus Dei, a secretive and conservative Roman Catholic order. 'Intelligent but arrogant' Mr Hanssen joined the FBI in 1976, rapidly moving up the ranks until he became a supervisory special agent in the Soviet Analytical Unit at the agency's Washington headquarters in 1987. His colleagues at the FBI described him as extremely intelligent, but with a tendency towards arrogance. "He was bright and he knew he was bright," said Richard Alu, a fellow FBI agent who is now a security consultant. "He was kind of arrogant about it." But he always took great care not to reveal his identity - and, according to court documents, never met his Russian handlers - showing he did not take risks lightly. US officials said it was that kind of caution and inside knowledge that allowed Hanssen to operate as a mole for 15 years. But the FBI said that by last March, a Hanssen letter to the Russians showed a man in despair. "I have come about as close as I ever want to come to sacrificing myself to help you and I get silence," Mr Hanssen allegedly wrote, after the Russians failed to respond to one of his signals. "I hate silence. ... Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal." -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2549 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:55pm Subject: Virginia Woods Hold Spy Secrets Virginia Woods Hold Spy Secrets http://www.guardianunlimited.co.uk/breakingnews/US/0,3560,747858,00.html Wednesday February 21, 2001 11:50 pm VIENNA, Va. (AP) - The FBI agent accused of spying for Moscow did his stealthy work along picturesque footbridges crossing serpentine streams, the government says. Still, he did not seem to appreciate the bucolic break from the office. ``Recognize that I am dressed in business suit and can not slog around in inch deep mud,'' the FBI says Robert Hanssen complained to his Russian handlers, who never seemed to tire of finding new parks for their mole. ``I am not a young man,'' he is said to have reminded his contacts on another occasion. Northern Virginia, with some of the country's worst traffic congestion, is also studded with parks and nature trails that provide respite from the suburban buzz. The FBI says they also became transfer sites for some of the nation's top secrets over the 15 years Hanssen is accused of spying. ``There is a lot of history here other than the monuments and the museums,'' said Paul Moore, a counterintelligence specialist who once worked with Hanssen. ``When a spy looks out at the terrain, he sees a little different picture. He sees features that he can use in his work.'' At least a dozen parks are identified as dead-drop locations in the FBI's thickly detailed affidavit, which purports to quote directly from correspondence between the handlers and their source. Although Hanssen is quoted as grousing about distant sites and excessive mud, most of his alleged moonlighting went on in easily accessible, if secluded, places. It was not an Outward Bound expedition by any means. Key locations were just minutes by car from two homes Hanssen and his family lived in during two stints since 1981 in Virginia's Fairfax County. Indeed, the FBI agent told Russian handlers the best places to leave classified information - and collect money and diamonds in payment - were not the most hidden ones, according to the documents. ``Can be actually more secure in easier modes,'' he is said to have written in September 1987. The parks were code named: An (as if for Ann), Bob, Charlie, Doris, Ellis, Flo and so on. A look at the parks where the espionage is alleged to have begun in 1985 and ended Sunday, with activities and correspondence as described in the government's case: NOTTOWAY PARK: Code named simply Park and, later, Prime, Nottoway is half a mile down Lemontree Lane from the home Hanssen lived in during the 1980s. Soccer fields, tennis courts and nature trails abound. After sending the KGB material by mail, Hanssen proposed the first dead drop - a delivery left for someone to pick up without the two meeting. The drop was to be $50,000 in payment for the mailed secrets. He put a vertical piece of white tape on a signpost to signal he was ready to receive the package. The KGB put up a horizontal piece to signal the drop was made. Then him again, another vertical mark to show he had picked it up. ``Remove old tape before leaving signal,'' he instructed. Some drops at the park were botched. One time, the KGB mistakenly placed a package under the wrong corner of the footbridge. On another occasion, in 1988, a KGB agent arrived at 9:03 p.m., three minutes after the end of the prearranged drop period. The agent saw a man who had removed the white tape get in his car and drive away. On Wednesday, park employees said they do not take notice of visitors unless they are playing music too loudly or doing something obscene. Taking advantage of the park's new notoriety, a radio station set up a promotion in the parking lot, giving away lottery tickets. A man walking a dog brandished a bag and joked he had found more secrets. Actually, it was a bag of dog poop. --- FOXSTONE PARK: Code named Ellis, Foxstone is a narrow strip of woodland tracking a stream less than two miles from the Hanssens' current home. A winding, paved path crosses a road and two wooden footbridges, one open and a stone's throw from the road, the other, more tucked away and bordered by thick bramble. Here, a package from the Russians containing $55,000 sat for three days, uncollected, before they retrieved it themselves. Another drop was made five days later. Eleven days after that, Hanssen gave the signal he had picked it up. ``I say bear with me on this,'' Hanssen said in a ``Dear Friends'' letter lamenting the lonely nature of his work, ``because you must realize I do not have a staff with whom to knock around all the potential difficulties. (For me breaks in communications are most difficult and stressful.)'' On Dec. 12, he drove by four times on the road that dissects the path. It was a ``signal site'' where white tape would indicate a drop. On Dec. 26, he drove by three times in the evening, stopped with a flashlight to look around, and ``turned and walked away, shrugging his shoulders and raising his arms in a gesture of apparent disgust or exasperation,'' the FBI said. On Sunday, the FBI arrested him at the site and found a stash of classified material in a garbage bag under one of the footbridges. The FBI said he had put it there nine minutes earlier. --- LONG BRANCH NATURE CENTER About 14 miles closer to Washington, in Arlington County, the nature center is the most tucked-away of the three parks even though it is just one mile from a six-lane highway. Popular with children, it offers nature hikes for tots year-round, family campfires and, in season, gardens for ferns, butterflies and more. The Russians and their source called it Lewis. On Feb. 12, the FBI found a package under the corner of the stage of an outdoor amphitheater where children scamper, hunting for nature souvenirs. The FBI analyzed it, found $50,000 in it, photocopied material from it, and quietly put it back, keeping it under surveillance until Hanssen's arrest. ``I was sitting right next to a bag of money,'' a park employee said Wednesday, clasping his head with his hands. ^--- On the Net: FBI: http://www.fbi.gov -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2550 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:58pm Subject: Full text of Hanssen affidavit Full text of Hanssen affidavit http://www.fbi.gov/pressrm/pressrel/pressrel01/affidavit.pdf -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2551 From: James M. Atkinson, Comm-Eng Date: Wed Feb 21, 2001 6:59pm Subject: FBI Calculates Spy Damage FBI Calculates Spy Damage http://dsc.discovery.com/news/ap/20010220/spy2.html Associated Press, Copyright 2001 Wed. 21, 2001 ≠ The FBI is trying to calculate the national security damage allegedly wrought by one of its own agents, Robert Philip Hanssen, accused of spying for Russia for more than 15 years. FBI Director Louis Freeh says the intelligence losses appear to be ``exceptionally grave.'' An FBI affidavit describing Hanssen's alleged spying said he passed along to Soviet and later Russian agents 6,000 pages of documents ≠ a virtual catalogue of top secret and secret programs. The case marked the third time that an FBI agent has been accused of espionage, and it brought a quick reaction from President Bush and members of Congress on Tuesday. ``Allegations of espionage are a reminder that we live in a dangerous world, a world that sometimes does not share American values,'' Bush said in a statement he read to reporters on Air Force One. Declaring that espionage remains a threat to the nation even with the Cold War gone, the president added: ``To anyone who would betray its trust, I warn you, we'll find you and we'll bring you to justice.'' ``This could be a very, very, very serious case of espionage,'' said Sen. Richard Shelby, R-Ala., chairman of the Senate Intelligence Committee. ``Here's an agent who is a veteran of the FBI, who's been doing counterintelligence for a long time. He knows a lot. He could have given them a lot.'' Freeh told a news conference: ``The full extent of the damage done is yet unknown, because no accurate damage assessment could be done during the course of the covert investigation without jeopardizing it. We believe, however, that it was exceptionally grave. The criminal conduct alleged represents the most traitorous actions imaginable against a country governed by the rule of law.'' Freeh said security measures need to be tightened, and he ordered an internal review to be headed by William Webster, a former FBI and CIA director. ``We don't say, at this stage ... that we have a system that can prevent this type of conduct,'' Freeh said. Hanssen, a 25-year FBI agent, was arrested Sunday night at a park in suburban Virginia after dropping a package of documents for his Russian contacts, authorities said. FBI agents confiscated $50,000 hidden for him at a nearby drop site. An FBI affidavit alleged that Hanssen betrayed his country for about $1.4 million in cash and diamonds. A court hearing was set for March 5 for the father of six, who was charged with espionage and conspiracy to commit espionage. Hanssen, who could face the death penalty, appeared briefly in U.S. District Court in Alexandria, Va., on Tuesday to have the charges read and was ordered held without bond. He was not asked how he pleaded to the charges but outside the courthouse his lawyer, Plato Cacheris, told reporters: ``At this point, not guilty.'' In one letter cited in the FBI's affidavit, the writer, allegedly Hanssen, said he was encouraged by the memoirs of the notorious British-Soviet double agent Kim Philby. ``I decided on this course when I was 14 years old,'' the letter stated. ``I had read Philby's book.'' The FBI affidavit said Hanssen and CIA spy Aldrich Ames identified to the Russians three of their double agents, leading to the execution of two of them. The document also said Hanssen ``compromised dozens of United States government classified documents,'' including those involving: The National Measurement and Signature Intelligence Program, which involves activities and technologies including acoustic intelligence, radar intelligence, nuclear radiation detection, infrared intelligence, radio frequencies and effluent-and-debris sampling. This program is not only classified ``top secret'' but subject to further restricted handling under a category designated ``Sensitive Compartmented Information.'' A highly classified and tightly restricted analysis of the foreign threat to a classified U.S. government program. The program is classified ``top secret/SCI.'' The FBI Double Agent Program, ``top secret.'' The Intelligence Community's Comprehensive Compendium of Future Intelligence Requirements, ``top secret.'' A study on recruitment operations of the KGB, the Soviet/Russian intelligence agency, against the CIA, ``secret.'' An assessment of the KGB's effort to gather information on certain U.S. nuclear programs, ``top secret.'' A CIA analysis of the KGB's First Chief Directorate, ``secret.'' The affidavit said Hanssen also compromised a technical program ``of enormous value'' and ``specific communications intelligence capabilities, as well as several specific targets.'' And he disclosed FBI counterintelligence techniques, sources, methods and operations, the bureau said. He also tipped off the KGB to the FBI's secret investigation of Felix Bloch, a foreign service agent suspected of spying for Moscow in 1989, the FBI said. The KGB was then able to warn Bloch, the agency said. Justice Department prosecutors were never able to find key evidence that Bloch passed secret document -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= From: Dawn Star Date: Tue Feb 22, 2000 11:21am Subject: transformers You better watch out using transformers across phone lines, it is real easy to interfere with the ring cycle and cause all sorts of nasty things to happen. Roger Message: 2 Date: Mon, 21 Feb 2000 12:12:07 -0600 From: Trace Carpenter Subject: Re: switch software manipulation I haven't been in the office much lately, so I haven't followed this tread very closely. Therefore I apologize if this is redundant, however if monitoring the wire pair for audio passage is the problem, you can build a fantastic little interface out of a 1:1 transformer and a non polarized capacitor. Both available at your local RadShk for a couple of bucks. You can even use a three pair RJ surface jack as a project box for the interface. We use them all the time when we're bringing audio from one source to another to keep from getting that nasty hum that you'll often get from dissimilar grounds. In fact we came up with it for use in an East Texas radio station that was having that hum problem with their equipment that they used to put callers on the air. They're cheap, easy and the nice thing is that since the transformer is a 1:1 and the cap is non polarized, there is no wrong way to hook it up and your equipment is totally isolated from the wire pairs. Like I said, I haven't been able to follow this tread lately so if this answer doesn't fit the original question, please accept my apologies. [Non-text portions of this message have been removed] 62 From: Trace Carpenter Date: Tue Feb 22, 2000 0:11pm Subject: Re: transformers Hi Roger, Maybe I didn't make the application clear. The point of the transformer and capacitor is to create an isolation to insure that very thing does not happen. Dawn Star wrote: > From: "Dawn Star" > > You better watch out using transformers across phone lines, it is real easy to interfere with the ring cycle and cause all sorts of nasty things to happen. Roger > > Message: 2 > Date: Mon, 21 Feb 2000 12:12:07 -0600 > From: Trace Carpenter > Subject: Re: switch software manipulation > > I haven't been in the office much lately, so I haven't followed this tread very > closely. Therefore I apologize if this is redundant, however if monitoring the wire > pair for audio passage is the problem, you can build a fantastic little interface > out of a 1:1 transformer and a non polarized capacitor. Both available at your > local RadShk for a couple of bucks. You can even use a three pair RJ surface jack > as a project box for the interface. > > We use them all the time when we're bringing audio from one source to another to > keep from getting that nasty hum that you'll often get from dissimilar grounds. In > fact we came up with it for use in an East Texas radio station that was having that > hum problem with their equipment that they used to put callers on the air. They're > cheap, easy and the nice thing is that since the transformer is a 1:1 and the cap is > non polarized, there is no wrong way to hook it up and your equipment is totally > isolated from the wire pairs. > > Like I said, I haven't been able to follow this tread lately so if this answer > doesn't fit the original question, please accept my apologies. > > [Non-text portions of this message have been removed] > > ------------------------------------------------------------------------ > Shop the web for great deals. Save on Computers, > electronics, Home furnishings and more. > http://click.egroups.com/1/1559/1/_/_/_/951242386/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 63 From: Rex Throttle Date: Thu Feb 24, 2000 2:59am Subject: Blown operation in RSA Almost seems they wanted to get caught. ------ S.African spy chief defends German operation Ellis Mnyandu 02/24/00 CAPE TOWN, Feb 24 (Reuters) - South Africa's intelligence chief has defended a bungled operation to monitor visitors to the German embassy in Pretoria and said his service was well managed. ``As human beings we're fallible and therefore this incident represented an aberration rather than a norm,'' Intelligence Minister Joe Nhlanhla told Reuters. German diplomats last November found a camera in a tree focused on the entrance to their mission in Pretoria. Wires led from the camera to a recording device in a rubbish bin. Nhlanhla's ministry has not given a reason for the embassy operation, but South African newspaper reports said at the time the camera had been part of an operation to counter alleged recruitment of South Africans by the German intelligence. ``(This) is something that happens the world over. It happens with the best in the world. You can hardly be expected to work and somewhere along the road there's no mistake,'' Nhlanhla said. ``The incident of the German embassy I think is behind us now and I don't think it also meant anything out of the ordinary.'' Initially, South Africa denied spying on Germany, its biggest trading partner, but after an inquiry the government acknowledged earlier this month that the embassy had been under official surveillance. The Foreign Affairs Ministry said the ``act was conducted within the scope and framework of duty, it was nonetheless handled in an overzealous manner by an intelligence operative.'' It said Foreign Affairs Minister Nkosazana Zuma and German ambassador Harald Gannf had reaffirmed their commitment to sound relations between Berlin and Pretoria following the probe. Germany is South Africa's most important trading ally, with annual trade volume of around 22 billion rand ($3.5 billion), just ahead of Britain. Its Foreign Minister Joschka Fischer is scheduled to visit South Africa next month. ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com 64 From: Robert C. Motzer <1RCM@M...> Date: Fri Feb 25, 2000 0:12am Subject: Re: Digest Number 191 To everyone on the list: There has been some mention in the last few digests about individual models of electronic telephone systems that do not take kindly to certain pairs being shorted, certain tests being conducted, etc that are tolerated well by most all other systems. I was just wondering if anyone on the list has a somewhat complete compilation of all of these little 'glitches' or knows of a commercial publication containing that information. If not, perhaps the moderator would consent to receiving all of the 'send- ins' from list members and compiling them into another worthwhile reference file on his already excellent resource page. I was just thinking that having the 'finds & mistakes' of others compiled in one place and available when you attack a beast you haven't checked before might save a whole lot of us from some real embarrassment and 2 AM panic every time we check a system that we have never come across before. Just another 'Bob' 65 From: James M. Atkinson, Comm-Eng Date: Fri Feb 25, 2000 6:46pm Subject: Re: Digest Number 191 At 1:12 AM -0500 2/25/00, Robert C. Motzer wrote: >From: "Robert C. Motzer" <1RCM@M...> > >To everyone on the list: > >There has been some mention in the last few digests about individual models >of electronic telephone systems that do not take kindly to certain pairs >being shorted, certain tests being conducted, etc that are tolerated well by >most all other systems. I was just wondering if anyone on the list has a >somewhat complete compilation of all of these little 'glitches' or knows of >a commercial publication containing that information. If not, perhaps the >moderator would consent to receiving all of the 'send- ins' from list >members and compiling them into another worthwhile reference file on his >already excellent resource page. > >I was just thinking that having the 'finds & mistakes' of others compiled in >one place and available when you attack a beast you haven't checked before >might save a whole lot of us from some real embarrassment and 2 AM panic >every time we check a system that we have never come across before. > >Just another 'Bob' Please do not take this the wrong way, as I don't mean to offend anybody. If you do not have a copy of the exact line specification or configuration (from the manuf.) and have not yet received formal training (from the factory) on the specific system you are about the test, then leave it alone (or be prepared to learn a very painful lesson and have embarassing experience). Several years back (around 90-91) a TSCM'er in the DC area blew up a huge brand new AT&T PBX system that had just been installed. He "lit up the PBX" with the "HV Pulse Function" present in the new phone analyser he had just bought (the damage to the PBX was over 14,000 dollars). If you don't have formal training on the PBX system which you are being asked to examine then hand the project off to someone to has. Blowing a fuse is one thing, but blowing out a line card is something your customer will never forget. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 66 From: Intelligence Inc. Date: Sun Feb 27, 2000 1:53pm Subject: Re: X Ray machine for sale Per Mr. Uhrig's comments and x-ray equipment for sale. Please note that in the State of California (and many other states), the operation of ANY x-ray devices require the operator to have a state issued Fluoroscopy license. And the device must be checked out by qualified personnel daily. Lee Lapin Steve Uhrig wrote: > > From: "Steve Uhrig" > > Once upon a midnight dreary, William L. McCrory pondered, weak and weary: > > > The statement, "You also can X ray your own or someone else's > > limbs," is unprofessional and suggests that the writer has little > > familiarity with radiation safety. > > The statement, essentially, is directly from the manufacturer's > literature. > > One *primary* application advertised for the device is realtime > use in sports, to X ray a player directly on the ball field. > > The EMT profession is a major consumer of this precise model > machine. > > > No one should routinely use a portable fluoroscope > > In TSCM one might use it a grand total of 60 minutes a year, in > 15 second increments. > > > They are not magic wands. They cannot find bombs and they > > cannot find "bugs." They can only highlight objects which, to > > the well-trained observer, indicate that further close > > physical or instrumental examination is necessary. > > Don't we all say this to each other about every piece of sweep > equipment, with my soapbox showing quite a bit more wear than > most? > > > Before buying this or any other used fluoroscopic equipment, > > insist that it first be examined by a qualified inspector > > I *said* the things were at the factory for checkout and would > not ship until blessed by them. > > Steve > > ******************************************************************* > Steve Uhrig, SWS Security, Maryland (USA) > Mfrs of electronic surveillance equip > mailto:Steve@s... website http://www.swssec.com > tel +1+410-879-4035, fax +1+410-836-1190 > "In God we trust, all others we monitor" > ******************************************************************* > > --------------------------- ONElist Sponsor ---------------------------- > > Free Valentineís Day Delivery from Petopia.com. > Looking for that pet-perfect Valentineís Day gift? > Click here for free delivery with purchases of $25 or more. > Click Here > > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 67 From: James M. Atkinson, Comm-Eng Date: Sun Feb 28, 1999 11:02am Subject: Vision Next time someone implies that something that is part of your future vision is impossible, improbable or even impractical, remember this list. (And perhaps quote them a favorite selection!) Enjoy the "wisdom of the ages". ************************************************* "Computers in the future may weigh no more than 15 tons." --"Popular Mechanics," forecasting the relentless march of science, 1949. ---------------------------------------------------- "I think there is a world market for maybe five computers." --Thomas Watson, chairman of IBM, 1943. ---------------------------------------------------- "I have traveled the length and breadth of this country... and talked with the best people, and I can assure you that data processing is a fad that won't last out the year." --The editor in charge of business books for Prentice Hall, 1957. ------------------------------------------------------ "But what...is it good for ?" -- Engineer at the Advanced Computing Systems Division of IBM commenting on the microchip, 1968. ------------------------------------------------------ "There is no reason anyone would want a computer in their home." --Ken Olson, president, chairman and founder of Digital Equipment Corp., 1977 --------------------------------------------------- "This 'telephone' has too many shortcomings to be seriously considered as a means of communication. The device is inherently of no value to us." -- Western Union internal memo, 1876. ----------------------------------------------------- "The wireless music box has no imaginable commercial value. Who would pay for a message sent to nobody in particular ?" -- David Sarnoff's associates (NBC) in response to his urgings for investment in the radio in the 1920s. --------------------------------------------------- "The concept is interesting and well-formed, but in order to earn better than a 'C,' the idea must be feasible." -- A Yale University management professor in response to Fred Smith's paper proposing reliable overnight delivery service. (Smith went on to found Federal Express Corp.) ----------------------------------------------------- "Who the hell wants to hear actors talk ?" -- Harry M. Warner, Warner Brothers, 1927. ------------------------------------------------------- "I'm just glad it'll be Clark Gable who's falling on his face and not Gary Cooper." --Gary Cooper on his decision not to take the leading role in "Gone with the Wind." ------------------------------------------------------- "A cookie store is a bad idea. Besides, the market research reports say America likes crispy cookies, not soft and chewy cookies like you make." -- Response to Debbi Fields' idea of starting her company, Mrs. Fields' Cookies. ---------------------------------------------------- "We don't like their sound, and guitar music is on the way out." -- Decca Recording Co. rejecting the Beatles, 1962. ------------------------------------------------------ "Heavier-than-air flying machines are impossible." --Lord Kelvin, president, Royal Society, 1895. ----------------------------------------------------- "If I had thought about it, I wouldn't have done the experiment. The literature was full of examples that said you can't do this." -- Spencer Silver, on the work that led to nthe unique adhesives on 3-M "Post-It" Notepads. --------------------------------------------------------- "So we went to Atari and said, 'Hey, we've got this amazing thing, even built with some of your parts, and what do you think about funding us ? Or we'll give it to you. We just want to do it. Pay our salary, we'll come work for you.' And they said, 'No.' So then we went to Hewlett- Packard, and they said, 'Hey, we don't need you; you haven't got through college yet.'" --Apple Computer Inc. founder Steve Jobs on attempts to get Atari and H-P interested in his and Steve Wozniak's personal computer. ------------------------------------------------------- "Professor Goddard does not know the relation between action and reaction... and the need to have something better than a vacuum against which to react. He seems to lack the basic knowledge ladled out daily in high schools." -- New York Times editorial about Robert Goddard's revolutionary rocket work, 1921. ------------------------------------------------------ "You want to have consistent and uniform muscle development across all of your muscles ? It can't be done. It's just a fact of life. You just have to accept inconsistent muscle development as an unalterable condition of weight training." -- Response to Arthur Jones, who solved the "unsolvable" problem by inventing Nautilus. ------------------------------------------------------- "Drill for oil ? You mean drill into the ground to try and find oil ? You're crazy." -- Drillers who Edwin L. Drake tried to enlist to his project to drill for oil in 1859. ------------------------------------------------------ "Stocks have reached what looks like a permanently high plateau." -- Irving Fisher, Professor of Economics, Yale University, 1929. --------------------------------------------------------- "Airplanes are interesting toys but of no military value." -- Marechal Ferdinand Foch, Professor of Strategy, Ecole Superieure de Guerre. -------------------------------------------------------- "Everything that can be invented has been invented." -- Charles H. Duell, Commissioner, U.S. Office of Patents, 1899. ------------------------------------------------------ "Louis Pasteur's theory of germs is ridiculous fiction." --Pierre Pachet, Professor of Physiology at Toulouse, 1872. --------------------------------------------------------- "The abdomen, the chest and the brain will forever be shut from the intrusion of the wise and humane surgeon." --Sir John Eric Ericksen, British surgeon, appointed Surgeon-Extraordinary to Queen Victoria, 1873. --------------------------------------------------------- "640k ought to be enough for anybody." -- Bill Gates, 1981 --------------------------------------------------------- =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 68 From: Trace Carpenter Date: Mon Feb 28, 2000 4:36pm Subject: Tempo Sidekick 7B For Sale If anyone is interested I ended up with an extra NEW STYLE Sidekick 7B recently that I'd like to sell. If you're not familiar with the Sidekick it is THE test set used by every major telephone company in the United States to troubleshoot twisted pair applications. Additionally, please note that this is the NEW Version which also has AC capabilities as well as the larger display. Not the old squared off unit. Among it's features are a single setup for testing Tip-Ring, Tip Ground, and Ring-Ground testing via a three lead hook-up. Plus your butt set hooks up to the meter which allows you to easily check on and off hook voltages with a single hook up. If you're interested you can see that actual meter at http://counterspies.com/sidekick I've also included a link to the manufactures page. The unit sells new through Power Telephone Supply for $670.00. I have found them used through Schultz for $400.00. I'm asking $285.00 for this one and will pay the shipping in the Continental U.S. Thanks -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 69 From: Dawn Star Date: Tue Feb 29, 2000 5:37pm Subject: 2.4 GHz On a recent sweep I ran into a Siemens Gigaset cordless digital 2420 phone system (2.4 GHz). http://www.ic.siemens.ca/prod/2420more.htm http://www.ic.siemens.ca/prod/2420.htm http://www.siemenscordless.com/cordless/userguide/AppendixD.html http://www.siemenscordless.com/cordless/faqs.html http://www.siemenscordless.com/about/resources/digcord.html The system uses time division duplexing and time division multiple access. It uses digital voice coding and frequency hopping spread spectrum, (100 hops per second). Also adaptive differential pulse code modulation. Voice sampling bit rate of 32kbps. To make a long story short, this damn thing is almost invisible to a spectrum analyzer and keeps a frequency counter spinning. Has anyone tried the REI VBA-2400 video booster antenna, claims to give 20 db of gain @ 2.4 Ghz http://www.research-electronics.com/brochures.htm click under oscor. I wonder it this might help? Any suggestions, if we cant see these puppies we are in big trouble! Roger [Non-text portions of this message have been removed] 70 From: James M. Atkinson, Comm-Eng Date: Tue Feb 29, 2000 6:09pm Subject: Re: 2.4 GHz At 6:37 PM -0500 2/29/00, Dawn Star wrote: >From: "Dawn Star" > >On a recent sweep I ran into a Siemens Gigaset cordless digital 2420 phone >system (2.4 GHz). > >http://www.ic.siemens.ca/prod/2420more.htm > >http://www.ic.siemens.ca/prod/2420.htm > >http://www.siemenscordless.com/cordless/userguide/AppendixD.html > >http://www.siemenscordless.com/cordless/faqs.html > >http://www.siemenscordless.com/about/resources/digcord.html > >The system uses time division duplexing and time division multiple access. >It uses digital voice coding and frequency hopping spread spectrum, (100 >hops per second). Also adaptive differential pulse code modulation. Voice >sampling bit rate of 32kbps. To make a long story short, this damn thing >is almost invisible to a spectrum analyzer and keeps a frequency counter >spinning. Has anyone tried the REI VBA-2400 video booster antenna, claims >to give 20 db of gain @ 2.4 Ghz >http://www.research-electronics.com/brochures.htm click under oscor. >I wonder it this might help? >Any suggestions, if we cant see these puppies we are in big trouble! > >Roger Roger, The Gigasets can be easily detected with a "paper clip antenna" and spectrum analyser a good 50-100 feet away inside of a house or office building. If we add the VBA (which is one hell of a product for the amount they cost) the detection can range can increased to as much as hundred of feet (I can detect them a good 500-800 feet away). For my initial checks of the 2.4 GHz band I start with a "paper clip" (in case something is spitting out hundreds of watts of RF). Once I am certain that I am not going to "poof" my SA I switch to the REI VBA (or my older active crossed log). Once I am happy with the results I move to a high gain waveguide and LNA combo (around 45 dB of gain) to scan 1-18 GHz spectrum in detail. The VBA is handy, battery powered, and small (unlike a 15+ pound waveguide and LNA combo). Couple it with a Radio Shack 2.4 Rcvr, and a small 4" TV and it's single to hunt down 2.4 GHz devices (for less then $1000). If any of the list members are interested, we are offering the VBA at $495.00, and the new OSCOR 21 GHz microwave convertor at only $9,850.00. As a courtesy to list members we will pickup the shipping and handling charges for 2nd day delivery. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 71 From: Charles Patterson Date: Tue Feb 29, 2000 11:05pm Subject: Re: 2.4 GHz You may also be interested that the Siemens Gigaset also has a "room monitor" mode. Not what you might expect, you can leave the handset in a room and it will activate and call the base when it detects sound above a certain level in the room. Can't give up that physical inspection yet! charles ----- Original Message ----- From: Dawn Star To: Sent: Tuesday, February 29, 2000 6:37 PM Subject: [TSCM-L] 2.4 GHz > > From: "Dawn Star" > > On a recent sweep I ran into a Siemens Gigaset cordless digital 2420 phone system (2.4 GHz). > > http://www.ic.siemens.ca/prod/2420more.htm > > http://www.ic.siemens.ca/prod/2420.htm > > http://www.siemenscordless.com/cordless/userguide/AppendixD.html > > http://www.siemenscordless.com/cordless/faqs.html > > http://www.siemenscordless.com/about/resources/digcord.html > > The system uses time division duplexing and time division multiple access. It uses digital voice coding and frequency hopping spread spectrum, (100 hops per second). Also adaptive differential pulse code modulation. Voice sampling bit rate of 32kbps. To make a long story short, this damn thing is almost invisible to a spectrum analyzer and keeps a frequency counter spinning. Has anyone tried the REI VBA-2400 video booster antenna, claims to give 20 db of gain @ 2.4 Ghz > http://www.research-electronics.com/brochures.htm click under oscor. I wonder it this might help? > Any suggestions, if we cant see these puppies we are in big trouble! > Roger > > > [Non-text portions of this message have been removed] > > > ------------------------------------------------------------------------ > Registering a domain name is quick and easy. > http://click.egroups.com/1/1611/0/_/507420/_/951867216/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 72 From: MICROSEARCH Date: Thu Mar 2, 2000 7:49am Subject: X-ray inspections A few days ago someone posted a message about laws requiring the licensing of x-ray units, and the requirement that they be inspected daily. According to section 115085 of the California Health & Safety Code, the frequency of inspection depends on the type of unit. Mammography units require annual inspection, whereas the units used in dental offices require an inspection every five years. I didn't spend a great deal of time on the research, but the only permit and/or licensing requirements I saw related to the medical use of x-ray units. A search on the OSHA web site yielded very little information about x-ray units. The main topic at OSHA concerned reacting to complaints about over exposure. People often overestimate the amount of danger associated with x-ray exposure. The small portable C-arm units are completely safe for use in TSCM work. Best regards, Rick Hofmann, CCO, CPP PI16998 MICROSEARCH - Technical Surveillance Countermeasures - Counterespionage P.O.Box 2084 - Cypress, Ca. 90630 714-952-3812 Fax:714-209-0037 [Non-text portions of this message have been removed] 73 From: James M. Atkinson, Comm-Eng Date: Thu Mar 2, 2000 2:33pm Subject: Voltages As per another list members request: The following is a listing of the various voltages commonly found within residential and business construction, but not including distribution voltages (such as 480 volts, etc). All of the following will typically be found in offices, bathrooms, homes, closets, kitchens, etc located in the U.S. In most residential buildings you will have 120 and 240 VAC commonly used, but in commerical buildings, mansions, (and apartment buildings) you will often find 480 VAC circuits. I have actually performed TSCM at large estates which had a 15,000 volt substation on the property that fed 480 volts into each of the buildings via transformers, which in turn provided 220/240/250V UPS systems and generators, which in turn provided 120 volts for the lighting, power etc. Of course the list does not include "everything" but it is a good place to start. Please feel free to add to the list. Note: Unless you know otherwise; assume that there is 600 volts present (or soon to be present) on all wires you are about to test. Until you know that a lower voltage (and current) is involved consider all conductors to be potentially lethal. Yes, you may have a 30 kHz, 50 mV RF signal present in the Traverse Mode, but it may also be riding on a 480 volt three phase circuit. Remember to check all conductor combination both in relatioship to other conductors, to ground, to free space, and to "other signal paths". ---------- Hard Wired Door Bells and Buzzer Systems 3-6 VDC (usually battery powered) 8-16 VAC (usually transformer powered) 24 VAC (transformer powered) Fluorescent Electromagnetic Ballasts 120 VAC 277 VAC Thermostats and HVAC Controls millivolts (Common with computerized systems) 24-30 VAC (Typical Thermostat) 120 VAC (Typically Baseboard or Similar Radiant Systems) 250 VAC (Typically Baseboard or Similar Radiant Systems) 277 VAC (Typically Baseboard or Similar Radiant Systems) Hot Water Heaters 24 VDC (Typical Thermostat) 24 VAC (Typical Thermostat) 120 VAC 240 VAC CATV 8 - 60 VDC (For Line Repeaters) Telephone (don't get me started) [grin] ...of course your mileage may vary -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 74 From: Warren Wotton Date: Thu Mar 2, 2000 10:59am Subject: Re: Voltages James. A short note from a Electrican; New construction in commercial bldg.s Power crct.s 600-575,208,3phase,120vrecp.s and lights. Higher efficency lighting systems at 347v usually with low voltage relay switching 24v and microprocessor control. At 03:33 PM 3/2/00 -0500, you wrote: >From: "James M. Atkinson, Comm-Eng" > >As per another list members request: > >The following is a listing of the various voltages commonly found within >residential and business construction, but not including distribution >voltages (such as 480 volts, etc). > >All of the following will typically be found in offices, bathrooms, homes, >closets, kitchens, etc located in the U.S. > >In most residential buildings you will have 120 and 240 VAC commonly used, >but in commerical buildings, mansions, (and apartment buildings) you will >often find 480 VAC circuits. > >I have actually performed TSCM at large estates which had a 15,000 volt >substation on the property that fed 480 volts into each of the buildings >via transformers, which in turn provided 220/240/250V UPS systems and >generators, which in turn provided 120 volts for the lighting, power etc. > >Of course the list does not include "everything" but it is a good place to >start. > >Please feel free to add to the list. > > >Note: Unless you know otherwise; assume that there is 600 volts present (or >soon to be present) on all wires you are about to test. Until you know that >a lower voltage (and current) is involved consider all conductors to be >potentially lethal. Yes, you may have a 30 kHz, 50 mV RF signal present in >the Traverse Mode, but it may also be riding on a 480 volt three phase >circuit. > >Remember to check all conductor combination both in relatioship to other >conductors, to ground, to free space, and to "other signal paths". > >---------- > >Hard Wired Door Bells and Buzzer Systems > > 3-6 VDC (usually battery powered) > 8-16 VAC (usually transformer powered) > 24 VAC (transformer powered) > > >Fluorescent Electromagnetic Ballasts > > 120 VAC > 277 VAC > > >Thermostats and HVAC Controls > > millivolts (Common with computerized systems) > 24-30 VAC (Typical Thermostat) > > 120 VAC (Typically Baseboard or Similar Radiant Systems) > 250 VAC (Typically Baseboard or Similar Radiant Systems) > 277 VAC (Typically Baseboard or Similar Radiant Systems) > > >Hot Water Heaters > > 24 VDC (Typical Thermostat) > 24 VAC (Typical Thermostat) > > 120 VAC > 240 VAC > > >CATV > > 8 - 60 VDC (For Line Repeaters) > > >Telephone > > > (don't get me started) [grin] > > > >...of course your mileage may vary > >-jma > > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > > > >------------------------------------------------------------------------ >GET A NEXTCARD VISA, in 30 seconds! Get rates as low as 2.9% >Intro or 9.9% Fixed APR and no hidden fees. Apply NOW! >http://click.egroups.com/1/936/0/_/507420/_/952029409/ >------------------------------------------------------------------------ > >======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: >http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... >=================================================== TSKS > > Warren Wotton Contact: Brandon University Wotton@B... 270-18th Street 204-727-9665 Brandon,Manitoba CANADA R7A 6A9 CONFIDENTIALITY NOTICE: This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient you are hereby notified that any dissemination, distribution or copying of this transmission is prohibited. If you have received this transmission in error, please notify us immediately by return E-mail or by telephone at 204-727-4475 and destroy the transmission by deleting the file and/or shredding any paper copy. 75 From: Mike F. Date: Fri Mar 3, 2000 6:29pm Subject: VOLTAGES,commercial & residential The voltages found in most residential systems,is a single phase Edison system.You can get 240 volt for say a dryer circuit from this type of system. In a lot of commercial building you will have the above configuration and then you will have the 480 volt 3 phase panel(s). This being used for large air conditioners and othe equipment with motors. On the 3 phase you get 480 volt phase to phase,A-PHASE,B-PHASE,& C-PHASE. So you can get 480volt from A TO B,A TO C,AND B TO C. In the panel you will have ground bar which we'll call G. 277 volt phase to ground.So for 277volt A TO G,B TO G,C TO G. It would be more accurate to use a Nuetral,therefore it is really, A TO N,B TO N,C TO N for your 277volts, The 277 voltage is used primarily in Lighting systems. later4,mike fiorentino 76 From: Jay Coote Date: Fri Feb 4, 2005 3:40pm Subject: Panasonic Phone Switch Assistance Has anyone looked into the vulnerabilities of a Panasonic KX-T123211D switching system? It looks as if remote and on-site programming can be accomplished. Remote programming (per their badly written manual) looks like PC-programmable via modem and generic comm software or dumb terminal and modem. There is a SYSTEM switch marked EIA (local programming) SET for remote programming and PITS (they don't say what PITS is for). I would like to eliminate any back door programming or lines, as well as cut out the programming features and change the access code. "RTFM" Thanks, Jay ˇ 77 From: Charles Patterson Date: Fri Mar 3, 2000 11:47pm Subject: Re: Panasonic Phone Switch Assistance Hi Jay, You are mostly correct. The 123211D can be programmed remotely as long as it has the required cards installed in it. If you have looked inside the cabinet, the cards used for remote programming will be in the upper shelf. The first card needed is the KXT123291, DISA card, the second card needed is the KXT123296 modem card. If the modem card is not there, then remote programming cannot be done. There may also be a remote diagnostic card: KXT123295, or a second DISA card KXT123292. The DISA cards provide "Direct Inward System Access" - the ability to dial in from outside and reach another extension directly, but they do not provide any remote programming capability by themselves. The modem card is required. Most installers do not use remote programming on this system. The switch on the side selects programming by direct rs232 connection (EIA) or PITS which is Panasonics fun anacronim for "proprietary integrated telephone set" (they love weird letter combinations). PITS programming means programming by the telephone set. The set plugged into the lowest numbered jack (usually 101) becomes a programming phone when the switch is thrown. When the switch is in EIA mode I believe it basically shuts down the phone system for direct connect programming (RS232), so that is not used very often either. hope this helps! Charles Charles Patterson communications@c... Global Communications Tarrytown, NY http://www.telephonesecurity.com ----- Original Message ----- From: Jay Coote To: Sent: Friday, March 03, 2000 8:59 PM Subject: [TSCM-L] Panasonic Phone Switch Assistance > > From: "Jay Coote" > > Has anyone looked into the vulnerabilities of a Panasonic KX-T123211D > switching system? It looks as if remote and on-site programming can be accomplished. Remote programming (per their badly written manual) > looks like PC-programmable via modem and generic comm software > or dumb terminal and modem. There is a SYSTEM switch marked EIA > (local programming) SET for remote programming and PITS (they don't > say what PITS is for). > > I would like to eliminate any back door programming or lines, as well > as cut out the programming features and change the access code. > > "RTFM" > > Thanks, > Jay > ˇ > > ------------------------------------------------------------------------ > MAXIMIZE YOUR CARD, MINIMIZE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2122/0/_/507420/_/952135149/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > 78 From: Miguel Puchol Date: Sun Mar 5, 2000 5:44pm Subject: RE: 2.4 GHz Hi all, > The Gigasets can be easily detected with a "paper clip antenna" and > spectrum analyser a good 50-100 feet away inside of a house or office > building. Just to add some comments on the Gigaset question. I own a couple of them, and they are great cordless phones. Regarding detection, it must be said that the DECT standard states, and you will find this in some Gigaset manuals, that the phones use 120 duplex channels, between 1880 and 1900 MHz in 1728 kHz channel steps. Binary speed of each slot within a channel is 1152 kbit/s, with an average power output of 10 mW. The signal can be easily be picked up by a decent scanner (AR5000 for example) by scanning 1880 MHz up in steps of 1728 kHz. If anybody is interested in knowing what they sound like, I can record some audio and send it across, let me know. Cheers, Mike 79 From: Dawn Star Date: Sat Mar 11, 2000 6:11pm Subject: The Passing of Norman Perle I would like to take a moment of your time to talk about my friend, Norman Perle. He passed to the Spirit World on February 19, 2000 while at a security convention in California. He was 61 years old. I met Norman back in 1973 when I first started in counter-measures. There were only three people doing bug sweeps in Los Angeles at that time: Norm, a fellow named Sergio Borquez and myself. When I attempted in those early days to contact Norm, he was reluctant to talk and was very secretive about his business and techniques. At that time he had an office in a high-rise building off of Hollywood Blvd. As the years went by and he realized that there was plenty of business for everybody, he became more friendly. Eventually, we started sharing information on devices that were found and techniques that we were developing with the TDR, which at that time was brand new. Somewhere in the late '70's Norman decided to shift his focus to being an expert in the area of audiotape verification. He became an expert witness in this area and certainly one of the best-known in all of the country. If my memory serves me right, he worked on the Nixon tapes. In the past 10 years or so, when I had visited him at his home office in Northridge, it was kind of like going to Dr. Frankenstein's laboratory. His lab was filled from floor to ceiling with stacks of technical information, test equipment, and associated components. There was barely room to walk yet he seemed to know where everything was. He at that time showed me some of the advance technology and techniques of micro-photographing of audio images. I would like to honor my friend at this time by telling one of our shared bug-sweep stories. Some years ago, I was in Las Vegas sweeping some gambling casinos. I got an emergency call from Los Angeles from a noted civil rights attorney. Some Palestinian people had been arrested by the federal government and charged with terrorism. This attorney thought that the federal government was bugging the phones at the defense attorney's offices. The circumstances of the case were that the Arab Defense League had set up a defense team for these men that were charged at an existing attorney's office in West Los Angeles. After about a week, or ten days, the activity became too much to handle at this office. So the defense team was moved across town to an office in Hollywood. The first day that the new telephone lines were operational in the new Hollywood office, the secretaries found that they were talking to the secretaries at the old office across town. The lines in both locations were cross-connected. The government, after discovering that the office had moved, had also moved their wiretaps to the trunks of the new location but had forgotten to lift the taps at the old location. This led to the lines at both offices being crossed. I called Norman and told him that I couldn't get back fast enough for this situation and asked him if he could handle it in my place. He took off right away to the attorney's office. He was able, in a matter of hours, to get the technical evidence to support this finding. The defense team immediately went to federal court with a discovery order for a wiretap on legal counsel's lines. The federal judge was outraged and ordered the government to show cause. Within a short period of time, all charges against the defendants were dropped and the men were set free. I am grateful for Norman doing excellent work for me in my absence. He was an extremely dedicated and meticulous individual. He did whatever it took to the 'nth' degree to present the best evidence possible. Norman is survived by his wife Barbara Perle and their two children. Barbara asks that anyone that would like to could make a donation in Norman's name to the American Diabetes Society. Barbara can be contacted by mail at Barbara Perle, 8357 Shirley Avenue, Northridge CA 91324. Norman, you will be greatly missed and hopefully we will aspire to do the quality work that you did when you were on the frontline. Thank you for being my friend for so many years. Roger Tolces [Non-text portions of this message have been removed] 80 From: Michael Martz Date: Sun Mar 12, 2000 2:19pm Subject: For Sale: Kaiser SCD5 Hello, I have an unused new in box Marty Kaiser SCD5 Carrier Current detector for sale for $200 if anybody needs one. The battery powered SCD5 detects VLF (10 KHz to 700 KHz) carrier-current signals on AC power or telephone lines. The unit is supplied withdetector/amplifier assembly, AC and telephone input cables (both protected to 400 volts DC or 50/60 Hz AC) and headset. Please email for any questions. Thanks, MM 81 From: James M. Atkinson, Comm-Eng Date: Fri Mar 17, 2000 3:47pm Subject: Larry LaPrise There was recently a great loss in the entertainment world this week. Larry LaPrise, the Detroit native who wrote the song "Hokey Pokey", died recently at the age of 83. It was especially difficult for the family. They had trouble keeping him in the casket. They'd put his left leg in and, well... you know the rest. Happy St. Patties Day -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 82 From: Brown & Sikes Date: Fri Mar 17, 2000 6:48pm Subject: Re: For Sale: Kaiser SCD5 Michael; Sorry, just got around to looking over the e-mails. Is the c/c detector still available? Let me know. Thanks Martin Brown brnsike@s... Michael Martz wrote: > From: Michael Martz > > Hello, > > I have an unused new in box Marty Kaiser SCD5 Carrier Current > detector for sale for $200 if anybody needs one. > > The battery powered SCD5 detects VLF (10 KHz to 700 KHz) > carrier-current signals on AC power or telephone lines. The unit is > supplied withdetector/amplifier assembly, AC and telephone input > cables (both protected to 400 volts DC or 50/60 Hz AC) and headset. > > Please email for any questions. > > Thanks, > > MM > > ------------------------------------------------------------------------ > DON'T HATE YOUR RATE! > Get a NextCard Visa, in 30 seconds! Get rates as low as > 0.0% Intro or 9.9% Fixed APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/2120/0/_/507420/_/953072859/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS 83 From: James M. Atkinson, Comm-Eng Date: Mon Mar 20, 2000 1:28pm Subject: Massachusetts Driving Rules [Humor] Massachusetts Driving Rules [Humor] 1. A right lane construction closure is just a game to see how many people can cut in line by passing you on the right as you sit in the left lane waiting for the same drivers to squeeze their way back in before hitting the orange construction barrels. 2. Turn signals will give away your next move. A real Massachusetts driver never uses them. Use of them in Boston may be illegal. 3. Under no circumstances should you leave a safe distance between you and the car in front of you, or the space will be filled in by somebody else putting you in an even more dangerous situation. 4. Crossing two or more lanes in a single lane-change is considered "going with the flow." 5. The faster you drive through a red light, the smaller the chance you have of getting hit. 6. Never get in the way of an older car that needs extensive bodywork. Massachusetts is a no-fault insurance states and the other driver has nothing to lose. 7. Braking is to be done as hard and late as possible to ensure that your ABS kicks in, giving a nice, relaxing foot massage as the brake pedal pulsates. For those of you without ABS, it's a chance to stretch your legs. 8. Construction signs warn you about road closures immediately after you pass the last exit before the backup. 9. The new electronic traffic warning system signs are not there to provide useful information. They are only there to make Massachusetts look high-tech and to distract you from seeing the State Police Radar car parked on the median. 10. Never pass on the left when you can pass on the right. 11. Speed limits are arbitrary figures, given only as suggestions and are apparently not enforceable during rush hour. 12. Just because you're in the left lane and have no room to speed up or move over doesn't mean that a Mass driver flashing his high beams behind you doesn't think he can go faster in your spot. 13. Please remember that New Hampshire is the Granite State, named so for a reason. Try to stay on the road. 14. Always slow down and rubberneck when you see an accident or even if someone is just changing a tire. 15. Throwing litter on the roads adds variety to the landscape and gives Adopt-a-Highway Crews something to clean up. 16. It is assumed that State Police cars passing at high speed may be followed in the event you need to make up a few minutes in your travel. 17. Learn to swerve abruptly. Massachusetts is the home of high-speed slalom driving thanks to DOT, which places potholes in various locations to test drivers' reflexes. 18. It is traditional in Massachusetts to honk your horn at cars that don't move the instant the light changes. 19. Seeking eye contact with another driver revokes your right of way, except in Boston where it acts as an invitation to duel or play chicken. 20. Never take a green light at face value. Always look right and left before proceeding. (In Maine it is allowed to stop and then decide which direction to turn.) 21. Remember that the goal of every Massachusetts driver is to get there first, by whatever means necessary. 22. Real Massachusetts female drivers can put on pantyhose, apply eye makeup and balance the checkbook at seventy-five miles per hour during a snowstorm in bumper-to-bumper traffic. 23. Real Massachusetts male drivers can remove pantyhose and a bra at seventy-five miles per hour in bumper-to-bumper traffic during daylight hours. 24. Heavy snow, ice, fog, and rain are no reasons to change any of the previously listed rules. These weather conditions are God's way of ensuring a natural selection process for body shops,junk yards, and new vehicle sales. =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 84 From: James M. Atkinson, Comm-Eng Date: Mon Mar 20, 2000 4:34pm Subject: Estimate Worksheet for TSCM Services Good Afternoon, I will be adding a "Estimate Worksheet for TSCM Services" to my website and would like to solicit opinions (in private) before I make it live. The worksheet (which is still in Draft form) may be found at the following address: http://www.tscm.com/SweepsEstimate.html I have been using a similar estimation worksheet, but would like to offer something the consumer can fill out. Do you think it would be helpful to add a paragraph explaining each block of the worksheet, or should I post it just as it is? Thank You, -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 85 From: Date: Mon Mar 20, 2000 4:55pm Subject: Re: Estimate Worksheet for TSCM Services Greetings. I am of the opinion that your document on pricing is self-explanatory. Maybe a link on each aspect linking to a page that explains the process in detail would be efficacious. Kanbanwa, Erik. http://community.webtv.net/Negative-/Gotterdammerung 86 From: Trace Carpenter Date: Tue Mar 21, 2000 8:46am Subject: Re: Estimate Worksheet for TSCM Services I like the sheet and although it is self explanatory to those of us in the profession, a description might be beneficial to the end customer. If they don't need it, no damage is done. "James M. Atkinson, Comm-Eng" wrote: > From: "James M. Atkinson, Comm-Eng" > > Good Afternoon, > > I will be adding a "Estimate Worksheet for TSCM Services" to my > website and would like to solicit opinions (in private) before I make > it live. > > The worksheet (which is still in Draft form) may be found at the > following address: > > http://www.tscm.com/SweepsEstimate.html > > I have been using a similar estimation worksheet, but would like to > offer something the consumer can fill out. > > Do you think it would be helpful to add a paragraph explaining each > block of the worksheet, or should I post it just as it is? > > Thank You, > > -jma > =================================================================== > Sed quis custodiet ipsos Custodes? > =================================================================== > James M. Atkinson Phone: (978) 381-9111 > Granite Island Group > 127 Eastern Avenue #291 http://www.tscm.com/ > Gloucester, MA 01931-8008 jmatk@tscm.com > =================================================================== > Copyright 2000, James M. Atkinson, All Rights Reserved > > ------------------------------------------------------------------------ > GET A NEXTCARD VISA, in 30 seconds! Get rates > as low as 0.0% Intro APR and no hidden fees. > Apply NOW! > http://click.egroups.com/1/975/0/_/507420/_/953591678/ > ------------------------------------------------------------------------ > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS -- *Trace Carpenter *2926 Maple Ave., Ste. 200 *Dallas, Texas 75201 *214.828.4520; 214.740-0112 Facsimile *Because the fly on the wall might not be the only bug in the room.ô 87 From: Jay Coote Date: Tue Mar 21, 2000 7:47pm Subject: TSCM receivers With the shadow of asinine receiver/scanner laws looming over US security and TSCM persons.... what can one do to obtain a receiver (for legitimate TSCM use) which has not been electronically neutered? It would be just like a 'bugger' to set his/her device to transmit within the coverage gaps of US-market receivers.... Jay Coote TSCM@j... 88 From: James M. Atkinson, Comm-Eng Date: Tue Mar 21, 2000 8:43pm Subject: Re: TSCM receivers At 9:26 PM -0500 3/21/00, Jay Coote wrote: >From: "Jay Coote" > >With the shadow of asinine receiver/scanner laws looming over >US security and TSCM persons.... what can one do to obtain >a receiver (for legitimate TSCM use) which has not been >electronically neutered? >It would be just like a 'bugger' to set his/her device to transmit >within the coverage gaps of US-market receivers.... >Jay Coote >TSCM@j... > A round trip airplane ticket to Canada is easiest method. -jma =================================================================== Sed quis custodiet ipsos Custodes? =================================================================== James M. Atkinson Phone: (978) 381-9111 Granite Island Group 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =================================================================== Copyright 2000, James M. Atkinson, All Rights Reserved 89 From: Scott Malcolm Date: Tue Mar 21, 2000 6:51pm Subject: Re: Digest Number 202 > Message: 2 > Date: Mon, 20 Mar 2000 17:34:12 -0500 > From: "James M. Atkinson, Comm-Eng" > Subject: Estimate Worksheet for TSCM Services > > Good Afternoon, > > I will be adding a "Estimate Worksheet for TSCM Services" to my > website and would like to solicit opinions (in private) before I make > it live. > > The worksheet (which is still in Draft form) may be found at the > following address: > > http://www.tscm.com/SweepsEstimate.html >snip James, I just added your: Optional Written Report (Typically 10% of total fee) to my present contract. Most of my clients could care less about a report up an over the hard documented findings. Excellent time saver. Regards, Scott Malcolm Malcolm & Associates Inc. Serving the State of Wisconsin Office 262 965 4426 Fax 262 965 4629 http://www.execpc.com/~conf-pi "Your Confidential Alternative" 90 From: Hoffman Date: Tue Mar 21, 2000 8:24pm Subject: Re: TSCM receivers > With the shadow of asinine receiver/scanner laws looming over > US security and TSCM persons.... what can one do to obtain > a receiver (for legitimate TSCM use) which has not been > electronically neutered? > Jay Coote ------------------------------------ Hoffman replies: Legitimate electronic test equipment is exempt from the laws you mentioned in 18 U.S.C. Chapter 119, Sec 2512. The only reason that companies like OPTOELECTRONICS, and the various scanner manufacturers block the cell band in my opinion, is because they are too cowardly, and they lack the testicular fortitude to claim that their equipment is for telecommunication company use, and so they are afraid of reprisals by rabid federal law enforcement. Anyway, whenever I want a scanning receiver which covers the cellular band, I just order it from various U.S. mail-order resellers. Despite common myth, there are lots of people who are all too happy to ignore the law; you just have to know who the "friendlies" are that will sell you the goods. I'll give you advice on how to purchase such units. It's just like illicit drugs. At first it seems as if nobody is selling the stuff, but if you do a little digging and scratch the surface; make some telephone calls; buy some products from dealers; and get to know people... You'll then realize that you can get cell capable scanners with no problem, so long as you've got the green. From: Matthijs van der Wel Date: Thu Feb 22, 2001 0:14am Subject: Information Warfare -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The Dutch company "TNO Physics and Electronics Lab" is writing a report for the Dutch government on the status of The Netherlands electronic infrastructure in case of an 'Information War' (cyberwar) . Although the report isn't finished yet, the first indications are not at all too positive (...). On their website, TNO offers a collection of links to websites and articles about Information Warfare: http://www.tno.nl/instit/fel/intern/wkiwar5.html. TNO also has a page with links about the subject "Information Operations": http://www.tno.nl/instit/fel/intern/wkinfdef.html and "Information Security": http://www.tno.nl/instit/fel/intern/wkinfsec.html All pages are in English and worth a visit. Yours sincerely, Matthijs van der Wel e-Consultant (and in no way affiliated with TNO, just someone who got curious after a lecture TNO gave on the subject) -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use iQA/AwUBOpPWC5+uKjzZYzkREQKH8wCfZ6ufQlk7u9LzHXJAwmTC1JwbvsUAoLC7 nLp4OvCvg0EteOWflVwlYSH5 =1POz -----END PGP SIGNATURE----- 2553 From: A Grudko Date: Thu Feb 22, 2001 9:07am Subject: Re: FBI agent ----- Original Message ----- > It's a shame that someone would sell out his own country for the love of money. Here in southern Africa there is a trend which you might look out for. Zimbabwe President Robert Mgabe has uncovered a plot to overthrow his 23 year government, and in reply has fired the judiciary, seized all foreign currency, bombed the press and encouraged the occupation of private land by mobs. This subversive process is described as a 'democratic election'. Watch out in case one comes your way. Andy Grudko Johannesburg 2554 From: Bob Washburne Date: Thu Feb 22, 2001 2:32pm Subject: Re: Darwin Awards Update!! Fiction (can't call them "Urban Legends" until everyone has heard them and knows them to be true) has crept into the Awards in the past, but all entries appear to be tentative until verified. Ideally, verification comes from the actual hospital or corinor's report. But in some cases, e.g. a story from Poland, you only have a story from one of the major news wires. Even so, this lends some measure of credibility. This is a good lesson for all of us: healthy skeptisism without summary dismissal until the story can be confirmed one way or the other. All filtered through the understanding that we are not in an ideal world. Bob Washburne David Miller wrote: > > Personally I think they all were a little contrived. Not your usual Darwin > fare. > > -----Original Message----- > From: Robert G. Ferrell [mailto:rferrell@r...] > Sent: Wednesday, February 21, 2001 2:42 PM > To: TSCM-L@yahoogroups.com > Subject: Re: [TSCM-L] Darwin Awards Update!! > > > Nothing was found of the technicians, but the > >lighter was virtually untouched by the explosion. The technician > >suspected of causing the blast had never been thought of as 'bright' > >by his peers. > > I don't believe this one. Too Warner Brothers. > > RGF > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.onelist.com/community/TSCM-L > > or email your subscription request to: > subTSCM-L@t... > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 2555 From: James M. Atkinson, Comm-Eng Date: Thu Feb 22, 2001 7:47pm Subject: USA v. Robert Philip Hanssen: Affidavit in Support of Criminal Complaint, Arrest Warrant and Search Warrant IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA) ) v.) )CRIMINAL NO. ROBERT PHILIP HANSSEN,) a/k/a "B") a/k/a "Ramon Garcia") a/k/a "Jim Baker") a/k/a "G. Robertson") AFFIDAVIT IN SUPPORT OF CRIMINAL COMPLAINT, ARREST WARRANT AND SEARCH WARRANTS I, Stefan A. Pluta, being duly sworn, depose and state as follows: 1. I am presently employed as a Special Agent of the Federal Bureau of Investigation (FBI) and am assigned to the Washington Field Office in the District of Columbia. I have been employed as an FBI Special Agent for approximately 13 years. I have completed FBI training in foreign counterintelligence matters. As a result of my training and experience, I am familiar with the tactics, methods, and techniques of foreign intelligence services and their agents. 2. This affidavit is in support of applications for the following: A) A warrant for the arrest of ROBERT PHILIP HANSSEN (DOB 4/18/44) for violations of Title 18 United States Code, Sections 794 (a) (Transmitting National Defense Information) and 794 (c) (Conspiracy to Commit Espionage); and B) Search warrants for: 1) The residence of ROBERT PHILIP HANSSEN, such premises known and described as a single family residence located at: 9414 Talisman Drive Vienna, Virginia 22182 as more fully described in Attachment B, and which is within the Eastern District of Virginia; 2) One silver 1997 Ford Taurus, bearing VIN IFALP52U9VG211742 and Virginia license plate number ZCW9538, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia; 3) One 1993 Volkswagen van, bearing VIN WV2KC0706PH080424 and Virginia license plate number ZCW9537, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia; 4) One 1992 Isuzu Trooper, bearing VIN JACDH58W7N7903937 and Virginia license plate YRP3849, which is owned by ROBERT PHILIP HANSSEN and anticipated to be within the Eastern District of Virginia. 3. In my capacity as case agent assigned to this matter, I have examined documents and other records pertinent to this investigation from numerous sources. Searches and various forms of surveillance have also been conducted pursuant to the Foreign Intelligence Surveillance Act (FISA) and orders of the Foreign Intelligence Surveillance Court (FISC). I. SUMMARY OF INVESTIGATION 4. The results of this investigation to date indicate that there is probable cause to believe that, beginning in 1985 and continuing to the present, ROBERT PHILIP HANSSEN (hereinafter "HANSSEN"), a United States citizen, has conspired with officers and agents of the Union of Soviet Socialist Republics (hereinafter "USSR" or "Soviet Union") and with its principal successor state, the Russian Federation (hereinafter "Russia") to commit espionage against the United States on behalf of a foreign government, specifically the Soviet Union or Russia, and has in fact engaged in such espionage. 5. The evidence establishes that between 1985 and the present, HANSSEN ≠ who the KGB/SVR referred to as "B" ≠ has engaged in the following conduct in violation of 18 U.S.C. ßß794 (a) and (c): (a) He compromised numerous human sources of the United States Intelligence Community. Three of these sources were compromised by both HANSSEN and former CIA officer Aldrich Ames, resulting in their arrest, imprisonment and, as to two individuals, execution. HANSSEN compromised these three individuals expressly in order to enhance his own security and enable him to continue spying against the United States. (b) He compromised dozens of United States Government classified documents, including documents concerning the National MASINT (Measurement and Signature Intelligence) Program (classified TOP SECRET/SCI), the United States Double Agent Program (classified SECRET), the FBI Double Agent Program (classified TOP SECRET), the United States Intelligence Community's Comprehensive Compendium of Future Intelligence Requirements (classified TOP SECRET), a study concerning KGB recruitment operations against the CIA (classified SECRET), an assessment of the KGB's effort to gather information concerning certain United States nuclear programs (classified TOP SECRET), a CIA analysis of the KGB's First Chief Directorate (classified SECRET), a highly classified and tightly restricted analysis of the foreign threat to a specific named highly compartmented classified United States Government program (classified TOP SECRET/SCI), and other classified documents of exceptional sensitivity. (c) He compromised United States Intelligence Community technical operations of extraordinary importance and value. This included specific electronic surveillance and monitoring techniques and precise targets of the United States Intelligence Community. In one case, he compromised an entire technical program of enormous value, expense and importance to the United States Government. In several other cases, he compromised the United States Intelligence Community's specific communications intelligence capabilities, as well as several specific targets. (d) He compromised numerous FBI counterintelligence investigative techniques, sources, methods and operations, and FBI operational practices and activities targeted against the KGB/SVR. He also advised the KGB/SVR as to specific methods of operation that were secure from FBI surveillance and warned the KGB/SVR as to certain methods of operation which were subject to FBI surveillance. (e) He disclosed to the KGB the FBI's secret investigation of Felix Bloch, a Foreign Service Officer, for espionage, which led the KGB to warn Bloch that he was under investigation, and completely compromised the investigation. (f) HANSSEN's conspiratorial activities continue to the present. HANSSEN continues to monitor a particular SVR signal site, doing so on numerous occasions in December 2000, January 2001 and February 2001. A recent search of HANSSEN's personal vehicle, pursuant to court authorization, disclosed a number of classified SECRET documents, entries in a personal journal concerning matters related to the instant investigation, and items typically used to mark signal sites. It has also been determined that HANSSEN continues to attempt to ascertain whether he has become the subject of FBI investigative interest, including checking FBI records to determine whether there have been recent entries as to his own name, his home address, or the signal site. (g) Over the course of HANSSEN's espionage activities, he communicated on numerous occasions with KGB/SVR personnel. This Affidavit cites 27 letters he sent to the KGB/SVR, and it describes 33 packages the KGB/SVR left for HANSSEN at secret locations, and 22 packages HANSSEN left for the KGB/SVR at secret locations. The Affidavit also describes two telephone conversations HANSSEN had with KGB personnel. The Affidavit describes 26 computer diskettes that HANSSEN passed to the KGB/SVR, containing additional disclosures of information, and 12 diskettes that the KGB/SVR passed to "B". HANSSEN provided the KGB/SVR more than 6,000 pages of documentary material. (h) For his services to the KGB/SVR, HANSSEN was paid over $600,000 in cash and diamonds. In addition, the KGB/SVR placed funds in escrow in a Moscow bank on HANSSEN's behalf. Some time in the last two years, the KGB/SVR informed HANSSEN that the escrowed funds are now worth at least $800,000. II. KEY TERMS AND ENTITIES 6. The term counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassination conducted for or on behalf of foreign powers, organizations or persons. 7. The KGB (Komitet Gosudarstvenoy Bezopasnosti, or Committee for State Security) was the intelligence service of the former Soviet Union. The KGB's First Chief Directorate (FCD) was responsible for foreign intelligence, active measures, and counterintelligence. KGB FCD intelligence officers assigned to Soviet diplomatic missions could be assigned to Line KR (Foreign Counterintelligence), Line N (Illegals Operations), Line PR (Political), or Line X (Science and Technology), among others. The KGB's Second Chief Directorate (SCD) was responsible, among other things, for domestic counterintelligence, that is, counterintelligence activities within the Soviet Union. The KGB's Moscow headquarters was referred to as the Moscow Center. 8. Since December 1991, the SVR (Sluzhba Vneshney Razvedki Rossii, or Russian Foreign Intelligence Service) has been the Russian Federation's successor agency to the KGB's foreign intelligence arm. 9. The GRU (Glavnoye Razvedyvateinoye Upravlenie, or Chief Intelligence Directorate of the General Staff) was the military intelligence agency of the former Soviet Union, and continues to serve that function for the Russian Federation. 10. The Soviet/Russian Embassy in Washington, D.C., is located at 1125 16th Street, N.W.; the Soviet/Russian Diplomatic-Compound is located at 2650 Wisconsin Avenue, N.W. The KGB/SVR presence in a Soviet/Russian diplomatic mission is called the Rezidentura. headed by the KGB/SVR Rezident. 11. An agent-in-place is a person who remains in a position while acting under the direction of a hostile intelligence service, so as to obtain current intelligence information. It is also called a recruitment-in-place. 12. An illegal is an intelligence officer or a recruited agent who operates in a foreign country in the guise of a private person, and is often present under false identity. 13. A double agent is an agent engaged in clandestine activity for two or more intelligence services who provides information about one service to another. 14. A dead drop is a prearranged hidden location used for the clandestine exchange of packages, messages, and payments, which avoids the necessity of an intelligence officer and an agent being present at the same time. 15. A signal site is a prearranged fixed location, usually in a public place, on which an agent or intelligence officer can place a predetermined mark in order to alert the other to operational activity. Such a mark may be made by, for example, chalk or a piece of tape. The operational activity signaled may be the fact that a dead drop has been "loaded" and is ready to be "cleared." A call-out signal may be used to trigger a contact between an agent and an intelligence officer. 16. An accommodation address is a "safe" address, not overtly associated with intelligence activity, used by an agent to communicate with the intelligence service for whom he working. 17. The FBI has documented the use by the KGB/SVR of agents-in-place, illegals, double agents, dead drops, signal sites, call-out signals, and accommodation addresses, including their use in the Northern Virginia area, in the Eastern District of Virginia. 18. The United States Intelligence Community is the aggregation of those Executive Branch entities and programs that, in accordance with applicable United States law and the provisions of Executive Order 12333, conduct intelligence activities that are necessary for the conduct of foreign relations and the protection of the national security of the United States, and that make up the total national intelligence effort. It includes the FBI's National Security Division, the Central Intelligence Agency (CIA), the National Security Agency (NSA), the National Reconnaissance Organization (NRO), the Defense Intelligence Agency (DIA), the Bureau of Intelligence and Research of the Department of State (DOS/INR), and the intelligence elements of the military service branches, among other entities. 19. The Foreign Intelligence Surveillance Act (FISA), Title 50, United States Code, Sections 1801-1811 and 1821-1829, provides for electronic surveillance and searches within the United States directed at persons for whom there is probable cause to believe they are knowingly engaged in clandestine intelligence gathering activities for or on behalf of a foreign power, which activities involve or may involve a violation of the criminal statutes of the United States, as authorized by the Foreign Intelligence Surveillance Court (FISC). 20. Aldrich Hazen Ames is a former CIA officer who in 1994 was arrested and subsequently pled guilty to having committed espionage as an agent of the KGB and SVR. Ames volunteered to the KGB in April 1985, and provided information to the KGB and the SVR until the date of his arrest in February 1994. 21. Classified information is defined by Executive Order 12958 and its predecessor orders (including E.O. 12356), as follows: information in any form that (1) is owned by, produced by or for, or under the control of the United States Government; (2) falls within one or more of the categories set forth in Section 1.5 of the Order (including intelligence sources or methods, cryptology, military plans, and vulnerabilities or capabilities of systems, installations, projects, or plans relating to the national security), and (3) is classified by an original classification authority who determines that its unauthorized disclosure reasonably could be expected to result in damage to the national security. Where such unauthorized release could reasonably result in "serious" damage, the information may be classified as SECRET. Where such damage is "exceptionally grave," the information may be classified TOP SECRET. Access to classified information at any level may be further restricted through compartmentation in SENSITIVE COMPARTMENTED INFORMATION (SCI) categories. Dissemination of classified information at any level may also be restricted through caveats such as: NOFORN (Not Releasable to Foreign Nationals), NOCONTRACT (Not Releasable to Contractors or Contractor/Consultants), WNINTEL (Warning Notice: Intelligence Sources and Methods Involved), and ORCON (Dissemination and Extraction of Information Controlled by Originator). III. BACKGROUND OF ROBERT PHILIP HANSSEN 22. ROBERT PHILIP HANSSEN was born on April 18, 1944, in Chicago, Illinois, where he was raised. He is a United States citizen. 23. HANSSEN received an AB degree in Chemistry from Knox College, in Illinois, in 1966. He studied dentistry at Northwestern University, in Chicago, Illinois, from 1966 to 1968, and received an MBA degree in Accounting and Information Systems from Northwestern University in 1971. He became a Certified Public Accountant in 1973. 24. From 1971 to 1972, HANSSEN was employed as a junior accountant at an accounting firm in Chicago, Illinois. In 1972, HANSSEN joined the Chicago Police Department as an investigator in the Financial Section of the Inspection Services Division. 25. HANSSEN studied the Russian language during college. A. FEDERAL BUREAU OF INVESTIGATION EMPLOYMENT AND DUTIES 26. On January 12, 1976, HANSSEN entered on duty as a Special Agent of the Federal Bureau of Investigation. He has served as an FBI Special Agent continuously since that date. 27. After initial training, HANSSEN was assigned to the FBI Field Office in Indianapolis, Indiana, and served on a White Collar Crime squad at the Resident Agency in Gary, Indiana, until August 1, 1978. 28. From August 2, 1978 to January 10, 1981, HANSSEN was assigned to the FBI Field Office in New York, New York, initially working on accounting matters in the Field Office's criminal division. 29. In March 1979, HANSSEN was detailed to the New York Field Office's intelligence division to help establish the FBI's automated counterintelligence data base in that office. At that time, this was a new automated database of information about foreign officials, including intelligence officers, assigned to the United States. Its contents were classified up to the SECRET level. 30. From January 12, 1981, to September 22, 1985, HANSSEN was assigned to FBI Headquarters in Washington, D.C., as a Supervisory Special Agent in the Intelligence Division. From January 1981 to August 1983, HANSSEN was assigned to the Budget Unit, which managed the FBI's portion of the United States Intelligence Community' s National Foreign Intelligence Program, and prepared budget justifications to Congress. This office had access to the full range of information concerning intelligence and counterintelligence activities involving FBI resources. From August 1983 until September 1985, HANSSEN was assigned to the Soviet Analytical Unit, which supported FBI FCI operations and investigations involving Soviet intelligence services, and provided analytical support to senior FBI management and the Intelligence Community. While at FBI Headquarters, HANSSEN was assigned to the intelligence component of a particular highly-compartmented classified United States Government program. He also served on the FBI's FCI Technical Committee, which was responsible for coordinating technical projects relating to FCI operations. 31. From September 23, 1985, to August 2, 1987, HANSSEN was assigned to the intelligence division of the FBI Field Office in New York, New York, as supervisor of an FCI squad. 32. From August 3, 1987, to June 24, 1990, HANSSEN was reassigned to FBI Headquarters in Washington, D.C., where he again served as a Supervisory Special Agent in the Intelligence Division's Soviet Analytical Unit. 33. From June 25, 1990, to June 30, 1991, HANSSEN was assigned to the FBI Headquarter' s Inspections Staff as an Inspector's Aide. In this assignment he traveled to FBI Field Offices, Resident Agencies, and FBI Legal Attache offices in United States Embassies abroad. 34. On July 1, 1991, HANSSEN returned to the Intelligence Division at FBI Headquarters, where he served for six months in the Soviet Operations Section as a program manager in the unit responsible for countering efforts by the Soviets (and particularly the KGB's Line X) to acquire United States scientific and technical intelligence. 35. From January 6, 1992, to April 11, 1994, HANSSEN served as Chief of the National Security Threat List (NSTL) Unit in the Intelligence Division (renamed the National Security Division, or NSD, in 1993) at FBI Headquarters. There he focused the Unit's efforts on economic espionage. 36. In April 1994, HANSSEN was temporarily assigned to the FBI's Washington Metropolitan Field Office (now called Washington Field Office). 37. In December 1994, HANSSEN was reassigned to FBI Headquarters, in the Office of the Assistant Director for NSD. 38. From February 12, 1995, to January 12, 2001, HANSSEN was detailed to serve as the FBI's senior representative to the Office of Foreign Missions of the United States Department of State (DOS/OFM). In that position he functioned as the head of an interagency counterintelligence group within DOS/OFM, and as FBI's liaison to the State Department's Bureau of Intelligence and Research (DOS/INR). His office was in an area designated Suites 106, 107 and 108 of Room 2510C of the State Department building at 2201 C Street, N.W., Washington, D.C. 39. Effective January 13, 2001, HANSSEN was assigned to a newly-created position in the Information Resources Division, at FBI Headquarters, in order that the FBI could more effectively monitor his daily activities without alerting him to the ongoing investigation of his activities. His current office is Room 9930 of FBI Headquarters, 935 Pennsylvania Avenue, N.W., Washington, D.C. 40. At no time during his employment with the FBI was HANSSEN ever authorized, directly or indirectly, to deliver, communicate, or transmit the classified information and documents described in this Affidavit to agents, officers, or employees of the KGB, SVR, or any other hostile foreign intelligence service. B. OATHS OF OFFICE 41. On January 12, 1976, upon entering service with the FBI, HANSSEN signed an Oath of Office in which he swore that: I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservation or purpose of evasion; and that I will well and faithfully discharge the duties of the office on which I am about to enter. So help me God. 42. On January 12, 1976, HANSSEN also signed the FBI Pledge for Law Enforcement Officers, in which he pledged, in part, as follows: Humbly recognizing the responsibilities entrusted to me, . . . . I accept the obligation in connection with my assignments to . . . consider the information, coming into my knowledge by virtue of my position as a sacred trust, to be used solely for official purposes. . . . In the performance of my duties and assignments, I shall not engage in unlawful and unethical practices .. .. While occupying the status of a law enforcement officer or at any other time subsequent thereto, I shall not seek to benefit personally because of my knowledge of any confidential matter which has come to my attention. I am aware of the serious responsibilities of my office and in the performance of my duties . . . I shall wage vigorous warfare against the enemies of my country, of its laws, and of its principles; . . . I shall always be loyal to my duty, my organization, and my country. 43. On January 12, 1976, HANSSEN also signed an Employment Agreement in which he stated, in part: I hereby declare that I intend to be governed by and I will comply with the following provisions: (1) That I am hereby advised and I understand that Federal law such as Title 18, United States Code, Sections 793, 794, and 798; Order of the President of the United States (Executive Order 11652); and regulations issued by the Attorney General of the United States (28 Code of Federal Regulations, Sections 16.21 through 16.26) prohibit loss, misuse, or unauthorized disclosure or production of national security information, other classified information and other nonclassified information in the files of the FBI; (2) I understand that unauthorized disclosure of information in the files of the FBI or information I may acquire as an employee of the FBI could result in impairment of national security, place human life in jeopardy, or result in the denial of due process to a person or persons who are subjects of an FBI investigation, or prevent the FBI from effectively discharging its responsibilities. I understand the need for this secrecy agreement; therefore, as consideration for employment I agree that I will never divulge, publish, or reveal either by word or conduct, or by other means disclose to any unauthorized recipient without official written authorization by the Director of the FBI or his delegate, any information from the investigatory files of the FBI or any information relating to material contained in the files, or disclose any information or produce any material acquired as part of the performance of my official duties or because of my official status. . . . (4) That I understand unauthorized disclosure may be a violation of Federal law and prosecuted as a criminal offense and in addition to this agreement may be enforced by means of an injunction or other civil remedy. C. SECURITY CLEARANCES AND ACKNOWLEDGMENTS 44. HANSSEN received his initial TOP SECRET security clearance on January 12, 1976, and has held various SCI accesses since his initial SCI indoctrination on June 23, 1980. 45. On June 23, 1980, HANSSEN signed a Nondisclosure Agreement for Sensitive Compartmented Information, in which he acknowledged receiving a security indoctrination for a particular SCI program, and further acknowledged, among other things: 3. I have been advised that direct or indirect unauthorized disclosure, unauthorized retention, or negligent handling of the designated Sensitive Compartmented Information by me could cause irreparable injury to the United States, and be used to advantage by a foreign nation. . . . 4. In consideration of being granted access to the designated Sensitive Compartmented Information, I pledge that I will never divulge such information, in any form or any manner, to anyone who is not authorized to receive it, without prior written authorization from an appropriate official of the United States Government. 5. I have been advised that any unauthorized disclosure of the designated Sensitive Compartmented Information by me may be a substantial violation of this agreement, and may result in the termination of my employment. In addition, I have been advised that any such unauthorized disclosure by me may constitute violations of United States civil or criminal laws, including, as to the latter, the provisions of Sections 793, 794, and 798, Title 18, United States Code, and of Section 783, Title 50, United States Code. . . . I acknowledge that the briefing officer has made available Sections 793, 794, 798, and 1001 of Title 18, United States Code, Section 783 of Title 50, United States Code, Executive Order 12065, as amended and the Information Security Oversight Office Directive of 2 October 1978, as amended, which implements this Executive Order, so that I may read them at any time, if I so choose. . . . I make this agreement without any mental reservation or purpose of evasion. HANSSEN signed further iterations of this SCI Nondisclosure Agreement, in order to have access to additional SCI program information, on the following dates: October 1, 1981; March 1, 1982; September 9, 1983; April 10, 1985; and May 31, 1991. 46. On October 15, 1984, HANSSEN signed a Classified Information Nondisclosure Agreement in which he stated, in part: 1. Intending to be legally bound, I hereby accept the obligations contained in this Agreement in consideration of my being granted access to classified information. . . . 2. I hereby acknowledge that I have received a security indoctrination concerning the nature and protection of classified information . . . . 3. I have been advised and am aware that direct or indirect unauthorized disclosure, unauthorized retention, or negligent handling of classified information by me could cause irreparable injury to the United States or could be used to advantage by a foreign nation. I hereby agree that I will never divulge such information unless I have officially verified that the recipient has been properly authorized by the United States Government to receive it or I have been given prior written notice of authorization from the United States Government Department or Agency . . . last granting me a security clearance that such disclosure is permitted. I further understand that I am obligated to comply with laws and regulations that prohibit the unauthorized disclosure of classified information. 4. . . . I have been advised and am aware that any unauthorized disclosure of classified information by me may constitute a violation or violations of United States criminal laws, including the provisions of Sections 641, 793, 794, 798, and 952, Title 18, United States Code, the provisions of Section 783(b), Title 50, United States Code, and the provisions of the Intelligence Identities Protection Act of 1982. I recognize that nothing in this Agreement constitutes a waiver by the United States of the right to prosecute me for any statutory violation. . . . 10. I have read this Agreement carefully and my questions, if any, have been answered to my satisfaction. I acknowledge that the briefing officer has made available to me Sections 641, 793, 794, 798, and 952 of Title 18, United States Code, Section 783(b) of Title 50, United States Code, the Intelligence Identities Protection Act of 1982, and Executive Order 12356, so that I may read them at this time, if I so choose. D. RESIDENCES 47. From 1981 until 1985, HANSSEN owned a house and resided with his family on Whitecedar Court in Vienna, Virginia. 48. In approximately August 1987, after returning from his tour of duty in New York City, HANSSEN purchased a residence at 9414 Talisman Drive in Vienna, Virginia, where he and his family have lived continuously since. IV. BASIS FOR THE INFORMATION IN THIS AFFIDAVIT 49. This Affidavit is based on numerous different types and sources of information, including the following: A. Letters, and other forms of communications from "B" to the KGB/SVR, and from the KGB/SVR to "B"; B. A recording of a telephone conversation between "B" and a KGB/SVR officer; C. Computer media, including hard drives and storage devices; D. The actual plastic material that constituted the inner wrapping of a package that "B" passed to the KGB/SVR; E. Information provided by former KGB/SVR personnel; F. Records of the FBI, the CIA, and other agencies of the United States Intelligence Community; G. The contents of an actual package that the KGB/SVR passed to "B"; H. Forensic testing and examination; I. Interviews; J. Physical searches and electronic surveillance conducted by the FBI pursuant to FISC authority; K. Public records; L. Other law enforcement and intelligence techniques, sources and methods; and M. KGB/SVR operational and production files. V. THE KGB's "B" OPERATION 50. The sources of information described in the foregoing section have established the following regarding "B": 51. On or about October 4, 1985, a KGB Line PR officer in Washington, D.C., named Viktor M. Degtyar, received an envelope by mail, at his residence in Alexandria, Virginia, in the Eastern District of Virginia. The envelope was postmarked "Prince George's Co, MD" on October 1, 1985. Inside was an inner envelope, marked: "DO NOT OPEN. TAKE THIS ENVELOPE UNOPENED TO VICTOR I. CHERKASHIN." At that time, Viktor Ivanovich Cherkashin was the Line KR Chief at the Soviet Embassy in Washington, D.C. Inside the inner envelope was an unsigned typed letter from the person whom the KGB came to call "B." The letter read in part as follows: DEAR MR. CHERKASHIN: SOON, I WILL SEND A BOX OF DOCUMENTS TO MR. DEGTYAR. THEY ARE FROM CERTAIN OF THE MOST SENSITIVE AND HIGHLY COMPARTMENTED PROJECTS OF THE U.S. INTELLIGENCE COMMUNITY. ALL ARE ORIGINALS TO AID IN VERIFYING THEIR AUTHENTICITY. PLEASE RECOGNIZE FOR OUR LONG-TERM INTERESTS THAT THERE ARE A LIMITED NUMBER OF PERSONS WITH THIS ARRAY OF CLEARANCES. AS A COLLECTION THEY POINT TO ME. I TRUST THAT AN OFFICER OF YOUR EXPERIENCE WILL HANDLE THEM APPROPRIATELY. I BELIEVE THEY ARE SUFFICIENT TO JUSTIFY A $100,000 PAYMENT TO ME. I MUST WARN OF CERTAIN RISKS TO MY SECURITY OF WHICH YOU MAY NOT BE AWARE. YOUR SERVICE HAS RECENTLY SUFFERED SOME SETBACKS. I WARN THAT MR. BORIS YUZHIN (LINE PR, SF), MR. SERGEY MOTORIN, (LINE PR, WASH.) AND MR. VALERIY MARTYNOV (LINE X, WASH.) HAVE BEEN RECRUITED BY OUR "SPECIAL SERVICES." "B" proceeded to describe in detail a particular highly sensitive and classified information collection technique. In addition, "TO FURTHER SUPPORT MY BONA FIDES" he provided specific closely-held items of information regarding then-recent Soviet detectors. "B" added: DETAILS REGARDING PAYMENT AND FUTURE CONTACT WILL BE SENT TO YOU PERSONALLY. . . . MY IDENTITY AND ACTUAL POSITION IN THE COMMUNITY MUST BE LEFT UNSTATED TO ENSURE MY SECURITY. I AM OPEN TO COMMO SUGGESTIONS BUT WANT NO SPECIALIZED TRADECRAFT. I WILL ADD 6, (YOU SUBTRACT 6) FROM STATED MONTHS, DAYS AND TIMES IN BOTH DIRECTIONS OF OUR FUTURE COMMUNICATIONS. The information concerning the FBI's recruitment of Yuzhin, Motorin, and Martynov was classified at least at the SECRET level, as was the defector information. The sensitive information collection technique described above was classified at the TOP SECRET level. 52. Valeriy Fedorovich Martynov was a KGB Line X officer assigned to the Soviet Embassy in Washington, D.C., from October 1980 to November 1985. In April 1982, the FBI recruited Martynov to serve as an agent-in-place, and he was debriefed jointly by the FBI and the CIA. Martynov was compromised to the KGB by Ames in June 1985 and by "B" in October 1985, as described above. Based in part on the information provided by "B", the KGB directed Martynov to return to Moscow in November 1985, ostensibly to accompany KGB officer Vitaliy Yurchenko, who was returning to the Soviet Union after his August 1985 defection to the United States. Upon arriving in Moscow on or about November 7, 1985, Martynov was arrested, and he was subsequently tried on espionage charges. Martynov was convicted and executed. 53. Sergey Mikhailovich Motorin was a KGB Line PR officer assigned to the Soviet Embassy in Washington D.C., from June 1980 to January 1985. In January 1983, the FBI recruited Motorin to serve as an agent-in-place, and he was debriefed by the FBI. Motorin returned to Moscow at the end of his tour of duty in January 1985. Motorin, like Martynov, was compromised to the KGB by Ames in June 1985 and by "B" in October 1985, as described above. Based in part on the information "B" gave the KGB, Motorin was arrested in November or December 1985, tried and convicted on espionage charges during the period of October-November 1986, and executed in February 1987. 54. Boris Nikolayevich Yuzhin was a KGB Line PR officer assigned to San Francisco under cover as a student from 1975 to 1976, and then as a TASS correspondent from 1978 to 1982. The FBI recruited him to serve as an agent-in-place, and debriefed him. After returning to the Soviet Union, Yuzhin became the subject of an internal KGB investigation. Yuzhin was compromised to the KGB by Ames in June 1985 and by "B" in October 1985. Based in part on the information "B" gave the KGB, Yuzhin was arrested in December 1986, convicted of espionage, and sentenced to serve 15 years in prison. In 1992, he was released under a general grant of amnesty to political prisoners, and subsequently emigrated to the United States. 55. On or about October 15, 1985, Degtyar received by mail, at his residence in Alexandria, Virginia, in the Eastern District of Virginia, a package from "B" containing a large number of classified documents, including some original documents, of the United States Intelligence Community. 56. At 8:35 am on October 16, 1985, FBI surveillance personnel observed Degtyar arriving at the Soviet Embassy carrying a large black canvas bag which he did not typically carry. 57. Thereafter, Degtyar received by mail, at his residence in Alexandria, Virginia, in the Eastern District of Virginia, a typed message from "B," in an envelope bearing a handwritten address and postmarked "New York, NY" on October 24, 1985. The message included the following text: DROP LOCATION Please leave your package for me under the corner (nearest the street) of the wooden foot bridge located just west of the entrance to Nottoway Park. (ADC Northern Virginia Street Map, #14, D3) PACKAGE PREPARATION Use a green or brown plastic trash bag and trash to cover a waterproofed package. SIGNAL LOCATION Signal site will be the pictorial "pedestrian-crossing" signpost just west of the main Nottoway Park entrance on Old Courthouse Road. (The sign is the one nearest the bridge just mentioned.) SIGNALS My signal to you: One vertical mark of white adhesive tape meaning I am ready to receive your package. Your signal to me: One horizontal mark of white adhesive tape meaning drop filled. My signal to you: One vertical mark of white adhesive tape meaning I have received your package. (Remove old tape before leaving signal.) The message established a date and times for the signals and drops, and concluded: "I will acknowledge amount with my next package." The KGB designated this dead drop site by the codename "PARK". It is located in Fairfax County, Virginia, in the Eastern District of Virginia. 58. On Saturday, November 2, 1985, the KGB loaded the "PARK" dead drop site with $50,000 in cash and a message proposing procedures for future contacts with "B". 59. On or about November 8, 1985, Deglyar and Cherkashin received a typed letter from "B", which read in part as follows: Thank you for the 50,000. I also appreciate your courage and perseverance in the face of generically reported bureaucratic obstacles. I would not have contacted you if it were not reported that you were held in esteem within your organization, an organization I have studied for years. I did expect some communication plan in your response. I viewed the postal delivery as a necessary risk and do not wish to trust again that channel with valuable material. I did this only because I had to so you would take my offer seriously, that there be no misunderstanding as to my long-term value, and to obtain appropriate security for our relationship from the start. "B" then rejected the contact plans proposed by the KGB, and suggested a particular communications scheme based on "a microcomputer 'bulletin board'" at a designated location, with "appropriate encryption." Meanwhile, he wrote: "Let us use the same site again. Same timing. Same signals." "B" proposed that the next dead drop occur on "September 9" which, according to the "6" coefficient that he established with the KGB in his first letter, actually meant that the dead drop operation would take place on March 3, 1986. "B" also wrote: As far as the funds are concerned, I have little need or utility for more than the 100,000. It merely provides a difficulty since I can not spend it, store it or invest it easily without triping [sic] "drug money" warning bells. Perhaps some diamonds as security to my children and some good will so that when the time comes, you will accept by [sic] senior services as a guest lecturer. Eventually, I would appreciate an escape plan. (Nothing lasts forever.) Referring to Yuzhin, Motorin, and Martynov, whom he had identified in his first letter as United States intelligence recruitments, "B" wrote: I can not provide documentary substantiating evidence without arousing suspicion at this time. Never-the-less, it is from my own knowledge as a member of the community effort to capitalize on the information from which I speak. I have seen video tapes of debriefings and physically saw the last, though we were not introduced. The names were provided to me as part of my duties as one of the few who needed to know. You have some avenues of inquiry. Substantial funds were provided in excess of what could have been skimmed from their agents. The active one has always (in the past) used a concealment device -- a bag with bank notes sewn in the base during home leaves. In conclusion, "B" warned of a "new technique" used by NSA, which he described. 60. On March 3, 1986, the KGB loaded dead drop site "PARK", but "B" did not appear and the KGB removed its package from the dead drop site the same day. 61. On or about June 30, 1986, Deglyar received a typed letter from "B" at his residence in Alexandria, Virginia, in the Eastern District of Virginia. The letter read in part as follows: I apologize for the delay since our break in communications. I wanted to determine if there was any cause for concern over security. I have only seen one item which has given me pause. When the FBI was first given access to Victor Petrovich Gandarev, they asked . . . if Gundarev knew Viktor Cherkashin. I thought this unusual. I had seen no report indicating that Viktor Cherkashin was handling an important agent, and here-to-fore he was looked at with the usual lethargy awarded Line Chiefs. The question came to mind, are they somehow able to monitor funds, ie., to know that Viktor Cherkashin received a large amount of money for an agent? I am unaware of any such ability, but I might not know that type of source reporting. "B" then described a United States Intelligence Community technical surveillance technique. He concluded: If you wish to continue our discussions, please have someone run an advertisement in the Washington Times during the week of 1/12/87 or 1/19/87, for sale, "Dodge Diplomat, 1971, needs engine work, $1000." Give a phone number and time-of-day in the advertisement where I can call. I will call and leave a phone number where a recorded message can be left for me in one hour. I will say, "Hello, my name is Ramon. I am calling about the car you offered for sale in the Times." You will respond, "I'm sorry, but the man with the car is not here, can I get your number." The number will be in Area Code 212. I will not specify that Area Code on the line. "B" signed the letter: "Ramon". According to the established "6" coefficient, the weeks the advertisement was actually to run were July 6, 1986, or July 13, 1986. 62. Viktor Gundarev was a KGB Line KR officer who defected to the United States on February 14, 1986. A classified FBI debriefing report, dated March 4, 1986, reports that FBI debrief ers showed Gundarev a photo of Cherkashin and asked if he knew Cherkashin. 63. The following advertisement appeared in the Washington Times from July 14, 1986, to July 18, 1986: DODGE - '71, DIPLOMAT, NEEDS ENGINE WORK, $1000. Phone (703) 451-9780 (CALL NEXT Mon., Wed., Fri. 1 p.m.) 64. The number 703/451-9780 at that time belonged to a public telephone located in the vicinity of the Old Keene Mill Shopping Center, in Fairfax County, Virginia, in the Eastern District of Virginia. On Monday, July 21, 1986, "B" called that number and gave the number 628-8047. The call was taken by Aleksandr Kirillovich Fefelov, a KGB officer assigned to the Soviet Embassy in Washington, D.C. 65. One hour later, Fefelov telephoned 212/628-8047 and told "B" that the KGB had loaded the "PARK" dead drop site. The KGB mistakenly placed the package under the wrong corner of the wooden footbridge at the "PARK" site. 66. On or about August 7, 1986, Degtyar received a letter from "B" slating that he had not found the package at the dead drop site, and indicating that he would phone 703/451-9780 on August 18, 20, or 22. The KGB then retrieved its package from the "PARK" dead drop site. 67. On Monday, August 18, 1986, "B" telephoned 703/451-9780, and spoke with Fefelov. The latter portion of the conversation was recorded as follows: ([UI] = unintelligible) "B": Tomorrow morning? FEFELOV: Uh, yeah, and the car is still available for you and as we have agreed last time, I prepared all the papers and I left them on the same table. You didn't find them because I put them in another corner of the table. "B": I see. FEFELOV: You shouldn't worry, everything is okay. The papers are with me now. "B": Good. FEFELOV: I believe under these circumstances, mmmm, it's not necessary to make any changes concerning the place and the time. Our company is reliable, and we are ready to give you a substantial discount which will be enclosed in the papers. Now, about the date of our meeting. I suggest that our meeting will be, will take place without delay on February thirteenth, one three, one p.m. Okay? February thirteenth. "B": [UI] February second? FEFELOV: Thirteenth. One three. "B": One three. FEFELOV: Yes. Thirteenth. One p.m. "B": Let me see if I can do that. Hold on. FEFELOV: Okay. Yeah. [pause] "B": [whispering] [UI] FEFELOV: Hello? Okay. [pause] "B": [whispering] Six .... Six .... [pause] "B": That should be fine. FEFELOV: Okay. We will confirm you, that the papers are waiting for you with the same horizontal tape in the same place as we did it at the first time. "B": Very good. FEFELOV: You see. After you receive the papers, you will send the letter confirming it and signing it, as usual. Okay? "B": Excellent. FEFELOV: I hope you remember the address. Is . . . if everything is okay? "B": I believe it should be fine and thank you very much. FEFELOV: Heh-heh. Not at all. Not at all. Nice job. For both of us. Uh, have a nice evening, sir. "B": Do svidaniya. FEFELOV: Bye-bye. According to the established "6" coefficient, the operation discussed in this conversation was actually scheduled to occur on August 19, 1986, at 7:00 am. The KGB then loaded the "PARK" dead drop site with $10,000 in cash, as well as: proposals for two additional dead drop sites to be used by "B" and the KGB; a new accommodation address codenamed "NANCY"; and emergency communications plans for "B" to personally contact KGB personnel in Vienna, Austria. The "NANCY" address was the residence of KGB Line PR officer Boris M. Malakhov in Alexandria, Virginia, in the Eastern District of Virginia, who was to become Degtyar's replacement as the Soviet Embassy press secretary. "B" was instructed to mis-spell Malakhov's name as "Malkow." "B" subsequently cleared the dead drop. 68. Thereafter, Degtyar received an envelope at his residence in Alexandria, Virginia, in the Eastern District of Virginia. The envelope bore a handwritten address and return address: "Ramon Garcia, 125 Main St, Falls Church VA." It was postmarked from "NO VA MSC 22081" on August 19, 1986. MSC designates the Merrifield Service Center, located in the Eastern District of Virginia. Inside the envelope was a handwritten note: "RECEIVED $10,000. RAMON." 69. On or about September II, 1987, Malakhov received an envelope at his residence in the Eastern District of Virginia. The envelope bore a handwritten address to "B.N. MALKOW" at the "NANCY" address, and a handwritten return address of "R. GARCIA, 125 MAIN ST, ALEXANDRIA, VA", and was postmarked September 8, 1987. Inside was the following typed letter: Dear Friends: No, I have decided. It must be on my original terms or not at all. I will not meet abroad or here. I will not maintain lists of sites or modified equipment. I will help you when I can, and in time we will develop methods of efficient communication. Unless a [sic] see an abort signal on our post from you by 3/16, I will mail my contact a valuable package timed to arrive on 3/18. I will await your signal and package to be in place before 1:00 pm on 3/22 or alternately the following three weeks, same day and time. If my terms are unacceptable then place no signals and withdraw my contact. Excellent work by him has ensured this channel is secure for now. My regards to him and to the professional way you have handled this matter. sincerely, Ramon According to the established "6" coefficient, the dates referred to in this letter were actually September 10, 12, and 16. 70. On Monday, September 14, 1987, the KGB received in the mail a package of documents including TOP SECRET National Security Council documents. 71. On Tuesday, September 15, 1987, the KGB loaded the "PARK" dead drop site with $10,000 cash. The KGB also proposed two additional dead drop sites, one codenamed "AN" located in Ellanor C. Lawrence Park in Western Fairfax County, in the Eastern District of Virginia, and another codenamed "DEN" at a different location farther away. The KGB proposed that "B" load the dead drop at "PARK" or "AN" on September 26, 1987, and that the KGB respond by loading "DEN". 72. On Wednesday, September 16, 1987, the KGB determined that "B" had cleared the "PARK" dead drop and removed the signal 73. On September 26, 1987, the KGB recovered from the "PARK" dead drop site a package from "B". The package contained a handwritten letter reading as follows: My Friends: Thank you for the $10,000. I am not a young man, and the commitments on my time prevent using distant drops such as you suggest. I know in this I am moving you out of your set modes of doing business, but my experience tells me the [sic] we can be actually more secure in easier modes. "B" then suggested an exchange procedure involving a parked car instead of a dead drop site, and a related communications procedure, but stated: "If you cannot do this I will clear this once ëAN' on your scheduled date (rather than the other)." He then asked the KGB to "Find a comfortable Vienna VA signal site to call me to an exchange any following Monday." He closed the letter, "Good luck with your work", and signed it "Ramon." The package also contained a document which the KGB described as having the title which roughly translates into English as: "National Intelligence Program for 87". 74. Thereafter, the KGB proposed to "B" a signal site in Vienna, Virginia, in the Eastern District of Virginia, on the post of a stop sign on the shoulder of Courthouse Road near its junction with Locust Street. This signal site was referred to as "V". 75. On September 29, 1987, the KGB deposited $100,000 into an escrow account established for "B" in a Soviet bank in Moscow. 76. On November 10, 1987, Malakhov received a letter from "B" at his residence in the Eastern District of Virginia. The envelope bore a return address of "J. Baker" in "Chicago" and was postmarked on November 7, 1987. In the letter, "B" advised that Saturday for "AN" was not suitable, and he postponed the operation for two days, until Monday, November 16. He advised that he had an urgent package for the KGB, and asked the KGB to place a signal confirming receipt of the letter. That same day, the KGB placed a signal at the "PARK" signal site. Thereafter, whenever "B" used the word "Chicago" in a return address, it was to signal that he intended for a dead drop exchange to occur the following Monday. 77. On Sunday, November 15, 1987, the KGB loaded the "AN" dead drop site with a package. It was not cleared by "B" and, on November 17, the KGB removed the package. 78. On Thursday, November 19, 1987, the KGB received a handwritten letter from "B". The envelope bore a return address of "G. Robertson" in "Houston" and was postmarked on November 17, 1987. The letter read as follows: Unable to locate AN based on your description at night. Recognize that I am dressed in business suit and can not slog around in inch deep mud. I suggest we use once again original site. I will place my urgent material there at next AN times. Replace it with your package. I will select some few sites good for me and pass them to you. Please give new constant conditions of recontact as address to write. Will not put substantive material through it. Only instructions as usual format. Ramon 79. On Monday, November 23, 1987, "B" and the KGB carried out an exchange operation at the "PARK" dead drop site. The package from "B" to the KGB contained: a cable-type report about a meeting in October 1987 with a valuable source, whom the KGB referred to as "M"; a survey of information provided by Vitaliy Yurchenko; and an official technical document describing COINS-II. In 1987, COINS-II was the then-current version of the United States Intelligence Community's "Community On-Line Intelligence System," which constituted a classified Community-wide intranet. The package from the KGB to "B" contained $20,000 cash and a letter conveying "regards" from the KGB Director and advising that $100,000 had been deposited in a bank at 6-7% interest. The letter also asked "B" for a variety of specific classified information. The KGB gave "B" two new accommodation addresses and asked "B" to propose new dead drop sites. 80. On February 4, 1988, the KGB received a note from "B" at one of the new accommodation addresses it had given to "B" in the November 23, 1987, dead drop. The address was the residence of a Soviet diplomatic official known to the FBI as a KGB co-optee, located in the Eastern of Virginia. The note read simply: "OK". It was in an envelope bearing a return address of "Jim Baker" in "Langley" and postmarked in Washington, D.C., on February 3, 1988. 81. On Monday, February 8, 1988, "B" and the KGB carried out an exchange operation at the "PARK" dead drop site in Nottoway Park, which the KGB had now renamed "PRIME". The package from "B" to the KGB contained a typed, unsigned letter. In the letter, "B" acknowledged receipt of $20,000 and identified two additional drop sites. He then went on to provide detailed information concerning a Soviet detector, and advised the KGB that he had arranged time to review the detector's file. "A full report will follow as soon as possible." He then disclosed to the KGB certain specific information concerning the United States Intelligence Community's communication intelligence capabilities. Enclosed with the letter was the first computer diskette "B" passed to the KGB. Also in the package from "B" were classified documents. The package from the KGB to "B" contained $25,000 cash, and a letter conveying thanks of the KGB Chairman, Vladimir Kryuchkov, for the information about the valuable source "M". The KGB also asked "B" for more information about "M" and the "agent network" in New York City, and about a particular KGB officer. On the next day, February 9, 1988, the KGB observed that the signal at "PARK/PRIME" had been removed, indicating that "B" had cleared the dead drop. 82. On March 16, 1988, the KGB received a second computer diskette from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Chicago" and was postmarked in Washington, D.C., on March 15, 1988. 83. On March 17, 1988, the KGB received a letter from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Chicago" and was postmarked in Northern Virginia on March 16, 1988. In the letter, "B" instructed the KGB to use the "PARK/PRIME" dead drop site until the KGB approved the other sites. 84. On Monday, March 21, 1988, the KGB observed a signal from "B" at the "PARK/PRIME" site, but was unable to check the dead drop site because strangers were present in the park. 85. On March 26, 1988, the KGB received a third computer diskette from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Chicago" and was postmarked in Washington, D.C., on March 24, 1988. The KGB found no text on the diskette, which it referred to as "D-3". 86. On Monday, March 28, 1988, "B" and the KGB carried out an exchange operation at the "PARK/PRIME" dead drop site. The package from "B" to the KGB included his fourth computer diskette ("D-4"), a TOP SECRET document entitled "The FBI's Double Agent Program" and a document that the KGB described as a Director of Central Intelligence (DCI) document entitled "Stealth Orientation." The package from the KGB to "B" included $25,000 cash and a letter explaining why the KGB had not been able to check the "PARK/PRIME" dead drop site on March 21. In the letter, the KGB also advised it had been unable to read the diskettes "B" had passed to the KGB. The KGB asked "B" for information about codes and cryptograms, intelligence support for the Strategic Defense Initiative, submarines, and other classified material. The next day, the KGB observed that "B" had removed the signal from the "PARK/PRIME" site, indicating he had removed the package. 87. On April 4, 1988, the KGB received an envelope from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Alexandria" and was postmarked in Northern Virginia, on March 31, 1988. The envelope contained a note from "B" reading: "use 40 TRACK MODE. this letter is not a signal." The term "use 40-track mode" refers to a technical process for re-formatting a computer diskette in order to conceal data by putting the data onto specific tracks on the diskette. Unless a person uses the correct codes to decrypt such a diskette, the diskette would appear to be blank. 88. On April 6, 1988, the KGB received a package from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Jim Baker" in "Fairfax" and a postmark of "MSC NO VA" (Merrifield Service Center, Northern Virginia, in the Eastern District of Virginia) on April 5. The package contained a fifth diskette ("D-5"). On the diskette, "B" provided what the KGB characterized as "everything" about a particular KGB officer, additional information about a KGB defector named Victor Sheymov, and information about two specific Soviet FBI recruitments. "B" also explained why the KGB had been unable to read his diskettes. "B" also asked the KGB for diamonds. The KGB subsequently purchased several diamonds for use in the "B" operation. 89. On May 24, 1988, the KGB received a letter from "B" at an accommodation address in the District of Columbia. The envelope bore a return address of "Jim Baker" in "Chicago" and was postmarked in "MSC NO VA" on May 17, 1988. With the letter was "B"'s sixth diskette ("D-6"), which contained information about a number of matters. The diskette also contained information about a specific recent FBI Soviet recruitment operation. 90. On Monday, May 30, 1988, a KGB officer arrived at the "PARK/PRIME" dead drop site at 9:03 pm, three minutes after the end of the prearranged dead drop exchange period. The KGB officer saw a man who apparently removed the signal, got into hi; car, and drove away. 91. On July 15, 1988, the KGB received a letter from "B" a an accommodation address in the Eastern District of Virginia. The envelope bore a return address "Chicago" and was postmarked "WDC 200" on July 13, 1988. The zip codes for Washington, D.C., begin "200". The typed letter read as follows: I found the site empty. Possibly I had the time wrong. I work from memory. My recollection was for you to fill before 1:00 a.m. I believe Viktor Degtyar was in the church driveway off Rt. 123, but I did not know how he would react to an approach. My schedule was tight to make this at all. Because of my work, I had to synchronize explanations and flights while not leaving a pattern of absence or travel that could later be correlated with communication times. This is difficult and expensive. I will call the number you gave me on 2/24, 2/26 or 2/28 at 1:00 a.m., EDST. Please plan filled signals. Empty sites bother me. I like to know before I commit myself as I'm sure you do also. Let's not use the original site so early at least until the seasons change. Some type of call-out signal to you when .1 have a package or when I can receive one would be useful. Also, please be specific about dates, e.g., 2/24. Scheduling is not simple for me because of frequent travel and wife. Any ambiguity multiplies the problems. My security concerns may seem excessive. I believe experience has shown them to be necessary. I am much safer if you know little about me. Neither of us are children about these things. Over time, I can cut your losses rather than become one. Ramon P.S. Your "thank you" was deeply appreciated. 92. On Monday, July 18, 1988, "B" and the KGB carried out an exchange operation at the "PARK/PRIME" dead drop site. The package from "B" contained over 530 pages of material, including: (A) A CIA document concerning certain nuclear programs, dated approximately November 1987 classified TOP SECRET and with the caveats NOFORN NOCONTRACT ORCON. (B) A DCI document entitled "Compendium of Future Intelligence Requirements: Volume II", dated September 1987, prepared by the Staff of the Intelligence Producers Council and classified TOP SECRET/SCI with the caveat NOFORN. (C) A CIA Counterintelligence Staff Study entitled "The Soviet Counterintelligence Offensive: KGB Recruitment Operations Against CIA," dated March 1988 and classified SECRET with the caveats NOFORN NOCONTRACT ORCON. This document contains the following preface: Warning NoticeIntelligence Sources or Methods Involved (WNINTEL) National SecurityUnauthorized Disclosure InformationSubject to Criminal Sanctions and also specifically defining "NOFORN" as "Not Releasable to Foreign Nationals." (D) A TOP SECRET comprehensive historical FBI review of allegations from recruitments and detectors over a period of years that the Soviet intelligence services had penetrated the United States Intelligence Community. It identified Soviet recruitments and detectors with specificity, and describes particular information they provided. It contained the following warning: IN VIEW OF THE EXTREME SENSITIVITY OF THIS DOCUMENT. THE UTMOST CAUTION MUST BE EXERCISED IN ITS HANDLING. THE CONTENTS INCLUDE A COMPREHENSIVE REVIEW OF SENSITIVE SOURCE ALLEGATIONS AND INVESTIGATIONS OF PENETRATION OF THE FBI BY THE SOVIET INTELLIGENCE SERVICES. THE DISCLOSURE OF WHICH WOULD COMPROMISE HIGHLY SENSITIVE COUNTERINTELLIGENCE OPERATIONS AND METHODS. ACCESS SHOULD BE LIMITED TO A STRICT NEED-TO-KNOW BASIS. The package from the KGB to "B" contained $25,000 cash and a letter asking for information about surveillance systems, the agent network in New York City, illegal intelligence, and several specific FBI recruitment operations. The KGB proposed two new dead drop and related signal sites. One, named "BOB", was under a footbridge in Idylwood Park, between Vienna and Falls Church, in the Eastern District of Virginia. The other, named "CHARLIE", was under a footbridge in Eakin Community Park, south of Vienna, in the Eastern District of Virginia. For these dead drop sites, the KGB instructed "B" to load the dead drops by 9:00 pm on the designated day; the KGB would clear it by 10:00 pm and load it with a package which "B" was to clear after 10:00 pm. 93. On July 31, 1988, the KGB received an envelope from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of Alexandria and contained a letter dated July 29 and "B"'s seventh diskette ("D-7"), which contained information on technical surveillance systems, a new recruitment in New York City, illegal intelligence, and several other specific Soviet recruitment targets. 94. On August 22, 1988, the KGB deposited $50,000 in an escrow account for "B" at a Moscow bank. 95. On September 21, 1988, the KGB received an envelope from "B" at an accommodation address in the Eastern District of Virginia. The envelope bore a return address of "Chicago" and was postmarked "WDC" on September 20. The envelope contained "B"'s eighth diskette ("D-8") and a note that read: "At BOB". The diskette contained information about particular Soviet recruitment targets of the FBI. 96. On Monday, September 26, 1988, "B" and the KGB carried out an exchange operation at the "BOB" dead drop site. The package from "B" contained approximately 300 pages of material, including an FBI memo about a particular individual believed at the time to be a KGB Line KR officer in New York City, information on technical means of Soviet intelligence, a transcript of a Counterintelligence Group meeting, and information on several other matters. The package from the KGB contained a diamond valued at $24,720, and a letter advising "B" that $50,000 had been deposited in his account. The letter also expressed gratitude to "B" from the KGB Chairman (Vladimir A. Kryuchov). The letter also discussed communications procedures, security measures, a personal meeting, and passports. It also asked "B" to provide information about classified technical operations in the Soviet Union, agent network details, allies' sources, FBI programs, past cases, and a certain missile technology. 97. On December 1, 1988, the KGB received a package from "B" at an accommodation address in the Eastern District of Virginia. It bore a return address of "G. Robertson, Baker's Photo" and was postmarked "WDC" on November 30, 1988. The package contained a letter and his ninth diskette ("D-9"), which contained information about a number of classified matters. 98. On Monday, December 26, 1988, "B" and the KGB carried out an exchange operation at the "CHARLIE" dead drop site in the Eastern District of Virginia. The package from "B" contained his tenth diskette ("D-IO") and approximately 356 pages of material. On the diskette, "B" provided additional classified information. He also provided six recent National HUMINT Collection Plan (NHCP) documents, and a document whose title the KGB noted as "Soviet Armed Forces and Capabilities for Conducting Strategic Nuclear War Until the End of the 1990s." The package from the KGB to "B" contained $10,000 cash, a second diamond, valued at $17,748, and a message in which the KGB asked "B" for additional specific information about a wide variety of classified technical and recruitment matters. The next day, the KGB observed that the signal at the "CHARLIE" site had been removed, indicating "B" had removed the KGB's package. 99. On Tuesday, January 31, 1989, the KGB observed an emergency call-out signal at a signal site that it had issued to "B", located at the intersection of Q Street and Connecticut Avenue, N.W., Washington, D.C. By prearrangement, the KGB immediately unloaded a package from "B" at the "BOB" dead drop site. The package contained a cable, with a note reading: "Send to the Center right away. This might be useful." Also in the package was "B"'s eleventh diskette ("D-ll"), which contained comments on the cable, as well as information on several specific individuals about whom the KGB had asked for information. 100. On Thursday, March 16, 1989, "B" marked a call-out signal site that the KGB has issued to him, located at the Taft Bridge in Northwest Washington, D.C. 101. On Monday, March 20, 1989, "B" and the KGB carried out an exchange operation at the "CHARLIE" dead drop site in the Eastern District of Virginia. "B" passed two packages to the KGB. One contained a TOP SECRET SCI document entitled "DCI Guidance for the National MASINT Intelligence Program (FY 1991-FY 2000)," prepared by the Measurement and Signature Intelligence (MASINT) Committee and dated November 1988. The document bears the caveats NOFORN and NOCONTRACT, and contains the following preface: Warning Notice Intelligence Sources or Methods Involved (WNINTEL) NATIONAL SECURITY INFORMATION Unauthorized Disclosure Subject to Criminal Sanctions According to its Introduction, this document contains the MASINT Committee's recommendations to the DCI for the collection, processing, and reporting of MASINT, and represents the Intelligence Community's consensus on specific MASINT objectives and studies leading to needed capabilities. Its contents are highly specific and technical. In passing this document to the KGB, "B" requested that it be returned. The second package from "B" to the KGB contained his twelfth computer diskette ("D-12") and approximately 539 pages of materials including classified information on a variety of matters. The KGB package to "B" contained $18,000 cash and a third diamond, valued at $11,700. It also-contained a letter that confirmed the KGB had received "B"'s packages on December 26 and January 31, discussed a personal meeting, requested new dead drop sites, and asked how to increase operational security. The KGB also asked "B" about his security precautions for the diamonds. ("B" told the KGB that he would say the diamonds came from his grandmother.) The KGB also asked for information about a wide variety of technical and operational subjects. The KGB thanked "B" for the information he provided on January 31, and asked him "for everything else that's possible." On Tuesday, March 21, 1989, the KGB observed that the signal at "CHARLIE" had been removed, indicating that "B" had removed the KGB's package. 102. On March 24, 1989, the KGB marked the "V" signal site on Courthouse Road in Vienna, in the Eastern District of Virginia, indicating that "B" should pick up a package at the "PARK/PRIME" dead drop site the following Monday. On Monday, March 27, 1989, the KGB loaded the dead drop with the MASINT document, for return to "B", but "B" did not clear the drop. 103. In April 1989, the KGB presented several awards to KGB officers involved in the "B" operation, including the highly- coveted Order of the Red Banner, the Order of the Red Star, and the Medal for Excellent Service. 104. On Monday, May 22, 1989, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "BOB" dead drop site, in the Eastern District of Virginia. The package "B" passed to the KGB contained the first and third diamonds the KGB had given to him and which "B" returned for cash, and his thirteenth diskette ("D-13") in which he suggested an account in Switzerland and bonds to be transferred to it. The package also contained approximately 80 pages of material, including a document whose title the KGB noted as "National Intelligence Program 90-91." The diskette contained classified information about a variety of technical and operational matters. "B" also provided information about United States Foreign Officer Felix Bloch and an illegal in Vienna, Austria. This disclosure compromised the FBI's then-ongoing espionage investigation of Bloch, as described below. The package that the KGB passed to "B" on May 22, 1989, did not contain a payment, but in a letter the KGB promised to do so the next time. The KGB also returned the MASINT Committee document, and described its two prior failed efforts to return it. The next day, the KGB observed that the signal associated with the "BOB" dead drop site had been removed, indicating that "B" had retrieved the KGB's package. 105. Felix Bloch had been identified as an associate of Austria-based known Soviet illegal Reino Gikman on the basis of a telephone call between them on April 27, 1989. One day later, the FBI opened a classified investigation of Bloch, who at the time was assigned to the State Department in Washington, D.C. Meetings between Bloch and Gikman were observed in Paris on May 14, 1989, and Brussels on May 28, 1989. In early June 1989, after "B" had compromised the Bloch investigation, Gikman suddenly left for Moscow. Early on the morning of June 22, 1989, Bloch received a telephone call at his home in Washington, D.C., from a man identifying himself as "Ferdinand Paul". According to a recording of that call, "Ferdinand Paul" told Bloch that he was calling "in behalf of Pierre" who "cannot see you in the near future" because "he is sick", and that "a contagious disease is suspected." (Bloch knew Gikman as "Pierre".) "Paul" then told Bloch: "I am worried about you. You have to take care of yourself." Having concluded that this call alerted Bloch that his association with Gikman had been compromised, the FBI interviewed Bloch on June 22 and 23, 1989. Bloch denied he had engaged in espionage and ultimately declined to answer any further questions. The FBI was unable further to develop its investigation of Bloch. 106. On Monday, August 7, 1989, after two call-out signals from "B", he and the KGB carried out an exchange operation at the "CHARLIE" dead drop site in the Eastern District of Virginia. In the package from "B" were five rolls of film containing a highly-restricted TOP SECRET/SCI analysis of the foreign threat to a specific and named highly-compartmented United States Government program, dated May 1987. Also in the package from "B" was his fourteenth diskette ("D-14"), which contained information from the Bloch-Gikman file, and several FBI recruitment attempts. "B" approved a new dead drop site the KGB had proposed, codenamed "DORIS", located under a footbridge in Canterbury Park in Springfield, Virginia, in the Eastern District of Virginia. The KGB's package to "B" contained $30,000 cash and a letter promising to compensate him for the returned diamonds. The KGB rejected his suggestions for an account in Switzerland. The KGB discussed communications plans, and proposed a new dead drop site, codenamed "ELLIS", under a footbridge over Wolftrap Creek near Creek Crossing Road at Foxstone Park, near Vienna, Virginia, in the Eastern District of Virginia, with a signal site on the "Foxstone Park" sign. The next day, the KGB observed that the signal associated with the "CHARLIE" dead drop site had been removed, indicating that "B" had retrieved the KGB's package. 107. On August 17, 1989, the KGB deposited $50,000 into an escrow account established for "B" in a Soviet bank in Moscow. 108. On Monday, September 25, 1989, "B" and the KGB carried out an exchange operation at the "DORIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained approximately 80 pages of material including part of a document concerning a highly-sensitive United States technical operation classified at the TOP SECRET/SCI level. In passing this document, "B" compromised a program of enormous value, expense, and importance to the United States. Also in the package was his fifteenth diskette ("D-15"), containing additional classified information. The package from the KGB to "B" contained $30,000 cash, a letter, and, for the first time from the KGB, a computer diskette. The next day, the KGB observed that the signal associated with the "CHARLIE" dead drop site had been removed, indicating that "B" had retrieved the KGB's package. 109. On October 2, 1989, the KGB received a letter from "B" at an accommodation address in the Eastern District of Virginia. It bore a return address of "G. Robertson, 1408 Ingeborg Ct., McLean VA" and was postmarked "NO VA" on October 28, 1989. The letter reported that: "The disk is clean. I tried all methods -- completely demagnetized." 110. On October 17, 1989, the KGB received an envelope from "B" at an accommodation address, in the Eastern District of Virginia. It bore a return address of "G. Robertson, 1101 Kingston Ct., Houston, TX" and was postmarked "NO VA MSC 220" on October 16, 1989. The envelope contained "B"'s sixteenth diskette ("D-16"). 111. On Monday, October 23, 1989, "B" and the KGB carried out an exchange operation at the "ELLIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained an exact duplicate of the sixteenth diskette ("D-16"), which "B" had sent by mail the week before. The diskette contained additional classified information about technical and recruitment matters. "B" requested the KGB to load the "ELLIS" dead drop site at any time, and advised that he would check the signal site periodically about the loading. The package from the KGB t.o "B" contained $55,000 cash and a letter advising "B" that $50,000 had been deposited into his escrow account in Moscow. "B" never signaled that he had cleared this dead drop, and on October 26 the KGB retrieved its package. 112. On Tuesday, October 31, 1989, the KGB loaded the "ELLIS" dead drop site with a package containing the $55,000 cash and a second KGB diskette. The diskette provided a new accommodation address, and instructions to "B" on how to inform the KGB which materials should be opened by the KGB in Washington, D.C., and which should go to the Center. It conveyed regards from the KGB Chairman and made extensive requests for additional information concerning particular United States intelligence activities targeting the Soviet Union. On November 11, 1989, the KGB observed that the "ELLIS" signal site was removed, indicating that "B" had removed the KGB's package. 113. On Monday, December 25, 1989, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "BOB" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his seventeenth diskette ("D-17") and several documents including a DCI National Intelligence Estimate entitled "The Soviet System in Crisis: Prospects for the Next Two Years" and dated November 1989. This document was classified SECRET, bore the caveats NOFORN NOCONTRACT WNINTEL, and contained the notice: "Unauthorized Disclosure Subject to Criminal Sanctions." He also provided additional documents on the highly sensitive technical operation referred to above. The diskette contained a message in which "B" complimented the KGB's efficient actions, and provided current information about: several ongoing FBI recruitment operations against Soviet intelligence officers; three new tightly-protected FBI sources within the KGB and other Soviet entities; and four detectors. He also provided updated information on the Bloch-Gikman matter. The package from the KGB to "B" contained $38,000 cash as payment for the October 16-23 period plus compensation for the two returned diamonds, and two KGB diskettes. The diskettes contained Christmas greetings from the KGB, discussed communications plans, and asked "B" for specific information about a variety of classified technical operations. 114. On Monday, March 5, 1990, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "CHARLIE" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his eighteenth diskette ("D-18"), on which "B" provided classified information on a wide variety of topics, including: four Soviet nationals, a KGB officer, a Soviet illegal, and two KGB detectors, who were all serving as FBI-CIA sources; communications intelligence operations; and the identification of a particular named NSA employee and the sensitive office in which the employee worked. The package also contained a 120-page document whose title, according to KGB records, was "Soviet Armed Forces and Strategic Nuclear Capabilities for the 1990s," dated February 1990. The package from the KGB contained $40,000 cash and a KGB diskette. The diskette discussed communications plans and asked "B" to provide information on a wide variety of classified technical, operational, and recruitment matters. The KGB also asked "B" what the Soviets could use of the certain highly classified and sensitive program information he had previously disclosed. 115. On Monday, May 7, 1990, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "DORIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his nineteenth diskette ("D-19") and approximately 232 pages of material, including another document on the tightly-compartmented classified program that was the subject of the document "B" passed to the KGB on August 7, 1989. "B" also gave the KGB permission to use the certain highly classified and sensitive program information he had previously disclosed. "B" also advised that because of a promotion he would be traveling for one year, and he discussed communications plans and a method of renewing contact. The package from the KGB to "B" contained $35,000 cash and a KGB diskette. The diskette contained communications plans, and identified a new dead drop site, codenamed "FLO", located under a footbridge in Lewinsville Park near the intersection of Warner Avenue and Westbury Road in McLean, Virginia, in the Eastern District of Virginia, and a nearby signal site. The diskette also contained specific requests for information, including operational leads and materials on recruitments of Soviets. It read, in part, as follows: Dear Friend: . . . . We attach some information requests which we ask Your kind assistance for. We are very cautious about using Your info and materials so that none of our actions in no way causes [sic] no harm to Your security. With this on our mind we are asking that sensitive materials and information (especially hot and demanding some actions) be accompanied by some sort of Your comments or some guidance on how we may or may not use it with regard to Your security. We wish You good luck and enclose $35,000. Thank you. Sincerely, Your friends. 116. On or about May 17, 1990, the KGB received a letter and a diskette from "B" at an accommodation address in the Eastern District of Virginia. 117. On Monday, May 21, 1990, the KGB loaded the "ELLIS" dead drop site with a package containing two KGB diskettes, and marked a call-out signal for "B." "B" picked up the KGB's package, but did not leave one for the KGB. The KGB diskettes contained a letter that discussed in detail communications plans and recontact procedures. It read, in part: Dear Friend: Congratulations on Your promotion. We wish You all the very best in Your life and career. We appreciate Your sympathy for some difficulties our people face - Your friendship and understanding are very important to us. Of course You are right, no system is perfect and we do understand this. Speaking about the systems. We don't see any problem for the system of our future communications in regard to this new circumstances of Yours. Though we can't but regret that our contacts may be not so regular as before, like You said. We believe our current commo plan - though neither perfect - covers ruther [sic] flexibly Your needs: You may have a contact with us anytime You want after staying away as long as You have to. So, do Your new job, make Your trips, take Your time. The commo plan we have will still be working. We'll keep covering the active call out signal site no matter how long it's needed. And we'll be in a ready-to-go mode to come over to the drop next in turn whenever You are ready: that is when You are back home and decide to communicate. All You'll have to do is to put Your call out signal, just as now. And You have two addresses to use to recontact us only if the signal sites for some reason don't work or can't be used. . . . But in any case be sure: You may have a contact anytime because the active call out site is always covered according to the schedule no matter how long you've been away. . . . Thank You and good luck. Sincerely, Your friends. The KGB particularly asked "B" to "give us some good leads to possible recruitments" among "interesting people in the right places." The KGB also asked for information about a Soviet Embassy employee who "B" had previously identified as an FBI recruitment-in-place, and who the KGB believed was about to defect. 118. On August 20, 1990, the KGB received from "B" an envelope, containing his twentieth diskette ("D-20"), at an accommodation address in the Eastern District of Virginia. The envelope bore the return address "J. Baker, Box 1101, Alexandria VA". The diskette contained classified information about several matters. "B" instructed the KGB to load the "FLO" dead drop site on September 3, 1990. 119. On Monday, September 3, 1990, the KGB loaded the "FLO" dead drop site with a package containing $40,000 cash, and a KGB diskette containing a letter which identified more call-out signal sites and contained numerous specific requests for classified information. The letter noted that some of the materials "B" had provided about "political issues of interest . . . were reported to the very top." "B" subsequently picked up the KGB's package. 120. On Saturday, February 2, 1991, in response to an emergency call-out signal from "B", the KGB retrieved a package from "B" at the "CHARLIE" dead drop site in the Eastern District of Virginia. The package contained "B"'s twenty-first diskette ("D-21"), which included a letter in which "B" acknowledged receipt of the $40,000, which he characterized as "too generous." He disclosed to the KGB that the FBI's chief of counterintelligence in the New York Field Office had told him that the FBI had recruited a specific number of sources at a particular Soviet establishment. "B" also advised that he would be ready for an operation on February 18, 1991. In exchange, the KGB left a package for "B" but he did not pick it up and the KGB later retrieved it. 121. On Monday, February 18, 1991, the KGB loaded the "CHARLIE" dead drop site with a package containing $10,000 cash and a KGB diskette. The diskette established two new dead drop sites, one of which was codenamed "GRACE" and located under a footbridge in Rock Creek Park in Washington, D.C. It also asked "B" to provide specific classified technical and operational information, and instructed that the next contact would be at the "DORIS" dead drop site. 122. On Monday, April 15, 1991, in response to a call-out signal from "B", he and the KGB carried out an exchange operation at the "DORIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his twenty-second diskette ("D-22") in which he confirmed receipt of cash. "B" also provided classified FBI material about a specific recruitment operation about which the KGB had previously asked. The package from the KGB to "B" contained $10,000 and a KGB diskette which read, in part, as follows: Dear Friend: Time is flying. As a poet said: "What's our life, If full of care You have no time To stop and stare?" You've managed to slow down the speed of Your running life to send us a message. And we appreciate it. We hope You're O'K and Your family is fine too. We are sure You're doing great at Your job. As before, we'll keep staying alert to respond to any call from You whenever You need it. We acknowledge receiving one disk through CHARLIE. One disk of mystery and intrigue. Thank you. Not much a business letter this time. Just formalities. We consider Site-9 cancelled. And we are sure You remember: our next contact is due at ELLIS. Frankly, we are looking forward to JUNE. Every new season brings new expectations. Enclosed in our today's package please find $10,000. Thank You for Your friendship and help. We attach some information requests. We hope You'll be able to assist us on them. Take care and good luck. Sincerely, Your friends. The KGB asked "B" for information about several specific classified matters, including United States Intelligence Community plans to respond to domestic turmoil in the Soviet Union and new United States communications intelligence efforts. 123. On Monday, July 15, 1991, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "ELLIS" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his twenty-third diskette ("D-23") and approximately 284 pages of material. The diskette read, in part: "I returned, grabbed the first thing I could lay my hands on" and " I was in a hurry so that you would not worry, because June has passed, they held me there longer." He also noted that he had at least five years until retirement, and remarked: "Maybe I will hang in there for that long." "B" also reported on a particular FBI-CIA operation. The classified documents passed by "B" included FBI documents, human intelligence plans, and documents concerning nuclear and missile weapons proliferation. The package from the KGB to "B" contained $12,000 cash and a KGB diskette reading, in part, as follows: Dear friend: Acknowledging the disk and materials . . . received through "DORIS" we also acknowledge again Your superb sense of humor and Your sharp-as-a-razor mind. We highly appreciate both. Don't worry. We will not steam out incorrect conclusions from Your materials. Actually, Your information grately [sic] assisted us in seeing more clearly many issues and we are not ashamed to correct our notions if we have some. So, thank You for Your help. But if some of our requests seem a bit strange to You, please try to believe us there were sufficient reasons to put them and that what we wanted was to sort them out with Your help. In regard to our "memo" on Your security. Just one more remark. If our natural wish to capitalize on Your information confronts in any way Your security interests we definitely cut down our thirst for profit and choose Your security. The same goes with any other aspect of Your case. That's why we say Your security goes first. . . . We are sure You remember our next contact is due at "FLO". As always we attach some information requests, which are of current interest to us. We thank You and wish You the very best. Sincerely, Your friends. Enclosed in the package please find $12,000. The KGB gave "B" new communications plans, and numerous specific requests for classified technical, operational, and recruitment matters. The KGB also asked follow-up questions about information "B" had previously provided, and requested specific United States Intelligence Community activity towards the Soviet Union. 124. On Monday, August 19, 1991, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "FLO" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained a recent FBI memorandum concerning specific methods of surveillance of a particular Soviet intelligence officer. It also contained "B"'s twenty-fourth diskette ("D-24") on which he discussed communications plans and provided information about classified technical and operational matters. On this diskette, he also discussed how the Soviet Union could benefit from a thorough study of the period of Chicago' s history when the city was governed by Mayor Richard J. Daley. The package from the KGB to "B" contained $20,000 cash and a message welcoming "B" back and advising that the next exchange would be at the "GRACE" dead drop site. 125. On Monday, October 7, 1991, after a call-out signal from "B", he and the KGB carried out an exchange operation at the "GRACE" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained his twenty-fifth diskette ("D-25") and a classified document entitled "The US Double-Agent Program Management Review and Policy Recommendations" dated September 10, 1991. On the diskette, "B" provided information about various classified recruitment operations. "B" also identified by name a particular "old friend" whom he suggested the KGB try to recruit; he explained that the man was a military officer who had recently been told he would not be promoted. The package from the KGB to "B" contained $12,000 cash and a KGB diskette reading, in part, as follows: Dear friend: Thanks for the package of 02.13. [The] materials are very promising, we intend to work on the scenario so wisely suggested by You. And the magical history tour to Chicago was mysteriously well timed. Have You ever thought of foretelling the things? After Your retirement for instance in some sort of Your own "Cristall [sic] Ball and Intelligence Agency" (CBIA)? There are always so many people in this world eager to get a glimpse of the future. But now back to where we belong. There have been many important developments in our country lately. So many that we'd like to reassure You once again. Like we said: we've done all in order that none of those events ever affects Your security and our ability to maintain the operation with You. And of course there can be no doubt of our commitment to Your friendship and cooperation which are too important to us to loose [sic].... Please note: our next contact is due at HELEN. Enclosed in the package please find $12,000 and attached as always are some information requests which we'd ask Your kind attention to. Thank You and good luck. Sincerely, Your friends. The KGB provided new communications plans and asked "B" for specific information about a variety of classified technical, operational, and analytical matters. The KGB also asked for the current 1991 issue of a particular document reporting on Soviet knowledge of United States satellite reconnaissance systems, commenting that: "It's fun to read about the life in the Universe to understand better what's going on on our own planet." Asking about some pages that appeared to be missing from "B"'s July package, the KGB noted: "Sometimes it happens, we understand. Life is becoming too fast." 126. On December 12, 1991, the KGB received an envelope from "B" at an accommodation address in Alexandria, Virginia, in the Eastern District of Virginia. The envelope, which was addressed by hand, bore a handwritten return address of "J. Baker, Box 1101, Houston, TX" and was postmarked Washington, D.C. The envelope contained a handwritten note reading: "≠ @ BOB on 6/22; T. DEVICE APPROVED 6/16, COMING SOON". Using the established "6" coefficient, the reference to "6/22" actually refers to December 16. The reference to "T. DEVICE" related to information "B" had previously passed to the KGB regarding a classified technical operation. 127. On Monday, December 16, 1991, "B" and the KGB carried out an exchange operation at the "BOB" dead drop site in the Eastern District of Virginia. The package from "B" to the KGB contained several documents, including: (A) A DCI Counterintelligence Center research paper entitled "The KGB's First Chief Directorate: Structure, Functions, and Methods," dated November 1990. The document was classified SECRET with the caveats NOFORN NOCONTRACT ORCON. It also bore the following notices: WARNING NOTICE This document should be disseminated only to persons having both the requisite clearances and a need to have access to its contents for performance of their duties. No further distribution or reproduction is authorized without the approval of the Associate Deputy Director for Operations for Counterintelligence, CIA. and National SecurityUnauthorized Disclosure InformationSubject to Criminal Sanctions (B) A current volume of the DCI Congressional Budget Justification that detailed the programs and resource needs of the FBI's Foreign Counterintelligence Program. The document was classified SECRET with the caveats NOFORN NOCONTRACT ORCON, and the warning: "Unauthorized Disclosure Subject to Criminal Sanctions." The package from "B" also contained his twenty-sixth diskette ("D-26") in which he expressed embarrassment over the pages missing from his earlier package, and advised that he had been promoted to a position of increased salary and authority that had moved him temporarily out of direct responsibility for Soviet matters. He noted that a new mission for his new group had not yet been defined, and he quoted a particular remark by General Patton about the Japanese. "B" discussed communications plans, and provided information about various classified technical and operational matters. He also proposed a new communications system, in which he would set up an office at a location in town not subject to electronic surveillance, where he and the KGB could communicate directly using a computer that would be specially-equipped with certain advanced technology. The package from the KGB to "B" contained $12,000 cash and a KGB diskette discussing communications plans and asking for specific information about various classified matters. 128. In one message to "B" the KGB warned him to: "Examine from the point of security Your practice of copying materials." 129. On or before October 6, 1999, "B" received the following letter from the SVR: Dear friend: welcome! It's good to know you are here. Acknowledging your letter to V. K. we express our sincere joy on the occasion of resumption of contact with you. We firmly guarantee you for a necessary financial help. Note, please, that since our last contact a sum set aside for you has risen and presents now about 800.000 dollars. This time you will find in a package 50.000 dollars. Now it is up to you to give a secure explanation of it. As to communication plan, we may have need of some time to work out a secure and reliable one. This why we suggest to carry on the 13th of November at the same drop which you have proposed in your letter to V. K. We shall be ready to retrieve your package from DD since 20:00 to 21:00 hours on the 12th of November after we would read you [sic] signal (a vertical mark of white adhesive tape of 6-8 cm length) on the post closest to Wolf trap Creek of the "Foxstone Park" sign. We shall fill our package in and make up our signal (a horizontal mark of white adhesive tape). After you will clear the drop don't forget to remove our tape that will mean for us - exchange is over. We propose a new place where you can put a signal for us when in need of an urgent DD operation. LOCATION: the closest to Whithaven [sic] Parkway wooden electricity utility pole at the south-west corner of T- shaped intersection of Foxhall Road and Whitehaven Parkway (map of Washington, DC, page 9, grid Bll). At any working day put a white thumb tack (I cm in diameter, colored sets are sold at CVS) into the Northern side of the pole at the height of about 1.2 yards. The tack must be seen from a car going down Foxhall Road. This will mean for us that we shall retrieve your package from the DD Foxstone Park at the evening of the nex [sic] week's Tuesday (when it's getting dark). In case of a threatening situation of any kind put a yellow tack at the same place. This will mean that we shall refrain from any communication with you until further notice from your side (the white tack). We also propose for your consideration a new DD site "Lewis". DD LOCATION: wooden podium in the amphitheatre of Long-branch Nature Center (map of N.Virginia, page 16, grid G8). The package should be put under the FAR-LEFT corner of the podium (when facing the podium). Entter [sic] Longbranch Nature Center at the sign from Carlin Springs Road (near 6th Road south) and after parking your car in the lot follow the sign "To Amphitheatre." LOCATION OF THE DD SIGNAL: a wooden electricity utility pole at the north- west corner of the intersection of 3d Street and Carlin Springs Road neaqr [sic] the Metrobus stop (the same map, grid F7). The signals are the same as in the "Foxstone Park" DD. The white adhesive tape should be placed on the NORTHERN side of the pole, so that it could be noticed fro [sic] a car moving along Carlin Springs Road in the southern direction from Route 50. Please, let us know during the November operation of your opinion on the proposed places (the new signal and DD "Lewis"). We are intending to pass you a permanent communications plan using drops you know as well a new portion of money. For our part we are very interested to get from you any information about possible actions which may threaten us. Thank you. Good luck to you. Sincerely, Your friends. The initials "V. K." are those of a known SVR Line KR senior officer in Washington, D.C. 130. On or before March 14, 2000, "B" wrote a letter to the SVR, reading, in part, as follows: .... I have come about as close as I ever want to come to sacrificing myself to help you, and I get silence. I hate silence. . . . Conclusion: One might propose that I am either insanely brave or quite insane. I'd answer neither. I'd say, insanely loyal. Take your pick. There is insanity in all the answers. I have, however, come as close to the edge as I can without being truly insane. My security concerns have proven reality-based. I'd say, pin your hopes on 'insanely loyal' and go for it. Only I can lose. I decided on this course when I was 14 years old. I'd read Philby's book. Now that is insane, eh! My only hesitations were my security concerns under uncertainty. I hate uncertainty. So far I have judged the edge correctly. Give me credit for that. Set the signal at my site any Tuesday evening. I will read your answer. Please, at least say goodbye. It's been a long time my dear friends, a long and lonely time. Ramon Garcia 131. On or before June 8, 2000, "B" wrote a letter to the SVR which read, in part, as follows: Dear Friends: Administrative Issues: Enclosed, once again, is my rudimentary cipher. Obviously it is weak in the manner I used it last -- reusing key on multiple messages, but I wanted to give you a chance if you had lost the algorythm [sic]. Thank you for your note. It brought me great joy to see the signal at last. As you implied and I have said, we do need a better form of secure communication -- faster. In this vein, I propose (without being attached to it) the following: One of the commercial products currently available is the Palm VII organizer. I have a Palm III, which is actually a fairly capable computer. The VII version comes with wireless internet capability built in. It can allow the rapid transmission of encrypted messages, which if used on an infrequent basis, could be quite effective in preventing confusions if the existance [sic] of the accounts could be appropriately hidden as well as the existance [sic] of the devices themselves. Such a device might even serve for rapid transmittal of substantial material in digital form. Your FAPSI could review what would be needed, its advisability, etc., obviously -- particularly safe rules of use. While FAPSI may move with the rapidity of the Chinese army, they can be quite effective, in juggernaut fashion, that is to say thorough. . . . New topics: If you are wise, you will reign [sic] in the GRU. They are causing no end of grief. But for the large number of double-agents they run, there would be almost no ability to cite activity warranting current foreign counterintelligence outlays. Of course the Gusev affair didn't help you any. If I'd had better communications I could have prevented that. I was aware of the fact that microphones had been detected at the State Department. (Such matters are why I need rapid communications. It can save you much grief.) Many such things are closely held, but that closeness fails when the need for action comes. Then the compartments grow of necessity. I had knowledge weeks before of the existence of devices, but not the country placing them. . . . I only found out the gruesome details too late to warn you through available means including the colored stick-pin call. (Which by the way I doubted would work because of your ominous silence.) Very frustrating. This is one reason I say 'you waste me' in the note. . . . The U.S. can be errantly likened to a powerfully built but retarded child, potentially dangerous, but young, immature and easily manipulated. But don't be fooled by that appearance. It is also one which can turn ingenius [sic] quickly, like an idiot savant, once convinced of a goal. The [ ] Japanese (to quote General Patten [sic] once again) learned this to their dismay.... I will not be able to clear TOM on the first back-up date so don't be surprised if we default to that and you find this then. Just place yours again the following week, same protocol. I greatly appreciate your highly professional inclusion of old references to things known to you in messages resulting from the mail interaction to assure me that the channel remains unpirated. This is not lost on me. On Swiss money laudering [sic], you and I both know it is possible but not simple. And we do both know that money is not really 'put away for you' except in some vague accounting sense. Never patronize at this level It offends me, but then you are easily forgiven. But perhaps I shouldn't tease you. It just gets me in trouble. thank you again, Ramon 132. On or before July 31, 2000, "B" received the following letter from the KGB/SVR: Dear Ramon: We are glad to use this possibility to thank You for Your striving for going on contact with us. We received Your message. The truth is that we expended a lot of efforts to decipher it. First of all we would like to emphasize that all well known events wich [sic] had taken place in this country and in our homeland had not affected our resources and we reaffirm our strong intentions to maintain and ensure safely our long-term cooperation with You. We perceive Your actions as a manifestation of Your confidence in our service and from our part we assure You that we shall take all necessary measures to ensure Your personal security as much as possible. Just because proceeding from our golden rule - to ensure Your personal security in the first place - we have proposed to carry out our next exchange operation at the place which had been used in last august [sic]. We did not like to give You any occasion to charge us with an inadequate attention to problems of Your security. We are happy that, according to the version You have proposed in Your last letter, our suggestions about DD, known as "Ellis", coincided completely. However a situation around our collegues [sic] at the end of passed [sic] year made us to refuse this operation at set day. 1. We thank You for information, wnich [sic] is of a great interest for us and highly evaluated in our service. We hope that during future exchanges we shall receive Your materials, which will deal with a [sic] work of IC, the FBI and CIA in the first place, against our representatives and officers. We do mean its human, electronic and technical penetrations in our residencies here and in other countries. We are very interested in getting of the objective information on the work of a special group which serches [sic] "mole" in CIA and FBI. We need this information especially to take necessary additional steps to ensure Your personal security.... 2. Before staling a communication plan that we propose for a next future, we would like to precise [sic] a following problem. Do You have any possibility to meet our collegues [sic] or to undertake the exchange ops in other countries? If yes, what are these countries? Until we receive Your answer at this [sic] questions and set up a new communication plan, we propose to use for the exchange ops DD according to the following schedule: = DD "LEWIS" on 27 of may 2001 (with a coefficient it will mean on 21 of november 2000). We draw Your attention on the fact that we used a former coefficient - 6 (sender adds, addressee subtracts). A time will be shown at real sense. We will be ready to withdraw Your package beginning by 8 PM on 27 may 2001 after we shall read Your signal. After that we put DD our package for You. Remove Your signal and place our signal by 9 PM of the same day. After that You will withdraw our package and remove our signal. That will mean an exchange operation is over. We shall check signal site (i.e., its absence) the next day (28 of May) till 9 PM. If by this time a signal had not been removed we shall withdraw our package and shall put it in for You repeatedly dates with DD "ELLIS" ≠ in each seven days after 28 May till 19 of June 2001 (i.e., 13 of December 2000). = We propose to carry out our next operation on 16 of October 2001 (i.e., 10 of April) at the DD "LINDA" in "Round Tree park" (if this place suits for Your [sic] we would like to receive Your oppinion [sic] about that during exchange in may). A time of operation from 8 pm to 9 pm, signals and schedule of alternate dates are the same. In the course of exchange ops we shall pass to You descriptions of new DD and SS that You can check them before. You will find with this letter descriptions of two new DD "LINDA" and "TOM". Hope to have Your opinion about them. In case of break off in our contacts we propose to use DD "ELLIS", that you indicated in your first message. Your note about a second bridge across the street from the 'F' sign, as back up, is approved. We propose to use "ELLIS" once a year on 12 August (i.e., with coeff. it will be 18 February) at the same time as it was in August 1999. On that day we can carry out a full exchange operation -- You will enload your package and put a signal, we shall withdraw it, load our package and put our signal. You will remove our package and put your signal. Alternate dates - in seven days 'til next month. = As it appears from your message, you continue to use post channel as a means of communication with us. You know very well our negative attitude toward this method. However if you send by post a short note where date (i.e., with coefficient), time and name of DD for urgent exchange are mentioned, you could do it by using address you had used in September (i.e., with coeff.) putting in a sealed envelope for V. K. In future, it is inexpedient to use a V. K. name as a sender. It will be better to choose any well known name in this country as you did it before. 3. We shall continue work up [sic] new variants of exchanging messages including PC disks. Of course we shall submit them to your approval in advance. If you use a PC disk for next time, please give us key numbers and program you have used. 4. We would like to tell you that an insignificant number of persons know about you, your information and our relationship. 5. We assess as very risky to transfer money in Zurich because now it is impossible to hide its origin... 133. On or before November 17, 2000, "B" wrote a letter to the KGB/SVR, reading, in part, as follows: Dear Friends: Bear with me. It was I who sent the message trying to use TOM to communicate material to you. On reflection, I can understand why you did not respond. I see that I failed to furnish you sufficient information for you to recognize that the message you left for me in ELLIS did not go astray. You do this often (communicate such assurances through the mention of items like the old date offset we used), and believe me, it is not lost on me as a sign of professionalism. I say bear with me on this because you must realize I do not have a staff with whom to knock around all the potential difficulties. (For me breaks in communications are most difficult and stressful.) Recent changes in U.S. law now attach the death penalty to my help to you as you know, so I do take some risk. On the other hand, I know far better than most what minefields are laid and the risks. Generally speaking you overestimate the FBI's capacity to interdict you, but on the other hand, cocksure officers, (those with real guts and not as much knowledge as they think) can, as we say, step in an occasional cowpie. (Message to the translator: Got a good word for cowpie in Russian?? Clue, don't blindly walk behind cows.). . . . I have drawn together material for you now over a lengthy period. It is somewhat variable in import. Some were selected as being merely instructive rather than urgently important. I think such instructive insights often can be quite as valuable or even more valuable long-term because they are widely applicable rather than narrow. Others are of definite value immediately. My position has been most frustrating. I knew Mr. Gusev was in eminent [sic] danger and had no effective way of communicating in time. I knew microphones of an unknown origin were detected even earlier and had no regular way of communicating even that. This needs to be rectified if I am to be as effective as I can be. No one answered my signal at Foxhall. Perhaps you occasionally give up on me. Giving up on me is a mistake. I have proven inveterately loyal and willing to take grave risks which even could cause my death, only remaining quiet in times of extreme uncertainty. So far my ship has successfully navigated the slings and arrows of outrageous fortune. I ask you to help me survive. . . . On meeting out of the country, it simply is not practical for me. I must answer too many questions from family, friends, and government plus it is a cardinal sign of a spy. You have made it that way because of your policy. Policies are constraints, constraints breed patterns. Patterns are noticed. Meeting in this country is not really that hard to manage, but I am loath to do so not because it is risky but because it involves revealing my identity. That insulation has been my best protection against betrayal by someone like me working from whatever motivation, a Bloch or a Philby. (Bloch was such a shnook. . . . I almost hated protecting him, but then he was your friend, and there was your illegal I wanted to protect. If our guy sent to Paris had balls or brains both would have been dead meat. Fortunately for you he had neither. He was your good luck of the draw. He was the kind who progressed by always checking with those above and tying them to his mistakes. The French said, "Should we take them down?" He went all wet. He'd never made a decision before, why start then. It was that close. His kindred spirits promoted him. Things are the same the world over, eh?) On funds transfers through Switzerland, I agree that Switzerland itself has no real security, but insulated by laundering on both the in and out sides, mine ultimately through say a corporation I control loaning mortgage money to me for which (re) payments are made.... It certainly could be done. Cash is hard to handle here because little business is ever really done in cash and repeated cash transactions into the banking system are more dangerous because of the difficulty in explaining them. That doesn't mean it isn't welcome enough to let that problem devolve on me. (We should all have such problems, eh?) How do you propose I get this money put away for me when I retire? (Come on; I can joke with you about it. I know money is not really put into an account at MOST Bank, and that you are speaking figuratively of an accounting notation at best to be made real at some uncertain future. We do the same. Want me to lecture in your 101 course in my old age? My college level Russian has sunk low through inattention all these years; I would be a novelty attraction, but I don't think a practical one except in extremis.) So good luck. Wish me luck. OK, on all sites detailed to date, but TOM'S signal is unstable. See you in 'July' as you say constant conditions. yours truly, Ramon 134. On the evening of Tuesday, December 12, 2000, FBI surveillance personnel observed HANSSEN driving four times past the Foxstone Park sign on Creek Crossing Road in Vienna, Virginia. As described above, the Foxstone Park sign is the signal site associated with the "ELLIS" dead drop site, which was used from early on in the KGB's "B" operation. 135. Also on the evening of Tuesday, December 12, 2000, FBI surveillance personnel observed HANSSEN walking into a particular store at a shopping center near Foxstone Park at the same time as a known SVR officer was in front of the store. 136. On Tuesday, December 26, 2000, FBI surveillance personnel observed HANSSEN three times at the Foxstone Park signal site: a) At approximately 5:42 pm, HANSSEN stopped his vehicle in front of the Foxstone Park sign for approximately ten to fifteen seconds. b) At approximately 8:53 pm, HANSSEN parked his car on a street off Creek Crossing Road and walked to the Foxstone Park signal site. HANSSEN stopped in front of the Foxstone Park sign, holding a lit flashlight, and swept the flashlight beam in a vertical motion over some wooden pylons located near the sign, between the road and the sign. He appeared to the FBI surveillance personnel to focus his flashlight beam on one of the pylons. He then turned and walked away, shrugging his shoulders and raising his arms in a gesture of apparent disgust or exasperation. HANSSEN returned to his vehicle, and drove away to a nearby Tower Records store. c) At approximately 9:32 pm, HANSSEN drove back past the Foxstone Park signal site, stopped his vehicle in front of it for approximately two to three seconds, and then drove away. 137. During January 2001, FBI surveillance personnel observed HANSSEN drive past the Foxstone Park signal site, and either slowing or stopping at the site, on three occasions. At approximately 8:18 pm on Tuesday, January 9, 2001, HANSSEN drove past the Foxstone Park signal site, came to a complete stop in front of it for approximately 10 seconds, then drove away. Shortly before 6:00 pm on Tuesday, January 23, 2001, HANSSEN drove past the Foxstone Park signal site, came to a rolling stop near it, and then drove away. After 5:00 pm on Friday, January 26, 2001, HANSSEN drove past the Foxstone Park signal site, slowing down near it. 138. On the evening of Monday, February 5, 2001, FBI surveillance personnel observed HANSSEN driving past the Foxstone Park signal site three times between approximately 5:37 pm and approximately 7:44 pm. 139. On Monday, February 12, 2001, FBI surveillance personnel checking the "LEWIS" dead drop site found a package concealed at the site. FBI personnel removed the package and transported it to the FBI Laboratory, where it was opened, its contents were examined and photocopied, and it was restored to an apparently intact condition. The package was then replaced at the dead drop site. The package contained $50,000 in used $100 bills and a typed note reading: "Next 10/31/01 TOM alt. 20,27". These were wrapped in white paper, which was taped, and which in turn was wrapped in a taped-up black plastic trash bag inside a second black plastic trash bag. VI. FACTS ESTABLISHING THAT "B" IS ROBERT PHILIP HANSSEN There is overwhelming evidence that "B" is ROBERT PHILIP HANSSEN. A. FORENSIC EVIDENCE 140. When "B" made dead drops to the KGB/SVR, he would place the contents of the drop in a plastic garbage bag, which he would wrap with tape. The plastic bag would then be placed inside a second garbage bag. The FBI has come into possession of the inner plastic bag used by "B" on one occasion to wrap the contents of a package to the KGB. 141. An FBI fingerprint examiner has conducted an examination of the plastic bag and ascertained that it contains two latent fingerprints of comparison value. The examiner determined that these two fingerprints are those of ROBERT PHILIP HANSSEN. B. MATERIAL OBTAINED FROM HANSSEN'S FBI OFFICE AND VEHICLE 142. On February 5, 2001, pursuant to court authorization, the FBI searched HANSSEN's current personal office within Room 9930 at FBI Headquarters. HANSSEN's briefcase, located in the office, contained (1) HANSSEN's current valid United States tourist passport; (2) a personal address book; (3) several personal checkbooks; (4) multiple sets of financial statements; (5) one computer floppy disk; (6) one 8MB Versa Card Flash Memory Adapter, which is a memory storage card for a computer; (7) one cell phone. These items were photographed, duplicated, or otherwise recorded, but not removed or altered. Upon examination, the FBI determined that the memory storage card contained several letters associated with the "B" operation, which are further described elsewhere in this Affidavit. That these letters were found in HANSSEN's possession is clear and unequivocal evidence that HANSSEN is "B". 143. On January 30, 2001, pursuant to court authorization, the FBI searched HANSSEN's Ford Taurus automobile, and found the following: (1) In the glove compartment were a roll of white Johnson & Johnson medical adhesive tape, and a box of Crayola colored chalk containing 12 pieces of chalk. (2) In one of four cardboard boxes in the trunk were seven classified documents printed from the FBI's Automated Case Support (ACS) system. Several pertained to ongoing FBI foreign counterintelligence investigations and were classified SECRET. (3) In another cardboard box in the trunk were six green fabric-covered United States government ledger notebooks, containing classified information. (4) Also in the trunk were a roll of Superior Performance Scotch clear mailing tape, and dark-colored Hefty garbage bags. These items were not removed, although small samples were taken, and they were photographed. 144. On February 12, 2001, pursuant to court authorization, the FBI again searched HANSSEN's Ford Taurus automobile. In addition to the items described in part (1) of the foregoing paragraph, the glove compartment contained a small plastic box containing thumbtacks of various colors, including yellow and white. It was further ascertained that at least one of the pieces of chalk was pink. These items were not removed, although small samples were taken, and they were photographed. During this search, HANSSEN's briefcase was observed in the vehicle, but it was not removed. C. RECORDING OF TELEPHONE CONVERSATION 145. On August 18, 1986, KGB Officer Aleksander Fefelov spoke by telephone with "B". A portion of that telephone call, lasting approximately two minutes, was recorded. Two FBI analysts, who have worked closely and routinely with HANSSEN for at least five years, have listened to both the recording and an FBI-enhanced version of the recording in which background noise has been minimized. They have both concluded without reservation that the voice of "B" is that of HANSSEN. D. DEAD DROP SITES 146. There is a particularly clear correlation between HANSSEN's personal residence in Northern Virginia and two dead drop sites used frequently in the "B" operation. 147. In 1985, when "B" volunteered to the KGB, HANSSEN lived on Whitecedar Court, in Vienna, Virginia. The first dead drop site selected by "B" was Nottoway Park, which was less than a five minute walk from Whitecedar Court. Between 1985 and 1989, the Nottoway Park site was used for dead drops so frequently - 17 times - that it was designated by the KGB as the "PARK/PRIME" dead drop site. 148. In November 1985, the Whitecedar Court house was sold and HANSSEN moved to New York to undertake his new assignment in the New York Field Office. He returned to FBI Headquarters in August 1987, and moved into a home at 9414 Talisman Drive, Vienna, Virginia, which he had bought in July 1987. 149. In August 1989, the KGB designated drop site "ELLIS," located near Foxstone Park in Vienna, Virginia. The frequent use of this site -- at least seven times -- suggests that "B" lived very close to the site or passed it routinely. A further indication of this is that "B" told the KGB in October 1989 that the KGB could use the "ELLIS" site at any time. In fact, the "ELLIS" site is an approximately one-mile walk from HANSSEN's Talisman Drive residence. E. PALM III 150. HANSSEN owns a Palm III device which is a hand-held personal digital assistant. The FBI has determined that HANSSEN's Palm III contains a reference to "ELLIS" and the date February 18, and the time 8:00. The term "ELLIS" is the KGB/SVR codename for the dead drop site located in the area of Foxstone Park that was used seven times by either "B", the KGB/SVR, or both. F. CORRELATION OF HANSSEN'S WORK ASSIGNMENTS TO "B"'s DISCLOSURES TO THE KGB/SVR 151. "B"'s first letter to the KGB was postmarked in Prince George's County, Maryland, on Tuesday, October 1, 1985. Although at that time HANSSEN had recently been re-assigned to New York City, FBI records show that on that particular day he was in Washington, D.C., on administrative matters. Prince George's County is located on the route between Washington, D.C., and New York City. 152. In May 1990, "B" told the KGB that, due to a promotion, he would be traveling more and his access to materials would be limited. In May 1990, HANSSEN was reassigned from the Soviet Analytical Unit in the Intelligence Division to the Inspection Division at FBI Headquarters. An Inspection Division assignment is a typical feature of an FBI supervisory agent's career path and requires frequent travel to FBI field offices for inspections. While serving in this assignment, HANSSEN traveled frequently from June 1990 through June 1991 to conduct inspections in various FBI offices. 153. On July 15, 1991, "B" indicated to the KGB that he had "returned" from a trip. The KGB responded on August 15, 1991 with a message welcoming him back and noting that "it's great for you to touch the green, green grass o£ home." HANSSEN returned on May 24, 1991 from a lengthy overseas inspection tour. 154. On December 16, 1991, "B" told the KGB that he had "an increase in salary and authority [which] moved him temporarily out of direct responsibility, but a new mission for my new group has not been fully defined" and that "I hope to adjust to that . . . . As General Patton said . . . 'let's get this over with so we can go kick the [ ] out of the [ ] Japanese." (He quoted the same reference to Japanese in the letter he wrote to the SVR on or before June 8, 2000.) At that time, HANSSEN was preparing to assume new duties as Chief of the new National Security Threat List Unit at FBI Headquarters, where he focused the Unit's counterintelligence efforts on economic espionage. This new assignment resulted in an increase in salary (from GS-14 to GS- 15) and authority (Unit Chief). Several FBI employees recall that HANSSEN frequently quoted General Patton, and one employee who worked closely with HANSSEN specifically remembers HANSSEN once using the above-mentioned Patton quote in a discussion with him. 155. In February 1988, "B" told the KGB that he could read the Viktor Sheymov file because a special project relating to Sheyrnov was about to begin. At that time, HANSSEN was reviewing the Sheyrnov file in preparation for his participation in upcoming Intelligence Community debriefings of Sheymov. 156. Throughout the "B" operation, "B" reported on Sheymov's defection. HANSSEN took particular interest in the Sheymov case and developed a personal friendship with Sheymov. Recently, in fact, HANSSEN told FBI co-workers that he was considering an offer of lucrative employment by Sheymov after retirement in April 2001. 157. On August 19, 1991, "B" passed detailed information to the KGB on FBI coverage of a particular suspected Soviet intelligence officer. On July 1, 1991, HANSSEN returned to the Intelligence Division at FBI Headquarters (after his tour of duty on the Inspection Staff) and became the Headquarters Supervisor responsible for FBI coverage of this suspected Soviet intelligence officer. 158. In his assignment to CI-3A, the FBI's Soviet Analytical Unit, HANSSEN had access to an extremely broad array of highly classified material. The FBI has determined that HANSSEN's access to classified material is consistent with "B"'s disclosure of classified material to the KGB/SVR. 159. During two extended periods when "B" was inactive, from November 1985 to June 1986, and August 1986 to August 1987, HANSSEN was assigned to the FBI's Field Office in New York City. 160. In July 1991, "B" told the KGB that he had at least five more years until retirement. HANSSEN was eligible for retirement from the FBI in 1996. G. HANSSEN'S USE OF THE FBI AUTOMATED CASE SUPPORT SYSTEM 161. The Automated Case Support System (ACS) is the FBI's collected computerized databases of investigative files and indices. ACS came online in October 1995. The main, and most extensive ACS database, is the Electronic Case File (ECF), which contains electronic communications and certain other documents related to ongoing FBI investigations, programs, and issues, and the indices to those documents. It is the equivalent of a closed FBI intranet. ACS users can access individual files by making full-text search requests for particular words or terms. 162. FBI personnel who are "approved users" of ACS, including HANSSEN, must log on with a user identification number and password unique to each user. Retrieval logs make it possible to conduct audits of individuals' use of ACS. 163. An audit of HANSSEN's use of ACS shows that he has been a consistent user of ECF in particular, and that he periodically conducted searches of the ECF database using a wide variety of very specific search terms. Although some of HANSSEN's ACS use appears to have been related to his official responsibilities, he made a substantial number of ACS searches apparently directly related to his own espionage activities. Through these searches, HANSSEN could retrieve certain FBI records that would indicate whether HANSSEN or his KGB/SVR associates, or their activities or operational locations, were known to or suspected by the FBI, and thus whether he was exposed to danger. For example, on the following dates HANSSEN searched the ECF for the following terms, limiting some of the searches to a specified period of time as indicated: July 25, 1997:HANSSEN March 30, 1998:DEAD DROP AND KGB May 18, 1998:DEAD DROP DEAD DROP AND RUSSIA July 6, 1998:DEAD DROP DEAD DROP AND WASHINGTON FISA AND CELL PHONE HANSSEN July 30, 1998:9414 TALISMAN DEAD DEAD DROP DEAD DROP AND WASHINGTON DOUBLE D HANSSEN ROBERT P. HANSSEN September 3, 1998:ROBERT HANSSEN ROBERT P HANSSEN ROBERT P. HANSSEN September 21, 1998:'DEAD DROP' 'DEAD DROP' AND RUSSIA October 13, 1998:DEAD DROP DEAD DROP [Dates=08/01/1998-10/13/1998 October 27, 1998:'DEAD DROP' 'DEAD DROP' AND WASHINGTON 'DEAD DROP' WASHINGTON December 14, 1998:DEAD DROP DEAD DROP AND WASHINGTON April 7, 1999:DROP SITE DROP SITE AND RUSSIA April 12, 1999:ROBERT HANSSEN TALISMAN TALISMAN DRIVE WHITE CEDAR WHITECEDAR COURT August 11, 1999:CCTV AND VIRGINIA CCTV AND VIRGINIA[Dates=01/01/1999- 08/11/1999 FOXSTONE August 17, 1999:DEAD DROP[Dates=01/01/1999-08/17/1999 August 30, 1999:DEAD DROP DEAD DROP[Dates=07/01/1999-08/30/1999 September 2, 1999:CCTV CCTV AND SVR 'DEAD DROP' AND SVR 'DEAD DROP' SVR September 28, 1999:DROP SITE DROP SITE[Dates=10/01/1999-10/21/1999 TALISMAN October 21, 1999:DEAD DROP[Dates=10/01/1999-10/21/1999 October 26, 1999:VIENNA AND VIRGINIA VIENNA AND VIRGINIA AND FCI [Dates= 01/01/1999-10/27/1999] October 27, 1999:DEAD DROP [Dates=1/09/1999-1/28/1999 November 3, 1999:FOXSTONE FOXSTONE AND VIENNA VIENNA AND DROP VIENNA AND DROP AND FCI [Dates=01/01/1999-ll/4/1999 VIENNA AND DROP[Dates=01/06/1999- 03/11/1999] November 15, 1999:DEAD DROP AND VIRGINIA FOXSTONE January 13, 2000:DEAD DROP[Dates=01/01/2000-01/13/2000 DEAD DROP [Dates=10/01/1999-12/31/1999 January 18, 2000:DROP SITE AND VIRGINIA SVR AND DEAD DROP NOT GRU March 14, 2000:DEAD DROP AND SVR March 31, 2000:DEAD DROP DEAD DROP AND RUSSIA May 22, 2000:TALISMAN DRIVE September 28, 2000:DEAD DROP AND WASHINGTON October 4, 2000:DROP SITE[Dates=08/01/2000-10/04/2000 November 13, 2000:DEAD DROP[Dates=10/01/2000-ll/13/2000 December 21, 2000:DEAD DROP [Dates=10/01/2000-12/22/2000 ESPIONAGE [Dates=11/01/2000-12/21/2000 January 3, 2001:ROBERT HANSSEN January 16, 2001:DEAD DROP[Dates=12/01/2000-01/15/2001 ESPIONAGE [Dates=12/01/2000-01/15/2001 January 19, 2001:DEAD DROP[Dates=12/01/2000-01/18/2001 January 22, 2001:DEAD DROP[Dates=01/01/2000-01/12/2001 DEAD DROP[Dates=12/01/2000-01/22/2001 DEADDROP[Dates=01/01/2000-01/22/2001 FOXSTONE H. "B"'S "OLD FRIEND" 164. In 1991, "B" proposed that the KGB consider recruiting a particular named individual who he described as an "old friend." HANSSEN had been friends with this individual since HANSSEN was a teenager. VII. LOCATION OF EVIDENCE, FRUITS, INSTRUMENTALITIES,. AND PROCEEDS 165. Based on my training and experience, and that of other FBI personnel with whom I have consulted, and on my participation in this investigation, I know that: 166. Persons who have engaged in espionage activities on behalf of foreign intelligence services maintain records, notes, bank records, financial statements, calendars, journals, maps, instructions, classified documents, and other papers or documents relating to the transmittal of national defense and classified intelligence information to foreign governments and intelligence services. Such records, notes, bank records, financial statements, calendars, journals, maps, instructions, classified documents, and other papers or documents are maintained, albeit often secreted, on their persons, in and around their residences, at their places of employment, in home and office computers, in their automobiles, and in other remote locations such as safe deposit boxes and storage facilities. 167. Persons who have been engaged in espionage activities on behalf of foreign intelligence services often utilize espionage paraphernalia, including devices designed to conceal and transmit national defense and classified intelligence information. These paraphernalia and devices include materials used by espionage agents to communicate between each other and with a foreign government, to wit: coded pads, secret writing paper, chemicals used to develop coded and secret messages, microdots, and microfiche, together with instructions in the use of these materials; electronic recording and transmittal equipment; computers and computer disks; cameras and film; books, records, documents, and papers. The information that is frequently passed or recorded through such methods often includes: (1) national defense and classified intelligence information; (2) the identities of other foreign espionage agents and intelligence officers; (3) financial transactions, including payments to foreign espionage agents and hidden financial accounts; (4) records of previous illicit espionage transactions; and (5) the source and disposition of national defense and classified information. 168. Persons who have been engaged in espionage activities on behalf of foreign intelligence services routinely conceal in their residences large amounts of United States and foreign currency, financial instruments, precious metals and gems, jewelry, and other items of value and/or proceeds of illegal espionage transactions. They also conceal records relating to hidden foreign and domestic bank and financial records, including accounts in fictitious names. 169. Persons who have been engaged in espionage activities on behalf of foreign intelligence services often secrete national defense and classified documents and materials, as well as clandestine communications devices and instructions, contact instructions, codes, telephone numbers, maps, photographs, other papers and materials relating to communications procedures, and proceeds and records of illegal espionage transactions, in secure hidden locations and compartments within their residences, places of employment, safe deposit boxes, storage facilities, and/or motor vehicles, including hidden compartments within motor vehicles, for ready access and to conceal such items from law enforcement authorities. 170. Persons who have been engaged in espionage activities on behalf of foreign intelligence services are not unlike any other person in our society in that they maintain documents and records, often doing so for long periods of time regardless of whether their value to the person has diminished. These persons maintain documents and records that will identify and corroborate travel both in the United States and abroad made in connection with foreign intelligence activity, including personal meets with foreign intelligence officers. Such documents and records include passports, visas, calendars, journals, date books, telephone numbers, credit cards, hotel receipts, airline records, correspondence, carbon copies of money orders and cashier's checks evidencing large cash expenditures, and accounts and records in fictitious names. 171. Persons who have been engaged in espionage activities on behalf of foreign intelligence services often maintain identity documents, including those utilizing fictitious identities. United States foreign currency, instructions, maps, photographs. United States and foreign bank accounts' access numbers and instructions, and other papers and materials relating to emergency contact procedures and escape plans. 172. The above-described results of recent court authorized searches of HANSSEN's automobile and office demonstrate that HANSSEN has retained evidence of his espionage activity, and that such activity is ongoing. 173. Both the location of the dead drop site "ELLIS", and the location of the signal site associated with the "ELLIS" dead drop site ≠ the Foxstone Park sign in the southern part of Foxstone Park -- are within an approximately one-mile driving and walking distance from HANSSEN's residence at 9414 Talisman Drive, Vienna, Virginia. 174. "B" had substantial communications with the KGB about using sophisticated computer techniques for communications, and he sent information to the KGB on encrypted computer diskettes. HANSSEN is known to be highly skilled in the use of computers and computer programming, and to maintain at least one computer with its own server in his residence at 9414 Talisman Drive, Vienna, Virginia. There is thus probable cause to believe that in continuing espionage activities HANSSEN is using one or more computers (in addition to his Palm III device) and related disks, diskettes, and other equipment now located in his residence at 9414 Talisman Drive, Vienna, Virginia. VIII. SPECIAL NEEDS AND JUSTIFICATION TO SEIZE COMPUTERS AND RELATED HARDWARE AND ELECTRONIC STORAGE DEVICES FOUND AT HANSSEN'S RESIDENCE FOR OFF-SITE EXAMINATION 175. As noted above, HANSSEN has a high degree of computer technology expertise. In addition, there is probable cause to believe that HANSSEN is using computers as an instrumentality of his espionage activities. This is evidenced by the letters to and from the KGB/SVR found on the computer memory card in his briefcase, and by the reference "ELLIS" on his Palm III device, as well as HANSSEN's extensive accessing of the FBI's ACS system for information relevant to his espionage activities. HANSSEN has at least one computer and a server in his residence at 9414 Talisman Drive, Vienna, Virginia, and a portable laptop computer. Because of the likelihood that HANSSEN will have extraordinary amounts of information and files in his computers (including laptops) and any computer storage devices and that such information may be encrypted, it will be neither practical nor reasonable to require the searching agents to examine the defendant's computers onsite at his residence. Given HANSSEN's computer expertise and concern about detection, there is considerable risk that HANSSEN has set up self-destruct programs for his computers that could erase vital evidence and files if his system or systems were examined by anyone other than experts. Accordingly, the FBI intends to seize those components of HANSSEN' s computer hardware and related equipment as the FBI determines must be seized in order to be examined in an appropriate location by Computer Analysis Response Team (CART) personnel. Seizing and disabling the defendant's computer hardware will also help prevent HANSSEN or any co-conspirators from seeking to erase any data on HANSSEN's computer system (including his server) from any remote location and through any special destructive program. 176. In addition, it is highly probable that HANSSEN has access to and has used the computers (including laptops) of family members residing in the same residence. Accordingly, he may be using these computers of family members to store or transmit or conceal classified information or other evidence of the espionage activity set forth in this affidavit. It will therefore be necessary to seize and examine the computer hardware and files within of family members. Such computers and files therein will be speedily returned to those family members if examination discloses that they have in fact no evidence or documents connected to the espionage activity described in this Affidavit. IX. REQUEST FOR AUTHORITY TO EXECUTE SEARCH WARRANTS DURING NIGHTTIME HOURS Based on my experience and the experience of other FBI Special Agents known to me, I am aware that persons who have committed serious felonies, particularly those felonies with authorized punishments of death or incarceration for any term of years or life, will often attempt to destroy evidence, fruits, and instrumentalities of their crimes if alerted prematurely to law enforcement interest. I also know that foreign intelligence services, including the SVR, are able to communicate prearranged "danger" signals to their agents to alert them to destroy evidence, fruits and other instrumentalities of crime, as well as to execute emergency escape plans. I am also aware that these hostile foreign intelligence services, and in particular the SVR, actively seek to penetrate United States intelligence and law enforcement agencies by technical and human means to learn about FBI counterintelligence activities. As a result, law enforcement interest could be detected at any time and it may be necessary to execute a search warrant during night time hours to preserve evidence, fruits and instrumentalities of espionage from destruction. In addition, it is noted that as a Special Agent of the Federal Bureau of Investigation, HANSSEN is authorized to carry a service weapon at all times, and he is known to have additional weapons in his residence, and may in his vehicles, that could pose an immediate danger and threat to any searching or arresting agents unless seized and secured as quickly as possible. If the FBI is unsuccessful in apprehending HANSSEN immediately, he could return home during evening hours to destroy incriminating evidence, obtain a weapon and other items to assist his flight or evasion. In an undated letter to the KGB in November 1985, HANSSEN wrote: "Eventually I would appreciate an escape plan." HANSSEN currently carries his valid tourist passport in his briefcase. As noted above, the SVR has instructed HANSSEN to use a yellow tack in case of a "threatening situation", which could trigger an SVR-assisted escape, and he has recently possessed yellow tacks. It is highly likely that HANSSEN would have such an escape plan in place by 2001, and that authority to search at any time of the day or night would be essential to foil any such escape plan, especially if HANSSEN received warning from the SVR. Finally, as noted above, much of the operational activity of the "B" operation occurred at night. Recently, HANSSEN was observed checking a known KGB/SVR signal site on several nighttime occasions in December 2000 and January and February. Accordingly, there is probable cause to believe that HANSSEN would go to the signal site or related dead drop site (both designated under the code name "ELLIS") at any time, and especially at night to avoid detection. Because an arrest of HANSSEN could well occur in the nighttime hours, and the searches should be conducted immediately upon his arrest, authority is requested to execute search warrants during nighttime hours. X. CONCLUSION AS TO PROBABLE CAUSE TO SEARCH 177. Based on the above facts and circumstances, I believe there is probable cause that evidence, fruits, instrumentalities, and proceeds of espionage activity by ROBERT PHILIP HANSSEN, in violation of Title 18, United States Code, Section 794 (a) (Transmitting National Defense Information) and Section 794 (c) (Conspiracy to Commit Espionage), are located in: 1) The residence of ROBERT PHILIP HANSSEN, such premises known and described as a single family residence located at: 9414 Talisman Drive Vienna, Virginia 22182 as more fully described in Attachment B, and which is within the Eastern District of Virginia; 2) One silver 1997 Ford Taurus, bearing VIN IFALP52U9VG211742 and Virginia license plate number ZCW9538, which is anticipated to be within the Eastern District of Virginia; 3) One 1993 Volkswagen van, bearing VIN WV2KC0706PH080424 and Virginia license plate number ZCW9537, which is anticipated to be within the Eastern District of Virginia; 4) One 1992 Isuzu Trooper, bearing VIN JACDH58W7N7903937 and Virginia license plate YRP3849, which is anticipated to be within the Eastern District of Virginia; XI. WARRANTS REQUESTED Based on all the foregoing, I respectfully request a warrant for the arrest of ROBERT PHILIP HANSSEN, and search warrants for the locations described in the immediately foregoing Section of this Affidavit. XII. ATTESTATION The above facts are true and correct to the best of my knowledge and belief. [signed] Stefan A. Pluta Special Agent Federal Bureau of Investigation Sworn and Subscribed to before me this 16th day of February, 2001. [signed:] T.R. JOSEPH [?] UNITED STATES MAGISTRATE JUDGE ATTACHMENT A 1) Espionage paraphernalia, including devices designed to conceal and transmit national defense and classified intelligence information and material, and implements used by espionage agents to communicate with their handlers and with a foreign government, to wit: white tape, mailing tape, colored chalk (all used for signaling purposes), coded pads, secret writing paper, microdots, any letters, notes or other written communications (including contact instructions) between defendant ROBERT PHILIP HANSSEN and any agents of the SVR or other intelligence service of the Russian Federation; any computers, (including laptops), computer disks, cameras, film, codes, telephone numbers, maps, photographs and other materials relating to communication procedures, correspondence; 2) Records, notes, calendars, journals, maps, instructions, and classified documents and other papers and documents relating to the transmittal of national defense and classified intelligence information (including the identities of foreign espionage agents and intelligence officers and other foreign assets or sources providing information to the United States Intelligence Community, such as the FBI and CIA; United States Government ledger notebooks in which the defendant ROBERT PHILIP HANSSEN has notes pertaining to FBI foreign counterintelligence investigations; records of previous illicit espionage transactions, national defense and classified intelligence information, including copies of documents copied or downloaded by ROBERT PHILIP HANSSEN from the FBI's Automated Case Support System (ACS), which is the FBI's computerized databases of investigative indices and files; FBI investigative serials; records receipts, .papers or documents reflecting financial accounts, where ROBERT PHILIP HANSSEN received payments from the KGB, SVR, or other agents of the Soviet Union or successor Russian Federation, records or documents reflecting the source and disposition of national defense and classified intelligence and counterintelligence information; 3) Large amounts of United States and foreign currency, financial instruments, precious metals, jewelry, and other items of value, which are the proceeds of or assets derived from illegal espionage transactions; any financial records of foreign and domestic bank accounts, including canceled checks, monthly statements, deposit slips, withdrawal slips, wire transfer requests and confirmations, account numbers, addresses, credit cards and credit card statements, financial and investment account records (including dividend records, stock transaction records), all reflecting illicit proceeds or wealth from multiple years of engaging in espionage for pay from the Soviet Union and successor Russian Federation and their intelligence services; records of such financial accounts and records in the possession or control of defendant ROBERT PHILIP HANSSEN but in fictitious or alias names; 4) Passports, visas, calendars, date books, address books, credit card and hotel receipts, airline records, reflecting travel in furtherance of espionage activities, and any documents evidencing large cash expenditures derived from espionage activities; 5) Identity documents, including but not limited to passports, licenses, visas (including those in fictitious or alias identities), U.S. and foreign currency, instructions, maps, photographs, U.S. and foreign bank account access numbers and instructions and other papers and materials relating to emergency contact procedures and escape routes; 6) Safety deposit box records, including signature cards, bills, and payment records, safety deposit box keys, whether in the name of the defendant or a family member; any records pertaining to any commercial storage sites where the defendant may be storing other classified intelligence and counter-intelligence documents or other records of his espionage activities; 7) Federal, state and local tax returns, work sheets, W-2 forms, 1099 forms, and any related schedules; 8) Records concerning real property purchases, sales, transfers, both within the United States and any foreign countries, including deeds, deeds of trust, land contracts, settlement statements, and mortgage documents, such records reflecting disposition of proceeds from and assets acquired from money paid to the defendant for his espionage on behalf of the Soviet Union, successor Russian Federation, and their intelligence services; 9) Telephone bills and records, including calling cards and pager records; 10) Photographs, including photographs of co-conspirators; correspondence (including envelopes) to and from ROBERT PHILIP HANSSEN and handlers, contacts and intelligence agents of the Soviet Union and successor Russian Federation; 11) Copies of applications, affidavits, search warrants, and returns filed with the Foreign Intelligence Surveillance Court (FISC), concerning current FBI foreign counterintelligence investigations and notes, reports and records pertaining to such investigations, including FBI requests for FISC authority; 12) Computer hardware, software, and storage media, known to be used by the defendant or to which he had access, including, but not limited to: any personal computer, laptop computer, modem, and server, which have been and are being used to commit the offenses of espionage and conspiracy to commit espionage; records, information and files contained within such computer hardware containing evidence and fruits of defendant's espionage activity between October 1, 1985, and the present, including classified documents, in whatever form and by whatever means they have been created or stored, including but not limited to any electrical, electronic, or magnetic form of storage device; floppy diskettes, hard disks, zip disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart cards, memory calculators, pagers, personal digital assistants such as Palm III devices, removable hard drives, memory cards, zip drives, and any photographic forms of such records including microfilm, digital prints, slides, negatives, microfiche, photocopies, and videotapes, computer terminals and printers used by the defendant in said espionage activity. ATTACHMENT B 9414 Talisman Drive, Vienna, Virginia, is the current residence of defendant ROBERT PHILIP HANSSEN, and his family. This residence is a single family detached house, the closet street intersecting 9414 Talisman Drive is McKinley Street. Talisman Drive ends in a cul de sac. It is further described as a wood multi-story building painted brown. This residence also includes an attached garage. 9414 Talisman Drive includes any appurtenances within the curtilege of this property, and any grounds, yard or woods constituting any part of the land upon which this residence is located. ATTACHMENT C One 1997 Ford Taurus four-door, silver in color, VIN #IFALP52U9VG211742, Virginia license tags ZCW9538, which is owned by, registered to, and used by ROBERT PHILIP HANSSEN. It is anticipated that this vehicle will be located in the Eastern District of Virginia in the vicinity of 9414 Talisman Drive in Vienna, Virginia, or elsewhere in the Eastern District of Virginia. ATTACHMENT D One 1993 Volkswagen van, Vin #WV2KC0706PH080424, Virginia license tags ZCW9537, owned and used by ROBERT PHILIP HANSSEN, and also used by his wife. It is anticipated that this vehicle will be located in the Eastern District of Virginia in the vicinity of 9414 Talisman Drive, Vienna, Virginia. ATTACHMENT E One 1992 Isuzu Trooper, VIN #JACDH58W7N7903937, Virginia license tags YRP3849. This vehicle is owned by, and possibly operated by ROBERT PHILIP HANSSEN. It is anticipated that this vehicle will be located in the Eastern District of Virginia in the vicinity of 9414 Talisman Drive, Vienna, Virginia. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= [Non-text portions of this message have been removed] 2556 From: Jordan Ulery Date: Thu Feb 22, 2001 11:47pm Subject: Re; 518 #2 Andy's warning is almost too late in the US, and I am afraid that the arrest of Hansen will encourage more restrictions on our open government. One of the greatest threats to a democratic society is the action of the government itself to "protect" the state and thus the people therein. A democratic republic like the US can exist only if the people support and participate in the operation of the state. Like the former Speaker said, "all politics is local" and each citizen must be involved in his town, county and state as well as the federal government to make this, or any, society work. A democracy, even a republic, like the US, must remain open. Open meetings, open records and open government. When the records get closed, then the government acts in a painfully secret manner and all sorts of little liberties are taken away, in the name of "security," "protection." anti-terrorism," and the like. Eventually we have no liberty at all. One of the penalties we pay for living in a free society is that breaches occur. It is our duty to prevent the lapses and maintain our own defenses. The Founding Fathers knew this. To often we have heard the quotes of "He who desire security of liberty deserves neither" and "the price of liberty is eternal vigilance." Take those quotes into today's world where you are bodily searched before going to court, before visiting a federal building and now, in many places, before visiting state offices. Yes, security is necessary, but it has to be balanced. President Mgabe is making sure he is secure. Stalin and Hitler both made sure they were secure. The first victim is access to government records. The second is access to government. The final victim to "security" is our very liberty to go and do as we please without undue government interference, i.e., the definition of liberty offered by the Supreme Court. Consider, Washington State attempting to close court records to public inspection. Maryland narrowly averting closure of court records. New Hampshire attempting to set up a "Privacy Tzar" (neat phrase for the Tzar of All the Russias was the head of a totalitarian government) that would evaluate your request for public records to determine if your really needed to view the records the government kept. The FTC making regulations that directly countermand the wording of the Fair Credit Reporting Act and intent of Congress. The FCRA itself which prevents an employer from complying with preexisting harassment, equal opportunity and discrimination laws without enormous effort. When government helps crooks, thieves, and scam artist to hide, there is something very wrong with its operation. Please note that I did not mention the more sensational cases, until the last, which have only lead to even more violence. MHO 2557 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:22am Subject: Hints to alleged spy's identity reportedly in letters Friday, February 23, 2001, 12:00 a.m. Pacific Hints to alleged spy's identity reportedly in letters http://seattletimes.nwsource.com/cgi-bin/WebObjects/SeattleTimes.woa/wa/gotoArticle?zsection_id=268448413&text_only=0&slug=spy23&document_id=134269364 by Karen Gullo The Associated Press WASHINGTON - Veteran FBI figure Robert Philip Hanssen left a trail of clues that led authorities to arrest him and charge him with spying for Moscow, say former co-workers and intelligence experts. Russian documents and letters that Hanssen, a 20-year FBI countintelligence agent accused of passing top-secret information to the Soviets and Russian for 15 years, allegedly sent to his Soviet handlers contained hints of his identity - from his code name "B" (Hanssen went by Bob) to using the name of his hometown Chicago as a signal, these former associates said in interviews. FBI officials would not publicly discuss how they came to pinpoint Hanssen as the agent whose alleged spying activities were detailed in internal Russian documents they obtained. "He increased his chances of getting caught" said Paul Moore, a former FBI counterintelligence analyst who has known Hanssen for 20 years. FBI officials have said that Hanssen's identity was not known to the Soviets. The letters and documents about Hanssen refer to him as "B". But these documents had details about the information that Hanssen was accused of leaking, which the FBI could then use to narrow its search. "They had a lot to work with," said Richard Alu, a retired FBI counterintelligence agent who worked with Hanssen for several years. The FBI said yesterday that tighter controls over top-secret documents, and other improvements recommended after the Aldrich Ames spy case, helped it to apprehend Hanssen. Ames was a longtime CIA officer convicted of spying for the former Soviet Union. Bureau management had been cautioned four years ago by the Justice Department inspector general to enhance training and communications. The FBI was criticized at the time by the Justice Department inspector general for not doing enough to find out how Ames leaked sensitive information to the Soviet Union. Ames pleaded guilty in 1994. FBI spokesman John Collingwood said recommendations made in the inspector general's 1997 report were implemented and had a direct bearing on the arrest of Hanssen. "The post-Ames focus on the possibility of additional compromises led directly to the charges against Hanssen. Substantial resources and expertise are being afforded to this effort," he said. Nevertheless, Hanssen's spying went undetected for 15 years. Moore said Hanssen was never polygraphed, which is done in cases of suspicious behavior. The FBI has declined to comment on whether Hanssen took the test. Not only that, Hanssen was meticulous about checking to see whether the bureau was aware of his activities, FBI officials have said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2558 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:22am Subject: Ex-FBI aides say accused spy took chances Ex-FBI aides say accused spy took chances http://www.chron.com/cs/CDA/story.hts/nation/831056 Associated Press WASHINGTON -- Veteran FBI figure Robert Philip Hanssen left a trail of clues that led authorities to arrest him and charge him with spying for Moscow, say former co-workers and intelligence experts. Former associates said Russian documents and letters that Hanssen allegedly sent to his Soviet handlers contained hints of his identity -- from his code name "B" (Hanssen went by Bob) to using the name of his hometown Chicago as a signal. FBI officials would not publicly discuss how they came to pinpoint Hanssen as the agent whose alleged spying activities were detailed in internal Russian documents they obtained. But two former FBI counterintelligence agents who worked with Hanssen said his letters and other evidence in the 100-page affidavit provided several clues about what transpired. "He increased his chances of getting caught" said Paul Moore, a former FBI counterintelligence analyst who has known Hanssen for 20 years. Moore said Hanssen was never polygraphed. The FBI has declined to comment on whether Hanssen took the test. Hanssen also was meticulous about checking to see whether the bureau was aware of his activities, FBI officials said. They said Hanssen's identity was not known to the Russians. The letters and documents about Hanssen refer to him as "B." But the files had details about the information that Hanssen was accused of leaking, which the FBI could then use to narrow its search. "They had a lot to work with," said Richard Alu, a retired FBI counterintelligence agent who worked with Hanssen. On Thursday, FBI officials said tighter controls over top-secret files, and other improvements recommended after the Aldrich Ames spy case, helped apprehend Hanssen. The 20-year counterintelligence agent is accused of passing secret information to the former Soviet Union and Russia for 15 years. Four years ago, the Justice Department's inspector general cautioned FBI officials to enhance training and communications. At the time, the inspector general criticized the FBI for not doing enough to find out how Ames leaked sensitive information to the Soviets. Ames pleaded guilty in 1994. FBI spokesman John Collingwood said recommendations made in the inspector general's 1997 report were implemented and had a bearing on Hanssen's arrest. "The IG's recommendations were constructive and incorporated into the FBI's counterespionage program," Collingwood said. "The post-Ames focus on the possibility of additional compromises led directly to the charges against Hanssen. Despite the improvements, Hanssen's alleged espionage went undetected for 15 years. Meanwhile, President Bush said he was "deeply concerned" about the case and said he would wait for an independent review of internal FBI security procedures to be completed before considering whether FBI agents should be given routine polygraph tests. "We ought to be concerned about espionage in America," Bush said at his first news conference since his inauguration. ============================ AT A GLANCE ============================ ROBERT PHILIP HANSSEN http://www.chron.com/cs/CDA/story.hts/nation/831056 AGE-BIRTH DATE -- 56; April 18,1944. EDUCATION -- M.B.A., accounting and information systems, Northwestern University (1971); B.A., chemistry, Knox College, Galesburg, Ill. (1966). Studied dentistry, Northwestern (1966-1968). EXPERIENCE: ï Information Resources Division, FBI headquarters, January 2001-present. ï FBI's senior representative, Office of Foreign Missions, State Department, Washington, February 1995-January 2001. ï National Security Division, FBI headquarters, December 1994-February 1995. ï Temporary assignment, Washington field office, April 1994-December 1994. ï Chief, National Security Threat List Unit, Intelligence Division, FBI headquarters, January 1992-April 1994. ï Soviet Operations Section, Intelligence Division, FBI headquarters, July 1991-January 1992. ï Inspections Staff, FBI headquarters, June 1990-June 1991. ï Supervisory special agent; Soviet Analytical Unit, Intelligence Division, FBI headquarters, August 1987-June 1990. ï Intelligence Division, New York City, September 1985-August 1987. ï Supervisory special agent, Intelligence Division, FBI headquarters, January 1981-September 1985; ï Criminal and intelligence divisions, New York City, August 1978-January 1981; ï Joins FBI, assigned to offices in Indianapolis and Gary, Ind., January 1976-August 1978. FAMILY -- Wife, Bernadette; six children. Source: Associated Press -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2559 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:24am Subject: It's a mole game to catch a spy Friday February 23, 10:21 PM It's a mole game to catch a spy http://uk.news.yahoo.com/010223/80/b6g1y.html By Tabassum Zakaria WASHINGTON (Reuters) - It's a mole game -- Russians get secrets from an American spy who apparently gets caught because of documents United States obtained from inside Russian intelligence -- and around and around it goes. The case of Robert Hanssen, a 25-year veteran of the FBI accused of selling secrets to Russia for money and diamonds over 15 years, illustrates the circle of treachery that has been played out through the ages. Hanssen was arrested on Sunday on charges of selling secrets to Moscow, including names of Soviets who spied for the United States. His downfall came from original documents and letters of communication between an American code-named "B" and "Ramon" and Russian handlers, which were obtained by U.S. authorities. U.S. officials have been extremely tight-lipped about how they obtained those letters, which look almost like a case file, but they say those documents point to Hanssen. Intelligence experts say the source is obvious -- a Russian mole handed the letters to the United States. "This was a highly protected source, to penetrate and get hold of the files related to this case was extremely difficult," Oleg Kalugin, a former general in the Soviet spy agency KGB, told Reuters. But he said it was clear the letters came from "a source inside the Russian intelligence service, that's too obvious." Kalugin, who left the KGB in 1990 and moved to the United States in 1995, said the documents about the American spy could have been handed over by a Russian defector. The Russians probably know who the mole is, he said. "With the very narrow circle of people who had access to the Hanssen files, maybe it would be not that difficult to find him," he added. Each side probably patted themselves on the back at various points in this case -- the Russians at finding out they allegedly penetrated the FBI and the Americans for apparently catching the spy, Kalugin said. "The FBI was always considered the toughest target to penetrate," he said. "The easiest was the Defense Department." "This is why the penetration of this calibre is really a spectacular feat for the Soviet, Russian intelligence," Kalugin said. "On the other hand the fact that he was exposed ... is another spectacular feat for the FBI, CIA." "THERE WILL ALWAYS BE MOLES" Former CIA Director Robert Gates said moles were always going to be a fact of life in governments. "There will always be a tiny number who betray the trust," he said in an opinion piece in The New York Times on Friday. "There will always be moles because governments will always want to know what other governments are up to," he wrote. U.S. investigators had been on a mole hunt for a second spy who was leaking secrets to Moscow after catching Aldrich Ames in 1994. Ames, a CIA officer, was later convicted of spying for the Soviet Union until its 1991 demise and then for Russia. The hunt for the second spy went on for years because investigators were convinced that Ames could not account for all the information Moscow appeared to have received. "When we were looking for Ames, we didn't know we were looking for two people," said Paul Redmond, a former CIA official who led the hunt that caught Ames. Redmond, who left CIA in 1997, had headed the spy agency's Counterintelligence Centre established in April 1988. Redmond said some of the signs pointing to a mole were when someone had too much money, was an outcast, hated the boss, had marital troubles, drank excessively, was narcissistic, gambled, and was very curious about others' classified work. Kalugin said Hanssen's characteristics were those of a "nearly perfect spy" who would go undetected. "With his devout Catholicism, with a large family, with the modest ways of life, with no money spent in a visible way, and keeping a low profile," Kalugin said. Federal law enforcement officials said Hanssen was never given a polygraph, but neither were most agents who started when he did. Since the mid-1990s, all prospective FBI employees and agents working on sensitive cases are given a polygraph. An investigation by former CIA and FBI Director William Webster into the security breach will look at whether a more rigorous polygraph policy at the FBI is necessary. At the CIA all new employees are given polygraphs before they are hired, most are again tested after about three years, and again after about a five-year interval, CIA spokesman Bill Harlow said. There are also random polygraphs. "It's a useful tool, it's not a perfect tool, it has a deterrent effect," he said. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2560 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:25am Subject: For Hanssen, tips that helped Clinton come in from the cold For Hanssen, tips that helped Clinton come in from the cold http://cgi.usatoday.com/usatonline/20010223/3091123s.htm By Walter Shapiro The fine print first: This column does not condone spying for a foreign power. This column does not intend to suggest that Bill Clinton or anyone who ever worked for him condones such espionage. This column recognizes that the charges against Robert Philip Hanssen have not been proven in a court of law. This column uses only natural ingredients, though political coloring has been added. And everything you're about to read has been certified as 100% imaginary. To: Robert Philip Hanssen From: A friend, aka Ramon2 Subject: Your public relations problems For eight years, I served in the upper reaches of the Clinton White House, helping the president and first lady escape scrapes that make your legal predicament seem like kiddie-league soccer. Although I am no longer in a position to help you arrange a presidential pardon, I can offer you some time-tested PR tricks that will transform your image from front-page felon facing the death penalty to the sympathetic victim of a witch hunt. You surely can understand why I prefer to keep my identity secret. I am sending you this get-acquainted memo as a public good-will offering. If you find my advice as useful as President Clinton did, we can make payment arrangements later. I understand you prefer used $100 bills in black garbage bags. Your attorney, Plato Cacheris, is a renowned Washington lawyer, but he is woefully behind the times when it comes to spin. I heard him say on ABC, ''It's a serious matter. An FBI agent was charged with espionage, and we'll have to see -- we'll have to see what the quality of the case is.'' Do you really believe that if President Clinton had mounted such a lame ''we'll have to see'' defense, he would have survived impeachment? Now, for the patented escape tricks that saved a presidency: * The war room. Get a half-dozen friends (former FBI colleagues would be ideal) to hit TV the way Russian troops hit Chechnya. Armed with daily talking points, they'll mount a defense on shows from Today to Nightline. * The money trap. Did you notice what the Clintons did when confronted with reports that Hillary's brother, Hugh Rodham, had received $400,000 to help arrange two pardons? They made him give the money back. No money, no quid pro quo. If you eliminate greed as a motive, any conduct can be made to appear defensible. Let's assume you still have most of the $600,000 in cash and diamonds that your Russian paymasters allegedly gave you. Immediately FedEx the loot to Vladimir Putin with an apologetic note saying that you just discovered it while renovating an upstairs bathroom. * The conspiracy. You need one to properly cast yourself as a victim. The details can be as vague as Hillary's ''vast right-wing conspiracy.'' So whose shadowy hand has been orchestrating these diabolical charges? A pulp novelist like Robert Ludlum might concoct a band of rogue FBI agents determined to bring back the Cold War. But a more up-to-date ploy is to have your TV spokesmen suggest that a cabal of militarists in Beijing is out to torpedo your selfless efforts to bring about true rapprochement between Russia and America. * Everybody does it. This has been the trademark Clinton defense. You instinctively grasped its possibilities by expressing in your Moscow missives your boyhood admiration for legendary British double agent Kim Philby. Have your spin team wax patriotic by reminding viewers that spying is part of the great American free-enterprise tradition dating back to Benedict Arnold. * Make the scandal bipartisan. If the prosecutors are to be believed, you were politically even-handed in your espionage efforts, spying under Republican and Democratic presidents. Congratulations on your cleverness. This means that both parties are likely to tread carefully for fear of being blamed for not uncovering your double-agent artistry. * Name-drop shamelessly. Who had just become the Russian leader in 1985, when you first donated your services to the cause of world peace? Nobel Prize winner Mikhail Gorbachev, who deserves major credit for ending the Cold War. So make sure that your defense team mentions Gorbachev and Ronald Reagan (you've got to get the conservatives on your side) in every interview. But we still have the pesky problem of why you reportedly halted your creative efforts for a few years, only to resume them in 1999. What was your motivation? Just say that you were inspired by watching the backhand -- and, let's face it, short skirts -- of Russian tennis phenom Anna Kournikova. A long shot: Have you, like Marc Rich, ever done anything for Israel? Finally, a word to the wise: Negative terminology like ''spying'' and ''treason'' can be as fatal (and I don't use that word lightly) as ascribing the wrong meaning to the verb ''is.'' Use softer, more caring language to describe your activities. Phrases like ''creating a level playing field'' and ''information sharing'' scored particularly well with focus groups. That's it for now. Got to run. Saddam Hussein's people are on the other line. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2561 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:27am Subject: Spy in FBI rightly alarms officials Spy in FBI rightly alarms officials http://cgi.usatoday.com/usatonline/20010223/3091099s.htm The Times-Picayune, New Orleans, in an editorial: ''Tuesday's announcement by FBI officials that one of their own agents had spied for Russia for 15 years is frightening, because (Robert Phillip Hanssen's) alleged crimes have the potential to cause great damage to the United States. . . . To be sure, Hanssen is entitled to fight any charges against him. And as the disastrous investigation into nuclear scientist Wen Ho Lee showed, government agencies sometimes do make accusations that turn out to be false. But officials are correct to be alarmed at Hanssen's arrest and to promise a thorough and complete investigation.'' The Hartford (Conn.) Courant in an editorial: ''No one should be shocked that the United States and other countries engage in spying. They do it in peacetime as well as during wars. Friends spy on friends. Even after the end of the Cold War and the fall of the Soviet Union, Moscow and Washington keep tabs on each other clandestinely. But treason is another matter. . . . If Hanssen is found guilty, he should spend the rest of his life in prison.'' Brian Jenkins, a senior adviser to the president of Rand Corp., in a column for the Los Angeles Times: ''Why do spies spy? Research shows that the motives are mostly personal, tawdry and banal and mainly involve money. What is interesting is how cheaply spies sell themselves. . . . (Hanssen) reportedly received $1.4 million during 15 years. If true, he bargained better than most. . . . Most spies are traitors . . . (but) only a few betray their country. Many betray the companies they work for. Corporate loyalties are thin these days.'' Atlanta Journal and Constitution in an editorial: ''The unveiling of Hanssen's treachery, while disturbing, does not strike the terror it would have had he been caught soon after he embarked upon it in the mid-1980s. Then, the Soviet Union had been dubbed the 'evil empire' by the Star Wars-inspired President Reagan, and the tensions between the two countries were high. Since then, our relations with Russia have improved greatly, but these days again seem shaky. Indeed, this episode shows the urgency, not just of improving FBI security, but also of maintaining a balanced relationship with Russia that keeps the stakes of our inevitable mutual espionage low.'' The Courier-Journal, Louisville, in an editorial: ''There's no reason for Americans to be shocked that Russia still conducts vigorous espionage operations against the U.S. We do the same to Russia. In fact, the damage that Hanssen allegedly did . . . was done mostly to our efforts to penetrate . . . Russian secret services. What is shocking, or at least profoundly disappointing, is that someone in Hanssen's position could be recruited by the Russians and could elude detection for 15 years.'' Daniel Schorr, news analyst, All Things Considered, National Public Radio: ''What strikes me about the Hanssen spy case is the banality and the grandiosity. The banal quality was greed. . . . The spies of the wartime and early Cold War era . . . were moved less by money than ideology, the conviction that communism offered a better way. . . . Then there was the grandiosity, the Walter Mitty quality . . . this quiet, churchgoing, suburban father of six leading the secret life of a master spy that their neighbors would marvel at, had they only known, which, of course, they couldn't because he was so clever. . . . The question is how the intelligence community will recover from this disaster of almost unprecedented proportions . . . (and) tighten security without strangling intelligence.'' Dale McFeatters in a column for Scripps Howard News Service: ''The FBI has asked William Webster, who has headed both the FBI and CIA, to undertake a thorough overhaul of its security procedures. . . . Webster will undoubtedly come up with numerous useful recommendations to repair defects in the FBI's security. Repairing defects in the human heart will be harder.'' What people are saying about an alleged spy for Russians -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2562 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:34am Subject: FBI Is Faulted for Failing to Heed Calls for Frequent Polygraph Tests FBI Is Faulted for Failing to Heed Calls for Frequent Polygraph Tests http://www.iht.com/articles/11533.html David A. Vise and Dan Eggen Washington Post Service WASHINGTON The FBI failed to heed a series of blunt warnings to adopt security measures that might have allowed agents to detect the kind of espionage that Robert Hanssen allegedly conducted for much of the past 15 years, according to government officials. . Congressional panels, interagency task forces and the Justice Department's inspector general repeatedly warned the FBI that it needed to subject agents to more frequent lie detector tests, increase their financial disclosure and impose tighter controls on the dissemination of classified documents. . But many of these proposals were rejected by FBI leaders on the grounds that they could harm the bureau's culture of trust among agents and hamper the recruitment of talented individuals, according to FBI officials and experts on espionage. . As a result, intelligence experts said, the agency responsible for rooting out spies in the U.S. government was unable to uncover a high-level mole in its own midst: Mr. Hanssen himself was not polygraphed as he rose through the ranks during 25 years at the FBI because the FBI's procedures do not require it, officials said Wednesday. . Until recently, the FBI had largely escaped criticism while other federal agencies, particularly the Departments of State and Energy, have come under intense scrutiny from Congress for alleged inattention to security. . Now, the Hanssen case has put the focus on the FBI itself, and the bureau may have to make the kind of changes - such as widespread polygraphing - that have been adopted by the CIA and other agencies, former bureau officials said. . Many of the suggestions for tightening security at the FBI were made after 1994, in the wake of the Aldrich Ames spy case, which prompted the CIA to overhaul its procedures after Mr. Ames, a CIA operative, pleaded guilty to spying for the Soviet Union. . The FBI has "a history of being fiercely resistant to change or to any oversight from outside," a former Justice Department official said. "They always say they're capable of keeping their own house in order. That was obviously not the case here." . Mr. Hanssen, 56, was arrested Sunday night as he attempted to deliver a trash bag full of highly classified documents, officials said. He was charged with spying for Moscow in return for $1.4 million in cash, diamonds and deposits in a Russian bank. . His activities contributed to the execution of two Russian agents who had been working for U.S. intelligence, officials said. . While Mr. Hanssen was so skilled in counterintelligence and other techniques that it may have been virtually impossible to prevent his determined efforts to allegedly sell information to the Russians, officials and experts sifting through the damage are disturbed that it could have gone undetected for so long. . While the FBI's director, Louis Freeh, has said that there are legitimate arguments in favor of polygraphs, he and other bureau officials have specifically opposed the widespread use of lie detector tests because they believe inaccuracies and inconclusive results may create more problems than they solve. . But security experts argue that the mere threat of undergoing lie detector tests has a valuable deterrent effect against spying and that the results can be used as one of many tools in a screening process to prevent betrayal.A former FBI director, William Webster, who will lead an inquiry into the agency's security measures, said in an interview that the spy case "highlights very clearly" the debate over whether the FBI needs to use lie detector tests more aggressively on both a random and routine basis. . Under FBI procedures, polygraphs are conducted on all new agents and other employees. They are also used in certain cases when agents are given access to sensitive information about a secret program or criminal case. . The FBI performs background reinvestigations of all employees every five years, and uses lie detector tests only in those instances when there is an unexplained anomaly. . Internal security experts at the FBI have been unable to suggest how to address the problems with polygraph testing in a way that would not force the bureau to sideline valued supervisors and agents who have polygraph results that cannot be explained. . The CIA, after implementing polygraphs to tighten security, has numerous employees who essentially have been idled because of inconclusive results. . Senator Bob Graham, the Florida Democrat who is a ranking member of the Senate Select Committee on Intelligence, said his panel would hold a hearing next Wednesday in part to probe how the FBI is monitoring the finances, lifestyles and truthfulness of its employees. Routine polygraphs may be necessary, he said, "when you're dealing with this level of sensitiveness." . Mr. Webster's panel will examine whether the FBI's antiquated computer systems and its rules governing access to sensitive information played a direct role in allowing Mr. Hanssen to turn over state secrets. For years, in a bid to deter such behavior, the Russians used a strict document control system that required agents and intelligence officers to identify themselves whenever they accessed top-secret information. . NBC Delayed Broadcasting Spy Report . A senior NBC executive said the television network held the story about Mr. Hannsen's arrest for more than 12 hours at the FBI's request, The Associated Press reported on Wednesday from New York. . The FBI feared that the release of the story would spoil a stakeout Monday aimed at catching the FBI agent's alleged Russian contacts. As it turned out, no one attempted to retrieve a parcel at the stakeout. NBC broke the story Tuesday morning. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2563 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:36am Subject: When No One Watches the Spooks When No One Watches the Spooks http://www.iht.com/articles/11445.html William Safire The New York Times WASHINGTON "Sorry about the handwriting," my linguistic source at the Allenwood Federal Penitentiary in White Deer, Pennsylvania, writes. "The Bureau of Prisons has a dinosaurian paranoia about typewriters, word processors and just about any writing tools beyond pencils and ballpoints, universally called 'ink pins.'" . My correspondent is Aldrich Ames, the American who spent nine years as a mole inside the CIA, paid by the Soviet Union to finger American spies in the Kremlin. His espionage led to the execution of a dozen U.S. sources. Two of those deadly fingerings, we are now told by the FBI, were confirmed by information provided to the KGB by Robert Philip Hanssen, who was arrested this week in what was said to be a secrets-for-cash transaction. . As a high-level FBI counterspy, Mr. Hanssen was privy to identities of some U.S. spies and was in a position to warn a fellow Soviet agent when U.S. counterintelligence was about to close in on him. But apparently someone inside the KGB did to him in the United States what Mr. Ames and he had long done to American agents in Russia - tipped off the other side. The accused turncoat Hanssen is represented by the Washington superlawyer Plato Cacheris, whose other famous clients include Mr. Ames and Monica Lewinsky. (Monica is not a spy.) Through Plato, I wrote to "Rick" Ames in my capacity of language maven, seeking definitions of spookspeak terms. CIA censorship delayed his answer, but the recent arrest of a man suspected to be his fellow mole adds piquancy to his reply. . Mr. Ames claims that his confession was coerced by prosecutors who threatened to jail his wife. "The target often (usually, when the pressure is sufficient) simply tells his interrogators what they want to hear, true or false. And of course, that's what I did - most everything the FBI and CIA wanted to hear from me I told them, a wonderful mixture of fact and mutually agreed-upon fantasy." The convicted spy adds: "A few government officials - no one in the FBI or the DOJ [Department of Justice], I think - knew some of the truth about my relations with the KGB and the SVR [Russian successor to the Soviet KGB], but they've remained silent." I take this as an attempt by Mr. Ames to cast suspicion on former CIA colleagues. . Mr. Hanssen, like Mr. Ames, may cut a deal with prosecutors leery of revealing too many secrets in court. He will presumably offer to detail the extent of damage to U.S. security in return for an escape from the death penalty, which, if guilty of complicity in the killing of U.S. agents, he would richly deserve. . The FBI cannot be pleased that Mr. Hanssen's prosecutor is Randy Bellows, an assistant U.S. attorney in Alexandria, Virginia. His still secret 800-page, four-volume report on the Wen Ho Lee investigation does not absolve the wrongdoer but, I am told, excoriates Reno Justice's obfuscatory procedures and the FBI's botching of the case. . So now it appears that the Russians have had two moles in place since the mid-'80s: Mr. Ames inside the CIA, Mr. Hanssen allegedly inside the FBI. Vladimir Putin can claim a KGB triumph; U.S. counterintelligence failed. . That sardonic laughter you hear from on high is that of the late James Jesus Angleton. America's great counterspy and orchid cultivator of the 1960s and '70s may have tromped on the toes of colleagues with his unrelenting suspicions, but he kept the CIA mole-free. He was driven from office by an intelligence bureaucracy and a miffed media that vilified his vigilance as "sick think." . I had asked my spookspeak source, Rick Ames, about that phrase. "It was used, and stuck," he writes, "as a description of Jim Angleton's 'monster plot,' theories which infected the intelligence community for a number of years. The monster plot was virtually groundless, irrational, and had all the earmarks of paranoid delusion." . The intelligence barn door will now be slammed shut with belated promises of computer surveillance and self-deluding lie detectors. What is needed instead is a touch of well-placed paranoia in the minds of the defenders of national secrets. The real "sick think" is complacency. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2564 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:37am Subject: Analysis: U.S. may seek accused spy's cooperation Analysis: U.S. may seek accused spy's cooperation http://www.vny.com/cf/News/upidetail.cfm?QID=162200 Thursday, 22 February 2001 13:40 (ET) Analysis: U.S. may seek accused spy's cooperation By MICHAEL KIRKLAND, UPI Legal Affairs Correspondent WASHINGTON, Feb. 22 (UPI) -- Accused FBI traitor Robert P. Hanssen may not face the death penalty even if convicted in what officials are calling one of the most damaging spy cases in U.S. history. Like CIA traitor Aldrich Ames, Hanssen had access to some of the most guarded information in the U.S. intelligence community. Also like Ames, U.S. investigators may be far more interested in repairing the damage allegedly caused by Hanssen than in seeking his life. A 32-year veteran of the CIA, Ames was arrested by an FBI team in Northern Virginia in 1994. He was accused of working for Moscow, beginning in 1985. In exchange for money, Ames betrayed vital U.S. assets in Russia. At least 10, possibly as many as 15, Russians working covertly for the United States were executed. Until his arrest in Northern Virginia Monday night, Hanssen, like Ames, worked in counter-intelligence and was tasked with defending the United States from foreign espionage. Like Ames, Hanssen is accused of beginning to work for the Soviets in 1985. The FBI alleges that Hanssen, a 27-year veteran of the bureau, supplied information to the Russians that confirmed Moscow's suspicions of at least three of Ames's victims. Like Ames, Hanssen allegedly operated for years within the shadowy world of clandestine operations, selling out his country in a cynical exchange for money, before he was detected and arrested. Finally, like Ames, Hanssen is represented by one of the best courtroom lawyers in Washington, Plato Cacheris, who helped Ames avoid the death penalty in exchange for a guilty plea and complete cooperation with U.S. investigators. The U.S. intelligence community had good reason to seek Ames's cooperation. Without it, U.S. officials may never have known the extent of the damage he caused. In 1995, the CIA assessed the aftermath of the Ames case. The agency concluded that Ames not only betrayed Russians working for the United States, he revealed information that made this country more vulnerable to Russian espionage operations. The CIA found that of more than 900 human intelligence reports made available to U.S. centers of policy -- including the Oval Office -- from 1985 to 1994, a "disturbingly high percentage" came from agents controlled by the KGB and its successor agency, the SVR. The extent of the damage allegedly caused by Hanssen, if he is indeed proved to be a traitor, is still to be assessed. But former associates who have talked to the media in the wake of Hanssen's arrest have said that his access to secrets was extremely broad. The news reports have not been well-received at the FBI, where Director Louis Freeh has clamped down on contacts with the media. Hanssen is said to have had access to U.S. intelligence secrets across the board, from the CIA and the National Security Agency as well as the FBI. The potential for damage, if Hanssen is proven guilty, is even greater than that posed by Ames's betrayal. The need to identify, contain and repair that damage may lead U.S. prosecutors to offer Hanssen the same deal that was offered Ames -- no death penalty in exchange for life imprisonment and complete honesty about his operations. A decision on whether to seek the death penalty for Hanssen may not come for some time. President George W. Bush still has to name a U.S. attorney for the Eastern District of Virginia, where the former FBI official is being detained and would eventually be tried. The U.S. attorney ultimately must decide whether to seek the death penalty, a decision that by law must be ratified by Attorney General John Ashcroft. -- Copyright 2001 by United Press International. All rights reserved. -- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2565 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:37am Subject: Analysis: FBI spy was in Pope task force Analysis: FBI spy was in Pope task force http://www.vny.com/cf/News/upidetail.cfm?QID=162346 Thursday, 22 February 2001 20:10 (ET) Analysis: FBI spy was in Pope task force By UWE SIEMON-NETTO, UPI Religion Correspondent WASHINGTON, Feb. 22 (UPI) -- Meet the threefold enigmatic man: FBI agent, alleged Soviet spy, and member of the "pope's taskforce," Opus Dei, a discreet, wealthy, very conservative and extraordinarily powerful Catholic prelature. Was it with ill intent that Robert P. Hanssen had wormed himself into this tightly structured and growing organization, whose Latin name means Work of God? Did he believe in its stated goal to "spread the ideal of holiness in the middle of the world?" Or did he join it as a cover? Was he professionally curious about some of Opus Dei's alleged activities, such as supporting Lech Walesa's Solidarity union in an effort to undermine Poland's communist regime? Because of its circumspect nature and its discipline, Opus Dei's very name evokes wild allegations. At one point the Italian media with its knack for publishing unsubstantiated charges insinuated its complicity in the sudden death of the 33-day Pope John Paul I in 1978. Doubtless, among Opus Dei's 84,000 members worldwide are very powerful personalities. FBI director Louis Freeh, Hanssen's former boss, is understood to be one, as are members of the political and social establishment in many Western countries and Latin America, politicians, professors, journalists, artists and generals. Left-wing and liberal groups tend to loathe it. In an Internet article, Catholics for Choice called Opus Dei "one of the most...reactionary organizations in the Roman Catholic church today." They singled out its opposition to abortion. "Opus Dei works in partnership with the Vatican in international events such as the United Nations conferences on population in Cairo in 1994." On that occasion, the Vatican teamed up with the Muslims to squash a Clinton administration attempt to have a woman's right to an abortion declared a global human right. In truth, though, Opus Dei is the church's only "floating diocese" to which some of the world's most committed Catholics belong -- and even some Protestants, who are not official members. They just work for and pray with the organization's men and women. Opus Dei, which has its spectacularly beautiful headquarters in Rome, is a newcomer to the Vatican's ancient power structure. It was founded in 1928 by Josemaria Escriva, a Spanish priest who later became its first bishop. There is no question that Opus Dei's goals are closely related to those of the Christian renewal ideas Pope John Paul II has been expounding since the very beginning of his pontificate. Its members commit themselves to leading an authentically Christian life in the secular world. "The mission of Opus Dei is to promote among Christians of all social classes a life in the middle of the world consistent with their faith and to contribute to the evangelization of every sphere of society," states the organization's mission description. "In short, it is to spread the message that all the baptized are called to seek holiness and make the Gospel known. This same message was the core of the Second Vatican Council." "In order to achieve this aim, the Prelature provides for the spiritual, educational, and pastoral care of its faithful and offers help to many other persons, each one in his or her own state in life, profession and situation of the world." These goals may not be the preferred flavor of postmodernity, but they are Biblical. In its pronouncements, Opus Dei never ceases to point to the core of the Gospel as the foundation for a Christian life: Scriptural texts stressing Christ's promise to make his followers children of God. The text most frequently quoted by the Prelature reads, "But to all who received Him, who believed in His name, he gave power to become the children of God" (John 1:12). The organization has three kinds of members. There are some 2,000 priests organized in a brotherhood -- the Holy Cross Society. The lay members consist of celibates and non-celibates who join not by giving vows but by signing contracts that can only be broken with the permission of the prelate-general (bishop), to whom all must promise obedience. Opus Dei's regulations are strict. Everybody must report his or her personal and professional activities once a week to a "director." Confessing once a week to a priest belonging to the organization is mandatory. All members attend mass daily. If they are married, they are asked to send their children to Opus Dei schools, which the organization's detractors accuse of being recruitment centers. To become a member, a young woman or man must be at least 18. Opus Dei's determination to have authentic Christians "sanctify the world" and permeate "all activities and temporal realities with the sprit of the Gospel" lies, of course, at the root of its hostile reception from groups with limited interest in holiness. It is in line with the pope's prayers for the world and out of line with deconstructionists trying to keep faith out of the public square. Hence, Opus Dei is a shock force in the front lines of today's culture wars -- and a target of constant attack. How and why did the enigmatic Robert Hanssen place himself squarely in these trenches? This is a fascinating topic to speculate about. But the answer seems very elusive at this point. -- Copyright 2001 by United Press International. All rights reserved. -- -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2566 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 1:39am Subject: US Department Of State May Declare Some Russian Diplomats "Persona Non Grata" Updated 22.02.2001 at 19:21:16 US Department Of State May Declare Some Russian Diplomats "Persona Non Grata" http://allnews.ru/english/2001/02/22/deportation/ Richard Boucher, an official spokesman for the US Department of State, answering a question of a RIA Novosti correspondent at a press conference in Washington on Wednesday, said some Russian diplomats might be expelled from the USA in connection with Hanssen's case. According to Boucher, the issue might be considered in the near future. Some names of Russian diplomats are mentioned in documents handed over to the court under Hanssen's case. FBI agent Robert Philip Hanssen has been arrested in Washington on suspicion of spying for Russia during the past fifteen years. Hanssen became suspected of spying for Russia after an internal intelligence audit had revealed the presence of a mole in the FBI. Later American intelligence obtained some Russian documents, which confirmed their suspects. Before the arrest Hanssen had been working in FBI headquarters in Washington. His task was performing surveillance on Russian Embassy and Russian government missions in New-York. Russia refrains from making official comments on Hanssen's arrest and his possible relation with Russian intelligence. -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2567 From: Steve Whitehead Date: Thu Feb 22, 2001 10:25am Subject: Liberian 'spy' journalists jailed Monrovia, Liberia - Authorities have jailed four journalists with an independent newspaper seen as critical of President Charles Taylor, accusing them of espionage. The men, three top editors and a senior reporter from The News, were arrested late on Wednesday, a few hours after the newspaper published a report saying the government was spending $50 000 on helicopter parts - noting that civil servants had not been paid in more than four months. The News report, quoting what it called "authentic documents", gave few details, though the government has at least three helicopters used for military operations. While the report did not mention military activity, the writ of arrest said "the intent of the paper was to reveal national defence information to foreign powers", and accused the men of espionage. A government statement later linked the report to the stand-off between Liberia and neighbouring Guinea. The two nations have seen their relations disintegrate over the past couple of years and have traded accusations over backing cross-border raids that have turned their frontier area into a combat zone. The Press Union of Liberia, the umbrella organisation for Liberian journalists, issued a statement saying it would be closely watching for the proceedings. The four arrested men are editor-in-chief Abdulai Dukuly, managing editor Joseph Bartuah, news editor Jerome Dalieh and Bobby Tapson, a senior reporter. Their newspaper is seen in government circles as critical of Taylor. Taylor, a powerful warlord in Liberia's 1989-1996 civil war, is highly sensitive to criticism and has long had strained relations with journalists. In August, his government arrested a British television crew and accused its members of spying. The journalists were released after heavy international pressure. - Sapa-AP http://www.news24.co.za/News24/Africa/West_Africa/0,1113,2-11-998_985438,00.html Steve Whitehead Managing Member TSCM Services cc Tel (012) 664-3157 Fax (012) 664-3180 International (+2712) URL http://www.tscm.co.za E-mail sceptre@m... P O Box 16063, Lyttelton, 0140, Centurion, South Africa [Non-text portions of this message have been removed] 2568 From: e cummings Date: Fri Feb 23, 2001 4:55pm Subject: Accused spy Robert Hanssen web page and usenet postings one can view this (now retired) FBI double-agent's website at: http://members.home.net/tim.meehan/ hanssen's usenet postings under can be viewed in google's usenet archives (currently in beta) at http://groups.google.com according to google, hanssen@o... posted to the following groups: comp.sys.laptops comp.sys.palmtops.pilot alt.comp.sys.palmtops.pilot one FBI affidavit alleges he planned to smuggle classified documents out of FBI headquarters in his Palm computing device... -bernieS 2569 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 8:40pm Subject: Contemptuous Philby Laid a Fool's Trail Contemptuous Philby Laid a Fool's Trail http://www.latimes.com/news/comment/20010222/t000015886.html By VERNE W. NEWTON "I decided on this course when I was 14 years old. I'd read Philby's book. Now that is insane, eh!" --Robert Philip Hanssen * * * If you're 14 and you picked Kim Philby for a role model, you lose. But according to information filed by the FBI, that is just what Robert Philip Hanssen, the agent arrested Tuesday, claims he did after reading Philby's "My Silent War." Philby, like Hanssen a highly trusted senior intelligence official, was recruited as a spy by the Soviet Union even before he entered MI6, Britain's CIA. He had climbed to nearly the pinnacle of MI6 before being brought down by the defections to Moscow of Donald MacLean and Guy Burgess, both of whom he knew well at Cambridge University, both of whom worked for the Foreign Office, and both of whom were also Soviet spies. That was in 1951. Philby was forced out of MI6 and lived a shadowy life as a journalist and probably as a retainer to his loyal MI6 friends. But in 1963 the walls were about to close on him, and Philby too escaped to Moscow. His book, written under the supervision of his Soviet paymasters, was largely a work of propaganda in which he glamorized the life of a man whose every waking moment was a lie. He had to manage his lies not only to his professional colleagues but to his friends and his family. Philby insisted he did all this because he was an anti-fascist or because he believed in the redistribution of wealth. But these defenses fall flat. Between the lines, and drawing on his well-documented life, it is clear that ideology had nothing to do with his choice. The question, after all, was never why Philby spied for the Soviets, but why they chose him over the many alienated Cambridge students in the 1930s who were eager to serve their idealized notion of the U.S.S.R., rather than the decadent British society. What Soviet recruiters saw in Philby was not an ideologue, because he wasn't one. Nor was he a passionate advocate for social justice, nor did he recite the Marxist catechism. Rather, they saw a weak man of few convictions who needed to become a robot in a rigid system with none of the responsibilities of a pluralistic society. They also saw in Philby a man who was drawn to conspiratorial relationships. Cambridge University was well-known for its secret societies, and a number of Soviet spies were Apostles, the most elite of the secret societies (almost none came from Oxford, a more open school that thought Cambridge's secret societies were infantile). Philby's hunger for conspiratorial relationships was sated by the Soviet Union, an entity that someone once described as an organized system of paranoia. Betrayal of his friends and colleagues was an opiate. In his book he ridicules those who trusted him for being too stupid and naive to know that he could not be trusted. And his own feelings of inadequacy disappeared beneath the gush of superiority that came from having secrets that even those in his super-secret agency never remotely suspected--that his true loyalty was not to England but to the Soviet dictatorship. There can be no doubt that Philby's book was calculated to appeal to the young Hanssens of the West. In his breezy style he posited the notion that if you believed in world peace and social justice in the 1930s (and beyond), the logical next step was to transfer your loyalty to the U.S.S.R. (no one imagined that one day it would crumble). We have nothing from Hanssen yet. But the FBI claims he wrote the letters and messages they released. The quoted passages certainly contain familiar themes. The anger at his government and his agency as a defense mechanism for justifying his alleged betrayal. The desperate cry of a man who feels he has been abandoned by his Russian spymasters to whom he declared his "insane loyalty." Whoever wrote those messages sounds as if he experienced the bitter lesson of Philby and so many others: The Soviets had only contempt for those who served them as spies. Philby, Burgess and MacLean were all isolated, given no jobs, treated with suspicion. All three died alcoholics. These are the things Philby did not reveal to his admiring 14-year-old reader. - - - Verne W. Newton Is the Author of "The Cambridge Spies: the American Side of the Philby, Burgess, Maclean Story" (Madison Books, 1991) -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2570 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 8:41pm Subject: Hanssen Is Not the Only Oneí Hanssen Is Not the Only Oneí http://www.insightmag.com/archive/200103207.shtml By Paul M. Rodriguez rodriguez@i... The names Robert Philip Hanssen and Aldrich Ames already are notorious. But, according to intelligence sources, the list of traitors in U.S. security agencies is likely to grow. The espionage case involving FBI counterintelligence agent Robert Philip Hanssen is far from over, according to U.S. law-enforcement and intelligence sources who tell Insight the alleged FBI traitor is among four to seven other U.S. agents under scrutiny as possible spies for Russia. ìHeís not the only one. There is at least another significant case in the works,î says a U.S. intelligence source commenting about the ongoing damage assessment concerning Hanssen. It involves not only FBI investigators but agents from the CIA, the National Security Agency (NSA), the State Department, the Defense Intelligence Agency (DIA), the National Security Council (NSC) and more. There has been talk in the years since the arrest of Aldrich Ames in 1994 about a second (or third) mole high in the U.S. government. Ames was a CIA analyst who turned traitor and revealed some of the most sensitive U.S. intelligence secrets to the Russians. He began spying around the same time that Hanssen is alleged to have begun. In the years since Ames was caught, U.S. intelligence agencies have continued to receive information pointing to an ongoing and significant series of security breaches. These activities were of an extremely high level, very sophisticated, and involved a staggering breadth of information touching on many agencies. ìWe had focused on numerous individuals at the CIA and the FBI, as well as targets at the NSA, but never could put the pieces together,î says a retired FBI counterintelligence agent familiar with the multiagency investigations. The Washington Post reported on Feb. 23 that among those suspected of spying for Russia was a senior CIA agent who, despite passing numerous polygraph tests, had been suspended since 1999. Although the suspect was, like Hanssen, involved in counterintelligence operations affecting Russia, a national-security official tells Insight, ìthe details we kept hearing from the field [about espionage] never fully matched up with his access to information.î But, until Hanssenís arrest Feb. 18 outside a park in Northern Virginia, the extraordinary post-Ames leaks of classified information had stymied U.S. intelligence. ìThere were several people we suspected, but never was it Hanssen,î says a colleague who worked closely with the accused FBI traitor. In fact, says the official story, it was only late last fall that Hanssen became a suspect as a result of information obtained by the CIA and developed in cooperation with the FBIís spy catchers. Based on the 100-page affidavit filed by prosecutors with a Virginia district court and unsealed Feb. 20, the pieces then began to fall together. The solved puzzle revealed an astonishing picture of Hanssenís alleged espionage going back at least 15 years and resulting in the deaths of at least two double agents working in Russia for the United States, as well as the imprisonment of a third. ìThere is much more to this than the public yet knows,î says a senior congressional aide briefed on the Hanssen investigation. ìItís more serious than anyone knows.î How serious? ìThatís all I can tell you, but we believe other agencies also have been penetrated,î the aide says. Another highly placed intelligence source tells this magazine: ìHanssen isnít the only one.î Making matters worse, say others, including an FBI official who asked not to be named, is the FBIís failure to employ either routine polygraph tests on its senior agents or automatic alarms on classified computers to identify unusual entries by volume or date. Hanssen routinely checked his own name and address in classified computers to determine whether he was under suspicion. For years rumors have persisted that while Ames was indeed an important Russian spy, he was not always in a position to have had firsthand knowledge of many secrets that Russia was known to have obtained clandestinely from U.S. security agencies. Thatís why when Hanssen came under scrutiny the possibility of his guilt seemed to explain other extraordinary and ongoing losses of secrets. Hanssen had unique access to U.S. spy-craft techniques and secrets, as well as to the status of U.S. counterintelligence and monitoring operations targeting not only the Russians but Washington-based agents of many other countries. Insight was told that this is one reason why even the CIAís counterintelligence departments were kept in the dark during the four- to five-month probe of Hanssen. During that time only a select few knew any details, and even these were quarantined from colleagues. While the full damage assessment will take months (if not years), U.S. spy catchers are continuing to troll for spies, Insight has learned, at the CIA, the FBI and among military personnel assigned to both the NSA and NSC. ìWeíre focusing on several people right now,î confirms a senior intelligence official. ìBut I canít tell you for sure we have all the holes plugged.î -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2571 From: James M. Atkinson, Comm-Eng Date: Sat Feb 24, 2001 8:46pm Subject: Secret Team Led Search for Mole Moderators Note.... [Sun Tzu said that to be effective spies are always used in groups of at least 3, but that a wise general will employ groups of at least five. That said, where are the other spies???] -jma Secret Team Led Search for Mole http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2001/02/24/MN142463.DTL Joint operation resulted in arrest of FBI agent James Risen, New York Times Saturday, February 24, 2001 Washington -- A secret investigative team established in 1994 to identify the source of a series of damaging intelligence losses played a crucial role in the counterespionage probe that led to Sunday's arrest of an FBI agent, Robert Philip Hanssen, officials said yesterday. The mole-hunting unit -- a joint operation of the FBI and the CIA whose existence has never before been disclosed -- was created because investigators could not explain why intelligence operations against Russia continued to be compromised even after the arrest of Aldrich Ames, a senior CIA covert officer. Shortly after Ames' capture, they concluded that it was unlikely he could have been responsible for all of the intelligence losses of the previous few years. Most damaging of the intelligence breaches was the apparent disclosure to the Russians of an elaborate and costly technical intelligence program monitoring their activities in the United States, officials said. The apparent compromise of that program -- which remains highly classified and which officials refused to describe -- may have cost the United States hundreds of millions of dollars, according to current and former U.S. officials. Other unexplained intelligence problems, including the disclosure to Moscow in 1989 that the FBI was conducting an espionage investigation of State Department official Felix S. Bloch, prompted officials to begin a new search for a spy inside the U.S. government, officials added. Yet some officials said that the driving force behind the creation of the new counterespionage unit was the need to find out what had happened to the costly technical intelligence program. They said they believe Hanssen's arrest may solve that mystery. In addition to the KGB officers working for the FBI that he betrayed, officials charge that the loss of that technical program was the most severe blow he inflicted on U.S. intelligence during his alleged 15-year career as a Russian spy. The special investigative unit, which works within the Counterespionage Group at the CIA's Counterintelligence Center, was created by Paul Redmond, the CIA counterintelligence expert who led the effort to apprehend Ames. The unit was responsible for a series of espionage investigations that subsequently led to the arrests of other significant spies, officials now say. They include both Earl Edwin Pitts, an FBI agent sentenced to 27 years in prison in 1997 for spying for the Soviet Union, and Harold J. Nicholson, a former CIA station chief in Romania who was also sentenced to more than 23 years in prison in 1997 for spying for Moscow. The efforts of the joint mole-hunting operation were finally rewarded late last year, when a Russian source provided what appears to be virtually the entire KGB file on the Hanssen case. The special investigative unit was a successor to an earlier and equally secretive CIA internal investigative team that helped uncover Ames. It is still in existence today, even after Hanssen's arrest, because officials believe it is possible that there are additional foreign agents inside the U.S. government. ©2001 San Francisco Chronicle Page C14 -- ======================================================================= Sed quis custodiet ipsos Custodes? "In a time of universal deceit, telling the truth is a revolutionary act" - George Orwell ======================================================================= James M. Atkinson Phone: (978) 381-9111 Granite Island Group Fax: 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com ======================================================================= The First, The Largest, The Most Popular, and The Most Complete TSCM, Technical Security, and Counterintelligence Site on the Internet. ======================================================================= 2572 From: Bullfrog007 Date: Sat Feb 24, 2001 2:24pm Subject: NSA Job Fair February 23, 2001 National Security Agency to host first-ever career fair By George Cahlink gcahlink@g... Seeking a new generation of workers, the National Security Agency will hold its first-ever job fair Saturday at its headquarters in Ft. Meade, Md. "The recruitment event is part of a larger strategy to recruit the diverse, highly skilled work force needed to meet the challenges of the 21st century," said NSA officials in a statement. The agency says it is seeking workers with experience or education in computer science, mathematics, engineering, signal analysis, language, data collection, "cryptanalysis" and intelligence analysis. Other intelligence agencies will also be represented at the career fair. The NSA statement noted that the Defense agency has "a proud history of recruiting and hiring top talent"--including more than 2,000 employees annually throughout the 1980s. But, the agency said, recruiting has become "more difficult" in recent years and old hiring methods must be "transformed" to meet today's needs. Other federal agencies are facing similar problems. A tight labor market and burdensome federal hiring rules have made recruitment a challenge. The General Accounting Office has repeatedly criticized agencies for failing to plan for the future workforce, and has warned that if more aggressive hiring and retention policies are not implemented, there will be a shortage of federal workers over the next decade. The career fair also is the latest attempt to put a public face on an agency that has long had a reputation for secrecy. NSA Director Lt. Gen. Michael Hayden has advocated a more open approach as the key to winning continued support from Congress for modernizing the agency's information systems and convincing the public that NSA doesn't spy on U.S. citizens. 2573 From: Steve Uhrig Date: Sat Feb 24, 2001 9:46pm Subject: Full Coverage Receivers available Hello list, Again I have a few unblocked ICOM receivers in excellent condition available. Have R8500 base receivers and R100 portable/mobile receivers. Many are familiar with the R8500. This is ICOM's newest wideband HF/VHF/UHF receiver, quite common with sweepers or for surveillance listening posts. The problem is getting them with 800 megacycle coverage. All the ones sold commercially are cellular blocked, with no provision for TSCM practitioners to obtain unblocked ones legally. We do not want receivers with holes in the coverage. Here are some that don't have the holes. These are full coverage receivers originally restricted to and purchased by the government, generally used for one weekend in a surveillance, then traded in. Basic specs are 100kc to 2 gigs, AM, Wide FM, Narrow FM, CW, SSB. This is a triple conversion tabletop receiver powered by 12VDC or 110VAC with included power supply. Can be used portable or mobile or fixed station. Go here for full specs and a photo: http://www.icomamerica.com/receivers/tabletop/icr8500.html This receiver is the best one ICOM has released to date, significantly better than the R9000, and a later model in the series of R7000/R7100. Remember this is a full coverage receiver, and covers from 100kc (0.1 megacycles) to 2 gigs (2000 megacycles). You do not need an additional receiver to cover the HF portion of the spectrum. When not sweeping, you will use this as a lab receiver on your test bench. There is an RS232 input port as part of this receiver, so you do not need the expensive external level converter to computer control it. There are a number of third party software packages available to remotely operate the receiver. Rather than one of the computer-controlled black box receivers, the R8500 can be computer controlled as well as it has a full featured front panel for standalone use. There may be times when you do not want to drag a laptop around just to run your receiver. There also is an IF and discriminator output on the rear panel for accessories. One of the standard internal features will scan and store any signals found in a special memory bank for later review. ICOM just raised the price on these substantially, and that higher price will soon be reflected on dealers' pricing. Even then, you can't buy them full coverage without a government sponsor willing to give you a blessing. I only have a few of these, so don't wait if you need a portable, decent full coverage receiver. Practically every time I list these, every one I have sells within a few days and I have to refuse orders from people who come too late. A wideband receiver is one of the first items in a professional sweep kit. When the other equipment sniffs a potentially hostile transmitter, you then tune this to the frequency and disassemble the signal manually. Price is $2000 shipped in the U.S. This is less than current retail for a blocked receiver and less than unblocked receivers imported from Canada or England, with no chance of these being seized at the border. I also have the accessory TV-R7100 AM video demodulator to fit the R8500 receiver. This will let you demodulate and display on an external video monitor any AM video signals you may pick up, whether broadcast, amateur or surveillance. These are extremely scarce. Price is $400 with purchase of a receiver only. And I have one speech synthesizer board available which will read the receiver frequency out in voice when it stops somewhere while scanning. This is convenient if you are running an unattended tape, so you know what it is that caused the receiver to stop scanning. I take credit cards for payment. The R100 is a little brother to the R8500 receivers. The performance is basically the same as far as frequency coverage and modes, but the R100 does not have all the "soft" capabilities of the R8500, nor do they have the computer control port or ability to display alpha tags on programmed channels. These are good if you want a full coverage receiver to install in your vehicle or something a bit smaller for a portable sweep kit. These can be analog tuned with a knob and also cover the restricted 800 meg frequencies blocked on consumer receivers. Here are basic specs on the R100 mobile/portable receiver: Frequency Coverage: 100 kHz to 1856 MHz continuous Mode: AM, FM, Wide FM (WFM) Power Supply Requirement: 13.8 V DC +/-15% Current Drain (at 13.8 V DC): Less than 1.1 A The R100 was discontinued some time ago and unfortunately there is no replacement for these friendly and versatile receivers. The supply of these is dwindling, especially in the restricted unblocked (government) versions. Price of R100s is $650. Anyone buying a receiver is eligible to purchase a wideband discone antenna for $75, which is a $50 discount off the normal price of $125. This antenna is ideal for this receiver, and is a good antenna for sweeping. Mount it on a tripod or microphone stand and move the antenna around the area you are sweeping. Antenna can be used for transmit also, from 25-2000 megs. Holler if interested and your receiver can ship immediately. Remember we pay the freight and insurance, which is considerable on equipment of this value. I also will consider trades towards the above, and I purchase surveillance, countersurveillance and communications equipment. Email me with anything you have to sell or trade. More equipment is listed on my webpage: http://www.swssec.com/used.html Regards ... Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 2574 From: James M. Atkinson, Comm-Eng Date: Sun Feb 25, 2001 4:09pm Subject: Spies: Who needs 'em? Spies: Who needs 'em? http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=21830 © 2001 WorldNetDaily.com Nobody likes to hear about any American knowingly betraying his country, but this week's espionage revelation suggests that some serious rethinking of the proper role of espionage and secrets in a post-cold war United States is in order. Perhaps keeping secrets and running spies is not as all-fired important to this country as it used to be. Perhaps, if our desire is to be a beacon of liberty in the world, it is time to think about putting away such childish things, or at least changing the way we do them. Robert Philip Hanssen, the 27-year FBI veteran who is accused of having spied for the Soviet Union and later for Russia for the past 16 years, is alleged to have given the Soviets and later the post-Soviet Ruskies tons of important information. But has it really damaged the United States all that much -- especially insofar as the real national interest is to be a free country? Will anybody raise the question? Mr. Hanssen, who is reported to have spent most of his career in counterintelligence against the Russians at the FBI headquarters in Washington, was in a position to have given the Russians some of the most sensitive, top-secret data the FBI possessed. FBI director Louis Freeh, while being somewhat circumspect, said of the suspected damage to U.S. intelligence that "We believe it was exceptionally grave." So the Russians, like the Soviets many times before them, seem to have pulled off an extraordinary long-term espionage coup, this time against the FBI. A couple of years ago it was the CIA's turn to be embarrassed at revelations that long-time employee Aldrich Ames had for years spied for the Soviets and then the Russians. As establishment-oriented an analyst as intelligence writer David Wise said on television that Hanssen was the FBI's Aldrich Ames case, a deeply troubling and potentially demoralizing episode. It's embarrassing, but how deeply should ordinary Americans be concerned about Russians spying against the U.S.? Look at the big picture. The Russians may be better at spying, though Cato Institute defense analyst Ivan Eland warned me that that's not necessarily a foregone conclusion. It could be that the U.S. is actually better at catching turned agents and the Russians are an open book to various agents they haven't discovered. The actions of the Clinton administration don't suggest that U.S. officials have had a very good idea of what was really going on in Russia for the past several years, but maybe that can't be blamed on our intelligence services. It wouldn't be amazing if the Clinonistas knew all about the corruption and crony capitalism and kept pumping money in anyway because they didn't know anything else to do and figured sending good U.S. taxpayers' money after bad at least wouldn't do major damage. If it turns out that the Russians really are better at spying -- and given the culture of secrecy and clandestine activity it's certainly not out of the question -- we need to wonder just what this superiority has bought them. Which country has the healthiest economy and the strongest military in the history of the world and which is an economic and political basket case? This will seem like heresy to some, but might it be worthwhile to speculate on the possibility that all those precious secrets allegedly passed on by Mr. Hanssen to the Russians didn't do the Russians much good or the United States much real harm. I would go a little further to raise the possibility that a relatively open society that is not obsessed with secrecy and values the free flow of information is not only more stable than a tyranny, but actually has a long-term strategic advantage over a society whose government is obsessed with secrecy and control. All through the Cold War Americans worried, often enough with justification, that the Soviets were more determined, more ruthless, more persistent and more skilled at various dark political arts than our guys. But the inherent weaknesses of a centrally-planned socialist economy, combined with corruption and loss of belief in the holy communist mission, eventually did the Soviet Union in. Scholars will debate for decades whether it was Reagan's rearmament, the threat of Star Wars, blind luck, miscalculations by Gorbachev or a combination of these and other factors that precipitated the fall of communism as an armed and dangerous force in the world. But those who understand the superiority of a free society and the inherent instability of a command-and-control economy knew the contradictions and inability to calculate when central planners make all important decisions would eventually weaken the socialist system. And it happened, fortunately with very little physical violence. Since then, with corruption, criminality and bumbling, post-Soviet Russia has not made much progress; if anything living standards have declined for the vast majority of Russians who have little aptitude or taste for crony capitalism and gangsterism. The birthrate is down, life expectancy has declined, alcoholism -- if anything -- is up. The leadership might still get things together sufficiently that Russia becomes a real threat to more of its neighbors, but at this point the country is in pitiful shape. So how much good did skill at espionage do the Russians? Without justifying his sleazy actions or misplaced loyalties at all, we have to wonder how much real harm to U.S. citizens Mr. Hanssen was able to do. The Bush administration says it is conducting a thoroughgoing reassessment of military needs and missions in the wake of the Decade of Improvisation. While it's doing so it should take a cold-eyed second look at just how much we need the intelligence apparatus we built during the Cold War and which has been casting about for a mission ever since. If the United States is not all that committed to "humanitarian" and "nation-building" military interventions, just how much information do we need? How much of the information produced by all the paper-shuffling gnomes in Washington needs to be classified? The United States has no natural enemies who pose a real military threat except those our leaders choose to engage -- which is not to say that countries with possible regional ambitions like Russia, China, North Korea, Iran and even Iraq don't warrant continued scrutiny. But do we need to spend $30 billion a year -- that's what the government released as the total intelligence budget a few years ago when it as in a mood of temporary openness -- to run spies and collect electronic intelligence? I have long advocated that the CIA be abolished. No doubt the government will still have a need for reliable information in the world whose post-Cold War shape is still evolving, but the CIA is too institutionalized, too rooted in the Cold War culture, too set in its ways, too bureaucratic to be reformed to become the leaner, cheaper intelligence service that might be warranted. Better to rethink our position in the world and then design an intelligence service from scratch to fit into our vision of our role in the world. Similarly, the espionage functions of the FBI deserve a cold-blooded reassessment. Louis Freeh has been opening up FBI offices all over the world, but the reasons (beyond the empire-building that is the natural inclination of any bureaucracy) are pretty murky. And the Hanssen fiasco, following so closely on the Wen Ho Lee bungle -- not to mention Waco, Ruby Ridge, the Olympic bombing, the crime lab troubles and other scandals involving cover-up and obstruction of justice -- suggest that the once-proud FBI is an agency in need of serious reform. Cutting back its duties to strictly interstate domestic crime -- eliminating dozens of functions it doesn't perform well -- might be a good start. I am really advocating something a little bigger: that we call into question the importance of espionage to the national interests of a free country in which most citizens (at least with the end of the Cold War) value freedom more than global influence. If we want to lead other countries toward freedom more by example than by brute force, we should understand that open access to information and an accountable government are more valuable than a short-term espionage victory that can't even be publicized. The espionage mentality encourages overclassification as a side effect. All kinds of trivial information gets a "Top Secret" label that has more to do with the self-importance of bureaucrats than with any real need. Our government classifies so much information that foreign governments often know more about what our government is up to than American citizens are allowed to know. And this addiction to secrecy impedes the free flow of information and the incentives to innovate that are the real secret weapon of a free society in a dangerous world. Again, I'm the last person to apologize for Mr. Hanssen; though I'll try to maintain the presumption of innocence until I know more, it seems unlikely the FBI would blunder so badly as to so publicly go after the wrong guy. If Mr. Hanssen really spied for the Russians he betrayed the trust of many and should receive severe punishment, of course. But his case, in conjunction with the Aldrich Ames case, other blunders and the changed world