From: Date: Mon Oct 20, 2003 8:58am Subject: tapping is being done by an amateur eavesdropper attaching a wiretap Leaders Worry Government is Spying On Them The East African Standard (Nairobi) NEWS October 19, 2003 Posted to the web October 20, 2003 By Standard Team Nairobi Fear is spreading among Members of Parliament and some cabinet ministers that government agents are trailing vocal critics and illegally tapping private telephone conversations. And intelligence and telecommunications sources warn that circumstances are ripe for eavesdropping on private communications. "Last Wednesday, one of my clients walked in to my office and asked me to be careful," says Kanu nominated MP Mutula Kilonzo. "The client said there was a problem because some of things we discussed on phone emerged again from people who could only have known them by tapping the conversations." The MP says some of his clients have shared their problems with him, only for them to receive calls from anonymous callers telling them not to talk to him again. Mutula Kilonzo Apart from MPs, other targets of mysterious snooping are vocal critics, constitutional review officials who have not taken sides particularly on the issue of the Prime Minister and whether the draft constitution should be adopted through a referendum. Claims that telephones are being tapped run alongside recent allegations that plainclothes police have been trailing some MPs even within Parliament buildings, a habit largely associated with the Nyayo regime in the 1980s. Two cabinet ministers said their phones are tapped and mysterious characters claiming to be from the National Security Intelligence Service had made calls to their offices, and left threatening messages. "There are MPs who will talk freely about what you said in a private conversation. Such intercepted and taped telephone conversations form the basis of some of the claims such MPs have made in public. It is part of what is fuelling controversy in Narc," an aide to one cabinet minister said. "You can overhear a conversation, then quote it out of context. You may recognise a minister's voice, but you don't recognise that of the person the minister is talking to. You can't report accurately on that conversation," the aide protested. "It is a serious infringement on privacy. It will only make society inefficient and slow down progress. Prominent people are beginning to fear talking on phone. It is bad even for business," he added. A business associate of another Cabinet minister said he has received telephone calls from people claiming to be from the NSIS who have warned him to tell the minister that his movements are being monitored. "I can't believe that somebody could be trying to push me back to where we were in the 1980s. I am used to political pressure. But I did not expect this under Narc. It is beginning to appear to me that if Narc is not restrained, it can go very far," he added. But an officer with the NSIS denied that the organisation is tapping people's phones, adding that they have not heard such complaints. "Intelligence gathering has become a very civilised affair. We are no longer the shady organisation we were before," said. "In any case, our focus is no longer politics. We now focus on gathering intelligence on terrorism, money laundering and organised crime. If we have a list of the complainants, then we can start investigating those calls," the official added. He said tapping phones is "completely illegal" in Kenya and that "some crooks" could be responsible for the mischief. "Technology has come up with gadgets. It could just be the work of some crooks. You get my number and hire crooks to call it or tap it using illegal equipment." Some of those complaining also doubt that the tapping is being done by the NSIS. They fear there could be a private attempt by influential individuals to intimidate those perceived to be critics or opponents of the government. "I experienced this thing in the 1980s and I know NSIS officers will never tell you they are calling from there," a close associate of a Cabinet minister who has received the calls said. While complaining ministers do not want to come out openly, backbenchers from across the political divide are complaining loudly that their phones have been tapped and their associates and clients threatened. They believe it is being done by the government. Outspoken KANU nominated MP, Mutula Kilonzo, said his business is threatened by telephone taps. "My clients tell me they have to call from a booth when they want to talk to me. They fear that somebody is listening into their conversation. People want to telephone their lawyer and their conversation is being recorded. The government is listening into private conversations," Kilonzo complained. He added: "If you have anything to discuss with me, don't call me, just come we talk about it. They are keeping tabs on all phones we make. I wonder why somebody would want to tap my calls. When there is an issue, I make noise about it in the press, on TV and Radio. I have nothing to hide." Another Narc MP who did not wish to be named said she was aware that phones are being tapped by some mysterious people. "I no longer talk sensitive matters on phone. I only talk to people whom I trust will not give me away, the MP said. Gem MP, Jakoyo Midiwo, said his phones are tapped and wondered what the problem is. "The tapping is permanent. For weeks after you say anything critical of the government, they will be on your phone. That is rubbish because there is no lie or conspiracy we hatch on phone. We just say the same things we say in public, he said. "We keep asking ourselves what could be wrong. What is Narc scared of after winning by such a huge mandate? Why are we behaving like we stole votes?" he asked. Some MPs trace the surveillance to the time differences emerged over whether the country needs a Prime Minister. The tapping has since escalated or dropped with the rising and cooling of Narc squabbles. It got worse with the murder of constitutional review commissioner, Dr Odhiambo Mbai. An official at the National Assembly estimated that there were about 110 plain clothes policemen in Parliament last week following the storm that rocked Narc over Dr Mbai's murder. MP Billow Kerow said MPs are being trailed, especially when they have raised sensitive issues in the House. "We know the guys. Some of them are our constituents. The whole idea is to find out who is doing what," he said. "It is intimidating. You feel insecure." But Kerow believes Mbai's death is not the cause. "The underlying cause is the distrust in Narc," he says. Mr Kilonzo however traces interferences with his phones to last February, "around the time the president left the hospital for the second time." All the complaining MPs say the problem is likely to worsen as disagreements in Narc intensify in the run up to Bomas III amid more revelations on the murder of Dr Mbai. Mr Kilonzo argues that while the Kanu regime also tapped phones, it is too soon for Narc to start doing the same because it was elected by a solid majority. "It should have been the most secure of governments," he says. "This tapping shows that the government is feeling insecure. There seems to be something serious going on in government which we are yet to be told. Be ready for more surveillance." Kanu MP, Nick Salat, says his phones are tapped "after every news bulletin" particularly from around seven in the evening. He thinks it could be somebody wants to listen to his comments about what has been broadcast. "There is a pattern and practice of eavesdropping on those thought to be critical of the government and even employees. We are also seeing a pattern where the government could be conducting surveillance on its own ministers. It is getting so bad we even fear talking to our wives," Salat said. "We don't make any strong commitments on phone now. We only give hints and discuss superficial matters. We are resorting to SMS now." Professional According to the MP, those who tap phones don't do a professional job of it. "They will cut into your conversation and say things that you would think they should not have said to you. Somebody cuts into your call and tells you "I am your colleague in Parliament, how is your family's" That from somebody you have never talked to or who has no business knowing about your family, he says, is intimidating. Narc MPs claim that some of the hostility between the coalition's leaders is based on information gathered from tapped telephone conversations. Their opposition colleagues, lawyers aligned to prominent politicians and some activists say they are receiving calls from people claiming to be from the Directorate of Security Intelligence. The callers warn that they know the activities of those they call, then promise to come and take statements but they never do. "The power to intercept private telecommunications between citizens is an extraordinary one. I have been through this before in the 1980s and I can see a pattern. It is a sign that the government is beginning to feel insecure," a member of the Constitutional Review Commission said. Subukia MP, Koigi Wamwere, says he has heard claims of people's phones being tapped and others who say they are being followed. But in the stream of claims and counter claims prevalent in Narc, he does not know what to believe. "The last thing I expect is to see this country relapse to the old days. We have come a long way and there can never be a good enough reason for the Government to start trailing MPs or ordinary citizens." Wamwere says he hopes that people are not making the claims to give the Government a bad name. National security minister Dr Chris Murungaru could not be reached by the Sunday Standard but an official in his ministry who declined to be named defended the government. "It is not the government's mission, nor is it part of the operations of this ministry, to monitor in government officials, or other citizens." The only exception, he said, would be in national security cases and only after serious consultations. Official The OP official declined to say whether there has been any security concerns lately that would warrant tapping of phones. But Mr Kilonzo, a lawyer, maintained that the law does not allow the government to listen into people's conversations under any circumstances. Doing so, he said, is a response to a desperate situation the public does not know about. He says tapping of phones began in the 1960s when President Kenyatta differed with Oginga Odinga. From then, people began to accept it as one of those things a government could do at will. But there is no law that allows the government to listen into people's telephone conversations. The right to privacy is absolute and the government is required to get an order from a judge to tap anyone's phone. The warrant must name either a specific person who is the target or a single set of premises which is the focus of the investigation. "If the government wants to tap phones legally, he said, it would have to ask Parliament to approve the need to do that. But I can assure you that this parliament cannot allow such a demand," Kilonzo says. A former minister in the Kanu government claims that even under Moi, it was never a government policy to have spies follow people around and it was done by people close to him. The surveillance mostly targeted vocal people or those suspected to be taking out information." Telecommunications experts says the things the leaders are complaining about, including clicking or tapping noises or whispering voices, could be signs that the line is tapped. They could also be signs that the tapping is being done by nonprofessionals. Clues "If your phone is being tapped by a professional, there will be no clues at all," a technician with a phone company said. But if those tapping are amateurish, or if they are using obsolete equipment, you may hear clicking or tapping noises on the line. Some people may also hear previous conversations being played back down the line, or voices whispering." Signs of tapping, she added, could also include strange sounds or volume changes on phone lines, and indication that the tapping is being done by an amateur eavesdropper attaching a wiretap, or activating some other phone tapping device. Another technician explained that the noise in itself does not indicate tapping. It could be caused by technical hitches. "When the Transmit and Receive lines are cross-connected, it could create the impression that the line is tapped. But it could also indicate tapping. It could mean that the buggers have put equipment that is not compatible with the network." Tapping of phones requires fixing a filter that is programmed to pick certain words or numbers. The filter is a conduit through which anything coming in has to pass. The device may attract no attention and even employees may not notice that it is not part of the equipment. But the operator will know. According to one technician, the two phone companies have no capacity to store what people say or receive. "Even if the authorities wanted to check what certain individuals have been saying, they cannot find it in the databases of phone companies." What can be traced is the location when you made the call and the destination of the call. An SMS text can be captured as it is being sent, not after. There is a device to make a copy of the text. The original will still go to the intended recipient but a copy can be retained. Intelligence According to a former intelligence officer there are signals that can show if the government is monitoring the communication of an individual. "You may notice phone company trucks and workers spending a lot of time near your home or office doing repair work. It could be the same many times. Telephone, cable, plumbing, or air conditioning repair people may start showing up to do work no one called them for. Eavesdroppers can fake a problem and then show up to fix it. While they are fixing the problem they are also installing eavesdropping devices." In other cases, service or delivery trucks are often parked nearby with nobody in them. These vehicles are commonly used as listening posts. "Be very cautious of any vehicle which has a ladder or pipe rack on the roof," he advises. " Or any vehicle which has tinted windows or an area you cannot see through." Copyright © 2003 The East African Standard. All rights reserved. Distributed by AllAfrica Global Media (allAfrica.com). [Non-text portions of this message have been removed] 7895 From: Date: Sat Oct 18, 2003 5:35pm Subject: spouses can no longer wiretap each other without fear of being sued [ The Atlanta Journal-Constitution: 10/18/03 ] Wiretaps by spouses actionable Court lets suit proceed By BILL RANKIN The Atlanta Journal-Constitution Sparring spouses can no longer wiretap each other without fear of being sued in federal court. In an opinion issued Thursday, the 11th U.S. Circuit Court of Appeals in Atlanta overturned a 29-year-old precedent that barred invasion-of-privacy lawsuits by spouses over wiretaps, even though the practice is a crime. "It's about time and long overdue," said Jeffrey B. Bogart, an Atlanta family law and criminal defense attorney. He said he has come across divorces with one spouse wiretapping another to catch an infidelity "more often than I'd like to see." Atlanta family law attorney John Mayoue said some studies estimate more than 75 percent of all wiretaps are done in family settings. This includes feuding spouses who try to use taped phone conversations as leverage in divorce disputes. "I think people in this country should be on notice we do not wiretap, period," Mayoue said. In Georgia, wiretapping is a felony with penalties of up to five years in prison and a $10,000 fine. But Mayoue said prosecutors, more inclined to charge more serious cases involving drugs and violence, rarely get involved in wiretaps in domestic disputes. "And most husbands and wives candidly think they just can't get DAs interested in this so they don't even bother to try," the attorney said. Clayton County District Attorney Bob Keller said he could not recall such a prosecution during his tenure. He said local prosecutors typically get involved in domestic disputes only when there is physical violence or threats of violence. The 11th Circuit issued its ruling in a case involving James and Elisabeth Glazner of Birmingham. After Glazner filed for divorce in 1999, he bought a recording device at Radio Shack and surreptitiously attached it to a phone line in their home. He then left on a trip. While he was gone, Elisabeth Glazner detected a hollow sound on the phone line, checked it out, found the recording device and called police. Before the Glazners' divorce was finalized, Elisabeth Glazner filed a federal lawsuit against her husband under a 1968 law banning wiretaps of "any person." But the case was dismissed by a federal judge, who cited a 1974 court precedent that said there was "implied consent" among married couples to wiretap each other in their own home. In Thursday's ruling, the 11th Circuit threw out that precedent entirely, noting that many other courts across the country that have considered the issue have ruled the other way. The 11th Circuit's decision applies to all three states within its jurisdiction: Georgia, Florida and Alabama. Elisabeth Glazner will now go to trial against her ex-husband, said her lawyer, Bruce Gordon. [Non-text portions of this message have been removed] 7896 From: George Shaw Date: Tue Oct 21, 2003 3:42pm Subject: Underground locator I have a need to locate the line/presence of underground cable approx 7ft deep in a mixed stone environment that contains lots of metal objects/bolts etc. I can induce a radio frequency along the cable but need to BE 100% (yes 100%) sure that what is induced will not interfere with the telecoms and signalling down the cable cores. What is the best approach/method and equipment out there? Suppliers? There may be fibre cores (with metal tracer) and 30/120 core telecoms cable involved. I need to be able to "trace" if there is a Tee off the main cable. What other method is there other than radio tagging? -- George Shaw MI3GTO " Any Sufficiently Advanced Technology is Indistinguishable from Magic" ---Arthur C. Clarke Mobile: +44 (0) 7740 361 163 Email: george.shaw@u... Fax & Voicemail: +44 (0) 871 242 4946 ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7897 From: szabo4381 Date: Wed Oct 22, 2003 5:31am Subject: Re:underground locator Dear Sir, go to :www.accuratelocators.com or www.futuregpr.com for underground 3D imaging devices Regards 7898 From: Lawrence Dillard Date: Wed Oct 22, 2003 7:00am Subject: Engineering Honor The bridge connecting Boston and Cambridge (Massachusetts) via Massachusetts Avenue is commonly know as the Harvard Bridge. When it was built, the state offered to name the bridge for the Cambridge school that could present the best claim for the honor. Harvard submitted an essay detailing its contributions to education in America, concluding that it deserved the honor of having a bridge leading into Cambridge named for the institution. MIT did a structural analysis of the bridge and found it so full of defects that they agreed that it should be named for Harvard. 7899 From: ATSCP Secretary Date: Wed Oct 22, 2003 5:56am Subject: Re: ATSCP To Whom It May Concern: I am very sorry to hear that there is some confusion by the aims or purpose of the ATSCP. Firstly, I would like to state, anyone is more than welcome to contact me with any questions or concerns you have about the operations of the ATSCP, hence please find attached my contact details below. Even though I am unfortunately described as a “powerful warning”, I still strongly believe I am reasonably approachable, and I have not “shot” anyone, yet! I can give you my personal assurance there is no smoke and mirrors involved in the association or in any of the members of its voluntary steering committee. Televisions sensationalising programs and the ATSCP mission could not be further apart. I will address the points that have been stated as concerns in a message posted by a Mr. Tracey, if there are any other concerns or issues anyone feels the need to raise then please forward them to the secretary or any other member of the committee. To show that there is no smoke or mirrors involved I am more than happy to continue to address anyone’s concerns through the TSCM-L list. However, I feel that one should always get facts straight in their mind before placing their mouth or keyboard in gear. Firstly, I think the objectives of the ATSCP are very clear, easily understood and unassailable. Secondly, my activities as a professional going about earning my living are primarily ‘Design and Manufacture’, secondly ‘Training’ and lastly, sweep operations. I do not actively promote the sweep service; it comes to me by request, which I am happy to do, as it provides continues real time input for further development of equipment and training procedures. Thirdly, the members of an association of those in the same profession have an element of competition, by definition. I fail to see that this is negative, and my experience is a spirit of friendly competition and co-operation. I am sure that the board members of organisations such as ASIS have their own businesses or day jobs and it would be frivolous to declare that they operate to their own agenda to the detriment of the reputation of the organisation. Fourthly, a number of “top professionals” have heard about the ATSCP and have telephoned me direct for any clarification, in particular progress in our formation. This was all well received. Many however have taken the wait and see approach, while this is perfectly acceptable, it is not so when an individual takes a critical, unconstructive and inflammatory response to the voluntary work whose intention is to better and develop the industry. Please note however that the existing steering committee is interim until such time that its members ratify a constitution and an executive committee is duly voted in. May I add that I have taken on the role of chairman on a voluntary basis, just as the rest of my committee have, but my responsibility is such that I do not decide association policy, but simple carry out my duties as a representative and chair of the committee. The association constantly strives to better itself, and if anyone feels they would be able to represent the association in a more appropriate manner than currently present then I'm sure the committee would welcome them. And, even if an individual’s years of experience don't match those of some of the committee members their contribution and input is still welcome in the association. The whole aim is to gather all the various experienced professionals and increase their skill and competence. Surely no one is beyond bettering him or herself? The aims of the ATSCP are very much in line with the recent debate the list had regarding what gives someone the right to charge $2000+ per day (Robert Motzer, Subject: We Do It To Ourselves, 12th October). This highlighted that only a high degree of self-imposed ethics or external regulation will stop charlatans and false claims. The ATSCP is attempting to pre-empt UK government regulations from imposing unworkable rules on the UK ECM industry which may permit anyone and everyone that passes a criminal record check to conduct TSCM sweeps. The aims of the association are not to make the operations of qualified professionals harder, it is to make the operations of unqualified “professionals” harder. In the message posted by Mr. Tracey he claims that he was not able to find any "top professionals" that wanted to be associated with the ATSCP. I would really like to know what Mr. Tracey defines as a “top professional”. I wonder if he considers himself a “top professional”? I do think it is very unfair that Mr. Tracey is questioning the professionalism of the members of the committee, this leads me to believe that he does not know them, as rest assured, I can vouch that they are some of the most professional, courteous, honest and honourable people I have had the pleasure of working with. I also know that I am not alone in holding this opinion. Rest assured, this is no "phoney operation" as some have assumed to call it. There is no intention, hidden or otherwise to "grab" business from hard working professionals, completely the opposite! The mission of the association is to try and establish a system of standards and possibly certification to represent the industry with the forthcoming new private security legislation, nowhere on the site is a product or service advertised. It also aims to increase the awareness of this security industry in the corporate world, which could only have positive benefits as we all know it is an often over looked area of security within an organisation. I have added the principles and objectives of the association at the end of my email so that anyone interested can read the objectives of the association. I'm glad Mr. Tracey likes the site, but once again, I feel he is sadly misguided by imagining that the site is all “smoke and mirrors”. If Mr. Tracey would be good enough to pass on his full contact details I would be more than happy to have one of the committee contact him so as to explain and clear any "smoke" obstructing his vision. Finally to all, if you have any questions or doubts, speak to us, false assumptions are not required or necessary. Yours sincerely, Mr. J. Little ATSCP Chairman chairman@t... Tel: +44-(0)1908-677062 7900 From: Hawkspirit Date: Fri Oct 24, 2003 9:35am Subject: Historical Sweep article Here is a historical sweep article that I could only reproduce from a xerox, if anyone has an original copy I would like to get the pictures scanned. Roger When Walls have Ears, Call a Debugging Man (Business Week, October 31, 1964, Industries) http://bugsweeps.com/info/debug_man.html 7901 From: Date: Fri Oct 24, 2003 10:08pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: If Granite Island Group sponsors a periodic TSCM "get together" to help focus and improve the industry would you be interested in attending? o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1148865 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7902 From: Date: Fri Oct 24, 2003 10:15pm Subject: New poll for TSCM-L Enter your vote today! A new poll has been created for the TSCM-L group: Do you have any interest in one of my inexpensive two line TDR (pulse/ping boxes) for use on telephone lines? o Yes o No To vote, please visit the following web page: http://groups.yahoo.com/group/TSCM-L/surveys?id=1148867 Note: Please do not reply to this message. Poll votes are not collected via email. To vote, you must go to the Yahoo! Groups web site listed above. Thanks! 7903 From: secure1939 Date: Wed Oct 22, 2003 10:28pm Subject: Re: ATSCP --- In TSCM-L@yahoogroups.com, "Lee Tracey" wrote: > I am a mite puzzled about this ATSCP organisation that claims to be an independent body to set standards for TSCM professionals. > This new body appears to also be all "smoke and mirrors" and no substance. A powerful warning shot was the announcement that Mr J. Little had been appointed as a "Chairman". > > Mr Little is a trader seeking after and trying to acquire sweeping work in competition with the very professionals he is claiming to represent. It is also significant that I cannot find any of the top professionals in the business who are willing to be associated with this "ATSCP" group. > > This smells to me like a phoney operation being set up to grab business from under the noses of the hard working and professional operatives. > > > Lee Tracey > I think Lee Tracy is right in his assumption. The real problem being this so called association has been set up by people with lots of knowledge of designing websites but absolutely no knowledge of TSCM. Tracy is correct in that none of the major sweep teams have ever heard of the people behind this scheme nor will they even consider membership. They failed to take into account the professional UK TSCM teams are a small, tight knit community who have all know and worked with each other for years and speak frequently. John Little is a manufacturer who also carries out sweeps, Alan Cook I gather came into the business only this year and is now an 'expert' having had one day's training with John Little before setting himself up to carry out TSCM investigations. So what happens when a corporate client is taken in by the site and an enquiry comes in for a major sweep worth say $20,000/$30,000 ? Messrs Little and Cook will allocate the enquiry to their most qualified member ? As the saying goes...'If it looks too good to be true.....' The thought of a prospective 'James Bond' buying his hand held scanner from a spy shop for a couple of hundred dollars then telling clients he is an accredited member of the 'Association for Technical Surveillance Professionals' doesn't bare thinking about. I wouldn't be at all surprised if John Little very quickly came to the conclusion that being closely associated with the ATSCP was, perhaps, not such a good idea after all and quietly withdraws. HK 7904 From: Lee Tracey Date: Thu Oct 23, 2003 4:47am Subject: Mr Little In response to "Mr. J.Little " - to use the title "Mr" as a self description is so bad a gaffe that it makes me cringe with embarrassment on his behalf. Jack Little; Jimmy Little; Johnny Little or His Royal Highness Little, but never "Mr". Who am I? I am just a poor old country boy of 77. Retired and with nothing better to do than cast the odd opinion when I see something that interests me. "Mr" Little states that if I provide my contact details he will admonish me direct. Some clued up member of the security fraternity is "Mr" Little. My contact details were published along with my comments. Some seven other subscribers to the forum emailed me direct and all agreed with me. I have not received any messages in support of the "Mr" Little organisation or his great magnificence The Chairman. Lee Tracey [Non-text portions of this message have been removed] 7905 From: Date: Sun Oct 26, 2003 10:22am Subject: File - mission.txt TSCM-L Technical Security Mailing List Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, wiretaps, bugging devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. This also includes bug detection, bug sweep, and wiretap detection services. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. The list includes technical discussion regarding the design and construction of SCIF facilities, Black Chambers, and Screen Rooms. This list is also for discussing DIAM 50-3, NSA-65, and DCID 1/21, 1/22 compliance. The primary goal and mission of this list is to "raise the bar" and increase the level of professionalism present within the TSCM business. The secondary goal of this list is to increase the quality and effectiveness of our efforts so that we give spies and eavesdroppers no quarter, and to neutralize all of their espionage efforts. This mailing list is moderated by James M. Atkinson and sponsored by Granite Island Group as a public service to the TSCM, Counter Intelligence, and technical security community. 7906 From: Date: Sun Oct 26, 2003 10:22am Subject: File - Gold List The current version of this list may be found at: http://www.tscm.com/goldlist.html ------------------------------------------------------------------------ Recommended U.S. TSCM Firms The following is a list of private TSCM firms who specialize in "bug sweeps" and wiretap detection and all of whom have legitimate TSCM training, credentials, and equipment (all are very well respected within the industry). While most TSCM specialists are available for travel outside of a specific geographic area they tend to avoid such engagements, or will limited the services to vulnerability analysis, pre-construction assistance, non-instrumented inspections, simple RF checks, in-place monitoring, or limited TSCM services involving only a briefcase sized in-place monitoring system (such as a single spectrum analyzer, MSS, Eagle, ScanLock, OSCOR, SPECTRE, ROSE, or similar system). These private TSCM firms tend to operate in a specific geographic area limited to a few hundred miles (usually within a four to six hour automobile drive). However, all of the TSCM firms listed here are available for travel anywhere in the United States or the World on short notice, but only provide limited services when operating outside of their normal coverage area. This limited coverage area is due to the logistics involved in transporting hundreds and often thousands of pounds of sophisticated, highly sensitive electronic instruments, equipment and tools. Bug sweeps and wiretap detection involves the use of ladders, pole climbing equipment, LAN analyzers, X-ray systems, large antennas and other equipment which is not easily transported by airplane. TSCM firms also tend to restrict their operations to a specific geographic area to facilitate an expert level of knowledge regarding the RF environment, construction methods used, community zoning, population demographics, civil engineering, aeronautic or maritime facilities, local military bases, and related areas. Knowledge of such regional information is critical for a successful TSCM project. The TSCM specialist must also have an intimate knowledge of the telephone systems, engineering methods, fiber optics, major cable locations, central office switches, test numbers, and related communications infrastructure present or being used in an area (which tends to be very regional). An understanding of what types of eavesdropping devices, methods, and frequencies are being used in an area is also important, as is a knowledge of what type of surveillance equipment is being sold within that region (and other areas). The TSCM Procedural and Protocols Guides used by a specialist also tend to be based on specific issues and variables present in that specific geographic area. On a more interesting note, many of these firms are located in, or near major maritime port cities. The heaviest concentrations are around major cities on the East and West coasts with a very limited presence in the Mid-West, Great Plains, and Rockies. If you are in the Mid-West, Great Plains, or Rockies area you would need to engage a TSCM firm from one of the major port cities. For example customers in Chicago, St. Louis, Memphis, Denver, Salt Lake City, Minneapolis, Billings, etc. would need to fly a TSCM specialist in from Boston, New York, Washington DC, Los Angles, Lexington, or Seattle. ------------------------------------------------------------------------ Please be patient when contacting these firms, as if they are out serving a client they may not be able to return your call for several hours. Rates generally are non-negotiable and reflect the cost of the sweep practitioner's time, investment in equipment acquisition and maintenance, several weeks of in-service training a year, travel, administrative and communications time and expense to coordinate the sweep and written report, and a fair profit for their services. It is very unwise to shop for sweeps by using price as a criteria as it only invites getting ripped off. Legitimate TSCM professionals are not interested in, nor will then engage in negotiating for a lower price. When you contact persons on this list, you are talking with someone in the same league as an attorney or surgeon, not a salesman. In fact most of the people listed on this page have more time in their specialized training than do most attorneys or medical professionals. Anything beyond an initial phone call usually will be billable time. Attorneys and doctors don't consult for free, and neither do legitimate TSCM specialists. If a potential client calls with a long list of questions not pertaining directly to hiring the practitioner, or wants to know how to do his own sweep, or wants to know how to use the sweep kit he purchased on his own, expect to pay an hourly rate in advance for consulting services. If you are considering engaging (or have already engaged) a TSCM firm and they are not listed in the following directory you would do well to immediately ask some awkward questions. It is also important you understand that legitimate services by a competent TSCM firm rarely start at less then several thousand dollars for even a basic sweep. Keep in mind that there only a small number of legitimate and competent TSCM counterintelligence specialists or "Bug Sweepers" in the U.S. private sector. Legitimate TSCM firms are in very high demand, hard to find, and expensive; so be patient when trying to find one to help you. Also, the firms listed on this page are not attorneys and cannot tell you whether it is legal or illegal for you to monitor your own phones. Always call a competent licensed attorney for legal advice. Without exception, no one listed here performs eavesdropping services or sells surveillance equipment to any other than government agencies AND WILL NOT REFER YOU TO ANYONE WHO DOES. When you contact any of the following firms please mention that you saw them listed on this web site. ------------------------------------------------------------------------ All of New England, Upstate New York, and the Boston Metropolitan Area (MA, RI, CT, VT, NH, ME, New York State including Long Island, and some of New Jersey) Available on a limited basis to cover any location within 1000 miles of Boston. James M. Atkinson Granite Island Group 127 Eastern Avenue #291 Gloucester, MA 01931-8008 (978) 381-9111 Telephone URL: http://www.tscm.com/ E-mail: jmatk@tscm.com ------------------------------------------------------------------------ Stamford, Connecticut Metropolitan Area (also, Manhattan, Long Island, and New Jersey) Sam Daskam Information Security Associates, Inc. 38 Settlers Trail Stamford, CT 06903 (203) 329-8387 Telephone URL: http://www.isa-tscm.com/ E-mail:sales@i... ------------------------------------------------------------------------ Norwalk, and Lower Fairfield Country Area (also, Manhattan, Long Island, Philadelphia, and New Jersey) Rob Muessel TSCM Technical Services 11 Bayberry Lane Norwalk, CT 06851 (203) 354-9040 Telephone URL: http://www.tscmtech.com/ E-mail:rmuessel@t... ------------------------------------------------------------------------ Greater Philadelphia and Harrisburg Metropolitan Area (also, serving South-Eastern and Central Pennsylvania) Bob Motzer RCM and Associates 609 Sandra Lane Phoenixville, PA 19460 (888) 990-6265 Telephone E-mail: 1RCM@M... ------------------------------------------------------------------------ Washington DC and Baltimore Metropolitan Area (also, Virginia, Delaware, and Pennsylvania) Steve Uhrig SWS Security 1300 Boyd Road Street, MD 21154-1836 (410) 879-4035 Telephone URL: http://www.swssec.com/ E-mail: steve@s... ------------------------------------------------------------------------ Houston, Dallas, Austin, and Galveston (also, Gulf Coast of Texas and Louisiana) Rick Udovich Communication Security, Inc. 2 Shadow Lane Bay City, TX 77414 (979) 244-4920 Telephone URL: http://www.bugsweep.com/ E-mail: rjudo@s... ------------------------------------------------------------------------ Atlanta Metropolitan Area, Southeastern US (also, AL, FL, GA, NC, SC, TN) Buzz Benson Executive World Services, Inc. P.O. Box 33 Braselton, Georgia 30517-0033 (678) 316-7002 Telephone URL: http://www.executiveworldservices.com/ E-mail: sales@e... ------------------------------------------------------------------------ Lexington KY Metropolitan Area (also, Louisville, Cincinnati, and Central Midwest) Bill G. Rhoads Intelcom, Inc. 121 Prosperous Place, Suite 4B Lexington, KY 40509 (859) 263-9425 Telephone E-mail: bgr101@a... ------------------------------------------------------------------------ Michigan and Surrounding Area (also, Indiana, Ohio, and Northern Midwest Region) Chad Margita Off Duty Security 18301 Eight Mile Rd, Suite 214 Eastpointe, MI 48021 (586) 774-1675 Telephone E-mail: offdutysecurity@c... ------------------------------------------------------------------------ Washington State and Seattle WA Metropolitan Area (also, Oregon, and the Pacific North West) Gordon Mitchell Future Focus, Inc. P.O. Box 2547 Woodinville, WA 98072 (888) BUG-KILR Telephone URL: http://www.bug-killer.com/ E-mail: enquiries@b... ------------------------------------------------------------------------ San Francisco and all of Northern California (also, Silicon Valley Area) William Bennett Walsingham Associates, Inc. P.O. Box 4264 San Rafael, CA 94913 (415) 492-1594 Telephone E-mail: walsingham@c... ------------------------------------------------------------------------ 7907 From: James M. Atkinson Date: Sun Oct 26, 2003 5:50am Subject: German Arrested for Spying for Bulgaria German Arrested for Spying for Bulgaria Fri Oct 17,11:20 AM ETAdd World - Reuters to My Yahoo! By Mark Trevelyan BERLIN (Reuters) - German authorities have arrested a veteran intelligence agent on suspicion of betraying secrets to a female Bulgarian spy, sources close to the case said on Friday. http://story.news.yahoo.com/news?tmpl=story&u=/nm/20031017/wl_nm/crime_germany_spy_dc_4 They said the 64-year-old agent, a Balkan specialist with Germany's BND foreign intelligence agency, was arrested at his home in Munich on October 9. The federal prosecutors' office in Karlsruhe said in a statement that the unnamed man was suspected of passing secret documents to the woman spy between late 1999 and last month. It did not name the foreign country, but a source with knowledge of the case told Reuters it was Bulgaria. In Sofia, the head of Bulgarian military counter-intelligence said such reports were an attempt to smear the ex-communist country before it joins NATO (news - web sites) next year. "There are thousands of ways to blacken a person... similar schemes could be used to blacken a country as well," Orlin Ivanov told state radio. DIVORCE AND DRINK Justice and security sources said the German agent had long worked in the Balkans in human intelligence gathering and had contact with other foreign intelligence agencies. They said his motives were not known, but he was coping with a number of personal problems, including divorce and alcohol. He was not believed to have had an affair with the Bulgarian agent. "This wasn't a love affair," one source said. "We don't know yet what the motives were or whether he received money." The agent has been interrogated by federal prosecutors and held in investigative custody since October 9 -- an indication that the security breach was serious, sources said. Der Spiegel magazine said in a report in its online edition the German government was outraged over the alleged spying by a friendly nation. As well as joining NATO next year, Bulgaria aims to win entry to the European Union (news - web sites) in 2007. NATO countries protested recently at plans by Bulgaria's prime minister to appoint a former communist spy as his security adviser. The issue was resolved this week when the official, Brigo Asparuhov, turned down the appointment. The German government refused to comment on the alleged German-Bulgarian spy affair. Petio Petev, minister plenipotentiary at the Bulgarian embassy in Berlin, said he was perplexed by reports of the case. "We have excellent relations with Germany, so it's a very strange publication (in) my personal opinion," he told Reuters. Petev said the embassy had not been contacted by German officials, but had been in touch with its own foreign ministry in Sofia to brief it on the reports. -- -------------------------------------------------------------------------------------------------- The First, The Largest, The Most Popular, and The Most Complete TSCM, Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet. -------------------------------------------------------------------------------------------------- James M. Atkinson Ph: (978) 381-9111 Granite Island GroupFax: 127 Eastern Avenue #291http://www.tscm.com/ Gloucester, MA 01931-8008mailto:jmatk@tscm.com -------------------------------------------------------------------------------------------------- "Those who advocate beating their swords into plowshares generally wind up plowing for those who didn't." - Benjamin Franklin. -------------------------------------------------------------------------------------------------- 7908 From: mark de boer Date: Sun Oct 26, 2003 7:18am Subject: usefull tool? Hi list, Does any of you know the field strenght detector made by Scanlock, called delta V ECM, is this a usefull tool for locating GSM Cell phone based devices. The specs seem to be oke. http://www.audiotel-international.com/deltav.html M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [Non-text portions of this message have been removed] 7909 From: Chris Childs Date: Sun Oct 26, 2003 10:49am Subject: New Jersey con artists' anti-terrorist device was filing cabinet: FBI http://www.canada.com/news/story.asp?id=1D0BDFCC-D7A9-4C1E-AFEC-3CBDAB5EEDE6 New Jersey con artists' anti-terrorist device was filing cabinet: FBI Friday, October 24, 2003 NEWARK, N.J. (AP) - A husband and wife have been charged in a scheme to promote a device after Sept. 11, 2001 that was supposed to protect people against terrorist attacks but was actually a yellow filing cabinet with flashing lights and a siren on top, officials said. The device led to a fourfold increase in the stock price of the couple's small company - and allowed defendant Stewart Kaiser to sell shares that were in his mother's name at a substantial profit, said the FBI complaint. Kaiser is charged with stock fraud and misleading investors in the company he founded, R-Tec Technologies. Both he and his wife, Nancy Vitolo, are charged with making false statements to investigators. A message left at a listing for Kaiser was not immediately returned Friday. It was unclear if the couple have lawyers. The complaints were filed Wednesday and delivered to the defendants Thursday, the U.S. attorney's office said. They were not arrested but have a Nov. 12 bail hearing. The complaints outline alleged stock fraud that began when Kaiser solicited investors in January 1998 and ended soon after his news release of Sept. 24, 2001, promoting a device called the C-BAND, for Chemical & Biological Alarm and Neutralization Defense System. A 1998 letter from Kaiser to potential investors said "there is no risk to you or your funds." Investors sending cheques, including one for $100,000, were told to make them payable to Vitolo, who eventually received more than $400,000, the complaints said. Kaiser was listed as the contact on the C-BAND news release, which touted the device as a self-contained unit that would alert people when it detects a "harmful bio or chem-agent" and that could be installed in airports, malls and sports arenas. It would also "isolate and neutralize the harmful agents" by "using a series of high electromagnetic frequency signals." In November 2001, the U.S. Securities and Exchange Commission ordered R-Tec to stop publicizing the device. The stock regulators determined the company had no plans to produce the device and lied about having patents on it. Kaiser was expected to plead last month to two stock-fraud charges and Vitolo to making false statements but the deal fell apart. That day, Kaiser said the filing cabinet was merely a "visual display" to show the SEC. If they had pleaded to the charges, Kaiser, 37, could have faced up to 10 years in prison and a $1-million fine. Vitolo, 40, could have faced up to five years and a $250,000 fine. © Copyright 2003 The Canadian Press [Non-text portions of this message have been removed] 7910 From: mark de boer Date: Sun Oct 26, 2003 1:10pm Subject: useful tool? Hi list, Does any of you know the field strength detector made by Scan lock, called delta V ECM, is this a useful tool for locating GSM Cell phone based devices. The specs seem to be OK. http://www.audiotel-international.com/deltav.html M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [Non-text portions of this message have been removed] 7911 From: szabo4381 Date: Mon Oct 27, 2003 5:22am Subject: The Magnetron=bug-desinfector ?! Hi to everyone, I was in doubt posting or not this question, but finally here is : did anyone anytime using a magnetrone ( provided from an ordinary microwave owen, about 500W at 2400 MHz) for "painting" the walls, furnitures etc.? This unusual "sweep" have to KO all electronic circuit behind... What is your procedure if you suspect a bug behind (or inside ) the walls ? Do you consider too brutal this metode ?? 7912 From: Shawn Hughes Date: Tue Oct 28, 2003 10:45pm Subject: audio intercept question Hi! Have a question I can't answer, so I thought I'd pose it to the group. A person related me that they were told there was a device one could put 'on their phone line' to prevent a person on the other end from recording them. This person is an investigative journalist, and she was attempting to record an individual (one party state). All she obtained was 'white noise and click-clack' (her description). Her setup worked normally prior to and subsequently, just not this time. Is this a freak incident, or does this sound like something one of you has heard about? How could you pass something past the switch, that doesn't garble heard audio, but defeats a wired recorder? (Holding the recorder to the earpiece, she was subsequently able to obtain her information.) Thanks in advance, Shawn Hughes Lead Instructor Tactical Response, Inc. 7913 From: Hawkspirit Date: Wed Oct 29, 2003 10:31am Subject: Bug sweep Historical articles Here is a new addition the bug sweep historical articles collection. CAN YOU FIND OUT IF YOUR TELEPHONE IS TAPPED? by Fred P. Graham - Esquire, May 1973 http://bugsweeps.com/info/esquire_5-73.html 7914 From: Steve Uhrig Date: Wed Oct 29, 2003 5:04pm Subject: Re:audio intercept question On 28 Oct 2003 at 23:45, Shawn Hughes wrote: > A person related me that they were told there was a device one could > put 'on their phone line' to prevent a person on the other end from > recording them. While there are all sorts of wondrous things being done by people much more capable than me, this sure sounds like snake oil. What is the credibility and technical savvy of the person making this claim? Did they have direct knowledge, or were they simply repeating something they heard from someone who heard it from someone else who heard it from his barber's nephew's vet who has a neighbor who worked for the FBI in 1947 cleaning toilets? Offhand I can't think of any way the above could be accomplished. > This person is an investigative journalist, and she was attempting to > record an individual (one party state). All she obtained was 'white > noise and click-clack' (her description). > Her setup worked normally prior to and subsequently, just not this > time. > Is this a freak incident Probably. Non-technical types tend to be the ones most gullible. The noise could be an open ground or no input path, motor noise, whatever. Click clack could be a worn capstan and pinch roller or worn or cheap tape cassette. > How could you pass something past the switch, that doesn't garble heard > audio, but defeats a wired recorder? I doubt it is possible. If it is possible, I'm quite sure it's not practical especially at a consumer level. Dektor some years ago had phones which were tap resistant (I hate to say tap PROOF). They injected noise from one end onto the telco line which was filtered out by the telco equipment between the originating phone and the other end. The concept sounded weird, but I had several and they worked which really impressed me. You set it up, did a bunch of analog adjustments to match local circumstances, and nothing locally could recover audio close to the instrument equipped with the masker. A butt set was completely dead. Recorder interfaces heard nothing. Amazed me. I got maybe 300 feet of copper past the masked phone while a conversation was in process, and I couldn't recover anything from the copper pair. However, the masking noise appeared in the local handset of the masked phone. It was loud enough to be annoying although the party at the other end still could be heard. The several clients for whom I installed the units on a provisional basis had a serious need for security, but could not deal with the masking noise they heard in their local handset. At the other end, the other side of town, the masked call sounded perfectly normal. Dektor knew how the telco filters would work and what would pass their bandwidth and what wouldn't, and the system worked for its intended purpose -- protecting the originating side from intercept. But from a user point of view, the masking noise was more than they would tolerate even for the security it offered. I'm talking maybe 20-25 years ago for this product from Dektor, long out of business. The masked phones never were popular and may not have been a production item. And I'm not real sure about Dektor's ethics as they sold products which I don't believe were real but sounded good. This last is personal opinion. This is not what you were asking as it worked on the originating end only, but was the closest example I could think of. Remember the telco has a pretty narrow freq response, something like 300-3000 cycles. And essentially everything gets digitized at some point, even if just a local call. You're not on copper for long anymore. Even in the very rural area where I live, fiber comes within a mile of the buildings. In more populated areas, you hit fiber a lot sooner than that. Once you're muxed onto fiber, digital filters will remove a whole lot of noise and garbage. > (Holding the recorder to the earpiece, she was subsequently able to > obtain her information.) I suspect a fluke, or more likely operator error. I wouldn't expect someone deliberately protecting the content of their telephone conversations, especially at a consumer level. 'When you hear hoofbeats, think horses, not zebras.' Steve ******************************************************************* Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" ******************************************************************* 7915 From: Jay Coote Date: Wed Oct 29, 2003 8:28pm Subject: Re: The Magnetron=bug-desinfector ?! My opinion- Many surveillance devices could be immune to being zapped by RF, while other harmless electronic devices may be damaged. If you zap your clients pacemaker, he may not pay. I would be concerned for the safety of the operator or other people in the area- even if away from the main lobe of the antenna.... 500 watts and how much ERP aimed where? Even NLJDs (nonlinear junction detectors) that run at 500 milliwatts require very cautious use. Also, consider the legality of operating a "dirty" 500-watt transmitter and the radio interference issues. Better to use good search techniques, combined with the appropriate TSCM equipment. Jay Los Angeles ---------- Hi to everyone, I was in doubt posting or not this question, but finally here is : did anyone anytime using a magnetrone ( provided from an ordinary microwave owen, about 500W at 2400 MHz) for "painting" the walls, furnitures etc.? This unusual "sweep" have to KO all electronic circuit behind... What is your procedure if you suspect a bug behind (or inside ) the walls ? Do you consider too brutal this metode ?? ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailing list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffeine alone I set my mind in motion. =================================================== TSKS Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 7916 From: Hawkspirit Date: Wed Oct 29, 2003 9:38pm Subject: Historical Bug Sweep Articles Another new addition the Historical Bug Sweep articles. Roger The Ways and Means of Bugging Time, May 28, 1973 http://bugsweeps.com/info/time_5-28-73.html 7917 From: Michael Puchol Date: Tue Oct 28, 2003 3:12pm Subject: Re: The Magnetron=bug-desinfector ?! Well, it may not kill the bug, but it will most likely render you instantly impotent....I remember a case about a HAM radio operator who tried such method and got severe burns and tissue damage from it (I can't remember if he died or not). This nutcase stuck 800 watts off a microwave magnetron into a waveguide, and had no better thought than look into it to make sure it was straight - ouch! Cheers, Mike ----- Original Message ----- From: "szabo4381" To: Sent: Monday, October 27, 2003 12:22 PM Subject: [TSCM-L] The Magnetron=bug-desinfector ?! > Hi to everyone, > I was in doubt posting or not this question, but finally here is : > did anyone anytime using a magnetrone ( provided from an ordinary > microwave owen, about 500W at 2400 MHz) for "painting" the walls, > furnitures etc.? > This unusual "sweep" have to KO all electronic circuit behind... > What is your procedure if you suspect a bug behind (or inside ) the > walls ? > Do you consider too brutal this metode ?? 7918 From: Juke Katan Date: Tue Oct 28, 2003 3:16am Subject: Re; Magnetron Bug Disinfector WOW! That is so dangerously wrong at so many levels, where do I begin. Do you understand how a microwave oven works? Do you know that 500 watts at 2.4 Ghz causes the Hydrogen molecule in H2O (water) to resonate, thereby causing friction which causes heat. How is that supposed to neutralize an eavesdropping device? Are you going to use this magnetron as a peak pulse or cw emitter? How do you propose to shield yourself from the output of the magnetron? Are you going to try to focus the output of the magnetron into an antenna thereby increasing the E.R.P.? How are you going to prevent that 500 watts from being reflected back at you by any metal pipes, screws, nails, electrical outlets, etc. that's buried in the walls? How are you going to prevent the penetration through walls/floors into persons on the other side? And lastly... are you going to seek type approval or certification of your new "intentional radiator" from your Governments Communications Ministry? Whatever you're thinking of doing along those lines, DON'T DO IT!!! Aside from maybe causing a few diodes or transistors to conduct momentarily (which probably won't destroy or burn up anything), you'll just wind up causing a lot of tissue damage in living organisms. --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [Non-text portions of this message have been removed] 7919 From: Gordon Mitchell Date: Tue Oct 28, 2003 11:00pm Subject: Re: audio intercept question Long ago people made some ultrasonic signal generators that had 2 tones. In normal situations they would not be heard; a filter blocked the signal from the phone being used. The theory was that any nonlinear circuitry, e.g., a recorder with an overloaded front end, would be hit with the difference of the 2 tones which was arranged to be in the audio range. Of course the coverage was best near the signal generator and marginal farther away. A friend in a company that used to make these things said that they worked OK but the phone company didn't like the extra stuff on their lines. Gordon (425) 489-0446 Shawn Hughes wrote: > Hi! > > Have a question I can't answer, so I thought I'd pose it to the group. A > person related me that they were told there was a device one could put 'on > their phone line' to prevent a person on the other end from recording them. > > This person is an investigative journalist, and she was attempting to > record an individual (one party state). All she obtained was 'white noise > and click-clack' (her description). > > Her setup worked normally prior to and subsequently, just not this time. > > > Is this a freak incident, or does this sound like something one of you has > heard about? How could you pass something past the switch, that doesn't > garble heard audio, but defeats a wired recorder? (Holding the recorder to > the earpiece, she was subsequently able to obtain her information.) > > > Thanks in advance, > > > Shawn Hughes > Lead Instructor > Tactical Response, Inc. > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ > > > 7920 From: Steve Uhrig Date: Thu Oct 30, 2003 7:37am Subject: Happy Birthday to Mike Adler Not sure if he's 66 or 67 this year. Maybe neither. Happy birthday Mikie! 7921 From: James Goldston Date: Thu Oct 30, 2003 9:57am Subject: Personnel Security Needs in Kuwait Greetings Everyone, We're doing a proposal on some work in Kuwait. Can anyone tell me anything about security concerns on doing consulting work there? I'm looking into State Department recommendations (links are below). I've not found that anyone is recommending the use of armed guards, but sometimes that info is held a little more privately. If armed escorts are recommended, does the list have any recommendations or ballpark numbers on what an escort would cost? Consular Information Sheet: http://travel.state.gov/kuwait.html Background Profile: http://www.state.gov/r/pa/ei/bgn/5409.htm US Embassy in Kuwait: http://kuwait.usembassy.gov/ - On April 30, 2003, the U.S. Department of State cancelled the Travel Warning for Kuwait issued on March 16, 2003 and allowed dependents of U.S. Embassy employees and non-emergency Embassy personnel to return to Kuwait. - On March 16, 2003, the U.S. State Department issued a Travel Warning strongly urging Americans in Kuwait to depart the country immediately due to the possibility of war with Iraq. The Department also ordered all dependents of U.S. Embassy employees and all non-emergency personnel at the Embassy to leave Kuwait. Thanks, James =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= James K. Goldston, President, CISSP http://www.sses.net Sword & Shield Enterprise Security, Inc. jgoldston@s... 10301-A Technology Drive http://www.SecureHQ.com Knoxville, TN 37932-3342 865-777-5500, x-501 865-777-5599(fax) PGP fingerprint: 8F28 D6AA 1438 A0D1 807D 38CF DB0C 0847 DE92 17B9 PGP Public Key, see --> http://www.keyserver.net =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 7922 From: Gregory Horton Date: Thu Oct 30, 2003 6:29pm Subject: Re: Bug sweep Historical articles Ouch, that really hurts when 1973 is considered historical. I feel old. Hawkspirit wrote: > Here is a new addition the bug sweep historical articles collection. > > CAN YOU FIND OUT IF YOUR TELEPHONE IS TAPPED? > by Fred P. Graham - Esquire, May 1973 > > http://bugsweeps.com/info/esquire_5-73.html > > > Yahoo! Groups Sponsor > > > > > ======================================================== > TSCM-L Technical Security Mailing List > "In a multitude of counselors there is strength" > > To subscribe to the TSCM-L mailing list visit: > http://www.yahoogroups.com/community/TSCM-L > > It is by caffeine alone I set my mind in motion. > It is by the juice of Star Bucks that thoughts acquire speed, > the hands acquire shaking, the shaking is a warning. > It is by caffeine alone I set my mind in motion. > =================================================== TSKS > > Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service > . [Non-text portions of this message have been removed] 7923 From: Chris C Date: Thu Oct 30, 2003 3:52am Subject: RE: Digest Number 1401 Dear M.de Boer Audiotel have a purpose built GSM detector - Signet -which you may be int= erested in but yes the Delta V alarms when a GSM handset is working. email Harry Bell on harry@a... Regards Chris Cauwood >-- Original Message -- >Date: 29 Oct 2003 23:12:53 -0000 >From: TSCM-L@yahoogroups.com >To: TSCM-L@yahoogroups.com >Subject: [TSCM-L] Digest Number 1401 >Reply-To: TSCM-L@yahoogroups.com > > ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" To subscribe to the TSCM-L mailin > list visit: http://www.yahoogroups.com/community/TSCM-L It is by caffeine alone I set my mind in motion. It is by the juice of Star Bucks that thoughts acquire speed, the hands acquire shaking, the shaking is a warning. It is by caffein > alone I set my mind in motion. =================================================== TSKS ------------------------------------------------------------------------ There are 7 messages in this issue. Topics in this digest: 1. usefull too >? From: mark de boer 2. New Jersey con artists' anti-terrorist device was filing cabinet: FBI From: "Chris Childs" 3. useful tool? From: mark de >oer 4. The Magnetron=bug-desinfector ?! From: "szabo4381" 5. audio intercept question From: Shawn Hughes 6. Bug sweep Historical articles > From: Hawkspirit 7. Re:audio intercept question From: "Steve Uhrig" ________________________________________________________________________ ________________________________ >_______________________________________ Message: 1 Date: Sun, 26 Oct 2003 04:18:15 -0800 (PST) From: mark de boer Subject: usefull tool? Hi list, Does any of you know the field strenght detector made by Scan >ock, called delta V ECM, is this a usefull tool for locating GSM Cell phone based devices. The specs seem to be oke. http://www.audiotel-international.com/deltav.html M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands > --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [Non-text portions of this message have been removed] ________________________________________________________________________ _____________ >__________________________________________________________ Message: 2 Date: Sun, 26 Oct 2003 08:49:45 -0800 From: "Chris Childs" Subject: New Jersey con artists' anti-terrorist device was filing cabinet: FBI > http://www.canada.com/news/story.asp?id=1D0BDFCC-D7A9-4C1E-AFEC-3CBDAB5EEDE6 New Jersey con artists' anti-terrorist device was filing cabinet: FBI Friday, October 24, 2003 NEWARK, N.J. (AP) - A husband and wife have been charged in a scheme to >romote a device after Sept. 11, 2001 that was supposed to protect people against terrorist attacks but was actually a yellow filing cabinet with flashing lights and a siren on top, officials said. The device led to a fourfold increase in the stock >rice of the couple's small company - and allowed defendant Stewart Kaiser to sell shares that were in his mother's name at a substantial profit, said the FBI complaint. Kaiser is charged with stock fraud and misleading investors in the company he f >unded, R-Tec Technologies. Both he and his wife, Nancy Vitolo, are charged with making false statements to investigators. A message left at a listing for Kaiser was not immediately returned Friday. It was unclear if the couple have lawyers. The >complaints were filed Wednesday and delivered to the defendants Thursday, the U.S. attorney's office said. They were not arrested but have a Nov. 12 bail hearing. The complaints outline alleged stock fraud that began when Kaiser solicited investors >in January 1998 and ended soon after his news release of Sept. 24, 2001, promoting a device called the C-BAND, for Chemical & Biological Alarm and Neutralization Defense System. A 1998 letter from Kaiser to potential investors said "there is no ris > to you or your funds." Investors sending cheques, including one for $100,000, were told to make them payable to Vitolo, who eventually received more than $400,000, the complaints said. Kaiser was listed as the contact on the C-BAND news releas >, which touted the device as a self-contained unit that would alert people when it detects a "harmful bio or chem-agent" and that could be installed in airports, malls and sports arenas. It would also "isolate and neutralize the harmful agents" by "usi >g a series of high electromagnetic frequency signals." In November 2001, the U.S. Securities and Exchange Commission ordered R-Tec to stop publicizing the device. The stock regulators determined the company had no plans to produce the device and li >d about having patents on it. Kaiser was expected to plead last month to two stock-fraud charges and Vitolo to making false statements but the deal fell apart. That day, Kaiser said the filing cabinet was merely a "visual display" to show the S >C. If they had pleaded to the charges, Kaiser, 37, could have faced up to 10 years in prison and a $1-million fine. Vitolo, 40, could have faced up to five years and a $250,000 fine. © Copyright 2003 The Canadian Press [Non-text portions of >this message have been removed] ________________________________________________________________________ ________________________________________________________________________ Message: 3 Date: Sun, 26 Oct 2003 11:10:57 -0800 (PST) > From: mark de boer Subject: useful tool? Hi list, Does any of you know the field strength detector made by Scan lock, called delta V ECM, is this a useful tool for locating GSM Cell phone based devices. The specs see > to be OK. http://www.audiotel-international.com/deltav.html M.de Boer RRB security Archimedesstraat 12 3316 AB Dordrecht Netherlands --------------------------------- Do you Yahoo!? Exclusive Video Premiere - Britney Spears [ >on-text portions of this message have been removed] ________________________________________________________________________ ________________________________________________________________________ Message: 4 Date: Mon, 27 Oct 2003 11: >2:58 -0000 From: "szabo4381" Subject: The Magnetron=bug-desinfector ?! Hi to everyone, I was in doubt posting or not this question, but finally here is : did anyone anytime using a magnetrone ( provided from an ordinar > microwave owen, about 500W at 2400 MHz) for "painting" the walls, furnitures etc.? This unusual "sweep" have to KO all electronic circuit behind... What is your procedure if you suspect a bug behind (or inside ) the walls ? Do you consider t >o brutal this metode ?? ________________________________________________________________________ ________________________________________________________________________ Message: 5 Date: Tue, 28 Oct 2003 23:45:05 -0500 From: Shaw > Hughes Subject: audio intercept question Hi! Have a question I can't answer, so I thought I'd pose it to the group. A person related me that they were told there was a device one could put 'on their phone line' to prevent a >erson on the other end from recording them. This person is an investigative journalist, and she was attempting to record an individual (one party state). All she obtained was 'white noise and click-clack' (her description). Her setup worked n >rmally prior to and subsequently, just not this time. Is this a freak incident, or does this sound like something one of you has heard about? How could you pass something past the switch, that doesn't garble heard audio, but defeats a wired re >order? (Holding the recorder to the earpiece, she was subsequently able to obtain her information.) Thanks in advance, Shawn Hughes Lead Instructor Tactical Response, Inc. _____________________________________________________________ >__________ ________________________________________________________________________ Message: 6 Date: Wed, 29 Oct 2003 08:31:42 -0800 From: Hawkspirit Subject: Bug sweep Historical articles Here is a new additi >n the bug sweep historical articles collection. CAN YOU FIND OUT IF YOUR TELEPHONE IS TAPPED? by Fred P. Graham - Esquire, May 1973 http://bugsweeps.com/info/esquire_5-73.html ______________________________________________________________ >_________ ________________________________________________________________________ Message: 7 Date: Wed, 29 Oct 2003 18:04:08 -0500 From: "Steve Uhrig" Subject: Re:audio intercept question On 28 Oct 2003 at 23:45, Sha >n Hughes wrote: > A person related me that they were told there was a device one could > put 'on their phone line' to prevent a person on the other end from > recording them. While there are all sorts of wondrous things being done by people m >ch more capable than me, this sure sounds like snake oil. What is the credibility and technical savvy of the person making this claim? Did they have direct knowledge, or were they simply repeating something they heard from someone who heard it fr >m someone else who heard it from his barber's nephew's vet who has a neighbor who worked for the FBI in 1947 cleaning toilets? Offhand I can't think of any way the above could be accomplished. > This person is an investigative journalist, and >she was attempting to > record an individual (one party state). All she obtained was 'white > noise and click-clack' (her description). > Her setup worked normally prior to and subsequently, just not this > time. > Is this a freak incident >robably. Non-technical types tend to be the ones most gullible. The noise could be an open ground or no input path, motor noise, whatever. Click clack could be a worn capstan and pinch roller or worn or cheap tape cassette. > How could you pa >s something past the switch, that doesn't garble heard > audio, but defeats a wired recorder? I doubt it is possible. If it is possible, I'm quite sure it's not practical especially at a consumer level. Dektor some years ago had phones which >ere tap resistant (I hate to say tap PROOF). They injected noise from one end onto the telco line which was filtered out by the telco equipment between the originating phone and the other end. The concept sounded weird, but I had several and t >ey worked which really impressed me. You set it up, did a bunch of analog adjustments to match local circumstances, and nothing locally could recover audio close to the instrument equipped with the masker. A butt set was completely dead. Record >r interfaces heard nothing. Amazed me. I got maybe 300 feet of copper past the masked phone while a conversation was in process, and I couldn't recover anything from the copper pair. However, the masking noise appeared in the local handset of th > masked phone. It was loud enough to be annoying although the party at the other end still could be heard. The several clients for whom I installed the units on a provisional basis had a serious need for security, but could not deal with the ma >king noise they heard in their local handset. At the other end, the other side of town, the masked call sounded perfectly normal. Dektor knew how the telco filters would work and what would pass their bandwidth and what wouldn't, and the syste > worked for its intended purpose -- protecting the originating side from intercept. But from a user point of view, the masking noise was more than they would tolerate even for the security it offered. I'm talking maybe 20-25 years ago for this >product from Dektor, long out of business. The masked phones never were popular and may not have been a production item. And I'm not real sure about Dektor's ethics as they sold products which I don't believe were real but sounded good. This la >t is personal opinion. This is not what you were asking as it worked on the originating end only, but was the closest example I could think of. Remember the telco has a pretty narrow freq response, something like 300-3000 cycles. And essentia >ly everything gets digitized at some point, even if just a local call. You're not on copper for long anymore. Even in the very rural area where I live, fiber comes within a mile of the buildings. In more populated areas, you hit fiber a lot soo >er than that. Once you're muxed onto fiber, digital filters will remove a whole lot of noise and garbage. > (Holding the recorder to the earpiece, she was subsequently able to > obtain her information.) I suspect a fluke, or more likely opera >or error. I wouldn't expect someone deliberately protecting the content of their telephone conversations, especially at a consumer level. 'When you hear hoofbeats, think horses, not zebras.' Steve *************************************** >*************************** Steve Uhrig, SWS Security, Maryland (USA) Mfrs of electronic surveillance equip mailto:Steve@s... website http://www.swssec.com tel +1+410-879-4035, fax +1+410-836-1190 "In God we trust, all others we monitor" * >***************************************************************** ________________________________________________________________________ ________________________________________________________________________ Your use of Yahoo! Groups >is subject to http://docs.yahoo.com/info/terms/ Chris Cauwood Tel +44 (0) 1780 767364 Fax +44 1780 763164 Mob +44 771 421 5490