Vol Two 1997 Iss #1 ****************************************************************************** IN THIS ISSUE... Hope Everyone Had Great New Year - and no Headaches ;-) ****************************************************************************** 01) Re: Telephone Harrassment 02) Intro - Intelligence 03) Intro - PGP List 04) TEMPEST Plans? 05) Intro - Thailand 06) CellPhone Scanning 07) Re: Need Security Help 08) Intro - Netherlands 09) Tech Tip 10) Intro/Re: Security Help 11) Intro/Re: Telephone Harrassment 12) Intro - Scientist 13) Backgrounds Checks 14) Telephone Surveillance 15) Intro - PI 16) Intro - PI 17) Growing Membership 18) Useful Resource ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Lucky Green Subject: Re: Telephone Harassments Help >18)From: Owen Morgan >Subject: Telephone Harrassment Help > >Hello, I am in need of some assistance. I have been receving prank phone >calls. They call and then hang up. I have used the number at the beginning >of the phone book that will trace the phone call, but you can't findout who >is doing it. I am not sure what it is you can't find out. The telco will trace the call when you dial the number mentioned. The information you seek is in their records. They are not required to give it to you. But making harassing phone calls is a federal offense. You can file charges, at which point the telco will be presented with a subpoena. >I know after 3 times the police are supposed to be alerted, >but I live in a very small county and they didn't do anything about it >until we called and asked, then strangely enough they seemed to stop. Harassing phone calls are a federal offense. I would not bother with the County Sheriff. Call the FBI. [...] >Is there any thing I can do to findout who they are so I can turn them in >to the police? It is very annoying right now we get the calls a little, >but have cooled down from 3-4 calls an evening. I have also gotten caller >ID, however this can be curcumvented very little effort. Please can anyone >help? There is no way for you to reliably obtain a caller's number on a home phone line. Disclaimer: I am not an attorney. -- Lucky Green PGP encrypted mail preferred Make your mark in the history of mathematics. Use the spare cycles of your PC/PPC/UNIX box to help find a new prime. http://www.mersenne.org/prime.htm ************************************************************************** 2)From: "William Ehrendreich" Subject: Company Intro Hello, My name is William Ehrendreich. My self and partners are starting a new venture to consult and advise companies and individuals on information crime. In our ranks are seasoned legal minds, former U.S. intelligence ELINT/SIGNT and operational security officers and other seasoned computer personnel. Our primary project will be to do an independent study of the new Economic Espionage Act. This bill should be landmark. We will be putting up a knowledge base that is similar to the other more well established legal databases. This legal knowledge base will also include information crime case histories and analysis from people who either actually worked on the cases or wrote the laws. Along the same lines, we are working on putting together information security seminars for executives. We have had some interest from speakers with diverse backgrounds. We are also looking into doing legal consultation for information security issues. We are always looking for input or are interested in communicating with others on this subject and look forward to participating in this forum. Also if you have an established background in this field, we would be interested in working with you. Please contact me. Best regards, Bill ************************************************************************** 3)From: "Fred B. Ringel" Subject: Intro - PGP List Hi there- I run a mailing list called the PGP-Users List which is a discussion list for, of course, PGP Use, Anonymous Remailers and privacy issues. One of my list members notified me of the existence of your list and suggested I'd be interested. Well I am. While I am not in a security-related field (except to the extent running a Unix Network and Internet Provider is concerned with security issues-and we are, but that's a whole other story) I am interested in any subject which impacts privacy right and your list obviously deals with that. Thus, I'd be interested in becoming a member and hopefully contributor. You can check out mt PGP web site to see my "bona-fides" at http://pgp.rivertown.net. Fred Ringel /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ Fred B. Ringel -- Rivertown.Net Internet Access Systems Administrator -- http://www.rivertown.net and General Fixer Upper -- Voice/Fax/Support: +1.914.478.2885 Although in theory, there's no difference between theory and practice, in practice, there is. ************************************************************************** 4)From: MPT00@aol.com Subject: Tempest Plans?? ok forgive me if this is a moronic question, just laugh and send me a reply; when i was reading alot about tempest a few months ago, i swear i read something on an obscure page that some guy built a tempest monitoring system for like two bucks, granted he had most of the parts and was very good with electronics, but claimed he used an old tv antennae a black and white tv and a vcr, along with miscellaneous salvaged parts and some thing for 2bucks at radio shack, can this be done? if so can someone please post the plans...it seems easy enough to me.... ************************************************************************** 5)From: "Kevin W. Robertson" Subject: Intro I run a Company here in Thailand whose main business is supply and installation of CCTV and Electronic security Systems. We have experienced growing demand for Countersurveillance equipment and for the past 3 years have been offering ECM Services to Companies and individuals in Thailand and Indochina. Regards. Kevin W. Robertson Asian Management Services Co., Ltd. 210 / 129 Muang Thong Nives 2 / 2 Thanon Pattanakarn Bangkok 10250 ************************************************************************** 6)From: "Luna H. Chiu" Subject: Scanning Question I recently read an article on a couple that were "cloning" cellphones. I was curious as to the method they used. Does one need an actual scanning device that collects the ESN/MIN, or just an ordinary scanner used in conjunction with software that extracts the ESN/MIN? An explanation would be appreciated. Luna ************************************************************************** 7)From: everett@ionet.net (glen wicker) Subject: Re: Need Security Help To your question on backyard surveillance; SAM's Club has a two camera monitor kit that runs around $400, the system can be added to, if Sam's isn't in you area any major electronic store should have something on the market for outside surveillance. On your quest for file privacy; I use two or three shareware "password" programs that can be easily picked up on a local BBS or some Internet sites free of charge. If you can't find one I can send you one via Email below. Some old tricks on your computor can "hide" files using attribute commands, check your DOS directory for more info. Check out my Intelligence Web Link for info on everything from KGB & CIA to TWA800 & Terrorist! Intelligence Web Link http://www.ionet.net/~everett/index.shtml everett@ionet.net (glen wicker) |/////////////////////////XXXXXXXXXXXXXXXXXXX\\\\\\\\\\\\\\\\\\\\\\\\| |////////0 G. EVERETT WICKER F.I.C. 0\\\\\\\\\| |//////0 Email : everett@ionet.net 0\\\\\\| |////0 0\\\\| |//0 HAVE YOU READ THE BOOK 0\\| |/0 "How to Make America Strong & Wealthy One Person at a Time" 0\| |0 24 hour hotline : 1-918-664-1350 0| |\\\\\\\\\\\\\\\\\\\\\\\\\XXXXXXXXXXXXXXXXXXX////////////////////////| ************************************************************************** 8)From: M van der Wel Subject: Intro Hello, Let me introduce myself as a seller of security and surveillance equipment in the Netherlands. We are in business for about 24 years, selling mini transmitters and debugging equipment. You can find our page on: http://www.tip.nl/users/wel/secure.htm If there are any questions please contact me . Regards and of course a very happy new year from Fa v.d.Wel ******************************************************************* ssssss h h o w w ttttttt i m m eeeeee ss h h o o w w t i mm mm ee ssssss hhhhhh o o w w w t i m m m m eeeee ss h h o o w w w w t i m m m ee ssssss h h o w w t i m m eeeeee ******************************************************************* *Fa v.d.Wel....................................... At your service* ******************************************************************* ************************************************************************** 9)From: spyking@thecodex.com Subject: Tech Tip - Got Them? Send Them... There are shareware programs in existance to take Morse code and pager input via a sound card and decode it on the fly via computer. Check this web site: http://www.simtel.net/simtel.net/ look under ham programs Also check security and telecomm archive same site for other useful programs ************************************************************************** 10)From: Bob Mather Subject: Re: Intro/Security Help Cc: MikeRowley@aol.com I sell CCTV systems to clients around the world that will do exactly what you wish. I will pre-connect the wiring for you. All you need to do is measure the distance. Email me or call if you need assistance. Bob Mather Mather / Associates Investigations Specializing in small business theft issues. Sub Rosa surveillance, Employee theft, Shoplifting, CCTV camera systems 916-347-1821 1-800-300-1821 Member CALI License #17141 ************************************************************************** 11)From: HtPursuit@aol.com Subject: Intro/Re: Telelephone Harrassemnt I guess you need to provide more info on what country your talking about, and the phone company your dealing with. I would start with a police report about the phone harrassment and also contact the phone company to advise them you want a trap placed on your line. As long as there is a pick up at your end, theres a record on the callers phone, unless a payphone, then you'll get a location. I f you want you can contact me directly also at the E-mail address. Good luck. I' thought I'd go ahead and do a brief into. I have been in the investigative field for over 16years, alot having to do with intelligence and investigations almost all being in Chicago area. Most of my current work is in investigative area's and personal protection/security details, but is not limited to Chicago. I do alot of networking with specialists in many fields and am always looking for additional contacts. If I can be of any help, just drop a note. Thank you. Bill ************************************************************************** 12)From: "Jamie Love" Subject: Intro Dr.Jamie Love (PhD, MBA) Scientist for Hire Biotechnology, Medicine, or Ecology, consulting, training and facilitations. "Life is my business" Homepages: http://homepages.enterprise.net/jamie/sci4hire Creator of "Alchemy by Merlin", the best Chemistry classes on the Internet. http://www.virtual-pc.com/mindweb/merlin/alchemy ************************************************************************** 13)From JEasom1046@aol.com Wed Jan 1 17:06:19 1997 Subject : Background Checks Can anyone recommend a reliable source of service by internet whereas one would be able to obtain credit checks, ssn searches, etc. ? ************************************************************************** 14)From: "Craig Shevlin" Subject: Telephone Surveillance Concerning eavesdropping/phone tapping of ones own phone: Even though it is the parents phone recording of a conversation that neither conversing parties are aware of the recording is technically illegal and definitely not abmissable in court. And probably any further action that would arise from any information gathered this way would not be allowed to be entered in evidence. Criag Shevlin ************************************************************************** 15) From: "David L. Mills" Subject: Intro Our corporate offices are located in Kennewick, WA with satellite offices in Walla Walla, Ellensburg, Yakima, Moses Lake, and Spokane, WA, effectively covering most of the populated areas in Eastern Washington and Northeast Oregon. We conduct all types of team surveillance operations. Many of our cases include disability claims; however, the child abuse/neglect cases seem to be a significant portion of our surveillance work. If anyone would like more detailed information on how to market and conduct child abuse/neglect investigative services (and how specialized surveillance techniques are invaluable), please post to this list and we'll respond. There are a lot of kids out there who need help! Dave Mills Mills & Associates, Inc. 2527 W. Kennewick Ave., Suite 104 Kennewick, WA 99336 Conducting Private Inquiries and Investigations for Attorneys, Insurers, Business and Individuals ************************************************************************** 16)From: Jacqueline Burke Subject: Intro Martin Burke City Investigative & Security Services 303 West 42nd Street Suite 610 New York, NY 10036 voice 1-212-957-9554 fax 1-212-957-1346 Full service investigative, surveillance, polygraph, training ************************************************************************** 17)From: TLKa@aol.com Subject: Growing membership Thus far I am very impressed with the quality of the list members and I hope to learn from everyone. Although I am in the law enforcement field, my technical expertise is minimal and consists of extensive reading and about a year and a half of engineering school. Keep up the good work. Harry K. Springfield MA ************************************************************************** 18)From: admin@asianenergy.com.au Subject: Useful Resource Check out the Security Resources listing at - www.securityserver.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol Two 1997 Iss #2 ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) TSCM Travel Question 02) Re: Scanning Question 03) Re: Bug Detectors 04) Intro - Re: Telephone Harrassment 05) Intro - PI 06) Re: SSN Info 07) Re: Surveillance Question 08) Fax Interception Alternative? 09) DMV Software? 10) Re: TEMPEST Plans 11) Interesting Web Site 12) Alternative to TEMPEST 13) Inexpensive Tracking Device 14) Re: Telephone Harrassment 15) Warped Mind Humor? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** From: SpyKing@thecodex.com Subject: TSCM Travel Question This is basically directed to the TSCM techs on this list. I have a client with offices in Madrid, Barcelona, Milano, Southern Switzerland and Buenes Aires. I travel from New York four times per year to these locations at their request. I travel with two heavily padded thermodyne shipping cases for my equipment, each weighing 90 lbs. The contents value exceed $100,000 USD. The extra airfreight is staggering. For instance from Madrid to Buenes Aires I was charged an extra $2,000.USD From New York to Madrid an extra $450.USD, and so on...The client pays the extra charges but I'm wondering if there is a better more cost effective way? Any Ideas? ************************************************************************** 2)From: CrACKeD Subject: Re: Scanning Question > From: "Luna H. Chiu" > Subject: Scanning Question > > I recently read an article on a couple that were "cloning" cellphones. > I was curious as to the method they used. Does one need an actual > scanning device that collects the ESN/MIN, or just an ordinary scanner > used in conjunction with software that extracts the ESN/MIN? An > explanation would be appreciated. There are stand-alone ESN readers available which will catch and store the ESN directly off the air. Just take a trip to the local airport or mall and let the thing do what it does. Then, it's a matter of reprogramming an EEPROM in the cell phone with that ESN and you're all set. Take a look at the video "Unauthorized Access" if you want to see what the things look like in action. The video has a web site at the following URL: http://bianca.wired.com/bump/ua/index.html CrACKeD ************************************************************************** 3)From: Elementary Investigations Pty Ltd Subject: bug detectors I've noticed a few questions from people wishing to update the counter surveillance equipment. Want to know what the best on the market is? I've been using the OSCOR-5000 by REI for about 12 months now and believe it's the best unit I've ever worked with. It's a micro controlled omni spectral correlator/spectrum analyser with dozens of other features. However if a US $14,000.00 is too costly then try CPM-700, scanlock, ranger etc.. They aren't anywhere near as good but they are cheaper. Regards Johan Erlandsson lmntry@ozemail.com.au ************************************************************************** 4)From: MARK CASTLEY Subject: Intro/Re:Telephone Harrassment/ Hi we are MC Investigative Services based in London England. You can see our web pages on http://www.mc-investigations.co.uk. We specialise in a number of fields and are the only agency in the UK to offer an anti - stalking service. In volume #1 of 1997, there were two pieces of post which we might be able to help with. Firstly, the nuisance phone calls. Reading the item, and correct me if I am wrong, I think the writer was from Ireland. The only way the telephone company will give you the number of the people that have rung you, if the caller has witheld ther number, is if the police apply for a Data Protection Form B Analysis. This will give every number that has rung you. Secondly, the cloned mobile number. You are right the only way to get the info you require is to scan it with a normal scanner via software. We had experience with both of these problems when a stalker was calling our client 100 times a day from cloned mobiles for the period of 9 months, until we caught him and he is now awaiting trial in a London Prison. Happy New Year ************************************************************************** 5)From: urquhart@computan.on.ca (William Urquhart) Subject: Intro Michelle Molnar for William Urquhart William Urquhart Investigation & Research Inc. A private investigation firm interested in hearing about the latest and updated news about surveillance, its technology, helpful hints, etc. We were established in 1991. William Urquhart Investigation & Research Inc. ************************************************************************** 6)From: chaos@tccbbs.com Subject: Re: SSN Info Some one requested a source for reliable SSN Searches. My name is Christopher Skeeles, Technical Director of American Automated Systems. We have a service on the Internet WWW that allows you to run a SS# search online and your results appear in two minutes. Try the "Social Locator provided by AAS" at www.americanautomated.com and see how easy it is. Next week we will be debuting our "National DOB" site which allows you to search using a Name and DOB. Even search by First name if you wish. Uses public records, not phone CD's. That SSN SEARCH site again is ************************************************************************** 7)From: Bret Watson Subject: Re: Intro/Surveillance Question Where should I start... Firstly a firewall does not do _any_ encryption. It acts somewhat like a gate guard - controlling what gets in and what gets out (sometimes). There are packages that will provide end to end encryption in the case of an 'intranet' type setup. I would need more info to give you more info. If you want to conceal email then you can't go past PGP and this means you can't go past the Private Idaho package (gee Joel gets a good plugging here :} ) have a look at http://www.eskimo.com/~joelm/ Give me a better idea of what your trying to do. Cheers, Bret Bret Watson bwa@usa.net fax/phone +61 9 454 6042 Computer Security Consultants ************************************************************************** 8)From: "Anastasios D. Panos" Subject: Fax Intercept Alternative? AS my office was on fire November 3, 1996 and had a total loss of my gear I try to get gear back to continue, Among other things I lost, was a Telefax Interception System called FAXMATE bought from Tech Support Ststems in the USA, As I wish to replece, does anyone has a cost effective solution ? Regards Anastasios D. Panos ============================================================== Panos & Associates,, P. 0. Box 19063, Athens 117 10, Greece Ph: +30-1-923.7420, Fax: +30-1-923.2787 Mobile: +30-93-214.287 Contact: Anastasios D. Panos (Intelnet,WAD,CII,ASIS,NAIS,ISDA,IPC) Specialised but not limited to: V.I.P. Close Protection, Due Diligence, Counterfeit Investications,Insurance Fraud, Covert Video Surveillances, Technical Support Systems ============================================================== ************************************************************************** 9)From: kevina@citynet.net Subject: DMV Software Hello, can anyone teach me or sell me software that will allow me to run license plates on cars (usa), to provide who its registered to, without using a police agency. thanks.. kevin. ************************************************************************** 10)From: fts@cris.com (Chester J. Karma, esq.) Subject: Re: TEMPEST Plans On Thu, 2 Jan 97 00:12:06 EST, you wrote: >ok forgive me if this is a moronic question, just laugh and send me a reply; >when i was reading alot about tempest a few months ago, i swear i read >something on an obscure page that some guy built a tempest monitoring system >for like two bucks, granted he had most of the parts and was very good with > [snip] That doesn't sound familiar to me. If such a story exists, it's probably not true. The electronics required to have a functioning TEMPEST Monitoring System far exceeds what you could get from Radio Shack for 2 bucks and what you happen to have lying around. If such a thing WERE possible though, you can be rest assured the plans would be available on every "hacker" site from here to eternity. -- Chester J. Karma, esq. fts@cris.com Network/Internet/Security Consultant http://www.cris.com/~fts - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The Dan & Scott Show - LIVE Weeknights via RealAudio - www.radiofun.com ************************************************************************** 11)From: admin@asianenergy.com.au Subject: Interesting Web Site Another interesting resources site on BiG brother, surveillance, privacy, crypto, etc Who's Watching Who www.teleport.com/~jstar/govt.html *************************************************************************** 12)From: SpyKing@thecodex.com Subject: Alternative to TEMPEST >Our technical staff at Elementary have developed a computer chip for an >anonymous client which is mounted on a card similar to the video card in >your computer. This card transmits every signal put out by your computer >tenfold. Monitoring the "on screen activity" is merely routine from there. > >Not exactly tempest monitoring, but for what it's worth, it's a very close >substitute for now. Shielded computers have no added security when this >method is employed, they are as vulnerable as any other. > >The unit can be purchased for around US$2500. 00. I've experimented with a wireless system that was manufactured for PC to PC transmission of data. When wired INSIDE the target PC and modified... transmission of data is accomplished over a range of 300 feet. This could easily be extended using a portable repeater, etc ... *************************************************************************** 13)From:spyman0007@aol.com (Spyman0007) Subject: RE: Plans for tracking device (bumper beeper). In response to the gentleman's question about how to make a vehicle tracking device, here's a $10.00 tracker that beats the expensive ones. Go to Radio Shack and buy a catalog #60-4024 children's walkie-talkie which operates on the 49 Mhz band for $10.99. It has a morse code button on it. These can also be purchased at Toy's r Us. Remove the circuit board from the housing, solder (jumper) the morse code connection so it emits a constant tone. Solder (jumper) the push-to-talk switch so the radio transmits automatically upon power up. Cut the antenna from the radio and throw it away. Replace it with a wire antenna. The proper length wire antenna for that frequency is 60 inches, or you can splice it into the vehicle's AM/FM antenna for maximum range and run a short wire across the underdash for the AM/FM stereo. Less than 60 inches will work, just not as well. You can power the tracker directly from the vehicles 12 volt power but the tracker can be damaged easily. To prevent this, get a Radio Shack catalog #RSU10911048 voltage regulator which costs $1.49. Solder the middle leg of the voltage regulator to the black wire on the walkie-talkie's 9 volt battery snap. (Cut the snap off and leave the wires) Solder the right side leg to the red wire on the walkie-talkie. Solder the left leg to a piece of 22 gauge stranded wire and connect the other end of the wire to the vehicle's +12 volt system, at the fuseblock or at the battery. Either hide the tracker under the dashboard and run the antenna wire across the underside of the dash board, or if the interior of the vehicle cannot be accessed, the tracker can be attacked to a magnet, and the magnet stuck to the underside of the vehicle. By using a good scanner, and a properly cut lowband antenna, you will pick up the transmitter well over 2 blocks away. I know a company that sells a magnet mount antenna cut specifically to that fraquency that gives outstanding range. You can turn the tuning coil on the circuit board and tune it to a clear frequency to eliminate interference from baby monitors & cordless phones which use the same frequencies as children's walkie-talkies. The tracker draws very little current, and would take a couple weeks to run the vehicle's battery down if the vehicle were not started. You can get fancy and power it from a ni-cad rechargeable battery, mount it underneath the car (waterproof it first), and splice into the tail light or brakelight line, so the tail lights or brakelights will keep the ni-cad pack charged. As doing this project may be illegal, this information is given for educational purposes only. *************************************************************************** 14)From: "David S. 'Greeny' Greenberg" Subject: Re: Telphone Harrassment > 18)From: Owen Morgan > Subject: Telephone Harrassment Help > > Hello, I am in need of some assistance. I have been receving prank phone > calls. They call and then hang up. I have used the number at the beginning > of the phone book that will trace the phone call, but you can't findout who > is doing it. I know after 3 times the police are supposed to be alerted, > but I live in a very small county and they didn't do anything about it > until we called and asked, then strangely enough they seemed to stop. I > caught them once when I put them on speaker phone and they didn't catch on, > but didn't recognize them. > > Is there any thing I can do to findout who they are so I can turn them in > to the police? It is very annoying right now we get the calls a little, > but have cooled down from 3-4 calls an evening. I have also gotten caller > ID, however this can be curcumvented very little effort. Please can anyone > help? > > Owen Morgan > ddraig@kuntrynet.com I believe that 'the # in the front of the phone book' is known as Call Trace -- you enter it before the next call comes in, and a log of the call is printed out at the local cop shop or is available to them from the phone co. -- there's a fee of about $4.00. I believe this is known as a CLASS service, and is part of the Caller ID bit which is basically nationwide... Use the Call Return option to call the schmuck back and tell them that if they call you again you will consider it harrasment by wire and contact the police. Caveat Emptor -- Harrasment by Wire statutes (if they exist...) vary by state to state... check your local laws. Or if all else fails, INSIST on filing a formal complaint with the police and tell them the info is available to them. If they do nothing, call the local newspaper and see if they're interested -- more than likely it's a bunch of kids and they're doing it to other people as well... *************************************************************************** 15)From: SpyKing@thecodex.com Subject: Warped Mind Humor? ;-) Someone sent this to me. I thought I'd share it. The following is a script from an automated phone system at a Psychiatric Hotline: Welcome to the Psychiatric Hotline! If you are obsessive-compulsive- please press 1 repeatedly. If you are co-dependent- please ask someone to press 2. If you have multiple personalities- please press 3,4,5, and 6. If you are paranoid-delusional- we know who you are and what you want, just stay on the line so we can trace the call. If you are schizophrenic- listen carefully and a little voice will tell you which number to press. If you are manic-depressive- it doesn't matter which number you press, no one will answer. *************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol Two 1997 Iss #3 ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: TSCM Travel Question 02) Equipment Suppliers 03) How is it Done? 04) Re: DMV 05) Re: Plans for Tracker 06) Feds Sniffing Re-Mail? - Long ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: admin@asianenergy.com.au Subject: RE: Airline Baggage Wow, With that value you are lucky the stuff arrives.. They are hitting you hard because of the size of the INDIVIDUAL pieces. Break them down into smaller pieces not greater than 32 kilos. that is the limit for "regular" type luggage. If they are small and you have 4 instead of 2, they will be less obvious and should be cheaper. Mike ************************************************************************** 2From: MARTIN RICHARD SHAW Subject: Equipment Suppliers I AM CURRENTLY LOOKING AROUND THE WORLD ON THE NET TO SEE WHO SELLS WHAT IN THE SPY SUPPLY AND EQUIPMENT TRADE, AS I AM INTERESTED IN SETTING UP A STORE HERE IN WESTERN AUSTRALIA. EMAIL ADDRESS..AS IF YOU DON'T ALREADY KNOW.. GOD700@OZEMAIL.COM.AU ************************************************************************** 3)From: "Rolf E. Cooke" Subject: How is it done? Hello: I, Rolf E. Cooke, am in search of various ways to locate persons and identify insurance companies in an effort to aide in progressing vehicular accident cases involving personal injury (gross negligence and/or gross injury). As a legal assistant, I have been afforded opportunity to perform investigative services, and one of my early resources after visiting the local DMV, is the internet search engines; unfortunately, the search engines for which I am aware simply provide information regarding address/phone/e-mail for individuals. Please advise what other methods are available and the procedure for each. I sure would appreciate your prompt response. If you need information from myself, please advise. With kindest personal regards, I remain, Sincerely yours, Rolf. ************************************************************************** 4)From: browngrp@southeast.net Subject: post re:DMV Kevin, There are a number of on-line services that broker this information. Some require a membership fee and charge usage fees while others are just usage based (ie., X minutesat Y$). These services are connected to the states or have people actually retrieve and update the info for their databases. It is quite expensive to get connected and running so that you can obtain this info directly, so to do it on an individual basis would be prohibitive. The cost of obtaining this info from a broker who is set up thusly would be a lot cheaper and easier. If you can't justify an account with one of these services and want ocassional tags, any PI can help as we are all subscribers to one or more of these services. Just a word of warning. Some states, like CA., are very strickt about accessing DMV info while other states like FL make it easy to get. Good luck with your search. Robert Plance Investigator@Private-Eye.com href="http://www.Private-Eye.com" Criminal Records-Driving Histories-Background Checks-Locate Individuals On-Line order form for Investigative Services. Protect Yourself, your family, your business, your customers. ************************************************************************** 5)From: browngrp@southeast.net Subject: re: Plans for tracker... Good detailed response. I'm heating up soldering iron now, but tell us how you get direction information using just a scanner. Robert Plance Investigator@Private-Eye.com href="http://www.Private-Eye.com" Criminal Records-Driving Histories-Background Checks-Locate Individuals On-Line order form for Investigative Services. Protect Yourself, your family, your business, your customers. +++Moderator's Note+++ I believe one of our list members posted some info a few issues ago on direction finders. There are several available that will plug into scanners, recievers, etc. Don't forget... use a GOOD antenna... ************************************************************************** 6)From Ukfan1a@aol.com Subject: Fwd: Is the Gov't reading your anonymous re-mail ? This is something I got in the mail. You might be interested in reposting some of it to the list. ==================================================================== ///, //// Mark A. Smith \ /, / >. \ /, _/ /. * * * \_ /_/ /. \__/_ < UNITED STATES THEATRE COMMAND /<<< \_\_ /,)^>>_._ \ email: mark.s@juno.com (/ \\ /\\\ mas8892@aol.com // ```` ======((`=========================================================== ARE THE FEDS SNIFFING YOUR RE-MAIL? by Joh Dillon THE RULES OF PRIVACY ARE CHANGING WITH ELECTRONIC COMMICATIONS, THE EAGERNESS OF GOVERNMENT TO PRY INTO OUR COMMINICATIONS, APPARENTLY, IS NOT. Foreign and domestic intelligence agencies are actively monitoring worldwide Internet traffic and are allegedly running anonymous re-mailer" services designed to protect the privacy of electronic mail users. The startling claim that government snoops may be surreptitiously operating computer privacy protection systems used by private citizens was made earlier this year at a Harvard University Law School Symposium on the Global Information Infrastructure. The source was not some crazed computer hacker paranoid about government eavesdropping. Rather, the information was presented by two defense experts, Former Assistant Secretary of Defense Paul Strassmann, now a professor at West Point and the National Defense University in Washington, D.C., along with William Marlow, a top official at Science Applications International Corp., a leading security contractor. Anonymous re-mailer services are pretty much what the name implies. By stripping identifying source information from e-mail messages, they allow people to post electronic messages without traceable return address information. But Strassmann and Marlow said that the anonymous re-mailers, if used properly and in tandem with encryption software pose an unprecedented national security threat from information terrorists. Intelligence services have set up their own re-mailers in order to collect data on potential spies, criminals, and terrorists, they said. *1 Following their Harvard talk, Strassmann and Marlow explicitly acknowledged that a number of anonymous re-mailers in the US are run by government agencies scanning traffic," said Viktor Mayer-Schoenberger, a lawyer from Austria who attended the conference. Marlow said that the [US] government runs at least a dozen re-mailers and that the most popular re-mailers in France and Germany are run by respective agencies in those countries."2 Mayer-Schoenberger was shocked by the defense experts' statement and tried to spread the news by sending an e-mail message to Hotwired, the online version of Wired magazine. Although the story did not make headlines, his note quickly became the e-mail message relayed 'round the world, triggering over 300 messages to Strassmann and Marlow. It was followed by the electronic version of spin control. Strassmann quickly posted a denial. In an interview, he said the Austrian completely misunderstood what he and Marlow had said. That was false," Strassmann said of Mayer-Schoenberger's message. That was the person's interpretation of what we said. ... We did not specifically mention any government. What we said was that governments are so heavily involved in this [Internet issues] that it seems plausible that governments would use it in many ways." *3 (Marlow did not return a call for comment.) But Harvard Law School Professor Charles Nesson, who heard the original exchange at the Harvard conference, recalls the conversation as Mayer-Schoenberger described it. *4 Mayer-Schoenberger also stands by his story. I remember the conversation perfectly well," he e-mailed from Vienna. They said a couple of additional things I'm sure they don't want people to remember. But the statement about the re-mailers is the one most people heard and I think is quite explosive news, isn't it?" *5 Marlow said that actually a fair percentage of re-mailers around the world are operated by intelligence services, Mayer-Schoenberger recalled in a subsequent interview. Someone asked him: `What about the US, is the same true here as well?' Marlow said: `you bet.' The notes for the Harvard symposium, posted on the World Wide Web, also lend credence to Mayer-Schoenberger's account. The CIA already has anonymous re-mailers but to effectively control [the Internet] would require 7,000 to 10,000 around the world," the notes quote Marlow as saying. *6 EASE WITH EAVESDROPPING Prying into e-mail is probably as old as e-mail itself. The Internet is notoriously insecure; messages are kept on computers for months or years. If they aren't stored safely, they can be viewed by anyone who rummages through electronic archives by searching through the hard drive, by using sophisticated eavesdropping techniques, or by hacking in via modem from a remote location. Once e-mail is obtained, legally or not, it can be enormously valuable. Lawyers are increasingly using archived e-mail as evidence in civil litigation. And it was Oliver North's e-mail (which he thought was deleted) that showed the depths of the Reagan administration's involvement in the Iran-Contra affair. Moreover, it's easier to tap e-mail messages than voice telephone traffic, according to the paper written by Strassmann and Marlow. As e-mail traffic takes over an ever-increasing share of personal communications, inspection of e-mail traffic can yield more comprehensive evidence than just about any wire-tapping efforts, they wrote. E-mail tapping is less expensive, more thorough and less forgiving than any other means for monitoring personal communications. 7 RISK Two kinds of anonymous re-mailers have evolved to protect the privacy of users. The first, and the less secure, are two-way database re-mailers," which maintain a log linking anonymous identities to real user names. These services are more accurately called pseudonymous" re-mailers since they assign a new name and address to the sender (usually a series of numbers or characters) and are the most vulnerable to security breaches, since the logs can be subpoenaed or stolen. The most popular pseudonymous" re-mailer is a Finnish service at anon.penet.fi". (penet is now out of service since mid 1996) I believe that if you want protection against a governmental body, you would be foolish to use anon.penet.fi," said Jeffrey Schiller, manager of the Massachusetts Institute of Technology computer network and an expert on e-mail and network security. Last year, in fact, authorities raided anon.penet.fi to look for the identity of a Church of Scientology dissident who had posted secret church papers on the Internet using the supposedly private service. *8 The second kind of re-mailers are cypherpunk" services run by computer-savvy privacy advocates. Someone desiring anonymity detours the message through the re-mailer; a re-mailer program removes information identifying the return address, and sends it on its way. Schiller says that a cypherpunk re-mailer in its simplest form is a program run on incoming e-mail that looks for messages containing a request-re-mailing-to" header line. When the program sees such a line, it removes the information identifying the sender and remails" the message. *9 Some re-mailers replace the return address with something like nobody@nowhere.org." Further protection can be obtained by using free, publicly available encryption programs such as Pretty Good Privacy and by chaining messages and re-mailers together. Sending the message from re-mailer to re-mailer using encryption at each hop builds up an onion skin arrangement of encrypted messages inside encrypted messages. Some re-mailers will vary the timing of the outgoing mail, sending the messages out in random sequence in order to thwart attempts to trace mail back by linking it to when it was sent. ISSUE: THE RIGHT TO PRIVACY Linking encrypted messages together can be tricky and time-consuming. So who would bother? A. Michael Froomkin, an assistant professor of law at the University of Miami and an expert on Internet legal issues, says anonymity allows people to practice political free speech without fear of retribution. Whistleblowers can identify corporate or government abuse while reducing their risk of detection. People with health problems that are embarrassing or might threaten their ability to get insurance can seek advice without concern that their names would be blasted electronically around the world. *10 A battered woman can use re-mailers to communicate with friends without her spouse finding her. The Amnesty International human rights group has used anonymous re-mailers to protect information supplied by political dissidents, said Wayne Madsen, a computer security expert and co-author of a new edition of The Puzzle Palace, a book on the National Security Agency. Amnesty International has people who use re-mailers because if an intelligence service in Turkey tracks down [political opponents] ... they take them out and shoot them," he said. I would rather err on the side of those people. I would rather give the benefit of the doubt to human rights." *11 Strassmann and Marlow, on the other hand, see the threat to national security as an overriding concern. Their paper, Risk-Free Access into the Global Information Infrastructure via Anonymous Re-mailers, presented at the Harvard conference, is a call to electronic arms. In it, they warn that re-mailers will be employed in financial fraud and used by information terrorists" to spread stolen government secrets or to disrupt telecommunication, finance and power generation systems. Internet anonymity has rewritten the rules of modern warfare by making retaliation impossible, since the identity of the assailant is unknown, they said. Since biblical times, crimes have been deterred by the prospects of punishment. For that, the criminal had to be apprehended. Yet information crimes have the unique characteristic that apprehension is impossible. ... Information crimes can be committed easily without leaving any telltale evidence such as fingerprints, traces of poison or bullets," they wrote. *12 As an example, they cite the Finnish re-mailer (anon.penet.fi), claiming that it is frequently used by the ex-KGB Russian criminal element. Asked for proof or further detail, Strassmann said: That [paper] is as far in the public domain as you're going to get." *13 At the Harvard symposium, the pair provided additional allegations that anonymous re-mailers are used to commit crimes. There was a crisis not too long ago with a large international bank. At the heart of the problem turned out to be anonymous re-mailers. There was a massive exchange around the world of the vulnerabilities of this bank's network," Marlow said. *14 But David Banisar, an analyst with the Washington, D.C.-based Electronic Privacy Information Center (EPIC) downplayed this kind of anecdote, saying that such allegations are always used by governments when they want to breach the privacy rights of citizens. I think this information warfare stuff seems to be a way for the military trying to find new reasons for existence and for various opportunistic companies looking for ways to cash in. I'm really skeptical about a lot of it. The problem is nine-tenths hype and eight-tenths bad security practices," he said. Already existing Internet security systems like encryption and firewalls could take care of the problem." The public should not have to justify why it needs privacy, he said. Why do you need window blinds? Privacy is one of those fundamental human rights that ties into other human rights such as freedom of expression, the right to associate with who you want, the right to speak your mind as you feel like it. ... The question shouldn't be what do you have to fear, it should be `Why are they listening in?' With a democratic government with constitutional limits to democratic power, they have to make the argument they need to listen in, not the other way around." *15 Froomkin, from the University of Miami, also questioned Strassmann and Mayer's conclusions. First of all, the statistics about where the re-mailers are and who runs them are inaccurate. I can't find anybody to confirm them," he said. I completely disagree with their assessment of facts and the conclusions they draw from them. ... Having said that, there's no question there are bad things you can do with anonymous re- mailers. There is potential for criminal behavior." *16 Banisar doubts that intelligence agencies are actually running re-mailers. It would entail a fairly high profile that they tend to shy away from, he said. However, it is likely that agencies are sniffing" monitoring traffic going to and from these sites, he said. WORK SNIFFING THE NET Not in doubt, however, is that the government is using the Internet to gather intelligence and is exploring the net's potential usefulness for covert operations. Charles Swett, a Department of Defense policy assistant for special operations and low-intensity conflict, produced a report last summer saying that by scanning computer message traffic, the government might see early warnings of impending significant developments." Swett added that the Internet could also be used offensively as an additional medium in psychological operations campaigns and to help achieve unconventional warfare objectives." *17 The unclassified Swett paper was itself posted on the Internet by Steven Aftergood of the Federation of American Scientists. The document focuses in part on Internet use by leftist political activists and devotes substantial space to the San Francisco-based Institute for Global Communications (IGC), which operates Peacenet and other networks used by activists. IGC shows, Swett writes, the breadth of DoD-relevant information available on the Internet." The National Security Agency is also actively sniffing" key Internet sites that route electronic mail traffic, according to Puzzle Palace co-author Wayne Madsen. In an article in the British newsletter Computer Fraud and Security Bulletin, Madsen reported that sources within the government and private industry told him that the NSA is monitoring two key Internet routers which direct electronic mail traffic in Maryland and California.18 In an interview, Madsen said he was told that the NSA was sniffing" for the address of origin and the address of destination" of electronic mail. The NSA is also allegedly monitoring traffic passing through large Internet gateways by scanning network access points" operated by regional and long-distance service providers. Madsen writes that the network access points allegedly under surveillance are at gateway sites in Pennsauken, N.J. (operated by Sprint), Chicago (operated by Ameritech and Bell Communications Research) and San Francisco (operated by Pacific Bell). *19 Madsen believes that NSA monitoring doesn't always stop at the US border, and if this is true, NSA is violating its charter, which limits the agency 's spying to international activities. People familiar with the monitoring claim that the program is one of the NSA's `black projects,' but that it is pretty much an `open secret' in the communications industry," he wrote. Electronic communications open up opportunities to broaden democratic access to information and organizing. They also provide a means and an opportunity for governments to pry. But just as people have a right to send a letter through the post office without a return address, or even to drop it in a mail box in another city, so too, electronic rights advocates argue, they have the right to send an anonymous, untraceable electronic communication. And just as the post office can be used maliciously, or to commit or hide a crime, re-mailers can be used by cruel or criminal people to send hate mail or engage in flame wars." And like the post office, the highways, and the telephone, the Internet could be used by spies or terrorists. Those abuses, however, do not justify curtailing the rights of the vast number of people who use privacy in perfectly legal ways. Robert Ellis Smith, editor of the Privacy Journal newsletter, said government agencies seem obsessed with anonymous re-mailers. They were set up by people with a very legitimate privacy issue, he said. Law enforcement has to keep up with the pace of technology as opposed to trying to infiltrate technology. Law enforcement seems to want to shut down or retard technology, and that's not realistic. Anonymous re-mailers are not a threat to national security. -END-- ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol Two 1997 Iss #4 ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Intro - PI 02) Re: Plastic Boxes 03) Re: Laser Listener 04) Re: New DEA Product 05) Re: Eavesdropping Question 06) Re: The Best Bug Detector 07) Re: Telephone harrassment Help 08) Re: DMV Software 09) Looking for Investigator? 10) Surveillance Schematics 11) Re: Plans for Tracker 12) Surveillance/Security Trade Shows? 13) Re: Contact Microphone? 14) Intro - Canada 15) Biometric Web Site 16) Re: Bug Detectors 17) Video Body Bug 18) Anonymous Remailers ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: isc@dtc.net (Kevin) Subject: Intro We are a full service private investigation agency in Wichita, Kansas, specializing in wcomp fraud, insurance claim, pre-employment and pre-tenancy investigations. Additionally, we take occasional domestic and civil litigation cases. We do not take wcomp/insurance cases plaintiff. Another are we are expanding is ECM. Our staff includes 2 administrative personnel and four licensed investigators. Sincerely Kevin J. Wray, L.P.D., D-0208 President Intellicom Services Corporation ************************************************************************** 2)From: Trace Carpenter Subject: Re: Plastic Boxes Tedy: I use a company in Dallas, Texas to make my boxes. They are fairly reasonable and will work with you on the engineering stage. I have them make boxes out of Lexan for my under the car tracking devices. You can reach them at: E&D Plastics 1010 Levee Dallas, Texas Tel: 214.742.6032 ************************************************************************** 3)From: Trace Carpenter Subject: Re: Laser Listener Ron: I have spoken with the engineer at Information Unlimited in great detail about that system and I am currently workin on one (with a few modifications). The system that they sell uses a regular red laser but you can replace it with an IR unit which will work even better for another hundred dollars or so. Also, they have a system in beta that will increase the capability of the listener by enhancing the voice instead of increasing the power of the laser. We may see this in production by around March 97. They are also working on a possible model that will listen at the reflection site as opposed to the end of the beam. This will be a great asset as if you've ever played with one you know what a pain lineing up the beams are. Plus when your trying to listen to a window above you, well you know what happens to the beam. Anyway, also remember that your buying a kit for a few hundred dollars as opposed to a Bell & Howell that runs $15K. All's not lost though, read up and make a few mod's to the system and it'll work o.k. Just remember that the size of the window has a lot to do with the frequency of the sound and the quaility you'll get. Unfortunately, the better mod's probably won't be made available through Info Unlimited due to their legal dept. Hope this helps. Trace Carpenter, P.I. Tech @ Large 214.828.4520 214.828.1917 Fax ************************************************************************** 4)From: Trace Carpenter Subject: Re: New DEA Product Believe it or not; we already have this in the private sector here. I tag vehicles every week and track them from my laptop while on the move. Trace Carpenter, P.I. ************************************************************************** 5)From: Trace Carpenter Subject: Re: Eavesdropping Question Sounds like the tap was probably done in the home. The local P.D. may have provided the equipment to be hooked up with the parent's permission but I doubt that it was done with a warrant through the phone company under the situation you've described. There has been a good deal of case law on taps done under those situations including Simpson V. Simpson 5th Circut. NO not O.J. Anyway, what it'll probably come down to is that it's the parent's phone and they can have a tap on it if they want. Criminally he probably doesn't have a leg to stand on, but he could file an invasion of privacy suit against his parents. I don't know the implications of him being a minor on that possiblity. Wish I was more help. If he really needs to know, I have a friend who is more up on the family type legalities. Trace Carpenter Tech @ Large +++Moderator's Note+++ Any attorneys on the list have an idea on this? Parents eavesdropping on minors? We know eavesdropping on spouses and others is a no-no. What are your feelings on minors? Do you think a prosecutors office would entertain seeking an indictment against a parent in this situation? ************************************************************************** 6)From: Trace Carpenter Subject: Re: The best bug detector Don't be misled by "bug detectors" as they are advertised. There are some good systems available, but you get what you pay for. Also, don't think that a detector is going to do the job for you. A detector reads the room and gives you data which is up to a tech to interpret. You have to decide what is causing the readings. If want a good basic unit a lot of people use the CPM7000 which will do you a good job for the money, but it's by no means going to give you a clean bill of health. As for cars, your going to have to know what you're looking for. My tracking devices are in constant recieve mode. They transmit nothing until my computer sends them a message saying "Where are you?" The transmitter then sends may a very quick "Here I am!" message and goes back to recieve mode. At that point I'm looking at the vehicle on a map on my laptop, and the transmitter is no longer sending out a signal for you to detect. Call if I can help. Trace Carpenter, P.I. Tech @ Large 214.828.4520 ************************************************************************** 7)From: Trace Carpenter Subject: Re:Telephone Harrassment Help Dear Owen: Guess what. You can't rely on anyone. You have to follow it up yourself. I'm assumeing your using *57 to trace the call. We have used the service in the past and have had to do the following. 1) Initiate *57 2) Immediately contact the phone companies Call Trace Center via the 800 number. Tell them you just 57'd a call, give them your number and then get a confirmation number from them. 3) Call your local police department's CID unit and give the info to them so they can contact the call trace center and retrieve the info. You must call the center and have them save the info and give you a reference number or it'll go away after I forget how many hours. Hope this helps. Trace Carpenter, P.I. Tech @ Large 214.828.4520 ************************************************************************** 8)From: Trace Carpenter Subject: Re: DMV Software Kevin, It varies from state to state. Some states will sell it to you directly on line or on a per plate basis through the local tax office. If you want a service that is multi-state oriented try Database Technologies out of Florida. I don't have one of their bill's handy but they have an 800 number, try directory assistance. If you don't find them call or e-mail me back and I'll find the number for you. I have it here somewhere. Trace Carpenter, P.I. Tech @ Large 214.828.4520 ************************************************************************** 9)From: NIKKI0423@aol.com Subject: Need Investigator? I was hoping someone could help me access the child support unit cse.net to find out info on my case. The ABSENT parent seems to be making a mock out of paying for a responsibilty. I would also like to know how to go about doing a complete background check, including hidden assets. If you can disclose how to get a ssn and to find out if the person is receiving any monies from accident cases it would be a great blessing. I am looking into starting in the home area and eventually help other custodial parents is there any formal training needed to do this? ************************************************************************** 10)From: admin@asianenergy.com.au Subject: Surveillance Schematics http://www.enlow.com/wilson.htm - Tons of surveillance & countersurveillance device schematics from John Wilson ************************************************************************** 11)From: CrACKeD Subject: Re: Plans for tracker... > From: browngrp@southeast.net > Subject: re: Plans for tracker... > > Good detailed response. I'm heating up soldering iron now, but tell us > how you get direction information using just a scanner. Asking "How do you get direction information using just a scanner?" is very much like asking "What is the meaning of life and why are we here?" First off, you will need more than just a scanner, but a scanner is a good start and the heart of the whole thing, of course. Second, you can't just slap a big antenna on your car and drive around town until the signal gets stronger, that crap is reserved for Hollywood. There are several working methods you can use depending on what financial resources you have available and are willing to part with. The most simple way to go is to construct or purchase a directional beam antenna, commonly known as a "yagi" antenna. There are other variations out there, like the log periodic, but they all operate under the same basic principle - point and read.. With a decent attenuator, the little things are able to get very close to the signal source, but require several readings and lots of patience to get you to that point. There are also various hand-held phase detectors you can purchase (or build) that use two antennas on either end of the unit to help you locate the source of a signal. The absolute best way to go, if you don't work for the NSA, is to get your hands around a Doppler Systems unit. These phase detectors use an array of four tuned antennas on your vehicles roof and a circle of LEDs (as well as a 3-digit LED display, depending on the model) which give you a very accurate bearing towards the signal source (in degrees in the case of the 3-digit display). Unlike beams or other long-range contraptions, they will continue to give you an accurate reading until you can throw a rock at the signal source. There are of course other odd things people do to their equipment during a transmitter hunt (a.k.a a foxhunt). Some are as bizarre as involving items such as toilet paper tubes, tin foil, coat hangers and duct tape, but I don't need to elaborate. The two or three methods I've just mentioned are the most commonly used and tend to be the most successful based on the speed at which they can de deployed and completed. It's a good idea to get in touch with your local ham radio club and find out if they practice direction finding, most do. They should be able and willing to answer your questions and give you a demo of the equipment they use if you wish. Some URLs pointing to useful RDF resources are below: http://www.dfsystems.com DF Systems, Radio Direction Finding (RDF) Equipment http://members.aol.com/homingin/Sources.html RDF Resources for Home Builders http://home.navisoft.com/agrelo/ae.htm Agrelo Enginering (RDF) http://members.aol.com/bmgenginc/index.html BMG Engineering, Radio Direction Finding http://www.kvoa.com/byon/thunt/index.html Hidden Transmitter Hunting CrACKeD ************************************************************************** 12)From: SpyKing@thecodex.com Subject: Surveillance/Security Trade Shows Any list members aware of any upcoming trade shows? Location doesn't matter. If you know of one let us know... anything to do with list topics... ************************************************************************** 13)From PRV8EYE@aol.com Sat Jan 4 02:35:52 1997 Subject: Re: Contact Microphone Radio Shack sells a small wireless microphone for about 20 bucks. If you hold this mic against a wall and listen through a set of headphones with a Walkman type radio tuned to the mike, it works remarkably well for listening through walls. Of course, I've never done this myself to listen to people-I just tested it listening to my TV. If you walk in to Radio Shack and ask for a "bug" many will NOT sell it to you. Ask for the FM wireless microphone. ************************************************************************** 14)From: Jean-Pierre Forest Subject: Intro Well, I've been lurking on the list for a while now, and I think it's time to introduce myself. Am former Canadian Armed Forces, served with the SSF and as Military Police and Investigator. Been in the Private sector for last five years as Consultant/PI as an Ops. Director for the Special Investigations Unit of an International Security Company (I am based in British Columbia, Canada). We are a fully intergrated security company(3000 employees), with services ranging from Security Officer, Access System, Intrusion detection, Electronic Countermeasures, Corporate/Criminal Investigations, Close Protection and covert electronic and physical surveillance. Hope I can help some people on Canadian issues. Blue Skies, J.P. +++Moderator's Note+++ Welcome lurker ;-) What about the rest of the list? ************************************************************************** 15)From: SpyKing@thecodex.com Subject: Biometric Web Site Some interesting info on biometrics and their various surveillance/security applications. Checkout: http://www.anet-stl.com/~wrogers/biometrics/index.html ************************************************************************** 16)From: Jean-Pierre Forest CC: MrNSPIRE@aol.com Subject: Re: Bug Detector If you are looking for any type of "Bugs" electronic surveillance, You will need several pieces of equipment and a lot of expertise. I would suggest you contact someone that has several years experience in the field and has the proper equipment. Typically you may be looking for RF bugs, which you may find with a good receiver. A good TSCM technician will also use a NLJD (Non-Linear Junction Detector) in order to search for devices which may be non-active or dormant or remote activated. There is also the IR laser which requires more sophysticated equipment to detect it's actions. If you need further assistance you can send me a private e-mail, we have offices in Toronto, Vancouver, Canada, Chicago in the USA. We also have over $100k in ECM equipment. It is not a do-it-yourself project. Blue Skies.. J.P. ************************************************************************** 17)From: Spysociety@aol.com Subject: Video Body Bug Video recordings are an integral part of any undercover investigation taking place in the 90's. The Video Body Bug makes concealing a body video system an easy task. Designed to be concealed on a person, the Video Body Bug is compact enough to fit into a purse or an attache case. The Video Body Bug comes ready to work. There are no wires to cut and no connections to solder. Simply charge your battery, plug in the camera and the system is ready to work. The Video Body Bug even comes with a custom holster bag to hold the mini video recorder. This holster was designed to access the recording controls and make battery changes quickly. The system can be worn fanny pack style or over your shoulder. The low light, high resolution CCD camera is concealed in a pager. The lens requires only 1/16 of an inch clearance hole and is virtually undetectable. The camera is even infrared sensitive should your operation require recording in total darkness. The mini video recorder can record up to five hours on one tape(battery change is required). Time and date are superimposed on the video tape. The system has the ability to record audio. While the Video Body Bug can provide you with powerful results, it is very simple to use. Non-technical users are surprised how easy it is to operate the system. The Video Body Bug comes complete with: pager-camera, Sony mini VCR, Sony set-up monitor, two rechargeable VCR batteries, battery conditioner/charger, VCR holster, camera batteries, VCR power supply, VCR to monitor cable, (5) P150 five hour tapes and a carrying case. Price: $3195.00 plus any applicable sales tax. Available through Covert Security Products. ************************************************************************** 18)From: Jim Ray Subject: Anonymous remailers (Not PGPsigned, because the list software munges my messages anyway.) Interesting article on remailers. A few comments from me follow, and Lucky Green probably has a few comments as well. (Hi Lucky!) I sometimes run the WinSock remailer, along with my friend Joey, who wrote it. We are Libertarians (the "UNcivil" variety :) and I suppose it does no good saying this, but I am not an NSA agent. [If I *were* one of their agents, I am quite a few years behind in my paychecks!] A look at my pages (see below) also reveals a few caustic political comments about US intelligence agencies. There is no way to prove a negative, but you can judge for yourself whether they would hire me considering my views on US govt. policies like the tax-and-spend drug war. I have political reasons to run the remailer, and I participate in a "remailer operators" list. That list may well be monitored by intelligence services, but the operators themselves seem to all just be 1st amendment absolutists like me. Privacy, like liberty and love, can only be had by first giving it away. Running a remailer service is one of the best ways to protect your own privacy, because it leads to many PGP encrypted messages entering and leaving your account. You can always chain encrypted messages through your own remailer using Private Idaho (see previous plugs) or "Premail," in order to have one trustworthy remailer operator in the chain, which is all it takes. There are 2 major types of remailers, and WinSock is a modified type 1 "cypherpunk" remailer. The "mixmaster" (type 2) remailers are slightly harder to set up and use, but provide some security advantages against certain possible technical attacks over type one remailers (see links on my page below for details). Operators can do whatever they want, but we don't keep logs of messages that make it through the service. We aren't interested in reading them and the logs would prove a tempting target for various bad guys. However, from looking at the rejected messages file, I can guess that maybe 1/3 or so of messages going through the remailer are abuse. The WinSock remailer now only accepts PGPencrypted messages, which has reduced abuse of the service. For more of my views on privacy, anonymity & politics than you are ever likely to want to see again, along with links to other remailer information sources, see my remailer page at: http://shopmiami.com/prs/jimray/ANON.HTM Which is definitely a work-in-progress and will change shortly. JMR Regards, Jim Ray DNRC Minister of Encryption Advocacy "In local news, the city of Miami discovered that it was $68 million short and was forced to seriously consider cutting back such municipal operations as the City Hall Drive-Thru Bribe Window." -- Dave Barry, 12/29/96 PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5 57 52 64 0E DA BA 2C 71 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two 1997 Issue #5 ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: SSN Searches 02) Re: Vehicle Locator System 03) Re: Laser Monitoring to Databases 04) Intro PI/Tech 05) DBT Number 06) Security System 07) Re: Anonymous Remailers 08) Intro - PI 09) Intro - Australia 10) Re: Contact Microphone 11) IR Sensitive Spray? 12) Penny for your Thoughts 13) Body Bug Specs 14) Re: Laser Listener 15) Re: Tracking System 16) Re: Tracking System ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Larry Braden Subject: Re: SSN Searches TO: All Members and Jeasom1046@aol.com Per your post asking about good credit checks and SS# searches etc.......... We use US Datalink out of Texas for the above searches and many many more. We have never been disappointed and are very happy with them. There telephone number is 1-800-527-7930 Good luck and I hope this helped in some small way. Respectfully, Larry Braden, Senior Investigator Montrose Investigations Montrose, Colorado E-Mail at Braden@rmii.com or visit our home page at http://www.angelfire.com/co/WestCoPI Consider us your Colorado Internet connection ************************************************************************** 2)From: Donintel@aol.com Subject: Re: Vehicle Locator System One of our members mentioned a passive tracking system that was activated only when signaled from his LapTop. This was in connection with tracking vehicles. When signaled from the LapTop, the target vehicle was located on a map. Does anyone know how this works, what mapping system is used, and where the system could be obtained? This is the most useful net group I've ever seen. Don MacDonald donintel@aol.com +++Moderator's Note+++ Thanks Don. It can even be better if EVERYONE participates ;-) It's only as good as the MEMBERS make it... ************************************************************************** 3)From: Donintel@aol.com Date: Sat, 4 Jan 1997 09:06:34 -0500 To: 6886@mne.net Subject: Re: Laser Monitoring to Databases In reading about laser listening devices (Spyking venture thru New York etc), I wondered if the results of such surveillance could be incorporated directly into a database. If so, such a textual database could be automatically interpreted or indexed via an artificial intelligence routine to provide charts and links concerning the individuals surveilled. I realize that an analog/digital conversion would be required and some conversion mechanism to text. Is this possible/feasible? If anyone knows, it will be this group. Don MacDonald donintel@aol.com +++Moderator's Note+++ SpyKing's "venture through New York" was with the DataScan TEMPEST monitoring device not a laser... we were measuring & monitoring electromagnetic emissions... not voices... ************************************************************************** 4)From: averyprivateeye@juno.com (Charles T RAHN) Subject: Intro I am new to this net and decided to drop a line describing my business to those that might be interested. I am a retired technicial investigator from the Orlando, Florida Police Department. I served in that capacity for over 18 years. A part of my job was that of performing wire taps, bugging operations, video surveillance, etc. I retired in 1991 and started my own business here in Orlando, "A VERY PRIVATE EYE, Inc." One of my specialties includes electronic sweeps and electronic counter measures. We also perform background checks, locates, and a number of other private investigative functions. We can be reached via email at: . Our phone number is: (407)273-6646. Visit our web page at: . Charles Rahn ************************************************************************** 5)From: TLMassoc@aol.com Subject: DBT number Their phone number is 800-279-7710. Tell them Terry Mills sent you and get everything for free. ************************************************************************** 6)From: "Richard Leatherwood" Subject: Security System We are in need of very high tech security equipment for a variety of areas, Area Access, Site Perimeter (leathal boundries, motion detection, thermal detection and surveillance), entry access for personnel at various levels, etc. Sight needs to be as Anti Terrorist as possible. Level V Security Sight. Please send details of all available products to: R. L. Leatherwood, CEO New World Biotechnology Consultants Ltd. NWBC@aloha.net ************************************************************************** 7)From: Lucky Green Subject: Re: Anonymous remailers [and remote computer monitoring] Jim Ray wrote: >Interesting article on remailers. A few comments from me follow, and Lucky >Green probably has a few comments as well. (Hi Lucky!) I thought I'd let it slide, since the original article, wasn't all that bad, except for the fact that it keeps repeating the old "the spooks are running the remailers network" myth. There is little doubt that the spooks are monitoring Internet email at a grand scale. After all, the spooks are monitoring international telephone traffic with automated voice recognition systems. Which is a more costly than processing email. Most remailer experts agree that much, if not all, traffic in and out of the remailer network is monitored by multiple opponents, as is all traffic amongst the nodes. This is not a problem, since type II remailers, such as Mixmaster, are designed to not be generally affected by universal traffic analysis. I have been informed that one of the more resourceful opponents monitoring the remailer network is using highly sophisticated technology to compare historic email traffic patterns (before the introduction of modern remailers) to today's traffic patterns. I doubt that the attack will yield any results. Using remailers successfully requires of course adherence to standards of email security. The messages must be sent to the remailer in encrypted form and the inner envelope used must be encrypted with the ultimate recipient's public key. Furthermore, the number of messages sent by you should be small compared to the total number of messages processed. Which is usually the case. >I sometimes run the WinSock remailer, along with my friend Joey, who wrote >it. We are Libertarians (the "UNcivil" variety :) and I suppose it does no >good saying this, but I am not an NSA agent. Having conversed with Jim Ray for a few years, I would find it hard to believe that he works for the spooks. I know many of the remailer operators personally. The operators I do know do not work for the spooks. But you don't have to trust my judgement. The nature of type II remailers is such that even if all but one remailer in your chain were run by the opponent, your anonymity would still be assured. All you have to do is to use a long chain containing at least one remailer you trust. For more information on using remailers, including automated software for Windows 95: http://www.eskimo.com/~joelm/ [Sidebar: This site also has an excellent collection of information on TEMPEST and van Eck radiation. Including a link to van Eck's seminal paper in which he describes successfully monitoring computers at a distance using an old b/w TV and a few bucks worth of parts from Radio Shack. A must read. The paper is mirrored from http://jya.com/emr.pdf ] The theory behind type II remailers is explained at http://www.obscura.com/~loki/remailer/remailer-essay.html You can get the software required to run a remailer from the same site. I would encourage anyone with a UNIX box and a permanent Internet connection to consider operating a remailer. Today's remailers work adequately for sending mail, even against opponents with significant resources. The biggest problem today is the fact that messages occasionally get lost in transit. However, the situation is quite different if you wish to receive email anonymously. Reply blocks are reasonably secure, but patently unstable. An anonymous mailbox service as easy to use as the now defunct anon.penet.fi, but _without_ an anonymous ID to real email address database that lends itself to confiscation and with guaranteed unlinkability and stability is badly needed. Such a service is currently being designed. -- Lucky Green PGP encrypted mail preferred Make your mark in the history of mathematics. Use the spare cycles of your PC/PPC/UNIX box to help find a new prime. http://www.mersenne.org/prime.htm ************************************************************************** 8)From: "Ian L. Sitren" Subject:Intro Ian L. Sitren, Private Investigator Post Office Box 11486 Santa Ana CA 92711 USA Voice: 800 435-1438 Fax: 800 965-8523 ILSPI@ILSPI.COM Http://WWW.ILSPI.COM Counterfeit Products * Product Diversion * Product Tampering Business Intelligence * Trade Secrets * Litigation Support ************************************************************************** 9)From: Graham Subject: Intro The Surveillance List Sounds like a great idea. I have been in the surveillance industry for the last 20 years. I design, manufacture and sell surveillance and counter surveillance equipment in Australia. Some of my products are at my web page http://www.ozemail.com.au/~spycam I would be happy to swap ccts. etc, ideas and answer questions from other technical people in the industry. Regards GraHam ************************************************************************** 10)From: SpyKing@thecodex.com Subject: Re: Contact Micropohne >Radio Shack sells a small wireless microphone for about 20 bucks. If you hold >this mic against a wall and listen through a set of headphones with a Walkman >type radio tuned to the mike, it works remarkably well for listening through >walls. > >Of course, I've never done this myself to listen to people-I just tested it >listening to my TV. If you walk in to Radio Shack and ask for a "bug" many >will NOT sell it to you. Ask for the FM wireless microphone. I doubt you'll have much success this way. The Rat Shack FM wireless microphone was not designed for this purpose. Basically, it's a toy... If price is a consideration, you might try a music store instead. Buy a contact microphone pickup. The same one used to amplify acoustic guitars. Most of them adhere with adhesive putty. Run it through a good audio amp... I like the Kaiser and AudioVox models... ************************************************************************** 11)From: SpyKing@thecodex.com Subject: IR Sensitive Spray? Any list members aware of manufacturer of IR sensitive paint or spray. I'm looking for something similar to ultra violet spray which illuminates under UV lite but will flouresce under IR light? Any ideas? Compound should be invisible to naked eye... ************************************************************************** 12)From: "Sammy Piazza" Subject: Penny for your thoughts Oh Yeah! Thanks for the replys on my "Bug a Caddy" question. The Cell phone activated by a pager was RIGHT ON. Now....Has anyone EVER heard of ops leaving a penny or pennies behind as "a job completed" or as some other kind of code or signal as to have been there or "Is there?".(or some other signal)..DEA? FBI? LOCAL LAW? PI's? who??...Someone is bound to know. This list is a real "Brain Trust" / "Think Tank"....Thanks in advance......Sammy /Shuffleking +++Moderator's Note+++ I seriously doubt ANY professional especially LE would leave behind a calling card... It is SOMETIMES possible to determine what type of agency left the device since most experienced TSCM Techs in the business can identify 95% of the devices out there by immediately by sight... Most agencies (gov, state, city), PI's, etc seem to stick to the same M.O. and same manufacturers...I had a job in Spain recently where a device was found and I identified it by sight as a device sold by a company in England... That's one of the reasons for this list... to exchange info and let each other KNOW what's out there... ************************************************************************** 13)From: Spysociety@aol.com cc: mcis@dial.pipex Subject:Video Body Bug Specs Power requirments VCR: 6 volts DC Camera: 9 volts DC Monitor: 6 volts DC Tape Format Standard 8mm Video Recorder Recording System: Rotary Two Head Helical Scanning Alarm Input Time & Date Generator Maximum Record/Playback 2 1/2 hrs.(SP) 5 hrs. (LP) on P-150 tape Camera Monochrome CCD imager 0.5 Lux Electronic Iris Wide Angle 3.6mm Lens 380 TV Lines *Optional Audio 2 channel Input Mic or Line Input Battery Type VCR: Rechargeable Ni-Cad Camera: 9 Volt Alkaline Monitor: 1.5 volt Alkaline AA Monitor Size: 2.7 inch Video Input: Composite BNC Audio Input: Mini-jack Total Weight: 3 LBS. Recorder Camera Holster Batteries Included Accessories Custom VCR Holster VCR Power Supply/Battery Changer Batteries Soft Sided Carry Case VCR to Monitor Cable (5) 150 Minute 8mm Tapes Features and specifications may change without notice. ************************************************************************** 14)From: Trace Carpenter CC: Ron Smalley Subject: Re:Laser Listener Ron Smalley wrote: > > Hello Trace, > Firstly, Thank you very much for your information!. > . > I have had several answers on my posting, it seems that item is more of a > demonstration unit, rather than a field operational system. It apparently > does not work any better that my own experiments of 25 years ago. I had > hoped developments had refined this type of technology. I do remember we had > some success fron bouncing I/R off other objects in the room, which helped > with the tangental problems. I am interested in your developments, What does > system in beta mean?. > I/R beam is a "must" though, interested in your comment that it would work > better. > How well does the Bell & Howell one work, and at what range? > Ron Smalley, I/R does work well, you simply have to use an I/R sensitive camera or night vision equipment to see the beam to line it up if you're indeed going to bounce the beam to a reciever instead of being able listen at the reflection point. I have used a red laser pointer as sort of a "laser sight" on top of the I/R laser to briefley set up the systems and then turn it off. The system in beta just means that it's in research & development. It's not a finished product yet, kinda like early software releases. As for the Bell & Howell unit; I haven't actually gotten to play with one first hand but I have a friend who has been able to extensively in the past. He is an ex-gov. contractor type who has done extensive work with bugs and countersurveillance equipment. In fact if you have ever seen the movie "The Conversation" new the person the movie was about quite well. He has told me stories about how on the night they were using the laser which I believe was a CO2 laser but I'm not sure of that, the fog rolled in. Although the beam was invisible, you could see the hole in the fog that the beam created and almost gave them away. He's a neat guy, but he doesn't get too specific on a lot of things. My ex-best friend introduced me to him. I say ex because he's now dead. He and one other person have told me that this guy was instrumental in building the devices used in Watergate. I don't know how true it is, you never know. But he seems to know his stuff. As for bouncing off of other things in the room. I know of one incident in Las Vegas where a painting on a wall had been copied onto a material like X-Ray film. It was then hung back on the wall in place of the old one with a type of sealed vacuum cavity behind it so it was like a stethiscope. In the back of the cavity was a speaker which was connected to a microphone in another office. I believe it was a conference room. That was the microphone transmitted the sounds to the speaker behind the x-ray film and the laser was pointed at the picture to pick up everything. I didn't actually see this, but it was relayed to me by the technician who did the debug. Well I hope this answered some more questions. Let me know if there's anything else. Trace Carpenter,P.I. ************************************************************************** 15)From: Trace Carpenter CC: HtPursuit@aol.com Subject: Re: tracking HtPursuit@aol.com wrote: > > Trace, > I have been using different types of tracking devices for a few years on a > case to case basis . Presently I am looking at a system, Tele track, which > sounds like the device you are using presently. If so, could you pass along > your pros and cons on what you know about it? Or any suggestions about a > system that could be used in a large city enviorment? > Thanks in advance. > Bill Teletrac is the system that I'm using. As for as pro's and con's well it's not a perfect system, but it's the best I've used. I buy my basic transmitter from teletrac and then make a few modifications to make it fit my application for an undercover unit. The system works fairly well, but rather than the system that uses the skybased GPS sats this network uses ground based cellular towers to triangulate the signal. That's good in that as a pilot I've seen how degradated the GPS signal for civilian use really is. The skybased system will get you within a few blocks of your transmitter which is good if you want to know if your Target is in San Antonio or Memphis, but if your in downtown Dallas it's not worth a darn. The teletrac system will get you withing a few feet almost always. I say almost, because we all know how well cellular coverage works. You will have dead spots, and the signal will bounce off buildings from time to time, but it's the best system I've used yet. Furthermore, I have it on my laptop and track vehicles from the field all the time. BEWARE OF RESELLERS OF THE TELETRAC SYSTEM!!!!!!! There is a company our of Oklahoma City who uses a name similar to a popular science fiction television show which advertises this service. They use the same account type as I have with Teletrac and then you call them, they track the vehicle and then tell you over the phone where it is. Or at least that's what they claim to do. First they charge you (as I recall) several dollars for a call up locate. I pay 2 cents through teletrac. Second, they charge you around $1200.00 for the transmitter. They cost around $250.00 from teletrac before I make a few LOW COST mods. Next, I as have other investigators, had problems getting them to call you back and get locates. You get a pager number to call them on and then if you're lucky they'll get back with you. BTW, this was a couple of years ago that I had these problems with them. They could have changes, but not according to what I've been told. I broke my contract with them, sent their unit back and they tried to sue me. We went to court, other investigators showed up and testified and we won. They ran back to Oklahoma. Hope this helps. Trace ****************************************************************************** 16)From: Trace Carpenter CC: zac Subject: Re: Tracking System zac wrote: > > Hi, > I read your post on the list, I have a couple of questions regarding the transmitters you talked about. > > What is the range of the transmitters? > > how much does the system cost? > > where can i get hold of this system? > > Thanks for your help > > Zac > > --------- your post --------- > > As for cars, your going to have to know what > you're looking for. My tracking devices are in constant recieve mode. > They transmit nothing until my computer sends them a message saying > "Where are you?" The transmitter then sends may a very quick "Here I > am!" message and goes back to recieve mode. At that point I'm looking > at the vehicle on a map on my laptop, and the transmitter is no longer > sending out a signal for you to detect. My system is through Teletrac. I buy the basic transmitter from them and then make a few mods for the way I want to use them. The range is anywhere in the Dallas/FT.Worth Metromess and a few other markets. I call into a mainframe in Arlington Texas, and there system triangulates on my transmitter by using cell sites. It then gives me the vehicles location, direction of travel and speed on my laptop. I also view it on a map. Depending on what market you're in, they may have coverage there. If not go to one of the skybased GPS systems. They work the same way, they just use GPS Sattelites. The signal is degradated so it's not quite as precise but it's still a great system and it'll follow a vehicle anywhere for the most part. If you want to call Teletrac the office I go through is at: Teletrac 524 E. Lamar Blvd., Ste. 120 Arlington, Texas 76011 817.261.5756 Let me know if I can help further. *************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two 1997 Issue #6 ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) GPS Tracking 02) Re: Vehicle Tracking System 03) List Member in Scotland? 04) Re: Laser Monitoring to Database 05) Laser Eavesdropping Systems- Long 06) Radio Shack 07) The Right Direction? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Trace Carpenter CC: dj73550@goodnet.com Subject: GPS tracking dj73550@goodnet.com wrote: > > My name is Jeff Evert and I work for I.S.C. in Phx. We are currently > in the market for a gps tracking system, but I have not found one that I > think will work due to the obviousness of the gps receive antenna. I > was wondering what you have done to hide the antenna and how well it > works. I was also wondering who you purchased your tracking system > through or if you built it yourself, the best system I have found so far > is one made by pinpoint tracking but I am still not happy with their > antenna setup. Thx. Jeff dj73550@goodnet.com Hi Jeff: The system I'm using is not off of a satellite based system, it's on a 900Mhz ground tower system. As for the antennas, I use a short magentic mount antenna for covert under the vehicle mounting if I have to move fast. If I have time I take a "big dave" loop antenna and either place it under the dash, under the back deck between the rear speakers works great, or between the headliner and roof. If you need one, let me know. Trace ************************************************************************** 2)From: Trace Carpenter To: SpyKing Newsletter Postings <6886@mne.net> Subject: Vehicle Tracking Systems I have had NUMEROUS requests about the vehicle tracking system that I'm using so I thought I'd try to explain to everyone. I think I've replied to most everyone personally, but just in case there's anyone else interested I'm using a ground tower based system through a company called Teletrac. I've posted the number for everyone but again it's: 817.261.5756. It's a great system which allows me to view the vehicles activity on my laptop while I'm driving downn the road. The only problem is that for many of you they probably will not have coverage in your area. Never fear though. There is another company we also have access to that uses a satellite based GPS tracking system which should get to most EVERYONE'S area. I don't have the number at this office but I'll bring it with me tomorrow and post it. If anyone has any other questions please feel free to contact me anytime by e-mail or at my office. Trace Carpenter,P.I. Tech @ Large 214.828.4520 ************************************************************************** 3)From: Trace Carpenter Subject: Anyone out there in Scotland near Perth? Do we have any subscribers out there in the Perth Scotland area? Please send a private e-mail to trace@onramp.net Thanks Trace ************************************************************************** 4)From: Trace Carpenter Subject: Re: Laser Monitoring to Database Don, there are a few programs out there (Drag & Dictate for one) which do pretty well at converting voice to text and entering it. The downfall is that the program actually learns your voice as you go. It works like this. As I talk to the machine, I may say the word bridge as in telecommunication bridge. The software my think I said one of 6-7 other words and asks me to select. I select the proper one and go on. The next time my voice says the word, it understands. In the beginning you may only get the software to recognize 10 words a minute or so. After weeks of talking to the system the number rises until you can talk at a normal rate. The problem is, even though we sound alike to each other, we don't to the computer, so if someone else sat down and talked to the computer, it wouldn't recognize anything. You'd have to start all over. Therefore, trying to have the software transcribe various different voices isn't really practical at this time. Hope that helps some Trace ************************************************************************** 5)SpyKing@thecodex.com Subject: Laser Eavesdropping Laser eavesdropping systems differ significantly from traditional audio surveillance and monitoring systems in that they are completely removed from the room being monitored. No microphone, radio transmitter, recorder, or electronic device of any kind is required in the room. The only indication that an eavesdropper is present is an invisible laser beam reflecting off the exterior surface of a window. A number of years ago, the national news media revealed that there was a serious health risk for employees of the U.S. embassy Moscow posed by the continuous bombardment of the embassy by microwaves, it was mentioned that the exposure resulted from the microwave beams of microwave eavesdropping devices operated by Soviet intelligence agencies. These devices were Maser-Bounce Listening Devices, older, lower frequency versions of Laser-Bounce Listening Devices, the basis of laser eavesdropping systems. Laser eavesdropping systems are more effective than Maser eavesdropping systems because laser light beams are much harder to detect than Maser microwave beams. Like the lasers on which they are based, laser eavesdropping systems were once very exotic, very sophisticated, and very expensive - the exclusive province of university laboratories, intelligence agencies, and the military. Today both lasers and laser eavesdropping systems are cheap, plentiful, easy to obtain, and easy to use. When T. H. Maiman demonstrated the first laser in 1960, the lasing element was a rod of specially grown ruby crystal optically "pumped" by a xenon flash lamp. Needless to say, the laser was expensive and temperamental. Today, there are many types of lasers, optically-pumped solid lasers, gas lasers, gas dynamic lasers, liquid lasers, tunable die lasers, organic lasers, chemical lasers, and most importantly, semiconductor diode lasers. Based on small semiconductor chips, the semiconductor diode laser (laser diode) has revolutionized our world and found its way into almost every aspect of our lives. Semiconductor laser diodes can be made which, at room temperature, radiate light with wavelengths (colors) from 420 nanometers (violet) to 1550 nanometers (infrared). A nanometer (nm) is a billionth (10-9) of a meter, about 39 billionths of an inch. It is semiconductor laser diodes operating in the near infrared region (700 nm - 1550 nm) that are most often used in laser eavesdropping systems. In 1992, almost 33,000,000 infrared laser diodes were sold for use in fiber optic communications, optical memories, bar code scanners, laser printers, and other applications. The economies of scale are evident. The price of lasers has dropped to the point that anyone can afford one Anyone can buy a laser pointer to enhance their presentations for $100 or a laser gun sight to improve their aim for $200. Laser diodes (either red or infrared) can be bought for $20 to $30 apiece from almost any electronics parts distributor. Cheap laser diodes make laser eavesdropping systems, once prohibitively expensive and used only in intelligence operations and very high stakes industrial espionage, affordable and usable by anyone with an urge to listen. For $200, anyone can buy an experimental laser eavesdropping system by mail from ads in the back of magazines like Popular Science and Popular Electronics. Naturally, more expensive and sophisticated systems are available for professionals. Laser eavesdropping systems require either a continuous wave (CW) or a very high duty cycle laser in the transmitter and a photodetector in the receiver. While any combination of CW laser and photodetector can be used to listen, the operational advantages of using an uncooled detector and the added covertness of an invisible infrared laser beam coupled with the low cost and easy availability of such laser/detector combinations are so compelling that almost all laser eavesdropping systems use a near-infrared laser diode and either a silicon or indium gallium arsenide photodetector. Laser eavesdropping systems operating in the near-infrared region use lasers which radiate an invisible beam with a wavelength somewhere between 700 and 1550 nanometers (nm).The reflected beam is received by either a silicon photodetector operating between 400 nm and 1100 nm or an indium gallium arsenide photodetector operating between 800 nm and 1700 nm. To use a laser eavesdropping system to monitor a conversation, the eavesdropper simply points the laser eavesdropping system laser at a window of the room in which the target conversation is occurring and illuminates the surface. A window is preferable to other surfaces because it is generally flatter and more reflective than other building material. The eavesdropper then centers the reflected laser beam on the laser eavesdropping receiver. The basic rule of optics (the angle of incidence equals the angle of reflection) governs the placement of the laser and the receiver. Normally, it is best to position both the laser and the receiver at a right angle to the window. The window behaves like a microphone. In a microphone, sound vibrates the plates of a capacitor and causes output voltage fluctuations which can be manipulated electronically and later reconstituted as sound. Similarly, sound vibrates the surface of the window and produces interference patterns in the reflected laser beam. The photodetector in the receiver converts these interference patterns to voltage fluctuations which are electronically manipulated and reconstituted as sound. Once the sound has been converted to an electrical signal, it is irrelevant whether the signal was generated by a microphone or a laser receiver. The effective range of a laser eavesdropping system is determined by the characteristics of its laser, its system optics, its photodetector, and the weather. Most cheap systems work at ranges out to 100 meters. Better systems can work at longer ranges. It is not easy to protect your conversation from the laser eavesdropping system. During the 1970's and 1980's, security personnel developed standard techniques to attempt to counter laser-bounce and Maser-bounce listening systems. Most techniques involved trying to mask conversations by beaming noise of various types at the windows of a conference room. Recent improvements in electronic and computer enhancement / signal recovery techniques have rendered "window shakers", beaming noise at the windows, and other similar jamming techniques obsolete. Modern electronics routinely allow the recovery of conversations 30 dB below (1000 times weaker than) the background noise level. With specialized commercial equipment, it is possible to recover information that is 60 dB below (1,000,000 times weaker than) the background noise. Modern sophisticated computer enhancement techniques make it possible to recover a conversation even if the background noise is billions of times louder than the conversation. In fact, military and intelligence communications systems typically require signal isolation levels significantly greater than 110 dB (100,000,000,000) to prevent the enemy from recovering voice or data which might be unintentionally transmitted. If you can't protect your conversations against laser eavesdropping systems by electronic means, how can you maintain confidential information without abandoning all rooms with exterior walls and windows? The answer is to detect the presence of the laser eavesdropping system and then take whatever action is required - moving the conversation to a room with only interior walls, dispatching a security team to find and remove the surveillance equipment, etc. Normal counter-surveillance equipment, sweepers, bug detectors, etc., are designed to detect electronic systems within the room and will not detect the presence of the infrared laser beam. What They Are Laser eavesdropping systems are covert listening devices. Laser eavesdropping systems are covert because they work from a distance and provide no electronic clues to security personnel that the conversation is being monitored. There are no radio transmissions from the building, no electronic variations in phone transmissions, no electronic equipment or bugs of any kind in the room being monitored. There is only an invisible beam of laser light reflecting off the outer surface of a window. The laser eavesdropping system contains two basic elements, a laser and a laser receiver. Most laser eavesdropping system lasers radiate in the near infrared spectrum between 700 nm and 1550 nm. The reasons for this are straightforward. A laser which radiates in that spectrum has an invisible beam with good atmospheric transmission characteristics. Operation in that spectral region is compatible with the use of inexpensive, uncooled silicon or indium gallium arsenide detectors in the receiver. The rationale behind selection of a near infrared laser is equally straightforward. Covert operation requires an invisible beam. This eliminates lasers which operate in the visible light spectrum. Atmospheric absorption factors eliminate ultraviolet lasers. The requirement that the laser be portable eliminates many of the more exotic lasers and further limits the choice to the infrared spectrum. Infrared radiation is often associated with heat. This is somewhat ironic because the longer the wavelength of light, the cooler the "blackbody" radiator which produced it. Infrared light is significantly "cooler" than visible or ultraviolet light. For this reason, night vision devices which are intended to detect the "heat" from living beings operate in the mid-IR (10,000 to 14,000 nm) region and air to air missile seekers which home in on the hot metal parts of jet engines operate in the near-IR (1,000 to 4,000 nm). This also means that the longer the wavelength of the laser light, the more potential sources of interference ("noise") exist. For a laser eavesdropping device, it is important to design the system to avoid as much interference or "noise" as possible. Consequently the shorter wavelengths of lasers in the near IR region, make them preferable to lasers in the mid and far IR regions. By process of elimination, the laser of choice for laser eavesdropping devices is a semiconductor laser diode operating in the near IR (between 700 nm - 1550 nm). The selection of a near-IR laser is reinforced by the choice of detectors for the receiver. The longer wavelengths typically require cryogenically cooled detectors for optimum sensitivity, while the near infrared spectrum can be received by either silicon or indium gallium arsenide uncooled detectors. Both silicon and indium gallium arsenide detectors are readily available, relatively inexpensive, reliable and effective in the near IR spectrum. Silicon detectors typically operate in the spectrum of 400 nm to 1100 nm. Indium gallium arsenide detectors operate in the spectral range of 800 nm to 1700 nm. The physical arrangement of a typical laser eavesdropping system is as follows: Laser: The laser optical package will be mounted on a stable platform, similar to a camera tripod or a surveyor's transit. The laser optical package will consist of the laser, its power supply (usually batteries), focusing optics, and aiming optics. The complexity of this element is a function of the sophistication and seriousness of the eavesdropper. Some mail order systems use a rifle scope sight arrangement to point the laser. Receiver: The receiver will also be mounted on a stable platform. It could be collocated with the laser transmitter or at a separate location. The location is dictated by the geometry of the target area. The receiver contains collection and focusing optics, filters, the detector, and supporting electronics. The complexity and function of the electronics package is dependent on the sophistication and seriousness of the eavesdropper. In the simplest case, the detector package simply converts the reflected laser interference patterns to sound and feeds it to earphones and a tape recorder. More sophisticated devices contain signal conditioning electronics. How They Work Laser Eavesdropping Devices work because of the two unique characteristics of laser light - laser light is monochromatic and coherent. Monochromatic means that all the light waves in a laser beam are exactly the same color and hence, have exactly the same wavelength. This is important because it allows the use of a monochromatic filter on the receiver to filter out all light with color different than the laser beam. This greatly simplifies signal reception. It is the equivalent of being in a crowded football stadium and having a device which filters out all the sound except the person to whom you wish to talk. From a system design perspective, the ability to use a monochromatic filter greatly improves the signal to noise ratio at the detector and allows the use of lower power lasers. This makes the system smaller, cheaper, and more practical. It is the added element of coherence which makes laser light so special. What coherency means is that all the light waves radiated by the laser are in phase. A beam of light can be represented as an electromagnetic wave. An electromagnetic wave is comprised of two varying fields, an electric (E) field and a magnetic (H) field sinusoidally varying in amplitude at right angles to the direction of propagation of the light wave. For most purposes, the amplitude of the light wave is given by the amplitude of the electric (E) field. The distance between two successive points of maximum amplitude of the E field is called the wavelength l. At a given point along the wave the amplitude y is normally represented by the equation y = a sin(wt- kx) where w is the angular frequency (w= 2pl/c), c is the speed of light, t is time and k is the propagation number or wave number (k= 2p/l). The phase at any given point along the wave at any given time is defined by the quantity (wt - kx). The absolute phase is not particularly important. What is important is the relative phase between two light waves. This is because when light waves are superimposed they interfere with one another and add either constructively or destructively depending on the relative phase. That is, when the waves are "in phase" they reinforce each other and create a greater amplitude and when they are completely "out of phase" the two waves cancel each other out. The patterns of light and dark which result from the adding of light waves are called interference patterns and are the basis on which laser eavesdropping devices work. A laser emits coherent light. Laser light is in phase. There is no destructive interference in the beam. Although laser beams can be collimated, the beam in a laser eavesdropping system is typically focused so that the beam has a diameter of about a foot when it hits the target window. The beam is reflected from the window and the individual light waves add at the receiver to create an interference pattern. The reason that an interference pattern exists is because as the beam diverges on the way to the window and back to the receiver, the light waves in different parts of the beam travel different distances. The round trip distance of a light wave at the edge of the beam from the laser to the window to the receiver could easily be several feet longer than the round trip distance of a light wave at the center of the beam. This means that the time it takes to reach the receiver collection optics is different for light waves in different parts of the laser beam. Since phase is time dependent, waves with different reflection paths may have different phases when they reach the receiver focusing optics and an interference pattern detectable by the receiver is created. The laser beam is focused on the window. Sounds are vibrations in the atmosphere. Sound vibrations in the room hit against the window and cause it to vibrate. As the window vibrates, the relative phase of the light waves being reflected change depending on the changes in the distance between the receiver and the individual reflecting element and the angle of reflecting surface. The result is a change in the interference pattern at the receiver which corresponds to the vibration of the reflecting surface. The detector converts these fluctuations in light intensity into voltage fluctuations which can be reconstituted as sound. Some points should be noted at this point. The vibration of the window required to affect the interference pattern at the receiver is small, less than half a wavelength. The wavelength l of the laser light used in laser eavesdropping systems is somewhere between 700 nanometers and 1550 nanometers. That means that part of the window surface need only move a little over a hundred thousandth of an inch to have a significant impact on the interference pattern at the receiver. How to Protect Yourself From Them The only way to protect yourself from a laser eavesdropper is to move the conversation which you wish to protect to an interior room. However, if you wish to use rooms with windows for meetings and normal conversations, you need to be able to detect the presence of the laser eavesdropping system laser beam. When eavesdroppers set up a laser eavesdropping system, they first mount the laser on a stabilized platform and aim it optically at the target window. At this point the beam is fairly wide. The receiver is then aimed at the window to intercept the reflected beam. After the receiver is centered on the reflected beam, the eavesdropper will then tighten the focus of the laser beam for optimum sensitivity. The initial laser beam will cover most of the window. The final beam will be about a foot in diameter and will be aimed at the center of the window formaximum sensitivity. Both beams are easily detectable by specialized laser detectors. Hope this helps... ************************************************************************** 6)From: "Ethan Miller" Subject: Radio Shack Anyone know how to build any bugs or listners out of any radio shack parts??? -Ethan ************************************************************************** 7)From: Joseph Chapuis Subject: The Right Direction? Can anyone point us in the right direction: We are in the process of entering into a business relationship with a certain individual. We are looking for a cost-effective way of finding out some basic information on him, to ensure that it matches the information he will be providing to us. Up to now, he has only given us his passport number, full name, and state of birth. We believe we know the month and year of his birth. Is it possible that we can obtain his SS#, driver's license number, and actual date of birth? If there's anyplace on the net to get an answer to this question, I know this is it! +++Moderator's Note+++ I think you're right Joe... PI's, let Joe know how... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two Issue #7 ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Intro - PI 02) PGP Question 03) Intro 04) Re: IR Sensitive Spray 05) Caller ID Australia? 06) Re: GPS 07) Re: The Best Bug Detector 08) Interesting Repost from "Cypherpunks" List 09) Professional Investigators List 10) Re: IR Sensitive Spray?/Intro 11) Re: High-tech tracking by police raises legal outcry 12) Subliminal Influence? 13) Moscow Microwaves 14) Need Help - Being Tapped 15) DataLink Effective? 16) Intro - Canada 17) Back Issues 18) Re: Radio Shack Parts ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: LEGAL6@aol.com Subject: Intro LOOKING FOR SOMEONE? WE LOCATE PEOPLE WHO DO NOT WANT TO BE FOUND >>>>>>>> NATIONWIDE <<<<<<<<<<< Private Detectives Specializing in : Locating Dead Beat Parents Obtain Current Addresses Obtain/Verify Social Security #s Background Investigations Identify & Verify Assets Dun & Bradstreet Reports Locate Missing Heirs Court Document Retrieval OSHA Violations Report Vehicle/Driver Records Bankruptcies/Liens Searches Business Credit Reports Locate Lost Apartment Tenants Process Service (Businesses Only) We also Specialize in Executing Small Claims Court Judgments LAW Investigative Service P.O. BOX 472 MT CLEMENS, MICHIGAN 48046 (810) 504-4861 ************************************************************************** 2)From: Leah Subject: post: PGP Question Cc: shamrock@netcom.com Hi, I read your post in the newsmailer I get from SpyKing... I have a question for you. I have had the full version of PGP for about two months now. I have generated a key, and even used another persons key to decrypt a test message, but I find that the whole process is bulky, frustrating and time consuming. Isn't there any way to make PGP easy and "automatic"? Leah Leah Wesolowski Private Investigator Adoption Search Specialist (leahwes@iquest.com) ACME Information 164 Manningham Drive Madison, AL. 35758 (205)464-0506 Office Hours 10:00 AM to 7:00 PM CST (205)464-0230 fax 24 hours a day, 7 days a week. Check out our web site: http://iquest.com/~leahwes/ ************************************************************************** 3)From: Ron Lander Subject: Intro My name is Ron Lander. I am a Security Consultant, author and lecturer on matters concerning security, workplace violence and the Internet. I am also a CPP and active in ASIS. I am a retired Sgt. from the Los Angeles County Sheriff's Dept-1971-1994. ************************************************************************** 4)From: "Matt" Subject: IR Sensitive Spray? >Any list members aware of manufacturer of IR sensitive paint or spray. I'm >looking for something similar to ultra violet spray which illuminates under >UV lite but will flouresce under IR light? Any ideas? Compound should be >invisible to naked eye... Contact a company call "SASO" they have the spray and UV light for just a few bucks. You can find these products through spy shops for a LOT more money. Try 800-555-1212 and ask for the number to SASO. Good Luck, Matt ************************************************************************** 5)From: Dave Mustoe Subject: Caller ID Australia? Could you please advise if there is any software that you can run on a computer (with a modem attached) that can identify the telephone number that is dialing my phone line that my modem is connected to? The reason I ask this, is because I keep getting nuisance calls, and I want to be able to see the persons number who is dialing me. I know in Canada you can use such "catching" equiptment but we do not have this here in Australia Please help, Dave ************************************************************************** 6)From: qzar@magicnet.net (megabyte) Subject: Re: GPS Trace wrote: >The skybased system will get you within a few blocks of your transmitter which >is good if you want to know if your Target is in San Antonio or Memphis, but if >your in downtown Dallas it's not worth a darn. I use a gps system in my car. it is based on the delome gps receiver unit and , talk about accurate. I travel around downtown orlando and this this is spot on accurate to within a few feet. I have been testing this unit for about 3 months now and it has not failed me yet. it may be correcting in the software, but if im between orange and pine st, my map will show exactly that. (The gps receiver unit only cost $199 and can plug directly into the serial port of a laptop) for more complete system installations check out my web site www.magicnet.net/~qzar Zac ************************************************************************** 7)From: "William H. Geiger III" Subject: Re: The best bug detector >6)From: Trace Carpenter >Subject: Re: The best bug detector >My tracking devices are in constant recieve mode. >They transmit nothing until my computer sends them a message saying >"Where are you?" The transmitter then sends may a very quick "Here I >am!" message and goes back to recieve mode. At that point I'm looking >at the vehicle on a map on my laptop, and the transmitter is no longer >sending out a signal for you to detect. Shouldn't a good sweeper be able to pick up the low level RF from the oscilator even in receive mode? Thanks, ----------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting WebExplorer & Java Enhanced!!! Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice Finger whgiii@amaranth.com for PGP Key and other info ----------------------------------------------------------- +++Moderator's Note+++ You would see this with a spectrum analyzer during tx stage. P.S. Trace, What freq does the burst occur on? ************************************************************************** 8)From: SpyKing@thecodex.com Subject: Repost from Cypherpunks List >>From The Orange County Register, Front Page, Sunday 1-5-97 > >Police across the country secretly tail hundres of people each year by attaching high-tech transmitters to suspects' cars and tracking them on squadroom computer screens. > >Detectives, federal agents and prosecutors routinely conceal use of the technology from defendants, their lawyers and the public, an investigation by The Orange County Register has found. Autorities in Orange County often plant the devices on cars without getting a warrant from a judge. > >The technology, marketed by a company called Teletrac, is simple: A transmitter sends a radio signal to a computer, which pinpoints the car's street location. Police with the proper software can follow a transmitter-equipped vehicle in real time as it moves across a street map on a computer screen. > "Is there any expectation of privacy on the whereabouts of a car on a public street? I suggest there isn't," said [Jeffrey] Ferguson, president of the county's narcotics officer's association. "I've told them they don't need a warrant unless they intend to enter a car." > The system automatically records the time, date, location and duration of the car's stops. The system could tell police, for example, that the suspect's car stopped on Main Street between 4th and 5th street for about an hour on Jan. 5. The records help police focus their investigation on places the suspects visits. > Obviously, several list members were wrong. Travel GAK is not coming; It is already here. +++Moderator's Note+++ The narc quoted as saying no warrant is necessary is absolutely wrong. Tracking devices ARE Title III and as such require a warrant. ************************************************************************** 9)From: SpyKing@thecodex.com Subject: Professional Investigators List I've taken the liberty of posting this information because I know there are many PI's on this list and those interested in that field who might be interested in a forum dedicated to investigations... (we are a LITTLE different ) The Pro-Investigators list is run by Phil Agrue PI and as such is first rate... I find it very informative... and it lacks the "self-touting" and nit-picking you'll find on other investigative lists and alt.PI ... >Professional Investigators Mail List: >Thank you for your interest in the Professional Investigators Mail List. This list is a moderated e-mail forum for the intelligent and thought provoking >discussion of issues related to Investigation. Whether your a PI, work in the >SIU department of a major corporation, or are just interested in the >Investigation Business, you will find intelligent conversations covering the in >and outs of investigation as well as opinion on legislation, and other societal >events that effect the investigation industry. > >This list is moderated and therefore, there are a few rules to adhere to if you >want your messages posted to the group at large. This is not because the list >owners enjoy editing. We do this to make the list informative and not a waste >of your time. The moderation is not heavy-handed and there are only a few >rules that need to be followed: > >I.No Flames. If you disagree with an opinion or message that's fine. But > an obvious bashing of someone will result in the message being returned > to the sender. >II.No Chest Thumping. This is not because we don't want you to > succeed. We do, we just feel that chest thumping belongs on your web > pages or via private e-mail. Your signature/tag lines are OK as long as > they aren't 50% of your message. >III.Responding to Request's For Help. We encourage members to > seek help on cases in other areas of the world. By this we mean, > looking for an investigator to perform some research for you. However, > to help keep noise to a minimum, please, if you r replying to these > requests for help do so privatley. > >These are the only rules, if you keep within these guidelines you will never >receive your post back from the list owners. > >E-Mail to the list will be distributed once a day in the evenings to begin. After the list picks up, mail may be distributed more often. > >If this list sounds like what you've been looking for, send e-mail to >majordomo@teleport.com in the body of the message put: >subscribe proinv-l your email address > >Thats an "L" not a "one". ************************************************************************* 10)From: fthome@amug.org (Shadow Runner) Subject: IR Sensitive Spray?/Intro >Any list members aware of manufacturer of IR sensitive paint or spray. I'm >looking for something similar to ultra violet spray which illuminates under >UV lite but will fluoresce under IR light? Any ideas? Compound should be >invisible to naked eye... Yes there is, I saw one in germany a while back, it came in a spray can like the kind mace comes in (Ask P.O officers where they get theirs). It was fairly expensive. Now, there is a simpler way to doing this. You can make a substance that sticks, and mix in a certain kind of chemical to make it be able to be picked up by UV/IR lights. I have the list of materials around here somewhere. You will probably need some chemistry knowledge. While I'm at it, I will write a quick intro. I'm 16, and am interested in computer security, radio, cellular technology, programing, cryptology. I am very new to surveilance (I'm amazed though how much I have learned from this list though). I plan to major in computer sciences and engineering, and Artifical Intelligence. That's about it. Laters. +++Moderator's Note+++ We're NOT looking for UV sensitive spray/paint we're looking for something that will fluoresce ONLY when veiwed thru IR sensitive CCTV or Night Scope... UV spray sold for theft detection kits is not satisfactory for our purposes... we want something similiar to firefly device... more in the IR range but a spray-on solution... We want something off the shelf if possible... IN BULK... ************************************************************************** 11)From: azur@netcom.com (Steve Schear) Subject: Re: High-tech tracking by police raises legal outcry >>From The Orange County Register, Front Page, Sunday 1-5-97 > >Police across the country secretly tail hundres of people each year by >attaching high-tech transmitters to suspects' cars and tracking them on squadroom computer screens. > [snip] > >The technology, marketed by a company called Teletrac, is simple: A >tramsmitter sends a radio signal to a computer, which pinpoints the car's street location. Police with the proper software can follow a transimitter-equipped vehicle in real time as it moves across a >street map on a computer screen. I'm quite familiar with Teletrac's technology. It consist of a receiver, very similar to a pager, tuned to about 930 MHz and a transmitter (up to a 50 Watt peak power) operating in the unlicensed 902-928 MHz band using direct sequence spread spectrum coding. The service acts by sending out 'ping' messages to mobile devices on the pager channel and triangulating for the their return pulses via a rather dense chain of stations in each city/area covered. This is very similar to how aircraft transponders work. There are at least three straightforward countermeasures to Teletrac. First, look under your car. Teletrac requires a relatively good antenna placement. The box should be visible. Second, a sweep by any professional surveillance service will surely find it. Third, any competent RF person (e.g, an amateur radio operator) can retune any number of narrow band 900 MHz RF comsumer electronic devices (e.g, cordless phone) to jam the Teletrac paging receiver and disable all such devices in your proximity. Please note this is not legal, but your unlikely to get caught. PGP Fingerprint: FE 90 1A 95 9D EA 8D 61 81 2E CC A9 A4 4A FB A9 --------------------------------------------------------------------- Steve Schear | Internet: azur@netcom.com Lamarr Labs | Voice: 1-702-658-2654 7075 West Gowan Road | Fax: 1-702-658-2673 Suite 2148 | Las Vegas, NV 89129 | --------------------------------------------------------------------- Internet and Wireless Development 1935 will go down in history! For the first time a civilized nation has full gun registration! Our streets will be safer, our police more efficient, and the world will follow our lead in the future! --Adolf Hitler ************************************************************************** 12)From: Filmgroup1@aol.com Subject: Social Engineering/Subliminal Influence This is my second post to the only group on the net worth posting to. Anyway, here's the big one folks... Who can tell me how one might go about constructing and executing a campaign to subliminally influence a person? Let's say for argument's sake you've been dumped, your relationship's down the sewer but you're not quite ready to lie down and accept that. I'm currently polishing a screenplay on this subject matter and need some expert feedback pronto - preferably local to production office located in Sydney, Australia. Please respond by email only. Thanks people, Daniel (filmgroup1@aol.com) +++Moderator's Note+++ I'd immediately check out alt.conspiracy and alt.mindcontrol. Lot's of mind control theory and info. Some of it is real... some not so real... ************************************************************************** 13)From: Jim Ray Subject: Moscow microwaves I had heard that they were used to charge batteries & power devices remotely. JMR Regards, Jim Ray DNRC Minister of Encryption Advocacy "In local news, the city of Miami discovered that it was $68 million short and was forced to seriously consider cutting back such municipal operations as the City Hall Drive-Thru Bribe Window." -- Dave Barry, 12/29/96 PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5 57 52 64 0E DA BA 2C 71 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEPAwUBMtD5zjUhsGSn1j2pAQHHmAfOJeYGeoqEOxw1zIIZcguOQXVYSvhwkrcA x9TfAwpc2baWOWXuNSGNncbnErlAJifO9C/vpWxo0qGx78lk87/LQ+Rq3kj5iur8 eW/FW3J7T2rg5n76oAakSogxziA9BGVlCAyKDUdFrZxWVrt9snkm4fk8qrjrKouT emkbsanaypW9SMKkpOP/YbNE7Itcgh0Uf+sp+g41z1Xxo0sDoDOiDzBfMcwKaA+H GWm8ps7/iCQ6z309nUNCizUu4szD5Y9VCeALk0bV+W8QlmJkal55z2ISs7D/vaF7 H5msntCF9IvUkQ1GsSOcEtoZdlnxfNRVI4EgM+n3zjznAQ== =xqpz -----END PGP SIGNATURE----- ************************************************************************** 14)From: DISCHOFF@aol.com Subject: Need Help - Being Tapped I can lurk no longer! I need help! I have been embroiled in quite a dangerous situation for some time now and have sought assistance to no avail. I will omit the details but ask the following: My telephone lines (2 of them) have been bugged for some time. There is no doubt of this and I am not crazy. I initially contacted the local police who said they could do nothing (even though the person doing the tapping is known to have done this previously to members of the force). The police referred me to the phone company (summer 1995). The phone company sent a line person to check the main NID. My line apparantly reads off of many others. The line person could find nothing. I changed the phone numbers. Tapping continued and continues now. I must do something. What equipment can be purchased to detect and show proof! The people that are doing this live next door. We are already in court as they have sued me and are attempting to garner my property as their own. It is a long and very bizzaar story. I digress...What do I do? They also have stolen my mail (I moved my mailbox). They have gone through my garbage (I now shread everything)! This is like the TWILIGHT ZONE! Any thoughts? Diane Schoff ************************************************************************** 15)From: kevina@citynet.net Subject: Effective? hello, i am going to subscribe to us data link out of texas, does anyone know how effective they are?? thanks.. kevin ************************************************************************** 16)From: "C. Kuethe" Subject: Intro I'm a computer / electrical engineering student at the Univeristy of Alberta, in Canada. I muck about w/ electronics and computers for fun. I want to learn everything there is to know about security hardware (where have we heard that before) Crypto, etc. is kind of a pet hobby for me. Please excuse my lurking in advance. I "lurk" because I do not generate spam. 30 seconds of thought usually solves my problem, so I can refrain from asking annoying questions. -- Chris Kuethe LPGV Electronics and Controls http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 CC: JPC@TradeBrokers.com Subject: Response to The Right Direction Regarding Bugs from Rad Shack Parts: Sure, just depends on what your trying to do. In fact you can modify a few of their existing products which works well. If you just need to monitor a room with a wireless try taking their 170Mhz wireless microphone and hook it to 12 volts of power instead of the standard 9V battery. The small amount of extra power makes a BIG difference. Good Luck Trace Carpenter Tech @ Large ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two Issue #8 ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Satellite Based GPS Tracking System 02) The Best Surveillance Recorders? 03) Re: Laser Article 04) Re: Caller ID Software 05) Scanner Mods 06) Spy article - Long 07) Gripe! 08) An OLD TEMPEST Article 09) PI's In MA Beware! 10) Re: Bugs from Radio Shack Parts ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Trace Carpenter Subject: Satellite Based GPS Tracking System Since there was such an interest in the tracking system I was using I told everyone I'd post a number where you could get info on the satellite based system. I'm using a tower based system for several reasons, but know that many of you aren't in an area with ground based coverage. So for those of you who can't use Teletrac contact: Rick Simons Trimble Navigation LTD. Sunnyvale, CA 408.481.2954 He should be able to help. Good Luck! Trace Carpenter, P.I. Tech @ Large ************************************************************************** 2)From SpyKing@thecodex.com Subject: The Best Surveillance Recorders? Anyone out there have any opinions on tape recorders for surveillance purposes? I personally like the Panasonic RN-36 as a body worn system (although I use my own FET mike) and the Marantz PD-221 for recording telephone and/or body wires. I've tried just about everything including the LE version Nagra and Uher but find these two recorders to be the best for the money... any other opinions? ************************************************************************** 3)From: Trace Carpenter Subject: Laser Article The recent article on Laser Listening Devices was GREAT! Thanks Trace Carpenter ************************************************************************** 4)From: fthome@amug.org (Shadow Runner) Subject: Re: Caller ID Software >5)From: Dave Mustoe >Subject: Caller ID Australia? > >Could you please advise if there is any software that you can run on a >computer (with a modem attached) that can identify the telephone number >that is dialing my phone line that my modem is connected to? >The reason I ask this, is because I keep getting nuisance calls, and I >want to be able to see the persons number who is dialing me. >I know in Canada you can use such "catching" equiptment but we do not >have this here in Australia >Please help, > >Dave I don't know what Platform you are using. I can tell you that there is a program for the Mac that is called "phone watcher". I have used it a couple of times. This will not trace the call but show you the number calling. However, it will only display it, IF the number that is calling you is unblocked. I don't know if you have the *xx codes like we have. I suggest you contact your local Phone Provider about this, they should be able to help you in one way or another. Shadow Runner ************************************************************************** 5)From: SpyKing@thecodex.com Subject: Scanner Mods This page provides information on modifying Radio Shack scanners that are cellular blocked to enable them to scan and listen to cellular telephone calls... Checkout: http://w5gb.nmsu.edu/kc5kto/mods.html ************************************************************************** 6)From: SpyKing@thecodex.com Subject: Spy Article Foreign spies snoop the Net, from The Netly News The Netly News http://netlynews.com/ SPY VS. SPY January 6, 1997 By Declan McCullagh (declan@well.com) Move over, James Bond. Take your last bow, Maxwell Smart. Modern spies are jacked into the Net, a recent report from the multiagency National Counterintelligence Center says. It claims the Internet is now the "fastest growing" means for foreign governments and firms to gather information about U.S. businesses. The eight-page quarterly report says that malevolent "foreign entities" are sorting through web sites, pounding on search engines and firing off e-mail queries to U.S. defense contractors in hopes of winnowing out sensitive data. "Use of the Internet offers a variety of advantages to a foreign collector. It is simple, low cost, non-threatening and relatively 'risk free' for the foreign entity attempting to collect classified, proprietary, or sensitive information... We also know foreign intelligence and security services monitor the Internet," says the report, which is distributed to government agencies and contractors. Search engines apparently serve spies well. Want a copy of something you shouldn't be able to get? Perhaps it was left in an unprotected directory; try Altavista. "Foreign intelligence services are known to use computers to conduct rudimentary on-line searches for information, including visits to governments and defense contractors' on-line bulletin boards or web sites on the Internet. Access to Internet advanced search software programs could possibly assist them in meeting their collection requirements," the NACIC briefing paper says. Beware of spam from spies, it warns: "These foreign entities can remain safe within their borders while sending hundreds of pleas and requests for assistance to targeted US companies and their employees." Of course! This is any e-mail spammer's modus operandi: Flood an astronomical number of addresses at an infinitesimal cost. Then hope that at least some recipients will respond with the information you want. This isn't the first time that the Clinton administration has painted economic espionage as a dire threat. Last February, FBI director Louis Freeh warned the Senate Select Committee on Intelligence of the possible harm. He said foreign governments are especially interested in "economic information, especially pre-publication data" including "U.S. tax and monetary policies; foreign aid programs and export credits; technology transfer and munitions control regulations... and proposed legislation affecting the profitability of foreign firms acting in the United States." Note to Freeh: That information already is online. For proposed legislation, try Thomas -- or for munition regulations, the White House web site is a good bet. But forget Freeh's rhetoric. The White House isn't serious about halting the overseas flow of American secrets over the Net. If it were, President Clinton would lift the crypto export embargo. Strong encryption is the most effective way for companies to fend off foreign data-pirates, but current regulations allow U.S. multinational firms to use only the cipher-equivalent of a toy cap gun. Worse yet, last week the Commerce Department moved further in the wrong direction by releasing its new encryption export regulations that continue to keep American businesses at a competitive disadvantage compared to their foreign competitors, which generally are less hampered by crypto export rules. "The new regulations are worse" than the old, says Dave Banisar, a policy analyst at the Electronic Privacy Information Center. Sure, France and Britain spy on us for economic purposes. But we're just as guilty. We snooped on the French -- and got several U.S. "diplomats" kicked out of France two years ago. We peeked at Japanese secrets during automobile trade negotiations -- and got caught then, too. Especially under President Clinton, economic intelligence has become part of the mission of our spy agencies. Yet if we complain about other countries while doing it ourselves, we become hypocrites. Stanley Kober, a research fellow at the Cato Institute, argues in a recent paper that it's "folly" for the U.S. to continue such spying and risk alienating political allies: "The world is still a dangerous place, and it would be folly for the democracies to engage in nasty intramural squabbles. Yet that is the danger that economic espionage against other free societies poses." "Washington ought to consider that it may need the cooperation of Paris (or other Western capitals) to help deal with a mutual security threat" from terrorism, Kober writes. I asked Kober what he thought of the NACIC report. "It strikes me as a normal security reminder," he says. "The specifics are fairly slim. It's not the sort of thing that's sent to everyone. It's sent to their clients, the people who have government contracts. Since the Internet is new, they're telling people to be careful." Indeed, netizens must be careful. It's common sense, really, and defensive driving for the Net. Encrypt that e-mail. Use the anonymizer at least once a day. Let paranoia be your watchword. That e-mail from your mother may come from the KGB. When you're not watching it, your monitor may be watching you. Be afraid, Maxwell Smart. Your shoe phone may be listening back. ************************************************************************** 7)From: ILQQK4DOE@aol.com Subject: Gripe! Re: LAW Investigative Service I do not understand something here, please help! I was under the impression that this web was for Investigative professionals or people interested in that line of topic. I am beginning to see more and more of what looks like long draw out advertisments in the way of opening statements. Bear in mind that I am not complaining (since most of us are investigators and would have no need to toot horns here) but hey, I think I missed the boat and I should call my ad manager before I post my next message (I'm jealous) but if I wanted comercials AOL provides enough. Guys lets talk business, we all do the same thing, calm down please. Jerry +++Moderator's Note+++ I tend to agree with Jerry but WE DID ask for introductions from list members and info on their new products, services, etc. I have not censored, edited or refused anything sent except one 105K file. I listed the URL instead so you could go there and read it yourself... I didn't want to piss off the list sending a file that large... Let's try to keep the self-promotion down to a minimum. OK? If you've got a great product or service how about directing the list members to your web site with a URL. Most of us on the list have pretty good investigative skills and intuition. We're also nosey by nature... We'll find it... Let's keep this to tech talk and the like... If you want... send me a bio on you and/or your company, products, services, etc and I'll create a master directory file that I'll send to the list members once a month or so. That way everyone knows who's out there and it keeps the list targeted toward tech talk... SpyKing ************************************************************************** 8)From: SpyKing@thecodex.com Subject: An OLD TEMPEST Article I found this a while ago and thought some might find it interesting... THE TEMPEST METHOD OF COMPUTER DATA INTERCEPTION! by Al Muick for P-80 Systems Let me begin by a brief history of myself. I spent the better part of six years in Uncle Sam's Country Club (better known as the US Army) working in the Intelligence and Security Command (better known as the ASA--Army Security Agency). During that time, my primary duties were Cryptology, Cryptologic Intercept, Counterintelligence, and Field First Sergeant (whatta drag!). What I'm about to tell you comes under the heading of Cryptologic Intercept. Incidently, for those of you in the know, I was stationed at Field Station Augsburg in West Germany (if you're not in the know, read the book, THE PUZZLE PALACE). The interception of radiated data from computers and computer terminals is known in the world of the ASA as "TEMPEST." TEMPEST intercept may be accomplished in several ways. One, is via a mobile van with the commo equipment on board, two is via strategicly stationed intercept sites (Field Station Augsburg) and the third, rarely used, is relay from one site to another. To run a TEMPEST operation, you will need a good communications receiver, both high frequency and very high frequency with adjustable bandwidths and a VFO. If you plan to just intercept and leave the exploitation of the collected intelligence for later, you will need a HIGH-QUALITY tape deck; not one of those cheap-assed portables, but a high quality deck. If you plan to do the exploitation now or later, you will still need to convert the IF of your communications receiver to a recordable frequency. To do this, simply patch the output of your 1 MHz or below IF to the input plug on your tape deck. If your IF is something above 1 MHz you're S.O.L unless you have an IF downconverter around or have the ability to construct one. You will, in effect, be recording an RF frequency on your tape deck, vice an audio frequency. Your tape deck MUST run at either 7 1/2 or 15 i.p.s in order for it to record this signal. You will later play that signal back into your IF for exploitation. As soon as you have your intercept station (it is best to use a van) set up with receiver, antenna, and recorder, you are ready to engage your intercept target. Most computers are RF shielded these days, so your receiver had better be damn sensitive and have a very selective bandwidth. If you are planning to intercept such a computer, you will need to be outside its building location (if possible). Since we know, most microprocessors operate at frequencies between 2-12 MHz, we will look for the radiated data here in that frequency range. It is here that a spectrum analyzer, connected to your IF output will aid in discerning the signals and binary emissions of your target computer. If you know how to use a spectrum analyzer, it will prove invaluable, but since they are so complicated, I will not attempt to explain their proper use here. You will simply scan the bands between 2-12 MHz until you find the radiated signal (if you must, go for the 2nd, 3rd, 4th, etc. harmonics if local interference on the primary frequency is too high) and then tune to the spot where it comes in best. Next adjust your bandwidth until you can just hear the signal as pure as day, with very little to no outside interference. Once you have your target tuned in, you may want to drive around the block or further away, to avoid detection. Remember, not to go too far or you will lose the signal. Mainframe computers (when unprotected) sometimes radiate a signal for 3 to four miles! A typical PC computer will radiate a signal for at least 1/2 mile if unprotected! You should, by now, have picked your intercept site, have parked the van, and have made sure that you still have your signal coming in at good strength. The next step is easy! Simply connect the output of your low frequency IF to the input of your deck and let 'er rip! I find that 10" reels suit this purpose just fine, and you should be able to get at least one or two UIDs or PWs in the amount of time you will have at 7 1/2 or 15 i.p.s. After the tape is done (you may want to record both sides) pack up your gear and head for home! Once home, you will need another piece of equipment, possibly two. In various surplus magazines, you will see a machine called a "visi-corder" advertised. This is a machine that burns a copy of binary code onto light-sensitive paper. They cost some money, but are basically invaluable. You are now ready for signal exploitation. You now need to play your recorded tape into the IF input of your communications receiver. The output of your IF will be connected to the IF input on the visi-corder. This will give your the truest binary representation on the paper. If you so desire, you may connect the audio out of your communications receiver to the audio input of the visi-corder. The audio is rectified into DC and then you get a crisp, clear presentation on the paper. But remember this....DC LIES!!! While the representation may be clear, the binary spacing will be off slightly, increasing in error as you continue, until you finally wind up with continuous error. Assuming you have made the proper connections, get some beer for your relaxation (or them funny l'il pills, or whatever makes you relax....here comes the hair-pulling part). Begin playback of the deck into your receiver and initiate the visi-corder's print mode. I recommend a medium-fast speed, because if you use slow speed to conserve paper (you cheap fucker!), the bauds will be so close together as to render the paper useless and wou wind up wasting the paper anyway! At this point, print out about 2 minutes worth of paper. Once the paper is printed, expose it to light so it develops and have several 3x5" cards handy. As soon as it develops, scan the paper and the binary stream on it for a section that has three or four of the smallest (closest together) bits. This is ASCII. Once you have found the section, place one 3x5" card at the base of the section and mark off tick marks where each bit stops and ends (on the smallest bits only!!). You are now ready to do what we in the ASA call "bustin' bauds." As you know, one ASCII byte consists of 8 bits. simply start at a reasonable point at the beginning of your interception and begin to mark off tick marks along the binary stream. Even if you come across 1s and 0s that are very wide, mark as many thin ticks from your 3x5" card on them. This is necessary to break the ASCII code. The complete 8 bit ASCII code is at the end of this tutorial for your convenience. < Moderator Snipped It. I'll send privately if you like> Once you have marked off the paper, count off the first eight bits, e.g. 10011101 and refer to the ASCII chart to find a character that fits it. If you can't find one immediately, don't despair! Try using the complement of the 8-bit code in front of you (i.e. the reverse of what you've decoded. Instead of 10011101, try 01100010.). If you still have not found anything, slide your card over one bit and try to get another byte of ASCII. This time you may come up with 00111010 (complement 11000101). Check it with the table. Remember, you may have to do this eight times (that is, shift a bit over eight times) before you make any sense out of it. It is long and tedious, but it will pay off in the end. Note: this is illegal and is punishable under federal law. I assume no responsibility for your actions, and neither does the operator of P-80. This is presented for your information only. If you have any questions, please leave me mail!......happy hacking!....Al Muick. ASA LIVES FOREVER!! ************************************************************************** 9)From: ILQQK4DOE@aol.com Subject: PI's In MA Beware! I have received several inquiries in the last few days that I would like to title as "Welcome to Massachusetts". These are semi substantiated horror stories so take them for what they are worth. A young PI in planting a "Bumper Beeper" on the subjects vehicle and is spotted by the nieghborhood snoop. She calls 911 and says " someone is placing a bomb under my nieghbors car". After the local PD and the Bomb Squad arrive and being caught in the act the poor upstart PI is sentenced to 2 1/2 years county and $10,000 fine. One technology wise PI student begins a surviellance of a subject and employs a cellphone decoder and a shot gun microphone. One day while he is using his equipment he is stumbled on by an off duty PO Since he is a young student of the art his court sentence is only a $100.00 fine. Addendum: a hundred dollar fine in MA precludes you from obtaining a PI license in MA. forever Career over. Moral of the story: 1) Know the laws of each state you work in 2) Keep yourself up-dated on the laws of the states you work in. 3) Follow your instincts. (If it feels wrong; it is.) 4) All the toys and gadgets in the world can not replace hard work, dedication, and devotion . Also: Be advised that there is a new law signed into effect by our faerless leader and his friends. Anyone who has ever been convicted of spousal abuse or domestic violence (even a $10. fine, as was standard in the 70's for breach of the peace) will immediately have their pistol permits, and their FID cards revoked for life. This means you can not possess Mace or bullets let alone a firearm for the rest of your life and it does not matter if you are guilty or not. If you paid the fine you are doomed. The MCPOA estimated tha 25K police officers will be out of their jobs and (I believe) no-one knows how many military are now un-hireable due to this abusive nonsense. There is no grand father clause to this and it begins the day you were born. PS We are not trying to control society, this is for your own good! ************************************************************************** 10)From: stanl@primenet.com (Steemer) Subject: Re: Bugs from Radio Shack parts One thing that I think works VERY well is a wireless microphone. RS sells a nice one for about $70 that transmitts in the normal wireless mike range (you can select which freq your on). With a scanner, this is a perfect bug. It runs on a 9 volt battery for about 8 hours. I have tested mine, and in open range, I can go(no joke) more then a block away with a small antenna on the scanner. I'm sure it would go much further with a good full length mobile antenna. Another good thing about this mike is that it is very sensitive to audio. I can clip that mike at my waist under my shirt and everything in the room can be heard. Stan +++Moderator's Note+++ Many novices use wireless microphone systems designed for use with video camcorders. Most of these systems operate in the 170.Mhz range.. and are decent and inexpensive... they also can be modified easily to draw power from AC to use as a fixed room bug... ************************************************************************* Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two Issue #9 ****************************************************************************** Vol Two Issue #9 The Surveillance List Jan 07, 1997 ****************************************************************************** IN THIS ISSUE... 01) Intro - UK 02) Re: PGP Question 03) Re: High Tech Tracking by Police 04) Re: US DataLink 05) Re: Need Help - Being Tapped 06) Re: PGP Question 07) Re: Contact Microphones 08) Intro - Sweden 09) Intro - PI 10) Czech Night Vision Site 11) Audio Filter for Enhancement 12) Re: Caller ID in Australia 13) Re: Need Help - Being Tapped 14) Re: The Best Bug Detector 15) Re: High Tech Tracking 16) Re: Social Engineering/Subliminal Influence 17) Re: Being Tapped 18) Re: Laser Article 19) Surveillance in Jamacia ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Alan Walker Subject: Intro I am currently working on the design and implementation of computer systems for the Ministry of Defence, mostly NT based although we still have some UNIX boxes. Security is an important issue and I would be grateful if I could be added to your discussion group list. Alan Walker ************************************************************************** 2)From: alpha1@pobox.com Subject: Re: PGP Question -----BEGIN PGP SIGNED MESSAGE----- If you're running Windows, our PGPn123 will make most PGP functions a click away. It lives as a toolbar connected to your email application or in stand- alone mode working off the clipboard. For more information or a working trial copy (shareware $15 US): http://www.pobox.com/~alpha1/epgpn123.htm Lynn Bradshaw Alpha1 Enterprises -----BEGIN PGP SIGNATURE----- Version: 2.6.3a for Windows Charset: alt_codes iQCVAwUBMtGoyUDlIgTrKJhRAQELWAQAk8764KCNeBUnlR5DYhdEaZnjngwT41A/ 21MLOV6hrVe9s15l766a+gev6lBQ9uvynIAq0/6tQiB1aMaGSB0+u2y07N+j+eOC pIWkg5jFLJJ1gjWk10bBDoW0l8n+l66LuJv6cwuVDgFQuD7PmsytX2deCd0lwWQH UKrHQi3cfmw= =pdYC -----END PGP SIGNATURE----- ************************************************************************** 3)From: jim bell Subject: Re: High-tech tracking by police raises legal outcry >> The technology, marketed by a company called Teletrac, is simple: >> A tramsmitter sends a radio signal to a computer ... > >Anybody know the frequencies used? > >(Anybody willing to guess whether the FCC might quietly introduce >prohibitions against scanners that can receive those frequencies?) > >(Gee, that looks paranoid.) This wouldn't do a great deal of good. The systems were already described as frequency-hopping. The hops are probably fast enough to outwit a scanner's receiver. However, it turns out that there is a comparatively simple way to detect such transmitters: An old-fashioned diode detector using modern components. Take a loop of wire (about a foot in diameter), add a microwave-capable signal diode to rectify the signal and send it to a small capacitor and then go to a DVM. (digital voltmeter.) (Sensitivity can be dramatically increased by also inserting a blocking capacitor in the loop and adding enough DC voltage to barely forward-bias the diode.) A momentary (or continuous) increase in output voltage indicates that the diode is rectifying AC, which indicates a transmitter. Buffering the DC-level signal and sending it to a set of earphones will indicate a pulsed transmitter. Interestingly, this is probably more or less the circuit that was originally used in 1970's Fuzzbuster-type radar receivers before the heterodyne systems were developed. The "disadvantages" of that circuit, in microwave-radar detection, are either not disadvantages or are in fact advantages in hidden-transmitter hunting. The first "disadvantage" was that this receiver was EXTREMELY broadband, practically "DC-to-daylight," or at least up to the rectification capability of the diode chosen. (I've implemented systems that will do 20 gigahertz easy, and I was using old diodes!) False triggers were a common result, due to hard-to-avoid rectification of CB and ham radio transmissions for example. In the case of transmitter hunting, that disadvantage is a solid advantage, because you don't need to know what frequency the transmitter is at. The second disadvantage, comparatively low sensitivity, was a problem if you're trying to detect a 100 milliwatt radar transmitter 300 meters away, but if you know you only have to search a car from a meter away, the inverse-square law indicates that you're going to see a signal with around 100,000 times the power level all other things being equal. Jim Bell jimbell@pacifier.com ************************************************************************** 4)From: caldwell Subject: Re: U.S. DataLink. Granted, I have not used USDL since about 1990, but at the time I found them to be one of the most expensive in the country, particularly on their sign-up fees. If you spend some time investigating (it's what we do, isn't it?), you will eventually find those providers that USDL subscribes to and can, therefore, circumvent many middle-man charges. Think of it as a food chain of information - many others do. GC ************************************************************************** 5)From: HtPursuit@aol.com Subject: Re: Need Help-Being Tapped There are a few things you can do, but also a few ways to explain your problem too. There are alot of people out there that enjoy playing games and harassing others. But on the other hand, there are some who have the feeling that there being harassed but are not. If the police are helping, fine, just advise them what is going, when, where, who and most of all, present them with witnesses who are credible. You must be sure of certain facts before you accuse someone or sign a complaint, if you can't prove up your claims, you don't need to be sued for false allegations. If the police are not finding enough evidence to support your claims, then you would be best to hire a good reputable and licesned Private Investigator. This P.I. can be a non biased party, and put together a case for you to present to the police. Also they should be able to check for any intrusion on your phone lines if any. I've been involved in a few of these types of case in both the public and private sector and have found many that are legit are never proved for criminal or civil complaints because they lack evidence. ************************************************************************** 6)From: ratak (Jason E.J. Manaigre) Subject: PGP FrontEnds Question The best way would be to use front ends to make things easier, most are for windows, but there are many for OS/2 and other platforms as well... There are some on my Web Page, as well you might want to try http://www.aegisrc.com/ for Windows 16 and 32 only. They have a damn nice Front end that works with all mail programs... Most of these rely on the clipboard monitor feature, you can get tighter integration by using dedicated front ends for mailers like Pegasus and Eudora for example. You can also switch mailers for ProntoSecure (Solves the problem entirely...) There URL is : http://www.commtouch.com It's only available in 16 bit as of yet, 32 bit is in the works and for Windows only. Quite a nice program, Jim Ray can attest to that... ___________________________________________________________________ GarGoyle Securities -Intrusion Assessment Systems -Security Consultation/Education/Curriculum Development -Project Management/Research/Analysis World Wide... -Member of CITDC (Canadian International Trade Development Council) -Email: ratak@GargSec.mb.ca (Jason E.J. Manaigre) -Web: www.GargSec.mb.ca -Email for PGP key with phrase 'Get Public Key' as Subject ___________________________________________________________________ ************************************************************************** 7)From: "Walstrom, Bradley" Subject: RE: Contact Microphones I have tried transducers from the music store with little success. What has worked surprisingly well from Radio Shack is a piezo speaker element part number 273-091 current price 2.49 used with a high gain audio amp like the Kaiser 1059. Or if money is no object Martin Kaiser sells a contact transducer last price list I have shows its price at 81.00. Brad Walstrom KG Detex ************************************************************************** 8)From: ljsaisa@algonet.se Subject: Intro - Sweden As an representative of the I.S.A. and new to this list, I would like to present our organisation in a brief: I.S.A. was started in -93 by X-military intelligence officers. Our HQ is stationed in Sweden, but we operate world wide by a security network. Our speciality is multinational operations. International Security Agency offer supplementary security solutions to our clients through our professional world wide security network. Not all breaches of security can be addressed with the solutions described below. A brief selection of optional services which we also provide will be found on our website. For further information, please contact us with your requirements. Here is a brief selection of our "civilian" services: * Data Encryption. * Electronical Intelligence. * Room and Telephone Monitors: Detection and Classification. * Alarm Systems. * C.C.T.V. * Ground Radar * Voice and Fax Scrambling. * Passage Controll Systems. * Perimiter Security. * Bullet Proof Vehicles. * Vetting of Staff. * Risk Analysis. * Security Butlers. * Close Protection. * Covert Surveillance. * Countermeasures to Surveillance. * Escort Service. * Security Chauffeurs. * Curiers. * Advance Reccies. * Mine and Bomb Disposal. * Hostage Rescue. - - end of list - - INTERNATIONAL SECURITY AGENCY Website : http://www.algonet.se/~ljsaisa E-mail : ljsaisa@algonet.se Tel : Int+46 (0)8-645 22 82 (08.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24 h/day) Post : Po.box 167, S-162 12 Stockholm, SWEDEN ************************************************************************** 9)From: Timberwolf Subject: Intro Thomas Tudor Timberwolf Private Investigaions OK License No: 95UPI 21021 As a P.I., I mainly do locates. I have a full-time job. Investigating is more of a hobby. I am very intrested in personal privacy (and how to keep it), government abuse, and the N.W.O. Thank you, Tom Tudor ************************************************************************** 10)From: Alexander PISARENKO Subject: New Night Vision Site "Dedal" Dear sirs! We invite you to visit our new web site www.dedal.cz dedicated to the night vision devices "Dedal" Gen II+, Gen II, Gen I+, Gen I. We offer wide range of quality night vision devices and special systems with 1 year warranty. On our site you will find products catalogue with full technical specifications list, price list, devices and accessories images. Thank you very much Stanislav Dvoychenko Czech Republic E-mail: KALIMEX@dracula.sh.cvut.cz Tel.: +42-602-304800 Fax: +42-2-887270 WWW: http://www.dedal.cz +++Moderator's Note+++ In the future let's try to keep product & services announcements similiar to the above format. It saves space and is to the point... anyone else out there? ************************************************************************** 11)From: "Walstrom, Bradley" Subject: Audio Filter I am the tech for a PI firm and have been looking for a band pass circuit for audio recording that would only pass the voice band ( 300 - 3000 HZ). Is anyone using something like this? Is it practical? By cutting out the highs and lows does it improve the recorded intelligence? If anyone has had any experience I would like some feedback and any schematic or commercial source information. Thank You Brad Walstrom KG Detex ************************************************************************** 12)From: Trace Carpenter Subject: Re: Caller I.D. in Australia I don't know if I understood your request. If you DO actually have Caller I.D. in Australia there are several modems on the market which display the I.D. and you can even have the software accept or decline the call based on the i.d. info. Of course you can also just put an I.D. unit on that line. I wasn't sure what you meant by "Catching Equipment". Hope this helps. Trace Carpenter ************************************************************************** 13)From: ALBrubaker@aol.com Subject: Re: Need Help - Being Tapped >I can lurk no longer! I need help! I have been embroiled in quite a >dangerous situation for some time now and have sought assistance to no >avail. >I will omit the details but ask the following: My telephone lines (2 of >them) have been bugged for some time. There is no doubt of this and I am >not crazy. I initially contacted the local police who said they could do >nothing (even though the person doing the tapping is known to have done this >previously to members of the force). The police referred me to the phone >company (summer 1995). The phone company sent a line person to check the >main NID. My line apparantly reads off of many others. The line person >could find nothing. I changed the phone numbers. Tapping continued and >continues now. I must do something. What equipment can be purchased to >detect and show proof! The people that are doing this live next door. We >are already in court as they have sued me and are attempting to garner my >property as their own. >It is a long and very bizzaar story. I digress...What do I do? They also >have stolen my mail (I moved my mailbox). They have gone through my garbage >(I now shread everything)! This is like the TWILIGHT ZONE! Any thoughts? >Diane Schoff >> ------------------------------- 1. Buy & install a Caller ID unit; build a computerized spread sheet with inbound information so you can sort & resort -- by name, number, day, date, time. Be sure to leave a column to note whether you know the caller or not. Use internet to narrow info on caller. 2. An alternative would be TAPI-compliant software for your computer. Contact Clearwave Communications @ http://www.clearwave.com Their software will track both inbound and outbound calls, I believe. Works nicely in conjunction with Time & Chaos (a PIM) available from isBISTER @ http://www.isbister.com/isbister With integration of these 2 packages, inbound calls will be identified & a notes page for that individual/company/whatever will pop up automatically before you to take notes. 3. Re phone company. a. Make a complaint, from a different phone, to the phone company (repair) EACH time you believe tapping is occurring noting exactly what sounds you have heard leading you to that conclusion. b. Ask the phone company to use a device called Trap & Trace to confirm caller number identification. c. Ask the phone company to install a dedicated line (will cost them $$$, but it's less tapable). Note to Surveillance List: This sounds pretty basic, but maybe it will help. Anita Brubaker Phoenix, Arizona ************************************************************************** 14)From: Trace Carpenter Subject: The best bug detector >My tracking devices are in constant recieve mode. >They transmit nothing until my computer sends them a message saying >"Where are you?" The transmitter then sends may a very quick "Here I >am!" message and goes back to recieve mode. At that point I'm looking >at the vehicle on a map on my laptop, and the transmitter is no longer >sending out a signal for you to detect. >Shouldn't a good sweeper be able to pick up the low level RF from the >oscilator even in receive mode? >Thanks, >----------------------------------------------------------- >William H. Geiger III http://www.amaranth.com/~whgiii >Geiger Consulting WebExplorer & Java Enhanced!!! >Cooking With Warp 4.0 >Author of E-Secure - PGP Front End for MR/2 Ice >Finger whgiii@amaranth.com for PGP Key and other info >----------------------------------------------------------- >+++Moderator's Note+++ >You would see this with a spectrum analyzer during tx stage. >P.S. Trace, What freq does the burst occur on? The burst occurs in the 900 Mhz band. Other than that, as for any signal generation I've never detected one when I was sweeping a vehicle for bumper beepers. I guess there could be a slight one but you would never find it just because of the massive amounts of other air born interferences that we have to deal with on sweeps in a major metropolitan area. It's a good thought though. Next time I'm bench testing one all see how much it puts off in a controlled enviornment such a screen room. That way there will be NO other signals interfering. BTW if anyone knows of any deals on used screen rooms with power filters let me know. Trace Carpenter, P.I. Tech@Large ************************************************************************** 15)From: Trace Carpenter Subject: High Tech Tracking Post Teletrac requires a relatively good antenna placement. The box should be visible. Many of my transmitters are placed by gaining access to the vehicle (such as if it's a sposes car (community property state)) and placing the transmitter under the back seat. I then place a Big Dave antenna between the headliner and roof, under the back deck, or under the dash. Haven't had one found yet. Knock on wood. Might try this if you need to hide one. Trace ************************************************************************** 16)From: Trace Carpenter Subject: Social Engineering/Subliminal Influence In the posting you mentioned please respond by e-mail only. I love to see cc's of the e-mails posted. Sounds REALLY interesting. I've seen very little on the subject. I think it was banned in movie theaters for popcorn sales. I'd like to learn more about it. Trace Carpenter, P.I. +++Moderator's Note+++ Trace is right. When answering info request posts, please CC: the list. We'd all like to benefit... ************************************************************************** 17)From: Trace Carpenter Subject: Being Tapped Dear Diane: Sounds like you could have a real problem. Unfortunately, if the phone company couldn't find the tap it's probably not something you can do yourself. The fact that they couldn't doesn't mean much as they understand telecommunications but not the spy business. You should probably consult a professional. Feel free to call me (from a secure phone line) if you'd like to talk. Other than that you might contact SpyKing to get a quote on having him come to your home and exterminate the bug. Trace Carpenter, P.I. 214.828.4520 +++Moderator's Note+++ No business touting Trace ;-) Diane feel free to call any list member who specializes in TSCM for advice... ************************************************************************** 18)From: HtPursuit@aol.com Subject: RE: Laser Article Vol.2 #6 At the end of this article there was mention of a device for detecting the use of the Laser surveillance. Could you explain where and the hows on the equipment available for this. Thank you in advance for your reasponse. Bill ************************************************************************** 19)From: urquhart@computan.on.ca (William Urquhart) Subject: Surveillance Looking for someone who can do surveillance in Jamaica...anyone have any contacts? If so please email me at urquhart@computan.on.ca so I can inquire on prices, etc.. Michelle William Urquhart Investigation & Research Inc. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** VolumeTwo Issue #10 ****************************************************************************** Vol.Two Issue #10 The Surveillance List Jan.08,1997 Don't be a Lurker! Over 1100 Members Worldwide! Be a Lurkee? ;-) ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Legal Question 02) Intro 03) Re: Scanner Mods 04) Re: IR Spray 05) PBX Rolm Phone System as Listening Device? 06) Re: Caller ID 07) Re: The Best Surveillance Recorders 08) Do We Want an Archive? 09) ***Important Please Read*** 10) Re: Laser Listener 11) Re: Surveillance in Jamacia 12) Re: Surveillance Recorders 13) Re: PGP Front Ends 14) Re: Audio Enhancement/IR Paint 15) Re: Surveillance Recorders 16) Re: Spy Article/TEMPEST Info ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Legal Question - Person Needing Info This is a little off topic but I felt this person needs some help and evidently deserves it. Maybe a list member has the answer as I am unfamiliar with Illinois Law... >From: James S Davis >Reply-To: bijsd@bgu.edu >Organization: Chicago State University >To: SpyKing@thecodex.com >Subject: Information on backgroud concealment or erasing from public record > >Your web site is excellent, I've never seen so much information on the >topic of surveillance. > >I have a concern that I hope you can offer some insight on. > >I'm an ex-offender who spent 11 years incarcerated. During my stay I >have taken advantage of every conceivable opportunity to turn my life >around and become a productive member of society. I entered prison with >little or no education background and I left with a number of college >degrees and new outlook on life. > >I'm currently doing my graduate (Master's) work in criminal work and I >intend to follow up with working towards a PhD in the same field. My >concern is that I may not be able to make a decent living because >potential employers would hold my background against me. I had an idea >to seek clemency through the governor or attempt to have my records >expunged through legal means but I have found nothing to support this >cause. > >I welcome any insight you can share on this matter and your suggestions >are appreciated. > >Thanx >-- >In New York State I know there is what's called a "good conduct certificate". >In essence it allows a convicted felon who has not been re-arrested or in trouble with authorities over a period of time to obtain a "Good Conduct Certificate" which allows the bearer to obtain restricted employement, gun permits, licenses, etc where he would be prohibited before... > >I believe it also has a section that allows for the felon's criminal record to be sealed after a period of time and/or removed... > >You might check with an attorney to see if your state has similiar provisions. Hope this has been some help. Good luck. I really mean it.. >SpyKing ************************************************************************** 2)From: "Captain" Subject: Intro I have been lurking for a few weeks now and I am quite impressed with the professionalism and knowledge on this list. Kudos to all. I am pretty much a tinkerer in electronics and have always had a knack for finding out things that I wasn't supposed to. I have worked with a friend, who is a PI, on a number of occasions and have learned some of the almost comical methods of "getting your man". I have made, modified, and tuned a great many radio listening devices and have a good knowledge of planting and monitoring these things. However, I am very far behind most of you. Thank you for the education. To the moderator; don't change a thing, It's all very nice. ************************************************************************** 3)From: "Walstrom, Bradley" Subject: RE: Scanner Mods Another good source of scanner modifications is Bill Cheeks home page. Bill is the author of several books on scanner mods. His last book is titled the Ultimate Scanner, 240 pages of scanner modifications. He can be found at http://ourworld.compuserve.com/homepages/bcheek Brad Walstrom ************************************************************************** 4)From: JEasom1046@aol.com Subject: Re: IR Sensitive Spray Try Clue Spray. Is applied by an arosol can. When it dries it is invisible to the naked eye. Anyone who picks up the object sprayed over the next 6 or 7 days will have their hands dyed which can only be seen under uv light. Can be purchased thru Gall's Police supply in Kentucky. +++Moderator's Note+++ Been there... Done that... Doesn't Work.... for my application... It's UV... I want IR - Infrared! ************************************************************************** 5)From: "Gordon Maybee" Subject: pbx rolm phone system as listening device Anybody out there know about the pbx Rolm phone system? I have heard that by using a code or password, a person can activate a phone reciever to act as a room bug (since the mouthpiece is always live) and the other phone being used is on the rolm system. If it is true what code would one use and is there any way to defeat your rolm phone being used as a bug? Thanks In advance Gordon gmaybee@ricks.net ************************************************************************** 6)From: MikeRowley@aol.com Subject: Re: Caller ID To: ddraig@kuntrynet.com> CC: >Hello, I am in need of some assistance. I have been receving prank phone >calls. They call and then hang up. I have used the number at the beginning >of the phone book that will trace the phone call, but you can't findout who >is doing it. I subscribe to Caller ID from Southwestern Bell. I'm not sure but I'd be willing to bet that there is a service like this available from your phone company. In addition I use Call Blocker to keep all phone numbers that are not transmitted from ringing my phone. Caller ID allows you to see the name of the person calling and the number they are calling from prior to answering the phone. If someone calls you don't want to talk to then you don't answer the phone. Some people choose to have their number not transmit. When this is the case Call Blocker keeps those numbers from ringing your phone. You get a message "The party your calling does not accept calls from anonymous numbers." The caller can then call you using a code that un blocks their number. In addition getting a second number on your line with a service called Distinctive Ring is a good idea. List the one number and give the second number out to those close to you. ************************************************************************** 7)From: ljsaisa@algonet.se Subject: Re: Mini Recorder >2)From SpyKing@thecodex.com >Subject: The Best Surveillance Recorders? > >Anyone out there have any opinions on tape recorders for surveillance >purposes? I personally like the Panasonic RN-36 as a body worn system >(although I use my own FET mike) and the Marantz PD-221 for recording >telephone and/or body wires. >I've tried just about everything including the LE version Nagra and Uher >but find these two recorders to be the best for the money... any other >opinions? A very good recorder for covert body use is the RN 36 BWRS. It was originally developed for the MI5. The RN 36 is specially handy for covert use. It's a credit card sized recorder. With a separate detachable microphone and extention lead, it's easy to conceal. The sound quality is very good and it records up to 3 hours on a micro cassette. Technical Spec. RN 36 BWRS(Body Worn Recording System) Size: 54x86x14mm Weight: 97g Power: 1.5V DC Battery Tape Speed: 1.2cm/sec - 2.4cm/sec _________________________________________________________ INTERNATIONAL SECURITY AGENCY Website : http://www.algonet.se/~ljsaisa E-mail : ljsaisa@algonet.se Tel : Int+46 (0)8-645 22 82 (08.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24 h/day) Post : Po.box 167, S-162 12 Stockholm, SWEDEN +++Moderator's Note+++ We're talking about the same recorder here... Wholesale they go for about $165.00 which includes the recorder, external microphone and playback amplifier OR you can get ripped off at a Spy Shop for around $500. with no mods... this really is a good micro recorder... ************************************************************************** 8)From: SpyKing@thecodex.com Subject: Do we want an archive? I've had a number of requests for back issues and have complied. Several list members have asked if we have an archive. We don't. I'm thinking about it... What do you think? Yes or No? Please send feedback... P.S. We're only two weeks old and membership has already topped 1100! ************************************************************************** 9)From: Ron Lander Subject: 2 Riverside Co. Deputies Ambushed-Funeral Info Snip from Riverside Sheriff's Dept. fax: The Riverside Sheriff's Department is saddened to announce the deaths of Deputies Michael Haugen and James Lehmann on January 5, 1997. They died in the line of duty, responding to a domestic disturbance calls (comment: ambushed by a sniper with a nightscope). Law Enforcement personnel attending in uniform shall wear Department Class A uniform, no jackets. Staging area will be announced. Black mourning tape on badges is authorized. Funeral Services for Deputy Haugen are as follows: Friday, January 10, 1997, 1000 hrs. HARVEST CHRISTIAN CHURCH 6115 Arlington Avenue. Riverside, Ca. Phone: 909-687-6902 Internment: Cremation after services Services for Deputy Lehmann are as follows: Saturday, January 11, 1997, 1100 hrs. OUR LADY OF THE DESERT CHURCH 18386 Corwin Road (cross of Hwy 18 East) Apple Valley, CA. Phone: 619-242-4427 INTERNMENT: Sunset Hills Cemetary 24000 Waalew Apple Valley, CA. Phone: 619-247-247 Contributions and Donation Information: A trust fund has been established for the families. Donations can be made through the Riverside Sheriff's Assn., RSA Relief Fund, 4361 Latham, Riverside, Ca. 92501. Phone: 909-683-6565. Please indicate which family the donation is intended for, or if it is to be split between both families. A trust fund for Michael Haugen's children has been established at the Riverside County Federal Credit Union, PO Box 908, Riverside, Ca. 92501 Additional information: E-Mail condolences can be sent to rlander@ix.netcom.com. They will be assembled into two portfolios and presented to the families or Sheriff Smith . So far, I have received a half-dozen, from as far away as New Zealand. Additional details about this terrible incident, including an article referencing the controversial photo of one of the deputies laying (in plain view)on the ground can be read at: http://www.pe.net/deputies_killed/ Stories from The Press-Enterprise, January 7, 1997 Doing their jobs, working for us Familes, deputies grieve Readers protest front-page photo of slain deputy Stories from The Press-Enterprise, January 6, 1997 Two deputies killed Pair recalled as 'Excellent Cops" Colleagues struggle with grief Slain lawmen were well-known Sometimes, Training doesn't help Officer Deaths "I can only hope that some good will come from this tragedy, and pray that their families and brother deputies can carry on" -Cpl D. Labonte, Ontario, Canada. ...I couldn't say it better Ron Lander, CPP Chairman, Norco Police and Fire Commission LASD Retired +++Moderator's Note+++ Those of us who have served feel things like this more than most... Our fallen brothers and their families are in our thoughts and prayers... I urge list members to send a condolence and dig in your pocket if you can. ************************************************************************** 10)From: Graham Subject: Re: laser listener & Caller ID in Australia In Radio - Electronics Oct 1987 ( now called Electronics Now) There is a detailed article and kit to build the laser listener. Back issues of this magazine are available from http://www.gernsback.com Alas caller ID telephone exchanges are ready but Telstra is not sending the info down the line so there is nothing to receive as yet in Aust. Graham ************************************************************************** 11)From: M van der Wel Subject: Re: Surveillance in Jamaica In Jamaica there is: Caribbean Investigative Network 31 Victoria St POBox HM 1385, Hamilton HM FX Bermuda Tel: 809 292 2626 Fax: 809 295 1429 I hope this helps you. Fa v.d.Wel www.tip.nl/users/wel/secure.htm ******************************************************************* ssssss h h o w w ttttttt i m m eeeeee ss h h o o w w t i mm mm ee ssssss hhhhhh o o w w w t i m m m m eeeee ss h h o o w w w w t i m m m ee ssssss h h o w w t i m m eeeeee ******************************************************************* *Fa v.d.Wel....................................... At your service* ******************************************************************* ************************************************************************** 12)From: M van der Wel Subject: Re: Best surveillance recorders The Panasonic RN 36 recorder is not available here in the Benelux. Is there some one who knows addresses where I can buy it ? Fa v.d.Wel www.tip.nl/users/wel/secure.htm +++Moderator's Note+++ Panasonic is also know as "National" in some parts of Europe and Asia. You might find it that way... otherwise I would suggest contacting Panasonic directly. They have various web sites on the net... ************************************************************************** 13)From: "Fred B. Ringel" Subject: Re: PGP Front Ends I have seen several questions about PGP Front Ends and other things to make a very complex, and sometimes difficult to use program, easier to use on a regular basis. I can make two suggestions to help people get over the "difficult to use" hump. First, you can get a listing of practically all the front-ends in one place from the PGP-Users Web site (which I run) located at http://pgp.rivertown.net. Second, once you have looked at that site (which also has lots of info regarding anonymous remailers and other privacy tools), you can join the PGP-Users Mailing list (there are links to join from the above page) where you have many, many experienced PGP-Users who can help you out with everything from selecting a front end (many of the authors are on the list), to helping you use it. Just thought I'd pass the info along. If you are interested in using PGP or anonymous remailers, the list and web site are good places to get your feet wet. Fred Ringel /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ Fred B. Ringel -- Rivertown.Net Internet Access Systems Administrator -- http://www.rivertown.net and General Fixer Upper -- Voice/Fax/Support: +1.914.478.2885 Although in theory, there's no difference between theory and practice, in practice, there is. ************************************************************************** 14)From: Bret Watson Subject: Re: Audio Enhancement/IR Paint re: audio filter for enhancement. In a previous job (life :} ) I worked for the ABC - thats the Australian Broadcasting Corp... We modified a normal radio comms system so that it was broadcastable - what did we do? Firstly be boosted the low end centered around 700hz - this made the most difference in intelligibilty. We also tried to compensate the signal out to 7kHz - but if you're trying to record from a telephone this is pointless. So how to do it - go any buy a graphic equaliser an octave one is minimum - preferably a 1/3 octave one - expensive but its worth it. If you can also get a compressor - should be able to get a guitar pedal that does this fairly cheaply, same for the eq. On the eq. boost from 100hz to 700hz as much as you can. Then slowly drop the boost from 3kHZ up. That should give you a nice clear speech band. - tell me how it went. re: IR paint sorry guys no paint will work like UV paint - UV paint uses the high energy UV photons to energise and the paint itself emits light. IR paint would glow all the time if that was so. What you want is paint that only reflects IR. - I'll ask a chemist friend of mine... Cheers, Bret Bret Watson bwa@usa.net fax/phone +61 9 454 6042 Computer Security Consultants ************************************************************************** 15)From: WWMason@aol.com Subject: Re: The best surveillance recorders I've tried a number of different units and have had good luck with the Sony M-909. No matter what I use, it's always difficult to pick up specific conversation in a large room with others talking in the background or music softly playing over an intercom. Has anyone had success with mics that filter unwanted noise, or by digitally filtering the tape after the recording? +++Moderator's Note+++ I bought a Sony M-909 about 4 years ago in a electronics shop in the Akihabara (a gadget freak will think he died and went to heaven) section of Tokyo. This was prior to US release. I was impressed with small size and the fact that is was auto reverse. I didn't care for built-in microphone. I also thought it was a little too thick for shirtpocket concealment. I'm not sure but I think US model is NOT auto-reverse... For audio tape filtering there is a company called JPS in Raliegh, NC that manufactures a number of enhancement products. Their telephone is 919-790-1011 Send for specs on - NRF-7 General Purpose Noise Remover & Filter Unit $249.95 NIR-10 Noise/Interference Reduction Unit - $ 349.95 NTR-1 Wide Band Noise and Tone Remover - $169.95 NF-10 Notch Filter - $149.95 These products are SOME help and will remove "white noise". I do audio tape enhancement myself and use a DAC (picture on my site). This piece of equipment is $20,000USD and not for everyone (I don't sell them, I own one). You might also consider software to do the job. Try DART or Sound Forge... BUT, you better have a LOT of hard drive capacity and memory... SpyKing ************************************************************************** 16)From: "C. Kuethe" Subject: Spy Article/TEMPEST Info > >The Netly News >http://netlynews.com/ > >SPY VS. SPY >January 6, 1997 >By Declan McCullagh (declan@well.com) >[snip] A bit off topic, but this isn't too new. I read in one Tom Clancy book that you had gov't and secret agents going to great lengths to get stuff the day before the newspaper prints it. Well not quite, but really, the analyst are what make all the hot dat work. #include Back on topic, a while back, on the Cypherpunks mailing list there was a really ingenious example of this. A certain member of the list was not well liked by others. Something about flames and way off topic posts. So a few people decided to poke around and see what they could find about him. Quite a lot as it turned out. If you believed "The Net" this would scare you. Someone said that the author of that snoop on the flamer should have been an analyst. I'll try dig up a copy of that message. Try snooping on yourself.... see how many trails and loose ends you leave lying around. Re: 8)From: SpyKing@thecodex.com >Subject: An OLD TEMPEST Article > >I found this a while ago and thought some might find it interesting... > >THE TEMPEST METHOD OF COMPUTER DATA INTERCEPTION! >by Al Muick for P-80 Systems >[snip] I have a few pointers to other tempest stuff on my web page: http://www.ualberta.ca/~ckuethe/crypto.html -- Chris Kuethe LPGV Electronics and Controls http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Subject: More tempest The following are posts from the Cypherpunks mailing list about TEMPEST... This is about 350 lines long...
Date: Thu, 05 Dec 1996 01:44:43 -0800 From: stewarts@ix.netcom.com To: cypherpunks@toad.com Subject: Laptops and TEMPEST >Not to mention the point that an external attacker--say, the NSA van parked >across the street--will under no circumstances be able to measure "the" >spectrum: his antennas cannot possibly measure the signals (at the lower >bits) seen by the FM receiver, noise source local to the computer, whatever. Tim was talking about the Bad Guys setting your radio noise generator, but the other side of the coin is TEMPEST - making sure your computers don't emit enough radiation for Bad Guys to read it. CRTs are well known as emitters of easily decoded signal, but people have occasionally suggested on this list that laptop LCD screens are much quieter. I now have a data point on this one, and basically, it ain't so. Take a basic television with big rabbit-ear antennas. Tune to the football game on Channel 6. Take your AT&T Globalyst 250P (which is a gray NEC Versa with a Death Star), with the 16-million-color 640x480 screen in 65536-color mode, and pop up a DOS command window in white-on-black. Type a few lines of text, then look at the TV. The sync wasn't quite right, but there were about three copies of my DOS window. It may have been scrolling slowly vertically or horizontally, but it was relatively readable given the lack of resolution of the screen. A good receiver run by a Bad Guy ought to be able to set its scan rates correctly to pick up the screen at better resolution. There are obviously more variables to be explored, but other people who were present at the time considered the football game to be more important :-) # Thanks; Bill # Bill Stewart, +1-415-442-2215 stewarts@ix.netcom.com # You can get PGP outside the US at ftp.ox.ac.uk # (If this is posted to cypherpunks, I'm currently lurking from fcpunx, # so please Cc: me on replies. Thanks.) Date: Thu, 5 Dec 1996 14:03:11 -0700 (MST) From: "C. Kuethe" To: stewarts@ix.netcom.com Cc: cypherpunks@toad.com Subject: Re: Laptops and TEMPEST On Thu, 5 Dec 1996 stewarts@ix.netcom.com wrote: > don't emit enough radiation for Bad Guys to read it. CRTs are well known > as emitters of easily decoded signal, but people have occasionally suggested > on this list that laptop LCD screens are much quieter. I now have a data > point on this one, and basically, it ain't so. > > Take a basic television with big rabbit-ear antennas. > Tune to the football game on Channel 6. > Take your AT&T Globalyst 250P (which is a gray NEC Versa with a Death Star), > with the 16-million-color 640x480 screen in 65536-color mode, > and pop up a DOS command window in white-on-black. > Type a few lines of text, then look at the TV. [snip] Here's some more about that. I use both the Texas Instruments ti85 and Hewlett Packard HP48 graphics calculators. I was playing tetris on my ti85 one day and had the radio on. every now and then this funny noise would come out of my radio. After a while I noticed it was sync'ed with a keypress on my calc. So I tried some experiments, and I found that doing just about anything would emit a detectable signal. Keep in mind that I was using a cheap radio, tuned to a 100kW radio stn and still could tune in a calc. I tried indiviual keystrokes.........yup individual pixel changes.....yup idling.......................yup printing to screen...........yup "For" loop...................yup NOP's........................yup and they all sound different. My favorite was the for loop.... sounds like a diesel engine. Maybe that's why my calc is running so slow. it's only going at 1500 RPM (revolutions per minute) The hamster inside must be getting tired. I guess that's why there's that crap like this that's printed in the manual of everything electronic... This equipment generates and uses radio frequency energy may interfere with radio and television reception. This device complies with the limits for a class B computing device as specified in part 15 of the FCC Rules for radio frequency emission and SIGINT operations pursuant to the interests of national security and inter-departmental funnies and scandals. In the unlikely event that there is no interference, please call your local spook-funded telco and the will be more than happy to remedy this situation. I think it was "Lucky Green" whose friend saw the little TEMPEST demo. Perhaps this friend might care to elaborate on this issue. I almost wonder if there is some kind of order from on high (NSA, [A-Za-z0-0]1,5) <--regexp to include other agencies like CSIS, MI5, Mafia, etc... -- to make "leaky" computers. So now we have to have thermite wired onto our HD's and Noise generators on the board. :) ICK. -- Chris Kuethe LPGV Electronics and Controls http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 To: cypherpunks@toad.com Subject: Laptops, TEMPEST, chewing gum, and baling wire At 11:52 AM -0800 12/5/96, Alan Olsen wrote: >Now the truly paranoia will not only cover their heads with tinfoil, they >will cover their laptops as well. Just be careful to remove the tinfoil prior to leaving the country. As you know, tinfoil is an ITAR-controlled item. (Pending the outcome of a court case, where a physics professor is challenging the ITARs on the grounds that using aluminum or tin foil in his physics lectures may subject him to imprisonment. That rolls of aluminum foil are commonly available in supermarkets throughout the country--and even at foreign sites!--does not mean the ITARs will not be enforced.) The traditional "personal use exemption," such as for the tin foil contained in chewing gum wrappers, is causing alarm in the Administration, as NSA researchers have discovered that some users are gluing together many gum wrappers to make RF shields. "We have notified Wrigley's Gum Company that their wrappers may constitute illegal "hooks" and may violate the ITARs even if any single wrapper is too small to be useful." The Administration is working with industry to relax export controls on tinfoil and other shielding substances. H-P and Intel have announced a solution the Administration may find acceptable: exports of shielded laptops would be allowed if special keystroke capture programs are installed. As Special Crytography Envoy David Aaron puts it, "This is for the protection of the consumer, not for use by the government." (When pressed to explain this, Ambassador Aaron admitted it made no sense to him either, but that he was just following orders. He also acknowledged that the Administration's policy appears to be held together by baling wire and chewing gum, so the Administration has a special interest in the wrapper issue.) --Klaus! von Future Prime Date: Thu, 05 Dec 1996 14:18:36 -0800 From: Joel McNamara To: stewarts@ix.netcom.com Cc: cypherpunks@toad.com Subject: Re: Laptops and TEMPEST Thinking that LCD screens reduce the risks of emanation monitoring is a dangerous misconception (at least under a high threat model). LCDs' current requirements are pretty small, and they only emanate a low magentic and electrical field. However, the gotcha with current laptops is their backlighting. Electric and magnetic fields are considerably higher compared with a low-res/contrast device. There are documents that circulate within certain security circles that list just how noisy (and therefore easy to monitor) various off-the-shelf machines are. It would be an interesting project for some ham radio type Cypherpunks to measure their machines, and publish the results. Or, for some well connected person just to scan and anonymously post such a document to the list. Of course, I'd never encourage anyone to do something illegal. Joel Date: Thu, 5 Dec 1996 14:24:21 -0800 From: "Timothy C. May" To: cypherpunks@toad.com Subject: Re: Laptops and TEMPEST At 2:03 PM -0700 12/5/96, C. Kuethe wrote: >Here's some more about that. I use both the Texas Instruments ti85 and >Hewlett Packard HP48 graphics calculators. I was playing tetris on my ti85 >one day and had the radio on. every now and then this funny noise would >come out of my radio. After a while I noticed it was sync'ed with a >keypress on my calc. So I tried some experiments, and I found that doing >just about anything would emit a detectable signal. Keep in mind that I was >using a cheap radio, tuned to a 100kW radio stn and still could tune in a >calc. I tried ... >and they all sound different. My favorite was the for loop.... sounds like >a diesel engine. Maybe that's why my calc is running so slow. it's only ... Back in the Olden Days, we used to use these signals as sound output for our computers. For example, on my Sol 20 computer (bought and soldered together in 1978, in case anyone's interested). There were various BASIC programs that ran various loops, thus generating crude tones on nearby radios. And the games that were available had routines which used radios as crude sound devices. (None of which could hold a candle to my 1968 "amateur transmitters": neon sign transformers, sending Morse code to my friend a mile or so away...it was detectable on all AM bands! I never got a visit from the FCC, but I only "transmitted" a few times.) --Tim Just say "No" to "Big Brother Inside" We got computers, we're tapping phone lines, I know that that ain't allowed. Date: Thu, 05 Dec 1996 17:22:24 -0800 From: jim bell To: Joel McNamara Cc: cypherpunks@toad.com Subject: Re: Laptops and TEMPEST At 02:18 PM 12/5/96 -0800, Joel McNamara wrote: >Thinking that LCD screens reduce the risks of emanation monitoring is a >dangerous misconception (at least under a high threat model). I disagree that it's a "dangerous misconception" to believe that "LCD screens reduce the risks of emanation." While it might be correct to say that it would be dangerous to believe that they ELIMINATE the risks, LCD displays would make it exceedingly difficult to read the screen remotely. The main reason is that the LCD segments are activated in parallel, which means that the electronic noise associated with a particular row is a smeared product of each portion of the display. This is quite unlike CRT's, in which individual pixel information is completely (well, except for color) demultiplexed by time. > However, the gotcha with current laptops is their >backlighting. Electric and magnetic fields are considerably higher >compared with a low-res/contrast device. What does the backlighting have to do with anything? The backlight and its noise is not modulated (at least, not in anything less than the optical band) by the imformation provided on the screen. Jim Bell jimbell@pacifier.com Date: Sat, 07 Dec 1996 15:12:55 -0800 From: Lucky Green To: cypherpunks@toad.com Subject: Re: Laptops and TEMPEST [Sorry, I don't have the attribution for the fist quote. The remainder of the post was authored by a friend of mine who retired from decades in military SIGINT. He allowed me to forward it to the list.] >>> don't emit enough radiation for Bad Guys to read it. CRTs are well known >>> as emitters of easily decoded signal, but people have occasionally >suggested >>> on this list that laptop LCD screens are much quieter. I now have a data >>> point on this one, and basically, it ain't so. Look - if it uses electricity; if there is an oscillator anywhere innit; if there is a ground loop in the circuit design, if there are make/break contacts anywhere - It will radiate, and the amount it radiates is directly proportional to the basic power source ... And circuit board traces are getting so damned close that engineers I know/knew were worried about friggin' arc-over at 3 volts. By now, may be even closer and voltage worries lower... So we have a problem. The only computer I know of that is (at this date) leak-proof is the biological one 'twixt one's ears. And soon, maybe not even that. Those who laugh at the paranoiacs who wear aluminum helmets and wear shoes with a static strap to the sidewalk may be laughing out the other side of their moufs too soon... As for any government directives requiring companies to make computers leak, I know of none, but CAVEAT: I've been retired from source info since '91, and most of my friends/fellow engrs who occasionally got together for a few brewskis and BS sessions over in Mt. View have either gone to better jobs (more $$$), transferred back east, or inconsiderately died. So, who knows? And of course, the ability to detect this RF/RFI/EMI leakage from your information processor is similarly dependent on the sensitivity of the equipment you're using for detection. I've seen absolute magic performed using a Wullenweber antenna, and that is NOT state-of-the-art equipment any more (ca. 1965-70), even tho the DoD keeps throwing money at it in upgrades (affectionately called 'the elephant's cage' by those who worked with it). If you really need to keep your information processing "private", then you can either isolate yourself inside a double-shielded room of solid copper; power everything with batteries; have no wires leading out of that room; make damned sure the door has the nice secure wiping strips to complete the shield when you close it -- or move your information processor into the middle of a whole bunch of the same or worse RF/RFI/EMI emitters, and just _maybe_ your data will get lost or become inaccessible because of the overload of the detection equipment by much larger interference fields. Or use paper, pencil, and one-time pads and burn everything that's done "in the clear" and really scrunch the ashes into dust. [Again, I am not the author of the above post.] -- Lucky Green PGP encrypted mail preferred Make your mark in the history of mathematics. Use the spare cycles of your PC/PPC/UNIX box to help find a new prime. http://ourworld.compuserve.com/homepages/justforfun/prime.htm
-- Chris Kuethe LPGV Electronics and Controls http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0My line apparantly reads off of many others. The line >person could find nothing. I changed the phone numbers. Tapping >continued and continues now. I must do something. What equipment can >be purchased to detect and show proof! The people that are doing this >live next door. We are already in court as they have sued me and are >attempting to garner my property as their own. .>Diane Schoff By any chance are you using a cordless phone or have a baby monitor? Simple question, but often the case. Robert Plance Investigator@Private-Eye.com href="http://www.Private-Eye.com" Criminal Records-Driving Histories-Background Checks-Locate Individuals On-Line order form for Investigative Services. Protect Yourself, your family, your business, your customers. ************************************************************************** 3)From: dj73550@goodnet.com Subject: Re: Best Surveillance Recorders The best body-worn recorder that I have used is the Sony M-909. It's a new microcassette recorder from sony which measures 2 3/4 x 2 5/8 x 3/4 inches. It has auto-reverse which allows 3hrs recording time and it comes with a sensitive remote microphone. It also has V.O.R. which makes it nice for recording phone calls. Jeff @ I.S.C. dj73550@goodnet.com ************************************************************************** 4)From: PRV8EYE@aol.com Subject: Search Question I've been using "Select Phone" from ProCD and find it to be an incredible help in locating subjects, BUT: If the phone number is listed as JoBob and Jezabell Smith and I am trying to locate Jezabell Smith without knowing that she is married to JoBob I get "no matching entries found". Is there a phone directory on CD that will give me the second person in a two person listing? Does Four 11 or Switchboard do that? I have tried another that would do it but it requires you to check every state individually. Anyone know how often the various phone directories are updated? I get a new update of Select Phone about every four months but some of the others seem to only have one per year. P.S. Still waiting to hear from anyone who has found a portable telephone voice changer with which they are happy. ************************************************************************** 5)From: "David L. Mills" Subject: US Datalink We had subscribed to US Datalink, Baytown, TX for a short while until they refused to conduct any credit checks for pre-employment background checks. Their literature indicated that they would do credit checks for that purpose only.....which is what we needed. But the first time I requested one, they informed me that they didn't do credit checks for private investigators. This may have been a result of abuses from some of our less ethical bretheren. They were gracious, however, and returned my set-up fees after I returned their software program to them. They are a good, honest company albeit expensive. We have since joined our local credit bureau with very good results. Dave Mills Mills & Associates, Inc. 2527 W. Kennewick Ave., Suite 104 Kennewick, WA 99336 Conducting Private Inquiries and Investigations for Attorneys, Insurers, Business and Individuals ************************************************************************** 6)From: "David L. Mills" Subject: Surveillance I was on a surveillance team once where we were tasked to surveil a person on foot in Washington D.C. This fella was short and stout, and could actually walk faster than I could run! He eventually zipped into an office building that had multi-level exits into adjoining buildings and out the back to another street. The building had two or three cafes and other shops too. It was a surveillance nightmare! Needless to say, we lost him clean! Can't win them all! Dave Mills Mills & Associates, Inc. 2527 W. Kennewick Ave., Suite 104 Kennewick, WA 99336 Conducting Private Inquiries and Investigations for Attorneys, Insurers, Business and Individuals ************************************************************************** 7)From: kevina@citynet.net Date: Thu, 9 Jan 1997 16:50:30 -0500 Subject: PI in CA? I am a pi in wva and i need to sub contract a pi in southern california for some surveillence work, any one interested e mail me at kevina@citynet.net kevin. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two Issue #12 ****************************************************************************** Vol.Two Issue # 12 The Surveillance List Jan.10,1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Request for Guidance/Security Breech? 02) Schools? 03) Re: Archive 04) Sources of Hardware 05) Re: Archive 06) Re: Legal question 07) Re: IR Spray 08) Re: Rolm Phone System 09) Re: Archive 10) Re: IRS Article 11) Interesting Site 12) Video Recorders 13) D.C.Cell Phone Danger 14) Surveillance Feature Film? 15) Re: Panasonic RN-36 Recorders 16) PI Referral? 17) Re: Surveillance Recorders 18) Bench Equipment Software? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: raset22@dircon.co.uk (Raphael Setchiel Rodgers) Subject: Request for Guidance?Security Breech? Hello, I am quite new to this list and my specialty is far from your norm in understanding of people, but before I attempt to explain it I would like to ask the greater mind [the list] for some help. I work for a major supplier of of broad band Internet connectivity. Recently we gave a class for a group of foreign nationals [the ones that use to be the enemy]. The the last day of the class was on a Saturday when the office was only staffed by the course instructor. So he was not in a position to monitor all of the people and could have subsequently left some one in the building after he left, but that is not the issue. In that office we have a complete Lan, switchboard which is attached to a leased line connected to our Pop. That afternoon the power went out to the "office system" not to the building, then mysteriously came back on about two hours later. Now the power to the building was never effected or showed signs of wavering in any manner. My question is what should be looked for in our connnection cabinets that may have been inserted to give an outside source the ability to dial in and use our system to spoof or otherwise act as a host for some one to act as if they were us on the Net. What kind of equipment should be used to detect this inserted parasite should there be one and when would be the most obvious time for it to be operated in the opinion of the "greater mind". My specialty for those who may be interested is the use of Numerology and Astrology cross referenced through direct mind probing. Esoteric yes. Effective, I will leave that for your consideration. But that is what I do......... I will look forward to any assistance that can be given. Thank you in advance. Raphael S. Rodgers ************************************************************************** 2)From: Rick Pedersen Subject: Schools? Still looking for info on schools for security, p.i.'s, or executive protection. Asked on one of earlier lists, but no luck. If they qualify for G.I. Bill, that would be great. Also looking for info on E.SI. in Colorado. Don't refer me to their website. Thanks all. Moderator: Enjoy the list and format. An archive would be helpful. ************************************************************************** 3)From: admin@asianenergy.com.au Subject: Re: Archive Hi, Its obvious that this is the hottest list on the net !!!! I vote yes for an archive of back issues. All new readers from now on will want all back issues. In addition, I think YOU should reprint them hardcopy every 3 months for the internet impared and YOU should keep the bucks for your trouble. I vote YES for another archive for articles/plans etc submitted by readers. Mike +++Moderator's Note+++ Archive I don't mind... Hardcopy? I don't think so... Bucks? Nah.... Info wants to be free... ************************************************************************** 4)From: admin@asianenergy.com.au Subject: Sources Another comment .... Please request ANYONE giving hardware information to give a good wholesale or retail source ? Thanks ************************************************************************** 5)From: CrACKeD Subject: Re: Archive I just wanted to let you know I think the idea of having an archive of back issues would be a great idea. If such a system could be implemented to allow for searching or the individual issues or at least specify the titles of articles in old issues it would be even better. Either way, excellent idea. .---------------------------------------------------------. | SMTP: cracked@primenet.com Send blank message to | | SMTP: kb7uix@amsat.org cracked@primenet.com | | AMPR: kb7uix@n8imo.ampr.org containing the subject | | AX25: kb7uix@wb7tls.az.usa.noam "sendkey" to quickly | | HTTP: www.primenet.com/~cracked receive my PGP key. | `---------------------------------------------------------' ************************************************************************** 6)From: Trace Carpenter Subject: LEGAL QUESTION In Texas it's a pardon and can be granted by the governor if it was a state felony. If it was a federal crime then of course it takes a presidential pardon. Those are applied for through the pardons attorney in Washington D.C. (Get an attorney to help). In Louisiana you are automatically pardoned as far as the state's concerned after your first felony even if it's a federal felony. What that means is that if you were convicted of a federal crime and finished your sentence and applied for a state licnense, you could get it, even though your not pardoned at the federal level. As you can see it can depend greatly on the state your in. If you want to get it erased, get started because even if it's a state crime, and your state doesn't have procedures for it, you can still go through the presidential route, and to me anyway (disclaimer: I'm no attorney) it sounds like you meet the criteria for a presidential pardon. Best of luck to you. Trace Carpenter, P.I. ************************************************************************** 7)From: Trace Carpenter Subject: IR Spray Not knowing what your trying to do I'm just gonna take a stab at this. I suppose you've already tried spraying phosphorus on the item? Trace Carpenter Tech@Large ************************************************************************** 8)From: Trace Carpenter Subject: pbx rolm phone system as listening device Hate to scare you but it can be done from outside the pbx from what I understand. Futhermore guess what. It can be done on your home phone. Southwestern Bell Telephone has a diagnostic system that will pass through every cap in an electronic telephone and listen to the room. It's not actually designed for that but it apparently does work. Furhter I assume that the other phone companies also have it. I found out about it from a friend who works for the phone company and has access to it. He is a supervisor and they internal security found out he was using the system to listen in on his wife while he was at work. He was of course fired. I don't remember the name of the system but I'll ask next time I see him. They apparently have three systems that diagnose whatever it is that his office looks for and this is the only one that does it. The answer you might wonder? Remember the old bell phones that had the copper relays inside? You can't listen over an open relay. Guess that's why Jim Rockford still has that old black desk phone. Trace Carpenter Tech@Large ************************************************************************** 9)From: Trace Carpenter Subject: Archive I keep my old volumes, but an archive with an index of whats in each issue would be good. I've been converting them to text files. Then, if I need to research a specific thing I'll have XT-Gold look inside each file for the key words. ************************************************************************** 10)From: "Michael W. Feinberg" Subject: Re: IRS Article As a former IRS Inspector and Revenue Agent, now practicing as a Private Detective, in the greater South Jersey -Philadelphia, PA area (609-667-5389; FAX 609-779-0067), I'd like to throw my two cents in: A while back there was posted a story about a zealous IRS person who became interesed in a flashy Rolls Royce. The story ends with a trial of the RR owner.That gentlemen and ladies is a story, just a story. Most of the middle of the story is deleted. To begin with unless there was an already ongoing IRS investigation of the RR owner, no IRS employee would have been able to start with a license number, legally run that number, then legally access all the IRS files, pull the necessary files, and conduct an audit, which would lead to a criminal investigation, which would lead to an indictment, without raising a whole bunch of flags, etc. I am not an apologist for the IRS, but even the IRS is limited in what they may investigate - there has to be a previous "connection" or "interest" in a "taxpayer". The entire process of identifying a taxpayer to be audited is more complex than described by that "story". I realize that everyone can point to a story where the IRS abused and "screwed" a taxpayer. I also relize that there are no guilty people in jail, just a bunch of people who were "screwed" by the systen and/or by their lawyers. Do not think that the IRS is populated by choir boys. BUT ... There are numerous safeguards within IRS to prevent the invasion of privacy. Witch hunting is strictly forbidden, and punished. As a former IRS Inspector and Revenue Agent, specializing in financial crimes ************************************************************************** 11)From nobody@REPLAY.COM Thu Jan 9 21:32:51 1997 Subject: Interesting Site The following is an interesting site - http://feustel.mixie.net Go to the homepage of J. Orlin Grabbe Scroll down to - HOW TO INVESTIGATE THE INVESTIGATORS Hackers vs Politicians Part I hackers vs Politicians Part II Learn how ex-cia hackers armed with a cray computer (in a semi van) steal politicians swiss bank accounts and cause them to "retire" ************************************************************************** 12)From: rkdixon@esper.com Subject: Video Recorders Anyone have a good, reasonably priced source for video recorders such as the Sony EVO-series, or other 12vdc-powered models? Thanks in advance, Rick Dixon ************************************************************************** 13)From: james coburn Subject: D.C. CELL PHONE DANGER!!! I thought that this would interest EVERYBODY!!!! GINGRICH'S CELL PHONE NIGHTMARE Political scandal has come crashing into the digital age. The NEW YORK TIMES kept everyone in Washington, DC up late on Thursday by publishing extended excerpts of an audio tape that captured Newt Gingrich in a conference call with others on the morning of his ethical mea culpa. The call was picked up on a police scanner in Florida. The conference call was over how to counter the inevitable Democratic attacks and how to time the admission with newspaper and evening news cycles. The call caught on tape provides top insights into the methods and intensity of spin used to calm and convince the public mass. It is provingto be a complete embarrassment for the Republican leadership. "Oh my lord -- why is anyone talking on a cell phone," a Republican source on the Hill told the DRUDGE REPORT after getting briefed on the TIMES bullet. The phone transmission originated from one of the participants in the strategy talk, who was no doubt taking a Christmas break in the sunshine state. Newt was at is home in Georgia; others taking part were in Washington. The TIMES says the tape was given to them by a Democratic congressman who was slipped the goods by a couple in Florida who overheard the call on their scanner. Calling James Bond. (It should be noted that it is a federal crime to make audio recordings of any and all activities that occur on such scanners.) Gingrich being caught on tape is a twisted irony. Leading Republicans on Capitol Hill have recently issued warnings to all staffers about the dangers of talking on cell phones in the current partisan-charged Washington, DC atmosphere. The National Enquirer's public announcement that they were soon going to open a Washington bureau also added to the growing cell phone fears. ************************************************************************** 14)From: Filmgroup1@aol.com Subject: Surveillance feature film Attention List Members, As the screenplay I've mentioned a few times continues to develop, the following questions have arisen. I invite any and all members with surveillance as an integral part of their work to reply to me via email whether or not they choose to cc the list as well: 1. Do you ever get too close to the case/mark? As in, are you ever too personally involved? Give brief details. 2. What would be the concerns for a PI in such a situation? Any replies can receive at least a mention in the film's credits if you indicate your desire for same. Thanks, Daniel (filmgroup1@aol.com) ************************************************************************** 15)From: "Walstrom, Bradley" Subject: RE: Recorders I did some research and it looks like Panasonic has discontinued the RN 36. The only place I can find one is at a spy shop at a very inflated price ($500+). Does anyone know place that might sill have one at a reasonable price. Brad Walstrom ************************************************************************** 16)From: souva@servtech.com (sbw) Subject: referral Does anyone know a good p.i. in the New Braunfels, Tx. area? ************************************************************************** 17)From: R0819@aol.com Subject: The Best Surveillance Recorders? >Anyone out there have any opinions on tape recorders for surveillance >purposes? I personally like the Panasonic RN-36 as a body worn system >(although I use my own FET mike) and the Marantz PD-221 for recording >telephone and/or body wires. >I've tried just about everything including the LE version Nagra and Uher >but find these two recorders to be the best for the money... any other >opinions? I used the RN-36 for years while in law enforcement. Since starting my PI business I have gone to the Olympus LS400. Some of the main differences are that the Olympus has a built in playback speaker and it has an auto-reverse to record on both sides of the tape. The major drawback is that at the end of the tape it will make a slight clicking noise. This would not be very healthy in some undercover situations. Another product I looked at (was very impressed with) but never used was a digital recorder manufactured by SONY. It was selling for approx. $900. The sound was tremendous and it filtered out the majority of the background noise. Rick Weatherby Weatherby Investigations Mobile, Alabama e-mail: R0819@aol.com +++Moderator's Note+++ The click at the end of the tape with the L-400 can be removed with a slight mod... ************************************************************************** 18)From: SpyKing@thecodex.com Subject: Bench Equipment Software Anyone using software to replace bench equipment? I've seen a few programs but not happy with package. I'm looking for something to attach receiver & laptop computer and get spectral display. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two Issue #13 ****************************************************************************** Vol.Two Issue #13 The Surveillance List Jan.11,1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Intro 02) Anonymity 03) Video Eavesdropping Article 04) Re: Cell Phone Article 05) Intro 06) Re: Gingrich Cell Phone Trouble 07) Sources of Surveillance Equipment? 08) FuzzBuster as Receiver? 09) Scanner Recording Software 10) POCSAG Pager Decoding Software 11) Domain Search? 12) Re: Bench Equipment Software 13) Re: Request for Guidance/Security Breech? 14) Title III Suppliers 15) PI Qualifications in NY? 16) Re: E.S.I. (Colorado) 17) RE: D.C. CELL PHONE DANGER!!! ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: comlab@mbox.vol.it (Garda Tullio) Subject: Intro Garda Tullio - COMLAB@MBOX.VOL.IT I am a tecnician in electronic intelligence, i project, realize some electronic circuits. I am a consultalt in agency for private investigation in Italy. My town is next to the Switzerland and France ( about 20 Miles ). Garda Tullio Phone / Fax +39 - 165 - 257672 ************************************************************************** 2)From: "Ethan Miller" Subject: Anonymity Does anyone know of any good, FREE anonymity software?? -Ethan ************************************************************************** 3)From: SpyKing@thecodex.com Subject: Video Eavesdropping Article This is an old article I ran across and thought the list might be interested. Toronto Sun - Sept 4, 1996 Sneaky photographer charged ... by Tom Godfrey A retired high school shop teacher has been charged after a man allegedly used a camera hidden in his size 12 shoe to secretly videotape up the skirts of young women at the CNE. Det. Mike Beauparlant said a man photographed up to 20 women with his "shoe cam," which contained about seven hours of footage when he was arrested at the CNE last Saturday night. Beauparlant said investigators believe he got the idea from surfing a voyeur news group on the Internet. He ordered a $400 fibre optic lens and fastened it in a brogue shoe, police allege. The Oxford-style footwear contained a false front and two small screws on the sole to which a bracket and lens were affixed. "I've never seen anything like this in my 21 years on the force," Beauparlant said. "This was ingenious." Beauparlant said the body of the camera was hidden in a waist pouch and connected to the lens on the shoe with wires that ran under a man's pants and through his sock. "He always photographed very attractive women in their 20s with short skirts," added Det. Const. Mike Dicosola. He said the man was detected by two couples who noticed him moving his foot under the skirt of a woman. They followed the man, held him and called police. Police ask women who feel they've been victimized to call 808-5289. George Walter Campbell, 62, of Cornwall, has been charged with sexual assault and mischief. He returns to College Park court on Sept. 10. He was released on $750 cash bail yesterday. ************************************************************************** 4)From: Donald Gray Subject: Re: D.C. CELL PHONE DANGER!!! At 22:12 09/01/97 -0800, you wrote: >I thought that this would interest EVERYBODY!!!! > >GINGRICH'S CELL PHONE NIGHTMARE > >Political scandal has come crashing into the digital age. The NEW YORK >TIMES kept everyone in Washington, DC up late on Thursday by publishing >extended excerpts of an audio tape that captured Newt Gingrich in a >conference call with others on the morning of his ethical mea culpa. Who is Newt Gringrich?? Not a name that rings big bells in UK (at least with me!) BUT "you aint seen nothin' " here, we have the Carmila tapes (Prince Charles friend) The Dianagate tapes, The Fergie tapes and HRH Duke of Edinburgh tapes to mention a few. > >The call was picked up on a police scanner in Florida. AHA! The police are using scanners now - eh? :---> Regards Donald +++Moderator's Note+++ For our Non USA List Members... Newt Gingrich is the Speaker of the House in the US Congress... ************************************************************************** 5)From: MOSUNIC_TONY@Tandem.COM Subject: Intro Hello to all, I found out about your web page through the High Tech Crime Investigators Assc. which I am a member of. I am the security manager for Tandem Computers in Fremont Calif.I am very interested in the information you have to offer, and I have to share. Hope to hear from you soon. e-mail add. mosunic_tony@tandem.com Tony..... ************************************************************************** 6)From: Peter Laws Subject: Re: Gingrich Cell Phone Trouble On Fri, 10 Jan 1997, Tvine wrote: > Here is some of the transcript of the Gingrich cell intercept: > > CAUGHT ON TAPE: GINGRICH HEARD URGING TACTICS IN ETHICS CASE Well, this means only one thing: Since criminalizing the repetition of certain radio transmissions didn't work (Comm Act 1934), and since criminalizing the interception of cell phones (ECPA 1986) didn't work, and since criminalizing the manufacture or importation of radios capable of intercepting cell phones (1994 - which law?) didn't work, then we must asssume that it will soon be a crime to manufacture, import, purchase, use or possess any device capable of recording anything. Also, soldering irons so that we can't accidently construct a radio. :-) The Cellular industry may think it won when it got the US CONgress to pass ECPA instead of encrypting, but I think they may yet begin to regret their decision ... :-) Peter ************************************************************************** 7)From: jesse@sonic.net Subject: Sources of Surveillance Equipment I was wondering if SpyKing or others could please post some good wholesale outlets for surveillance equipment. I would also appreciate any sources that, while unrelated to the surveillance industry, carry wholesale equipment that could be applied to the trade. Thanks, Nathan Patrick -- The Patrick Mint +++Moderator's Note+++ Nathan, I've got about 2800 companies in my rolodex worldwide that sell some type of surveillance equipment or device(s) that can be used for surveillance. Please be a LITTLE bit more specific about what type you're interested in... ************************************************************************** 8)From: Paul Longo Subject: FuzzBuster as Receiver? While discussing a "home-made" bumper beeper detector, Jim Bell noted that: >Interestingly, this is probably more or less the circuit that was originally >used in 1970's Fuzzbuster-type radar receivers before the heterodyne systems >were developed. I wonder if an old Fuzzbuster would make an effective scanning device for this purpose? I remember them being VERY "broad-band," in that almost any RF signal (not only radar) would set them off. Has Jim (or anyone else) experimented with this? P.S.--Great list! ************************************************************************** 9)From: SpyKing@thecodex.com Subject: Scanning Recorder Software I found this program and thought it useful. It has several surveillance applications... if anyone on the list knows of others, please advise the list... >Scanner Recorder - Technology that makes it possible to record speech without recording the silence. Download at: http://www.davee.com/adar.html > The next release (1.2.1) is now available. For the list of improvments, click here. For pricing and availability, click here. > >Download the free recorder software now. Size is about 770K. > >Scanner Recorder is not just another recorder application. This recorder only >records when the incoming signal is above a user specified threshold. This >allows the recorder to pause while nothing is being received. The automatic >pause feature also lends itself well to recording the date, time and other >information every time the squelch opens. >> >>Some of the uses of Scanner Recorder are: > >Recording police activity. >Recording channels that hardly ever have activity, such as tactical or >military frequencies. >Catch rarely heard conversations. >Air traffic control recording. > >Here's an explanation on what Scanner Recorder is and does: > >Scanner Recorder provides a switched recorder that listens to the sound coming >into the audio card and if the sound is above the minimum threshold, the >recorder operates. If the sound level falls below the threshold, the recorder >pauses. >Since the recorder starts and stops based on what it hears, Scanner Recorder >incorporates an anti-clipping feature that keeps the very beginning of the >audio that breaks the squelch threshold from being clipped off. The result is >that when sound is played back, you cannot hear where the recorder started and >stopped. There is absolutely no click at all. The output file format only >supports WAV files. Currently you will need a seperate WAV player capable of >playing very large files. The Media Player that comes with Windows 95 cannot >load files larger than the amount of available virtual storage. There will soon >be a playback facility with some nice features to allow searching for audio >based on what time the recording was made. > >I chose a default of 8000 sps because, for recording voice communications, 8000 >works just fine and can record one hour of constant audio in 28.8 megabytes. >That's pretty efficient use of disk space without any compression applied to >the data. > >The original intent for this recorder was to be able to record the audio from a >scanner each day, then if something happens in the news, you can play back the >actual emergency communications as it occurred. >SYSTEM REQUIREMENTS > >Computer: 486 PC or faster. >Memory: 4 MB RAM >Disk Space: 770K program, not including audio storage use. >Operating System: Windows 95 and Windows NT. >Screen: 16 color (or higher) display. >Hardware: Windows compatible sound card that has record capability, only 8 bit samples supported currently. 16 bit capability will be added to the shareware version. > PRICING AND AVAILABILITY > >Currently, only the freeware prototype is available. There will be a shareware >version available this summer which will have a fully capable playback unit >which will allow you to seek to the exact point in time of the recording to >allow very selective listening capability. > >The free prototype recorder will be supported to some extent in order to fix >any bugs that get reported and to add some basic usability features. Improved >versions will be posted to this site periodically throughout the upcoming >weeks. > >The price of the shareware version of Scanner Recorder will be approximately >$20 US dollars. ************************************************************************** 10)From" SpyKing@thecodex.com Subject: POCSAG Pager Decoding Software I found this and thought it of interest to the list... The POCSAG and Radio Paging Site: http://www.bearnet.demon.co.uk/pocsag/ PD (POCSAG Decoder) PD, together with a receiver or scanner, allows the off-air decoding of POCSAG paging signals at 512, 1200 or 2400 bits/second. This makes it extremely useful for the testing of paging transmitters and systems. Decoding of both numeric and alphanumeric pager data is supported, as is the hex dumping of raw POCSAG codewords. PD runs on an IBM PC or equivalent, anything from an 80286 upwards. It requires 512K of conventional memory and a small amount of hard disk or floppy. Hard disk is recommended. PD runs from DOS, running from Windows is not recommended. PD is freely distributed as a shareware version. Also checkout this site... >Announcing P_Base Version 1.00 >For users of PD.exe, the DOS POCSAG decoder, a Windows based companion >database shareware program is now available for evaluation. >Visit: http://www.devans.demon.co.uk/p_base.html >You can download P_Base and/or PD from the site. If you're just getting into Pager decoding, you can also learn about POCSAG and link to other sites. ************************************************************************** 11)From: "Stephen Douglas" Subject: Domain Search? How do you find the domain name of a server when all you have is the DNS number? I use chat lines from time to time and I want a way to gauge the honesty of some of the people I chat with. Often I interrogate the chat server for thier identity and I get a response (electronically) like "user is 'unknown' dhatter@222.20.343.222". That number is their IP number and is usually unique to each connection. But part of it is based on their ISP's DNS number (I think). Their should be a way to look that up and find out the domain name of their ISP...ergo, the location. If they tell me they are in Walawala and I find out their ISP is in Tampa Bay, I know they are lying and should drop them like a hot potato(e). I've tried the unix commands "dig" and "nslookup" through a telnet session to no avail. Any help would be appreciated. Stephen Douglas K6HZT http://www.dfsystems.com ************************************************************************** 12)From: Paul Longo Subject: Re: Bench Equipment Software >Anyone using software to replace bench equipment? I've seen a few programs >but not happy with package. I'm looking for something to attach receiver & >laptop computer and get spectral display. Haven't tried it, but AOR's EDI-5000 ($89.95) software provides spectrum analysis on Windows PC's. However, it requires AOR's SDU-5000 and a scanner with 10.7 IF output. It doesn't eliminate hardware--it just enhances functionality of existing equipment. A decent source for this and other radio products is EEB (Electronic Equipment Bank) in Vienna, VA. More info available at: www.access.digex.net/~eeb/eeb.html or 1-800-368-3270 ************************************************************************** 13)From: BrK Subject: Re: Request for Guidance?Security Breech? >I work for a major supplier of broad band Internet connectivity. Recently we gave a class for a group of foreign nationals [the ones that use to be the enemy] >The last day of the class was on a Saturday when the office was only staffed by the course instructor. So he was not in a position to monitor all of the people and could have subsequently left some one in the building after he left, but that is not the issue. >In that office we have a complete Lan, switchboard which is attached to a leased line connected to our Pop. >That afternoon the power went out to the "office system" not to the building, then mysteriously came back on about two hours later. Now the power to the building was never effected or showed signs of wavering in any manner. >My question is what should be looked for in our connnection cabinets that may have been inserted to give an outside source the ability to dial in and use our system to spoof or otherwise act as a host for some one to act as if they were us on the Net. What kind of equipment should be used to detect this inserted parasite should there be one and when would be the most obvious time for it to be operated in the opinion of the "greater mind". ----- My take on this: Probably a bad stroke of luck due to either Mother Nature, or an untrained repairman. You do not say what sort of leased line you have, a 56k circuit is a little different from a T1 or fractional T1 type circuit. In either case, if somebody actually wanted to be YOU on the Internet for whatever reason, they could do so without making themselves so obvious. For example, if somebody wanted to impersonate your host/server, it would not be hard to take a moderately high powered laptop, loaded with Windows NT, or Linux and steal one of your LAN connections somewhere inside of your office, the machine could be easily hidden in a ceiling or whatever. Parasites to look for? Tell me more about your enitre setup from the telco's demarc to your server. Some things to maybe look for: If you are using the standard type of router which usually has two WAN connections, is there anything connected to what should be an unused port? Any new LAN ports in use that you can't account for?? Does your equipment look different, or disturbed in any way? What are your physical and firmware security measures? Where is the telco's demarc inside the building? Do you share a large office with other occupants, or is it only you in the building? 56K and ISDN circuits really have no demarc equipment, other than an RJ-4x jack. T1's have a 'Smart Jack' or intelligent jack on your premises, in most office buildings, this is where all the phone trunks enter the building, from there it is distributed to your space via ordinary twisted pair wire, someone could easily attach their own DSU and Router anywhere along this line, and temporarily disable your service, and bring their equipment up on your lines. ************************************************************************** 14)From VallacciNY@aol.com Subject: Title III Suppliers This list is great, however, I'd like to see more field surveilance info and suppliers rather than TSCM talk. Personally, I am looking for a supplier of Title III surveilance equipment. All input would be appreciated. Jon Vallacci ************************************************************************** 15)From: Medic Subject: PI Qualifications in NY? I am very interested in the Private Investigations field. I also have great interest in survailence technology. What are the qualifications for becomming a PI in New York City / New York State? It seems as if, but probably not the case, it is exciting work. How profitable is this business? ****PLEASE DO NOT PRINT MY E-MAIL ADDRESS!!!***** +++Moderator's Note+++ If my memory serves correctly it's 5 years as intern under licensed PI or three years LE/governmental investigative experience in rank other than patrol. You MUST show investigative experience not just general patrol duties... Contact NYS Dept of State, Div of Licensing for application and/or complete roster of ALL NYS PI's and watch guard agencies ************************************************************************** 16)From: caldwell Subject: Re: E.S.I. (Colorado) Rick: Perhaps it is not the school, but rather that they accept "anyone" into their program, but my overall experience with utilizing graduates from ESI has been that they have to be re-trained in many areas, not the least of which is that personal protection confrontation is not on the agenda; the idea of protection is to remove the Subject as quickly as possible from the threat. In short, I think they turn out "body guards" ("cowboys" ala Tonya Harding's thug) as opposed to professionals. I know that they have some very qualified instructors up there in some of the disciplines (no names will be mentioned) but the overall curriculum seems to be to teach people to fight, not think. Now, as a qualifier, I have not hired an ESI Grad for the past three years because of the above problems I experienced previously with them, so it is possible they have addressed these problems. Greg ************************************************************************** 17)From: trever.kb9nhu@juno.com (Trever C. Trader) Date: RE: D.C. CELL PHONE DANGER!!! Well, to start off, there is no danger in cellular telephones. I think it would be common sense for anyone in the security/privacy business to realize that if you talk on something wireless, i.e... a Cell phone, can be intercepted by anyone, unless you are using a TDMA (Time Division Multiple Access (Digital)) cellular network. Then, your call can only be intercepted by someone with a digital descrambler. The same goes for cordless phones, and two-way radios... Anything "wire-less" can be picked up. Next, it would not matter about the tape, the tape recording of the conversation would not be court-admissible. Since it is illegal to monitor cellular phones, and cordless telephone frequencies, It would be illegal to rebroadcast this recording. However, if the recording was made from a "mirror" frequency, then the recording would be legal, since the recording was not made from an actual cellular frequency. So, as you see, this could be quite a detailed matter. All it comes down to is, if you want to remain "private" talk on a land-line phone. Trever C. Trader 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two Issue #14 ****************************************************************************** Vol.Two Issue #14 The Surveillance List Jan.12, 1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Schools 02) Re: Bench Equipment Software 03) RE: RN-36 Recorders 04) Re: RN-36 Recorders 05) Re: D.C. Cell Phone 06) Re: Surveillance Recorders 07) Cordless Phone Security 08) Microphones 101 09) Hackers Hack Crack, Steal Quake 10) Intro - UK 11) recording/divulging scanner traffic 12) Re: Domain Search 13) Intro 14) Ro-Bo Roach 15) The Tale Unfolds ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Trace Carpenter Subject: Re: Schools There are some schools in the Dallas, Texas areas I can locate and refer you to. However, I don't know how much good they'll do you. The schools for securtiy guards will get you commissioned in Texas but you're state may not recognize them. As for P.I. Schools, I've never met anyone who came out of one that we hired that I didn't have to totally retrain. If they came out of one of the schools, we don't even consider them anymore. -- Sincerely, Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 660 Amberton Tower Suspicions Confirmed 4144 N. Central Expy. Problems Solved ! Dallas, Texas 75204 Free Consultations 214.828.4520 214.828.1817 Facsimile ************************************************************************** 2)From: Trace Carpenter Subject: Re: Bench Equipment Software I've been wondering the same thing. Radio Shack has logic probe/ oscilloscope software and digital multimeter software. I haven't gotten to play with it very much, but what little I did felt awkward. Maybe it's just because I haven't used it much yet. Kind of like getting used to a new keyboard. -- Sincerely, Trace Carpenter ************************************************************************** 3)From ljsaisa@algonet.se Subject: RE: RN-36 Recorders >I did some research and it looks like Panasonic has discontinued the RN >36. The only place I can find one is at a spy shop at a very inflated >price ($500+). >Does anyone know place that might sill have one at a reasonable price. >Brad Walstrom You may contact Lorraine Electronics in the U.K. They sell complete RN 36 BWR-systems, don't know the exact price today, but they where quite affordable when we bought ours 3 yrs ago. If you decide to contact them, talk with a girl named: JoAnn O'Neil, she might be able to help you. INTERNATIONAL SECURITY AGENCY Website : http://www.algonet.se/~ljsaisa E-mail : ljsaisa@algonet.se Tel : Int+46 (0)8-645 22 82 (08.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24 h/day) Post : Po.box 167, S-162 12 Stockholm, SWEDEN ************************************************************************** 4)From: WWMason@aol.com Subject: Re: RN-36 micro recorder Yes, it has been discontinued. Try Ken Fox at (916) 388-1750. Be aware that it's a good unit but does not have auto reverse so you'll have to flip the tape after 1.5 hours. The Sony M 909 does have auto reverse and is still in production. The built in mic on the Sony is sub-par. It does work very well with an exterior mic or amplified mic. ************************************************************************** 5)From: "Patrick J. Quinn" Subject: D.C. CELL PHONE >>I thought that this would interest EVERYBODY!!!! >> >>GINGRICH'S CELL PHONE NIGHTMARE snip - snip - > >well the person who made the tape should be arrested, that constitues an >illegal wiretap. REMEMBER the ECPA???? Isn't it interesting that some of us look at this as a violation of the ECPA, and how terrible it is. Imagine that someone would violate it and make a "private" conversation, (illegally listened to), and then make it public knowledge. And yet, NO mention is made or referred to just WHO is in MORE violation here. The person who made this "private" conversation public, or the Public Official/s whom are betraying their masses by trying to concieve a cover up. Whom would you consider more trustworthy in these circumstances? I vote for the person who had the guts to make the conversations public of an elected official/s attempted to mis-inform or cover up their intentions. I feel more violated by the public official/s conversations than do I feel upset that someone using their own home radio happened to pick-up some, supposedly "private" conversation. So who really is the dummy here?!?!? Just my 2 cents. Pat Quinn KB7ZQF ************************************************************************** 6)From: SpyKing@thecodex.com Subject: Re: Surveillance Recorders With the RN-36 taken off the market this might be the next best thing in small concealable body recorders... Checkout: http://www.olympusamerica.com/recorder/l400/l400.html At the main page you can also view other Olympus recorders. They have an interesting DAT recorder and an "in-the-ear" telephone pickup for recording telephone conversations... ************************************************************************** 7)From: Jason Christman Subject: Cordless Phone Security There has been much discussion here about cordless and cell phones. You said that all cordless phones could be intercepted quite easily. How about the ones that use a digital security encryption...? Is it possible to get through these codes...and if so...what would someone have to do if they wanted to? Thanx in advance... ************************************* * E-MAIL: jasonch@jersey.net * * HOMEPAGE: www.jersey.net/~jasonch * ************************************* --TRUST NO ONE-- +++Moderator's Note+++ It has been my experience that the old saying is true... "Anything that man invents, man can defeat"... Maybe some of our Cyperpunks and/or Phreakers can answer this one... ************************************************************************** 8)From: SpyKing@thecodex.com Subject: Microphones 101 Any list members who are interested in learning about microphones should checkout: http://www.star.so.swt.edu:80/radiostation/lec06&07.html ************************************************************************** 9)From: faried nawaz Subject: Hackers Hack Crack, Steal Quake 8:00 pm PST - Hackers broke into the Web server and file server of Crack dot Com, a Texas gaming company, on Wednesday, stealing the source code for id's Quake 1.01, as well as Crack's newest project, Golgatha, and older games Abuse and Mac Abuse. Although the hackers left a trail that may make them easy to track, the theft did its damage. "Quake's raw engine market value dropped several hundred thousand dollars," said Dave Taylor, who formed Crack dot Com after leaving id Software, where he worked on Doom and Quake. But Barrett Alexander of id denies that the financial loss will be so great, saying that the code for Quake's unique engine is recognizable, making it hard for anyone to be able to use without id's knowledge. Crack dot Com is also worried that its unreleased techniques, developed for Golgotha, could make their way into the hands of other game competitors, who could copy bits of code into their own software. The hackers, who were able to get through the Crack's firewall, left intact a bash-history file that recorded all their movements. They even logged onto IRC's #quake to brag about their exploits, and made Quake's source available on Crack dot Com's homepage (it is no longer there). The hackers, who identified themselves as being from the group FEH, probably broke through Crack's firewall through their Web site. The former editor of the now defunct hacker magazine FEH denies any knowledge of the event, and has already posted a disclaimer. ************************************************************************** 10)From: business.services@jura.almac.co.uk Subject: Intro Hi, Please let me introduce myself: My name is John Randall and I have recently formed a company called Jura Business Services based in Northern Ireland. I am 47 years old and was Head of Security for a Banking Group for 17 years prior to setting up my own business. Before this I was with H.M. Forces where I specialised in physical security of key establishments. Jura Business Services provides a Risk Management / Technical Security Service to local businesses, small and large, and is primarily an independent consultancy service. In the short while that I have been operational I have experienced numerous requests for low level technical searches where persons have suspicions that they are a victim of technical surveillance. I have attended courses in tscm and have used tscm equipment during my careers. In view of the demand I am now in the process of acquiring additional equipment in order that I can provide a professional service to the Northern Ireland marketplace. I would be interested in joining this group to increase my knowledge of current trends and to share experiences and I look forward to hearing from you. John L. Randall Jura Business Services +44(0)1846 670537 email: business.services@jura.almac.co.uk ************************************************************************** 11)From: Len Romanick <102144.3543@compuserve.com> Subject: re: recording/divulging scanner traffic To the moderator and list: I am very interested in the recent discussion concerning the Gingrich tapes. I attend events of a certain automotive racing sanctioning body and often legally intercept tramsmission by drivers and crewchiefs and also record them. Racing Information Service on Compuserve has reporters at these events and some of them have a scanner along. They occaisionally include radio quotes of *certain* teams in their reports and there is one driver who would allow the track announcer to patch in to his radio from time to time. I asked the owner of the service about this practice based on the law cite I include below. He informed me that they have permission from those teams they quote. Previous to this, I almost got myself into serious trouble when I started to inform a certain individual about the tactics of her favorite driver and how I knew certain allegations were true based on what I heard and recorded at racing events. A broadcast engineer turned me on to part of the code after a similar discussion ensued in the HAM forum on CIS. I forward this for information to the list and will leave it to you decide what should be done with it as far as the list is concerned. There appears to be some incorrect assumptions being made by list members. They have the right conclusion but based on incorrect information to get to the conclusion. Len Romanick * UNITED STATES CODE o TITLE 47 - TELEGRAPHS, TELEPHONES, AND RADIOTELEGRAPHS + CHAPTER 5 - WIRE OR RADIO COMMUNICATION + SUBCHAPTER VI - MISCELLANEOUS PROVISIONS ---------------------------------------------------------------------------- 605. Unauthorized publication or use of communications * (a) Practices prohibited Except as authorized by chapter 119, title 18, no person receiving, assisting in receiving, transmitting, or assisting in transmitting, any interstate or foreign communication by wire or radio shall divulge or publish the existence, contents, substance, purport, effect, or meaning thereof, except through authorized channels of transmission or reception, (1) to any person other than the addressee, his agent, or attorney, (2) to a person employed or authorized to forward such communication to its destination, (3) to proper accounting or distributing officers of the various communicating centers over which the communication may be passed, (4) to the master of a ship under whom he is serving, (5) in response to a subpena issued by a court of competent jurisdiction, or (6) on demand of other lawful authority. No person not being authorized by the sender shall intercept any radio communication [interception not illegal by my reading of the Electronic Comms Act of 1986] AND [emphasis mine] divulge or publish the existence, contents, substance, purport, effect, or meaning of such intercepted communication to any person. No person not being entitled thereto shall receive or assist in receiving any interstate or foreign communication by radio and use such communication (or any information therein contained) for his own benefit or for the benefit of another not entitled thereto. No person having received any intercepted radio communication or having become acquainted with the contents, substance, purport, effect, or meaning of such communication (or any part thereof) knowing that such communication was intercepted, shall divulge or publish the existence, contents, substance, purport, effect, or meaning of such communication (or any part thereof) or use such communication (or any information therein contained) for his own benefit or for the benefit of another not entitled thereto. This section shall not apply to the receiving, divulging, publishing, or utilizing the contents of any radio communication which is transmitted by any station for the use of the general public, which relates to ships, aircraft, vehicles, or persons in distress, or which is transmitted by an amateur radio station operator or by a citizens band radio operator. * (e) Penalties; civil actions; remedies; attorney's fees and costs; computation of damages; regulation by State and local authorities o (1) Any person who willfully violates subsection (a) of this section shall be fined not more than $2,000 or imprisoned for not more than 6 months, or both. o (2) Any person who violates subsection (a) of this section willfully and for purposes of direct or indirect commercial advantage or private financial gain shall be fined not more than $50,000 or imprisoned for not more than 2 years, or both, for the first such conviction and shall be fined not more than $100,000 or imprisoned for not more than 5 years, or both, for any subsequent conviction. [it is much longer but this is the meat and the rest doesn't affect the above] ************************************************************************** 12)From: fiveyes@iiiii.com (5-i's) Subject: Domain Search? >How do you find the domain name of a server when all you have is the >DNS number? Use Internic's web-based domain finger at- http://rs.internic.net/cgi-bin/whois However, be aware that IRC users are often routed through other than their normal ISP, because many of them aren't IRC servers themselves. And, the IRC server may not be anywhere physically near the user, because of the nature of logical routing on the Net. That applies double if they are subscribed to a large commercial outfit such as Netcom or AOL... Now if someone can just tell me how to determine the sex of the individual I'm chatting with... :) 5-i's (kc5mog) ************************************************************************** 13)From: "Shadow Chasers" Subject: Intro Introducing "SHADOW CHASER INVESTIGATIONS(c)" Our web sight at www.shadow-chasers.com is underconstruction and should be up by the time you read this posting. Providing Counterintelligence & CounterHuman Intelligence (C-HUMINT) services. We accept sub-contract work from licensed PI firms only. SCI team is comprised of one former CI Agent fresh out of the military and one PI-intern; if you have information that can help us establish our firm, we have open ears! If you have a URL that you would like link from my WEB SIGHT, drop me a line. Shadow Chaser ************************************************************************** 14)From: "Sammy Piazza" Subject: Ro-Bo Roach Greetings to all: Well, you'd better keep a LARGE can of "RAID" handy as the Japanese have just developed a method of useing American Cock-Roachs (live ones) and implanting transmitters (audio & video) in the living roaches. They can also "direct" the movement of the "little buggers" any way they want via a remote signal. I accidently ,honest accidently landed on a RUSH LIMBAUGH program on friday as he was outlining this new "snooping" technique. It seems they use American roaches because they are "hearterier" than our Japanese counterparts. The Japanese say that they can be used to look through rubble for earthquake victims. I suppose so ....however think of the possibilities....I'm sure someone already has.....Sammy Piazza Alpha Omega Information Brokers +++Moderator's Note+++ This gives new meaning to the question "Are you bugged? ;-) ************************************************************************** 15)From: james coburn Subject: The tale unfolds The tale unfolds: WHO PASSED THE TAPE? The DRUDGE REPORT has learned that Rep. James McDermott (D-WA) is now highly suspected of passing the illegal audiotape of Newt Gingrich's private conference call to the NEW YORK TIMES. Information from top Capitol Hill intelligence is pointing directing at McDermott -- the former chairman and still senior Democrat on the Ethics Committee investigating Gingrich. The charge is explosive and threatens to undermine the entire ethics process. NEWSWEEK will report tomorrow that the Justice Department's Computer Crimes Section is on the case. John and Alice Martin of Fort White, Florida overheard the Gingrich call on their police scanner and tape-recorded it, a felony violation of the Electronic Communications Privacy Act of 1986. The United States Code for Wire and Electronic Communications -- Title 18, Chapter 119, Section 2511 -- prohibits disclosure of any wire or electronic communications without a court order. Last week the Martins took their tape to Washington where they attended a reception for incoming House freshmen. A highly suspected scenario, according to Hill Sources, has the couple showing up in the reception area of the Ethic Committee hearing room. They told the receptionist they would like to give something to McDermott. The receptionist said she would give it to him, but they insisted they had to hand it to him mano a mano. McDermott came out of the hearing room, he talked with the couple, the transfer was made. It is now believed that Representative McDermott gave the tape to Adam Clymer of the NEW YORK TIMES, who has been leading the paper's coverage of Gingrich's ethical woes and who wrote Friday's subsequent story on the conference call. But in a strange twist of the printing press, Section 605 of the Wire and Communications Code makes it illegal to publish the contents of any and all cell phone communications. Any person who violates this section willfully and for purposes of direct or indirect commercial advantage or private financial gain (surely the TIMES hoped the cell phone transcript would sell papers and please the advertisers) shall be fined not more than $50,000 or imprisoned for not more than 2 years, or both, for the first such conviction. It should be noted that the Martins have declined all comment on the matter; friends said they are in the process of contacting an attorney. The GOP on the Sunday morning talk shows demanded that their Democratic counterparts come clean on who actually gave the tape to the TIMES. A grand game of cat and mouse is currently playing out. With most on the Hill now strongly suspecting that it's Jim McDermott's prints that are all over this power play gone sour. Developing. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two Issue #15 ****************************************************************************** Vol.Two Issue #15 The Surveillance List Jan.13,1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Domain Search 02) A PI's Anthem 03) Mind Prober Software 04) Voice Stress Analyzers 05) Two Unrelated Questions 06) Re: Domain Search 07) Re: Title III Toys 08) Electronic Workbenches 09) Automatic covert triggering device 10) Need Help Electronics Project 11) Tape Recorder to Scanner 12) Upcoming Trade Shows 13) Re: Cell Phone Post 14) Minox Cameras 15) Re: RN-36 16) Intro - UK 17) Re: Laser Listener ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: BrK Subject: Re: Domain Search Re: >11)From: "Stephen Douglas" >Subject: Domain Search? > >How do you find the domain name of a server when all you have is the >DNS number? Have you tried the InterNic? go to http://rs.internic.net/cgi-bin/whois from there type in either the second level domain name (ie: if you wanted to look up a server named chat.stuff.com, you would use stuff.com) or the IP network number, most ISP's have a 'Class C' address, if their network number was: 205.182.61.10, you would enter 205.182.61 This will tell you something about the ISP that owns either the domain name, or IP Network. One thing to consider, many ISP's have POP's in many different cities and states, the info will generally pertain to their headquarters location, so it's possible that someone from Nevada could be on a network from Texas. If anybody wants a more in-depth explanation of how some of the Internet's structures operate, just say so. Good luck. ************************************************************************** 2)From: Trace Carpenter Subject: A P.I.'s Anthem Came across this and thought memebers of the surveillance list might enjoy it. Every breath you take (breath analyser) Every move you make (motion detector) Every bond you break (polygraph lie detector) Every step you take (electronic anklet) Every single day (continuous monitoring) Every word you say (bugs, wires, taps) Every night you stay (light amplifier) Every vow you break (voice stress analyser) Every claim you stake (computer matching) Every smile you fake (brain wave analysis) I'll be watching you (video surveillance) -- Sincerely, Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 660 Amberton Tower Suspicions Confirmed 4144 N. Central Expy. Problems Solved ! Dallas, Texas 75204 Free Consultations 214.828.4520 214.828.1817 Facsimile +++Moderator's Note+++ Trace, You're a poet and you don't know it... ;-) ************************************************************************** 3)From: Trace Carpenter Subject: Mind Prober Software Does anyone out there have a copy of the old Mind Prober Software? Rumor has it the government shut them down. -- Sincerely, Trace Carpenter ************************************************************************** 4)From: Trace Carpenter Subject: Voice Stress Analysers I'm looking for input and contact information on VSA's (Voice Stress Analysers) Like most things there appear to be good ones and bad ones. I'm still looking for a good one to play with. I have found a company in Ct. that builds them but I have mixed emotions about the company. Any and all input would be appreciated. -- Sincerely, Trace Carpenter ************************************************************************** 5)From: diablo Subject: Two unrelated questions... Hello everyone. Two unrelated quick questions for you all. 1. I'm writing a research paper on the intelligence services of the US. Right now, I'm looking for current or former employees of the Central Intelligence Agency or anyone who has had training or dealings (i.e.- collaborated on project, recieved briefings, etc) with them. I'm not looking for specific information. Just general things. Any directorate is helpful. E-mail me personally. I'm not releasing any sources in the paper unless you approve. Thanks. 2. What are the laws concerning interception of e-mail within the US? Not as in attacking a system, but through broad based scanning over a network, such as the internet? The reason I ask is because I'm semi-concerned that an acquaintance of mine is having their mail read. It's nothing important, and pgp is not really worth the effort. I was just wondering how one goes about broad-based scanning by recipient. If you respond to this question, please cc a copy to my box along with the post. Thanks again. Jeff ************************************************************************** 6)From: Trace Carpenter Subject: Domain Search Go to one of the "Search Internic" sites. You might try looking in a search engine under Whois. -- Sincerely, Trace Carpenter ************************************************************************** 7)From: Trace Carpenter Subject: Title III Toys We build a lot of our equipment. What exactly are you looking for? -- Sincerely, Trace Carpenter ************************************************************************** 8)From: Trace Carpenter Subject: Electronics Workbenches We're getting ready to cleanout, repaint and reorganize our electronics shop. I've seen some really nice prefab benches and we're trying to decide between building new ones or buying ready mades. Does anyone have any contacts for a bench they really like? I've called a few companies out of Who's Who in Electronics and asked for lit on their's. -- Sincerely, Trace Carpenter +++Moderator's Note+++ Try Wrightline. They are national company and make great stuff... I just redid my lab and ordered a custom made workbench from them that is configured in an L formation 10 ft x 10 ft x 3 ft deep and fits in the corner. It is 7 feet high with 3 racks of shelving (plenty) and 20 feet of counterspace. Each shelf holds (allegedly) 2000 lbs. The construction is angular steel with steel reinforced formica shelving & desktop. I have a TON of bench & lab equipment on it and it's a pleasure having everything at your fingerips within easy reach to the right or left... only problem is this baby set me back $6,000. :-( ************************************************************************** 9)From: spyman0007@aol.com (Spyman0007) Subject: Automatic covert triggering device I thought I'd pass this on for anyone who needs it. I'm the covert man for a state agency and this is something I constructed and used a couple times with great results. Let's say you need a small device which can be hidden in something, which will trigger an alarm, or start a VCR when the article is moved out of or through a certain area. I took a Linear brand garage door opener transmitter, removed the PC board from the case, and solder jumpered the microswitch, causing the transmitter to transmit continuously. It will transmit for around 10 days on a single battery. (Remove the red L.E.D. to conserve current) I took the associated garage door receiver, cut the path on the relay to remove the voltage from the relay contacts (making a set of dry contacts), then ran the relay contacts to unused telephone line pairs, which went to a VCR. I used a cheap Goldstar VCR, cut the path on the stop button, and jumpered the paths on the record & play buttons. I removed the 24 volt relay from the garage door receiver and replaced it with a Radio Shack DPDT relay. I attached the stop button line on the VCR to the normally closed side of the relay, and the rec/play buttons to the normally open side of the relay. When the article that had the transmitter hidden in it came within around 300 feet of the receiver, the receiver kicked in and caused the VCR to start recording. After the article passed through the camera's field of view and out of the area, the receiver disengaged and stopped the VCR. This saves tape, and adding batteries to the transmitter adds transmitting time. The VCR will toggle from stop to record as the transmitter passes through the area. I was unable to make this work with Emerson VCR's but Goldstar units will work. I use only the later model Linear transmitters with the crystal resonator, the range is far superior than others. A person can also carry the transmitter in his pocket to start recording when he enters an area, or hide it in a vehcle. ************************************************************************** 10)From: (Bret Johnson) Status: Need Help Electronics Project Since my only access to a computer is at work, I do not have the ability to interact with Newsgroups directly (parts to the program that allow that are intentionally deleted from our computers). I personally live in a bad area -- on the Mexican border -- which is frequented by thieves and transients and use a baby room monitor transmiter (housed in an outside electrical fuse box) to listen for unusual noises (breaking glass, human foot steps at 3:00 a.m., etc.) while I am at home. Works well with the exception of electrolytic capacitors breaking down (maybe the heat?) prematurely. I would really appreciate some help on another project of mine, even if you could act as an "intermediate" to post it to a usenet and forward replies to me (I know -- that could be asking a lot!). I have various sensors available to place on the "Mexican trails" leading towards my home but need a wireless reporting proceedure to alert me in advance of the possibility of an "undesireable" visit. Radio Shack #60-4024 Space Patrol (children's) Walkie Talkies fit the bill nicely due to size, power requirements, and above all -- cost per unit. Replacing the "rubber-duckie" antenna with an appropriate length long wire (and jumpering the internal loading coil) solves the range problem. Cutting the negative battery cable provides a nice place to tie relay contacts from my sensors to (the Push-To-Talk button can be locked down in a constant transmit mode on this model) and serves to enable a signal to be transmitted only when a sensor is tripped. A slide switch is installed to provide a constant "Morse Code tone" upon power connection. (This model is equipped with an internal audio oscillator and a Code Key button.) The wires to the speaker of the "reporting" radios are cut to prevent sidetone and provide a "silent" (from the intruder's point-of-view, anyway) alarm. Noisy alarms tend to just get stolen, especially if the area is lit well enough for a hasty search. The problem I have is distinguishing which sensor has been tripped by the audio tone (sent by its accompanying transmitter). Altering the audio oscillator tone for each transmitter and just remembering which tone is transmitted from where seems to be the best approach. Can someone help me locate which parts need to be swapped out to alter the tone of the internal code-key audio oscillator? I've tried Radio Shack and Tandy National Parts but no service manual or schematics seem to exist. Thank you in advance. Bret (Radio Technician in the Armed Services) johnsonb@laugate1.lau.aetc.af.mil Locate & identify transmitters in your area with RadioMap(tm) ************************************************************************** 11)From:zmbwf@somtel.com Subject: Tape Recorder to Scanner I bet a lot of you are wondering just how to get your scanner to get along with your tape recorder. I had this same trouble when I bought my 2005 about three or four years ago. I sat down with both manuals, the one for the tape recorder, and the one for my voice-activated tape recorder. The scanner`s recording jack was putting out about 100 Millivolts of audio , while the tape recorder only required about 20 MICROVOLTS to activate it. That is quite a large difference ! Needless to say, whenever I plugged the tape recorder into the back of the scanner, if I put it into voice - activate mode, the reels would turn all the time anyway, since there was enough audio coming from the scanner even when it was squelched to activate the recorder. And when the scanner would un-squelch , the audio from it was so loud that all I would get on the tape was noise ! Here is what I did to solve the problem. It is a well - known fact that any voltage will divide across resistors in series according to the magnitude of each resistor. I decided to take advantage of this fact. So, I took two resistors and hooked them in series, like this: ---\/\/\/\/\---o---\/\/\/\/\--- R1 - 100K R2 - 1K Now, if I were to hook this arrangment up across the scanner`s output, we would get the following: Voltage across R1 = 99 Millivolts Voltage across R2 = 1 Millivolt here is how we would go about hooking this up to the scanner and recorder: |
| | braid lead | | from from | | recorder recorder | | I mounted the reistors on a small perf-board I had. The actual level applied to the tape recorder can be adjusted by adjusting the value of R1 slightly. My particular case needed a 220 OHM for R1, which came out just right ! You can make R1 easier and quicker to adjust if you use a 1K trim-pot However, your particular recorder might need more audio than that. It is possible to just use about a 5K trim - pot for R1 to begin with. Then , you can just adjust it for your recorder`s audio needs. This has worked REALLY WELL for me for quite a while. Louie ************************************************************************** 12)From: SpyKing@thecodex.com Subject: Upcoming Trade Shows Thought this might be of interest. If you know of others, please post... Perhaps the list members that are located locally to these shows could acquire info on their respective show and post... I've attended some of them and found them to be a wealth of information... SECUREX January 14-16, 1997 London, England, phone +44 181 2075599 SECUREX January 21-24, 1997 Poznan. Poland, phone +44 1223 233952 SECURITY February 4-8, 1997 Moscow, Russia, phone +70 95 4600510 SECURITY 97 February 17-21, 1997 Sofia, Bulgaria, phone +35 92 872631 EUROSICUREZZA 97 February 25-27, 1997 Bologna, Italy, phone + 392 55700098 SECURITEX February 26-28, 1997 Bangkok, Thailand, phone +44 171 4861951 SECUREX February 26-28, 1997 Johannesburg, South Africa, phone +44 181 9107743 TOP SECURITY 97 March 4-7, 1997 Germany, phone +3311 47602220 ISC March 12-14, 1997 Las Vegas, USA, phone +44 181 9107743 IDEX March 16-20, 1997 Abu Dhabi, phone +9712 324744 FIRE AND SECURITY March 23-24, 1997 Bahrain, phone +44 1737 768611 MIPS April 7-10 Moscow, Russia, phone +44 171 2869720 SECURITY AND FIRE BANKING April 8-11 Ho Chi Minh City, Vietnam, phone +852 25117427 SECUREX 97 April 8-12 Budapest, Hungary, phone +361 2636000 SECURITY AND SAFETY 97 April 9-11 Vienna, Austria, phone +4431 21665260 SECURITY, FIRE, SAFETY April 9-12 Signapore, phone +44 1494 837770 SECUREX 97 April 10-13 Lisbon, Portugal, phone +3511 3601556 SASMEX April 29-May 1 Brighton, England, phone +441737 768611 FIREX and IFSEC May 12-15 Birmingham, England, phone +44181 7422828 SECURITY/FIRE EQUIPMENT May 13-16 Shanghai, China, phone +44 171 2896982 SECURA 97 May 14-16 Brussels, Belgium, phone +322 3461132 VAROVANJE 97 May 20-23 Lubiana, Slowania, phone +38 661 1735331 INTEL 97 May 22-26 Milano, Italy, phone +392 3264285 ************************************************************************** 13)From: PRV8EYE@aol.com Subject: Re: The Surveillance List Forum - Volume Two Jan 12, 1997 Issue #14 Seems to me that the post by Patrick Quinn in this issue, accusing Speaker Gingrich of "betraying the masses" and a "cover up" (apparently he has NOT read the transcripts of the phone call) are a clear violation of your first two listed reasons for refusing a post. Please don't let this be turned into a forum for politics with all its spins and half assed accusations. This is an INCREDIBLE source of networking and information for anyone interested in the field of surveillance. It will be quickly destroyed if we allow it to be turned into a soap box for political slanderers. +++Moderator's Note+++ Point well taken... It was allowed because it brought up the issue of a politician's lack of sense using a cell phone for a (evidently) policital conversation. I don't care WHO it was personally. I thought it made a point and members would gain something from it. Not everyone on this list is a pro. There are many here to learn... P.S. Glad you like the list ;-) ************************************************************************** 14)From: SpyKing@thecodex.com Subject: Minox Cameras Interested in photography? Checkout: http://www.minox.com and view the world famous Minox Spy Camera... I own a few of the older B & C models and the palm sized 35mm. They take GREAT pictures... good for documents and just about everything else... You might also checkout: http://members.aol.com/xkaes/index.htm for a lot more info on subminiature photography... ************************************************************************** 15)From: R0819@aol.com Subject: Re: RN-36 >15)From: "Walstrom, Bradley" >Subject: RE: Recorders >I did some research and it looks like Panasonic has discontinued the RN >36. The only place I can find one is at a spy shop at a very inflated >price ($500+). >Does anyone know place that might sill have one at a reasonable price. >Brad Walstrom Brad I have purchased several RN-36s from: Southern Electronics Corp. 11N. 8th. Street Opelika, Alabama 36801 Office (205) 745-5298 Fax (205) 745-3482 Jerry Levias is the sales coordinator and will be glad to help you out. Rick Weatherby Weatherby Investigations Mobile, Alabama R0819@aol.com (334) 432-6100 ************************************************************************** 16)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Intro From UK Member Hello from The United Kingdom. Hi My name is Martin Pask I am a full time surveillance operative based in South Wales. I have been specializing in surveillance in the civilian world for the last 10 years. Prior to that I was attached to the special forces. As I said I know run my own company which undertakes covert surveillance day in day out. We are able to undertake operations in any kind of environment from urban council housing estates to rural long term observations. We operating on a UK nation wide basis but have also undertaken jobs across Europe. Our teams are all recruited from ex military sources and are full trained with the use of the latest covert video and communication equipment. For further detailed have a look at our web page: http://ourworld.compuserve.com/homepages/m_pask_security_services I have been looking through the listings over the last weekend and must admit that there is a wealth of information out there. This service has got to be an aid to any surveillance professional. If I or my company can be of any assistance to any member please do not hesitate to drop me a line. Kind regards Martin Pask M.P.I. P.O.Box 6 Aberdare Mid Glamorgan South Wales United Kingdom Tel: 44 (0)1685 870262 Fax: 44 (0)1685 876051 Mobile 44 (0) 585 220650 Pager 44 (0)1426 117150 ************************************************************************** 17)From: HtPursuit@aol.com Subject: Re: Spotting Laser Listening Devices I know there has been alot of talk regarding the laser listening device, what I ham looking for is information on spotting this device in use. The place where it can be purchased and the pros and cons. Thanks in advance. Bill ************************************************************************** 18)From SpyKing@thecodex.com Subject: Surveillance List .gif There is a .gif attached for posting on your web site if you'd like. Let the world know you're a member... ; The code is:
************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume Two Issue #16 ****************************************************************************** Vol.Two Issue #16 The Surveillance List Jan.14, 1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Intro - UK 02) Article Submissions 03) Earth Cam 04) Hacking E-Mail 05) Recording Format 06) Re: Caller ID in Australia 07) Re: Domain Search 08) Re: Tape recorder to scanner 09) RE: Video Recorders 10) Re: Electronics Project 11) Re: Voice Changers 12) Re: Voice Stress Analysers(VSA) 13) Re: Electronics Project 14) Unlocking Blocked Scanners 15) Re: Electronic Project 16) Copex Show 17) Re: Minox Cameras 18) Re: Upcoming Trade Shows 19) More Upcoming Trade Shows 20) I Need Info 21) New TSCM Materials Available ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: t_robarts Subject: Intro To whom it may concern - Many thanks for sending me the above List and for including the Back Issues file as well. I must say that I am very impressed indeed with what I have been reading today ! This will be an information service of enormous value to anyone who is interested in the information/security industry. I will certainly spread the word around people whom I have been doing business with here in London and also in Melbourne, Australia where I have some contacts in the industry. I may submit postings on their behalf or they may come to you direct. I hope that I may remain on your list of recipients for as long as this service remains in existence. Congratulations on a great product. Regards Timothy Robarts t_robarts@hands-on.ltd.uk ************************************************************************** 2)From: heatgain@igc.net (Gary Cohen) Subject: Article submissions SFIA (South Florida Investigators Association) is a non-profit Association. We publish a Journal every month. If you have an article you've written, relevant to Private Investigators, that you would like to submit for possible inclusion to the Journal, e-mail me with the article and your byline and I will fax it to our Journal editor. SFIA homepage is at: http://www.angelfire.com/fl/sfia/ Thanks! Gary Cohen Investigator International Investigative Associates Ft. Lauderdale/Pompano Beach Florida (954) 726-9685 Pager (954)409-5599 heatgain@igc.net Member-FALI & SFIA http://www.geocities.com/WallStreet/5963/ ************************************************************************** 3)From: "Shadow Chasers" Subject: "EARTH CAM" For the Surveillance Expert in need of a new high-tech toy, try the EARTH CAM, a CCD camera attached to it's own modem, the surveillance possibilities are endless with this! Visit www.earthcam.com/camera.htm for all the details, for $695 , THE EARTH CAM should lower in price when the QUICK CAM version comes out soon. For covert surveillance needs, this will be the wave of the futre, with a few modifications of course. +++Moderator's Note+++ I saw this gizmo on MSNBC the other nite. Nice, but you can also build yourself for less than half the price... it appears to be CCD board camera with modem circuit board attached mounted inside see-thru plastic tube... add a microphone and you have something nifty... although I think you'd have sound problems... any ideas on this? ************************************************************************** 4)From: trever.kb9nhu@juno.com (Trever C. Trader) Subject: Hacking E-mail? I suspect my girlfriend is cheatin on me. Can anyone tell me how I can get into her AOL account and read her email? I thank you for any replies in advance. Trever C. Trader 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 ************************************************************************** 5)From: mark.locken@odyssey.on.ca Subject: Recording Format I've got a tape recording of some e-mail traffic (in an infidelity case) and I need to know how to get it into a readable format on my computer. The originating computer runs Windows 3.1 and a 14.4 modem. My computer runs Windows 95 and a 28.8 modem. I've tried a number of things with Hyper-terminal but just can't get anything on the screen. ************************************************************************** 6)From: Elementary Investigations Pty Ltd Subject: Re: Caller ID in Australia At 03:27 8/01/97 EST, you wrote: >************************************************************************** From: Trace Carpenter >Subject: Re: Caller I.D. in Australia > >I don't know if I understood your request. If you DO actually have >Caller I.D. in Australia there are several modems on the market which >display the I.D. and you can even have the software accept or decline >the call based on the i.d. info. > >Of course you can also just put an I.D. unit on that line. > >I wasn't sure what you meant by "Catching Equipment". >+++++++++++++++++++++++++++++++++++++++++++++++++++++ We dont have caller ID in Australia as yet, though the technology is in place. It apparently goes against our privacy laws. To trace a phone call we need to go through Telecom. I know for a fact though, that there is a computer software package in New Zealand that enables caller Id in Australia, however there is a huge price tag on it, some of the major corporations have it. Regards Johan Erlandsson email: lmntry@ozemail.com.au ************************************************************************** 7)From: browngrp@southeast.net Subject: re: Stephen Douglas asks about Domain Search You might check the InterNic home page for a lead on this. If you have a IP they can give you registration info about it such as owner, technical contact etc. Robert Plance Investigator@Private-Eye.com href="http://www.Private-Eye.com" Criminal Records-Driving Histories-Background Checks-Locate Individuals On-Line order form for Investigative Services. Protect Yourself, your family, your business, your customers. ************************************************************************** 8)From: Spysociety@aol.com Subject: Re: Tape recorder to scanner For those of you who are intimidated by the lack skills of kit building, contact Amateur Electronics Supply at (800)558-0411. They sell this great affordable impedence matching patch cord by BMI Inc at $19.95 and a top of the line unit at $69.95 . Tape recording from a scanner or any audio source with an external 8 ohm speaker output is simplified with no modifications. ************************************************************************** 9)From: "Walstrom, Bradley" Subject: RE: Video Recorders Any recorder designed for a commercial applications like surveillance is going to cost more than the one you would pick up at circuit city for home use. But the best price I have found for the Sony EVO is at Security Products International. Their toll free number is 800-342-5774. I have purchased from them and they have been very responsive and also provide tech support on the 800 number. They have a web site at: www.thehost.com/spi/catalog.htm#compact I am still look for a RN 36 at a reasonable price. Anyone know a location that might have one in stock? Brad Walstrom ************************************************************************** 10)From: Trace Carpenter Subject: Re: Electronics Project Being a radio tech you've probably already tried this, but have you placed an adjustable cap across the tone switch? I was thinking about a cap and resistor like you would make an R-C circut such as an integrator or defferentiator. Other than that I believe changing out the cap on the tone board to a different value should certainly change the tone. I know you've already tried the consumer route but one of the guy's that works with me also manages a radio shack store. I'd be glad to have him see if he can get a schematic. Let me know via e-mail or give me a call. Good Luck Trace Carpenter Trace Carpenter Investigations 214.828.4520 214.828.1817 Facsimile ************************************************************************** 11)From: everett@ionet.net (glen wicker) Subject: Re: Voice changers Read in one of the Post, a question on voice changers; I have used some home-brew versions but found one the other day that works well for the price, its under $100 and saw it in The Edge catalag, 1-800-732-9976. Its portable and works pretty good. They also have a office version but haven't used that one. Internet/Intelligence Consultant G. Everett Wicker everett@ionet.net 918.664.1350 Intelligence Web Link http://www.ionet.net/~everett/index.shtml ************************************************************************** 12)From: Jean-Pierre Forest Subject: Re: Voice Stress Analysers(VSA) BTW Nice poem Trace, One of the largest supplier of VSA and Stress Evaluator in my current black book is Allan Bell Enterprises, Inc which markets the PSE 2000 (approx $7500) They are at 4148 Amsterdam Circle, Savannah, GA, 31406, Tel.:(912)238-0075. Otehr supliers are listed in the Security Industry Buyers Guide published by A.S.I.S. Hope this helps, honestly, I'm not lying. Blue Skies J.P. :-) ************************************************************************** 13)From: rkdixon@esper.com Subject: Re: Need Help Electronic Project I don't know if this will help, but Electronic Goldmine (toll-free order line @ 1-800-445-0697) has a pretty good collection of wireless transmitters, etc. I recently bought a wireless alert system which has a remote alarm/chime and a magnetic activator/transmitter. They claim 100' reception and it is probably close to that. Cost was only $12.95 (cat # G8051). Don't have any stock in company, but they do have a good selection of microphones, transmitters, etc. and miscellaneous electronic components at pretty good pricing. They even advertise strange surplus items like a "Maverick Missile Gyro". I have purchased from them several times and they have always been dependable, and ship quickly. Rick Dixon Knoxville, Tn ************************************************************************** 14)From: Spysociety@aol.com Subject: Unlocking blocked scanners For those of you interested in unlocking the 800 MHZ cellular bands from selected Radio Shack Pro series, Bearcat and Regency scanners, contact Cellular Security Group at (508)281-8892 . Please note, only some of these models can be modified depending on the manufactures code on the unit. ************************************************************************** 15)From nobody@REPLAY.COM Tue Jan 14 02:35:12 1997 Date: Tue, 14 Jan 1997 08:33:57 +0100 (MET) Subject: Re: Electronic Project >From: (Bret Johnson) ... I have various sensors available to place on the "Mexican trails" leading towards my home but need a wireless reporting proceedure to alert me in advance of the possibility of an "undesireable" visit. ====================================================== One possible answer is the military AN/PSR-1A Seismic Intrusion Set The unit comes with 4 sensors but will handle 8 (I believe) New ones are available for $240 from : JRH Enterprises P.O. Box 3986 St. Augustine, FL 32085 (904) 797-9462 Tell 'em IRONWOLF sent 'ya. ************************************************************************** 16)From: COPEX@delphi.com Subject: Copex Show With reference to your recent listing of exhibitions, list members may like to be aware of the COPEX (Contingency & Operational Procurement) Exhibitions which have been taking place around the world for the last 15 years. Although primarily intended for military and law enforcement special operations groups and government intelligence agencies, the past few years has seen an increase in PI's and other qualified security professionals. Suitably qualified professionals should e-mail for the attention of the ticket unit or go to for more information regarding COPEX. Or you can always use Tel (international code) +44 01923 819301..or ...Fax +44 01923 818924 Some of the up-coming dates are COPEX USA Washington DC, USA May 12th and 13th 1997 COPEX @ SECURITY ISRAEL Tel Aviv, Israel July 1st to 3rd 1997 COPEX 97 Farnborough, UK 30th Sept to October 2nd COPEX JORDAN In conjunction with Jordanian Royal Special Forces Amman, Jordan March 1998 COPEX USA Washington DC, USA May 1998 Canberra, Australia December 1998 +++Moderator's Note+++ I have attended several Copex shows both here (USA) and in the UK. I can attest they are first rate... ************************************************************************** 17)From: Andrew Teoh Subject: Microtech? There used to be a company by the name of Microtech in Illinois which specialize in micro cameras such as minox etc and also develop minox films. Anyone know whether they are still in business? Or can anyone recommend any good source for similar products? Thank you. Regards, Andrew Teoh andrewte@pacific.net.sg ************************************************************************** 18)From t_robarts@hands-on.ltd.uk Subject: Upcoming Trade Shows. An excellent source of information about Trade Shows in this or in any other industry is the Exhibition Bulletin which is published in the United Kingdom and which is updated and sent to subscribers on a monthly basis. It can be obtained from "Exhibition Bulletin", Regent House, 291 Kirkdale, London SE26 4RZ , United Kingdom - Fax.+44-181-659-8495 - email is ExBul@dial.pipex.com I recommend this Directory simply to be helpful to other list members. I have no other interest in endorsing the Directory other than a wish in my own interest that the publishers do well enough out of their product to be able to remain in business until my own business can produce a better product. Euromonitor and Cedar Tree also publish Directories in the Safety, Security and Defense sectors. These are published on an annual basis. If anyone would like the contact information for these two Directory publishers, would they please email me at t_robarts@hands-on.ltd.uk and I would be glad to look it up and email it back. If I come across any other Directories which are of interest, I will post whatever information comes to hand on a daily basis. I would also be happy to provide list members who email me with more detailed information on Trade Shows as it becomes more available as the date of the Trade Show itself approaches. This is offered gratis in the spirit of this List which I must say that I for one am very impressed with so far. A selection from my most current issue of Exhibition Bulletin is as follows and will hopefully not duplicate what has already been posted ... COPEX November 4-6, 1997 Esher, United Kingdom ph.+44 1923 819301 ACPO July 14-16, 1998 Birmingham, United Kingdom ph.+44 181 313 3535 What's New July 15 & 16, 1997 London, United Kingdom ph.+44 1782 265511 Security Technology October 21-22, 1997 Glasgow, United Kingdom ph.+44 141 649 3233 Regards Timothy Robarts t_robarts@hands-on.ltd.uk ************************************************************************** 19)From: t_robarts Subject: More Upcoming Trade Shows. ISC - International Security Conference and Exposition in New York from 26 to 28 August, 1997. The organisers are Reed Exhibition Co.- ph.+1 203-8404800 - fax.+1 203 8404804. If you email me, I will obtain more detailed information from their London office and email back/post it to you. Regards Timothy Robarts t-robarts@hands-on.ltd.uk ************************************************************************** 20)From: Husnain Adil Cheema Subject: I need info Hi to everyone at the surveillance list centre. My name is Mr Cheema, i've just joined the S.L and i'm a learner and would like to get into the field of surveillance. Right now i'm looking for info on hacking and any other computer related topics (ATM's) etc... Cheers. +++Moderator's Note+++ Checkout: http://www.thecodex.com/hacking.html ************************************************************************** 21)From: jmatk@tscm.com (James M. Atkinson, Comm-Eng) Subject: New TSCM Materials Available Just uploaded new materials to our web site, you might want to take a look at the follow updated pages: http://www.tscm.com/ - Main Page http://www.tscm.com/bugfreq.html - Heavy Updates, info on Sony Bugs, DHS, Body Wires, etc. http://www.tscm.com/reioscor.html - Quadrupled amount of material, spec sheets, etc. http://www.tscm.com/riserbond.html - TDR Tutorial, Spec Sheets, App Notes http://www.tscm.com/whatistscm.html - Additional gvt materials http://www.tscm.com/reference.html - Added several new books, more gvt TSCM regs Let me know what you think, We curently have over 500 TSCM products available online, next round of additions will bump that to over 1000 products, and we are planning to have over 2000 TSCM products available online within the next 90 days. The next round of updates will go online the end of the month. Regards, James M. Atkinson =============================================================== Train, Observe, Detect, Protect, Defend, Repel =============================================================== James M. Atkinson Granite Island Group - TSCM.COM 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =============================================================== The First, The Largest, The Most Popular, and the Most Complete TSCM Counterintelligence Site on the Internet =============================================================== ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue#17 ****************************************************************************** Vol.Two Issue #17 The Surveillance List Jan.15,1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Surveillance Investigators Needed 02) Eavesdropping on the line 03) Re: Upcoming Trade Shows 04) Monitoring Scanners w/VOX, Telephone Interface, Etc. Schematic Info 05) Question - Reverse Search 06) L0pht Advisory? 07) Intro - Isreal 08) Intro - Denmark 09) Cellular Question 10) Useful New Resource ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: NAPA Subject: Surveillance Investigators Needed Colleagues: You are invited to assist us this Saturday, January 18, at 9:00 p.m. ET to search for commercial signal pirates. We expect......GOOD PIRATE ACTIVITY for this Pay-Per-View event. Investigators throughout the US will be searching bars, restaurants, go-go lounges, billiard halls, bowling alleys, and other public establishments to determine if these locations are showing a specific boxing event without authorization. Legal establishments have paid a fee, and are authorized to publicly display the commercial broadcast signal of this event. All other establishments showing this boxing event on Saturday night will be considered PIRATES. We need your help! If you would like more information, please Email your request ASAP. Include your name: Agency name: Address: Telephone #: Fax number: E-mail address: Cities you would like to conduct your search in: How many people you will have helping you: The more help, the more PIRATES you will locate. Remember, we will supply you with all the forms, instructions, and financial info you will need. Thank you, Jimmie Mesis, President v 888-USA-NAPA National Anti-Piracy Association f 888-FAX-5500 30 Two Bridges Road, Suite #330 v 201-575-0493 P.O. Box 10781 f 201-808-8530 Fairfield, NJ 07004 napa@easternpi.com ************************************************************************** 2)From: Paul Pomes Subject: Multi-drop quantum cryptography article in Nature 385, 47-49 (1997) (Reproduced from ) Eavesdropping on the line Secure electronic communication is becoming increasingly important. In recent years, quantum cryptography has been investigated as a means of detecting eavesdroppers on private lines. When quantum mechanical processes are used to establish the 'key' used for encryption and decryption, any eavesdropping during transmission leads to an unavoidable and detectable disturbance in the received key information. This technique has been demonstrated to be effective on standard communication lines between two users, but Paul D. Townsend now introduces a practical scheme for a multi-user network. This work demonstrates the technical feasibility of quantum cryptography for practical applications. P D Townsend Quantum cryptography on multi-user optical fibre networks (Letter to Nature) Nature 385, 47-49 (1997) ************************************************************************** 3)From: Jim Ray Subject: Re:Upcoming Trade Shows Datanet Security 97 http://www.datasec.net/ Feb. 17, 18, 19 and 20 in Miami. More computer related than directly PI stuff. I'd describe it as "an upscale DEFCON for sysadmins who want a junket to escape the snow," with better food (hopefully, if I go). They have invited Joel MacNamara to speak on TEMPEST, and if he shows, I'm there. I *may* speak there on running the remailer or debate the former NSAlawyer there, they haven't said if I will or not. Their timing isn't all that great, due to a nice financial cryptography seminar at the same time in Anguilla (a far better junket, IMO). See: http://www.cwi.nl/conferences/FC97/ On the subject of politicians and cellphone intercepts, I think that any politician who has ever supported (by not opposing) the present crypto reg.s (that bipartisan list is WAY too long for here!) has only itself to blame for being recorded, possibly anonymously, next time. Cellular companies would have LOVED to put crypto in phones, right from the start, if only to prevent massive cellular "cloning" fraud. The government didn't let them, which makes listening in on anyone a whole lot easier for everyone. "Cypherpunk types" like me tend to put our faith in good technology, rather than in the huge paper output of politicians, for our protection. See http://www.comsec.com/ for *my* kind of voice privacy solution (if I had that kind of money...). JMR Regards, Jim Ray DNRC Minister of Encryption Advocacy Dave Barry's prescription for Miami after the Brinks incident. "[W]e need to do two things: 1. Arrange with the Brinks people to periodically crash money trucks on randomly selected Miami streets. 2. Try to keep Miami's political leaders away from these crashes. Because there wouldn't be a nickel left over for the amateurs." PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5 57 52 64 0E DA BA 2C 71 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEPAwUBMtwYhzUhsGSn1j2pAQFFYwfPTRt4ai41uSFs+R4070onbJtKY3hO2SoN VSLxryNXI58+XfwpAczdSmdEgBtaop16WVm/sdHbGS6OkccjKQSi5atTQFZ6mxQK Z/rDAoSVLaBi8dIKAm3TLoEKNM/9zS5J0R/ZQ0LGivohTxJ5flLGD4Ow0l/bJQMC gbVARQvkAQ6WaMkjYppqyW8rcDzEm0P89uSGedBqlvOvKJK+3ReP9kCQrIm2/V0B qAHOq8fXdN8mFb7xIswYUNfWiwLjsPznAFmawWXbNunXVbqRdRGUZKQxM7/Hooq8 yVwISjpW9Azk87T2Sb3R8N7bMmE7WwrP4hpMC2kAM0qsrw== =O5HO -----END PGP SIGNATURE----- ************************************************************************** 4)From: Trace Carpenter Subject: Monitoring Scanners w/VOX, Telephone Interface, Etc. Schematic Info. I've had a lot of inquiries on a practical interface for recorder/telephone interface and scanner/recorder interfaces so I thought I'd post this. It is a simple circut that will allow you to record your calls, (Texas is a one party consent state; check your local laws), record a scanner, or play tones into a phone line for decoding purposes. The big problem with VOX to scanner recording is that you are coupling two dissimilar grounds which sends the vox switch out to lunch. This circut can be built for around $3 out of radio shack parts and will isolate the units so well you could actually stand in a bath tub of water holding the secondary wires with the primary in a 120VAC socket and not even feel a tingle. (DON'T TRY THIS AT HOME KIDS). I actually got the idea from a DHEW Circut used in conjuction with high voltage television circuts which are regulated by the Dept. of Health Education and Welfare. THis isolated winding passes the requirements. Hence the bathtub statement. You'll need a 1:1 transformer, about a 10MFD 100VDC Bipolar or Non Polar capacitor, and a 1-2K potentiometer (variable resistor). This is a bad schematic: Pin 1 of potentiometer Input --------}{-------Z-----------Output to Ring of input jack (ground) }{ Z-- Input --II----}{-------Z |_________Output to Tip of input jack Pin 3 Pin 2 I apoligize for the quality. Guess I should have attached a .gif file. But you'll get the idea. The "II" is the inline non-polar cap, the "}{" is the 1:1 transformer, and the "Z" is the adjustable resistor. Pin one of the resistor goes strait to the ring or ground, and pin 3 goes to the transformer's secondary windings. Pin 2 is the "wiper" which goes to the tip of the input jack. Trivia: Now you know where the term tip and ring came from in telco terms. It was the old swithboards which the trunks actually came into a jack with a tip and a ring. The adjustable resistor will act as a volume control to pasify the VOX systems, the transformer will isolate the two devices and the cap will curtail that nasty hum. The first one we designed was for a radio station in east Texas. They wanted to record telephone conversations for on air playback and their "expensive" equipment was causing interference. This works quit well and will even work on amplified phone systems like the Merlin. I use it for taking recorded statements over the phone all the time. If you want a really versatile way to put it together, mine is in a block type phone jack with a audio cord and 1/8" jack coming out of one end, and a standard RJ11 cord connects the other end to the wall. Sorry if this isn't very clear, but it's very easy. If anyone has any questions feel free to e-mail me or call. Good Luck! Trace Carpenter Technician at Large Trace Carpenter Investigations 214.828.4520 ************************************************************************** 5)From: kevina@citynet.net Subject: Question hello, I have a phone number and area code,(usa) is there any way to check and see who the phone is listed to? thanks. kevin ************************************************************************** 6)From: Anonymous@? Subject: BoS:L0pht?Advisory? Originial advisory released Feb 2 '96 to select building hackers - Re-released Jan 14th 97 to the general public. LLL 00000000 PPPPPPPP HHH HHH TTTTTTTTTTTT LLL 00 000 PPP PP HHH HHH TTT LLL 000 0 000 PPP PPP HHH HHH TTT LLL 000 0 000 PPP PPP HHHHHHHHHHH TTT LLL 000 0 000 PPPPPPPP HHH HHH TTT LLLLLLL 0000 000 PPP HHH HHH TTT LLLLLLLL 00000000 PPP HHH HHH TTT Who says we don't have a sense of humor! First you were given Monkey, the MD4/MD5 s/key cracker program that works with either sniffer logs or /etc/skeykeys data. Next you were told of a blatant flaw in the current implementation of Security Dynamics' SecurID card where you can trivially predict the passcode of a person about to log in (oh so sorry, did we forget to post that one?). Lotus Domino was cakewalk for Weld as he cut-and-pasted his way to spoofing their server. Sendmail 8.7.5 stayed in place pretty long until we finally brought its demise. Kerberos 4 turned out to be the hackers friend. This month a hack close to the heart of computer enthusiasts everywhere is unveiled (complete with ascii art!). Inspired by the lack of truly K-RAD G-Philes floating around out on the net, following in the style of such greats as the Stoner's Hymnal and the Countlegger files. We'd mention the influence of greats such as cDc but that should go without saying! L0pht Heavy Industries presents: How to scam coffee from FILTER FRESH coffee vending machines. [trust us about this fun one as next week the potato-head hits the proverbial fan with a couple of big companies - besides we needed the caffeine to take on the upcoming giants] HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT Before you go on, re-read that last paragraph - paying special attention to the last part!!! HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT_HINT The motivation: --------------- Suppose you don't work at Microsoft, Sun, or any of the companies that provide free hot caffinated beverages to their employees. It's a sad day when you find yourself at work (or scrounging around someone elses place of employment... I dunno, perhaps leaving a portable sniffing laptop up in the acoustic ceiling tiles) around 2am and the only coffee available is from a FILTER FRESH vending machine. It's even sadder when you are being asked to deposit .55 cents for an 8oz. cup of really poor java. The culprit: ------------ The particular model under scrutiny is relatively distinctive. It stands about 2' tall and about 1.5' wide with a section on the bottom left to insert your cup for the monstrosity to spit joe into. The upper left corner will most likely have an emblem similar to the following. -------------------------------------- | ....... | | ******* | | FILTER FRESH ##### | | &&& | | Coffee Excellence ! | | | -------------------------------------- Beware! There are two main different models of these. One exhibits the 'flaw' while the other doesn't. Both have LED/LCD displays in the upper left corner that spout the following message in stand-by mode. Right next to it is a button labeled 'Start'. ------------------- ------- | For this choice | | | | Insert $.55 | | Start | ------------------- ------- Or some similarly outlandish price for a cup of coffee. Remember, above all else, coffee wants to be free! Both models also have the standard selection of 'cell-membrane' style buttons to the right of the logo and under the LED/LCD. ----------- | cup size | Coffee Hot Water | ------- | ------------------------------------ -------------- | | / | | -------- -------- -------- ------- | |/ sml | | | / | | / | | / | | / | | | | | |/ | |/ | |/ | |/ | | ------- | | Coffee | | Decaf | | 50/50 | | Water | | ------- | -------- -------- -------- ------- | | / | | -------- -------- -------- ------- | |/ lrg | | | / | | / | | / | | / | | | | | |/ | |/ | |/ | |/ | | ------- | | Mild | | Medium | | Strong | | Carafe| ----------- -------- -------- -------- ------- --------- --------- | / | | / | |/ Hot | |/ Mocha | |Chocolate| | Java | --------- --------- One model will have the buttons 'Hot Chocolate' and 'Mocha Java' while the other model does not. This scam has worked on most of the machines that *do* have the extra buttons (at least that I've come across). NOTE: sometimes the pad connectors are still there but the pads are not. On the machines that normally do not have these extra buttons you will only see one hole for a led. On machines that would normally have these buttons you will find holes for two led's. The Flaw: --------- It seems it is a default software setup (firmware?) as it comes from the distributor. The exploit: ------------ The machine will undercharge you for the same selection if you specify carafe. To wit: 1) press the "coffee" button. 2) press the "strong" button (hey, it's gonna taste nasty no matter what you pick... You didn't think it was _really_ fresh did you?!?. Might as well get a caffeine kick out of it). 3) press the "carafe" button. The LCD/LED will change it's display to: ------------------ | Press 'carafe' | | for each cup | ------------------ 4) deposit your .25 cents 5) press the 'start' button. You just saved your scrawny little ass .30. If you are a poor sod who is unfortunate enough to work at a company with these monstrosities and don't have other means for coffee at odd hours you can save yourself a small bundle over the period of a single month. Month X = 30 days Weeks in month ~4 Work days in month 20. Cups of shitty coffe consumed per day = 4 Normal price = 20 X 4 X .55 = $40 New Improved price = 20 X 4 X .25 = $20 Hey, that's a case of the _good_ beer you just saved for! Maybe that will help you to forget you work in such a sweat house! [note to our friends at Filter Fresh Co.: Don't buy us! We aren't very thrilled with your coffee. We also do _not_ want you to send us scantilly clad women as we don't think you would do a much better job choosing them. We will not continue to drive you insane by picking apart your coffee kiosks and posting the exploits publicly to the world. You can send money if you feel like it. It will be used to help switch various l0pht members over to decaf corinthian coffee. Actually, that last line is a lie as all we drink is beer and Coca-Cola... ahhh we give up, Scriptors of Coffee we ain't. This one goes out to the SOD guys: come back from vacation! We can't stand the boring nothingness that each day brings without your p1mpin sk1llz.] The guys and gals (hi Meg!) at L0pht Heavy Industries. +++Moderator's Note+++ Posted in the spirit that "coffee wants to be free" ;-) and that "techs" generally don't have a lot of change in their pockets... ************************************************************************** 7)From: Narkunski Gideon Subject: Intro - Hotam Israel Investigations, Inc. Hotam is a private consulting firm specializing in commercial investigations, business information services and security management. 27A Keren Kayemet L'Yisrael Givatayim, Israel 53225 Tel.972.3.6729958 Fax.972.3.672.2234 http://www.hotam-il.co.il ************************************************************************** 8)From: special@post1.tele.dk (Pless, Allan) Subject: Intro - Denmark A great idea. Count me in. I have been working with internal security and surveillance for nearly 15 years specialising in theft of money, products and last but not least, informations. Looking forward to hear from you Allan Pless Pless & Partner Internal Security and Consulting 48 H Roskildevej DK-3400 Hilleroed Denmark Oops - forgot email adress: special@post1.tele.dk Sorry ************************************************************************** 9)From: Bruce P Hall Subject: Cellular Question Does anyone know how one would go about converting an etacs cellphone to receive cellular transmissions in the manner of a scanner. Is it possible to programme a target ESN into such a converted unit to enable interception of calls to and from a specific cell phone and follow it on cell switches - assuming that you are in the same geographic location. I have used the celltrack system which works ok but I'm looking for a cheap alternative using surplus cellular kit that we have, if this is possible. The list is great - thanks to SpyKing Bruce P Hall Elite Systems bhall@elite.u-net.com elite@compuserve.com -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6 mQCNAjA53DsAAAEEANaL/n1EBessakXmrH9rQ/+MEP/VDMIHUIvfNftVX7dQE1nO P44LSU2RtD2Zht4vApPuk88j6Jl9KiXpo5pM3HCBIts74cgX8RZzna1nRLc/Xv/y J/GqPt1c055qdz2yAyBfHDM+xzjWsz8DvheK8ACD4puMHFhNW6jQV4AQNO41AAUR tClCcnVjZSBQLiBIYWxsIDwxMDA2NzYuMjExQGNvbXB1c2VydmUuY29tPokAlQMF EDLX4xGo0FeAEDTuNQEBi30D/2CLbn6iSiNN6UkNEv0HQiyqM5TNuNXIQBQ1zA33 xaSd4zB385ijtvr1xf1sU51ukj4wfjXCU2rnNsjDQh1OUD4Fk1BM4JjhVcjKrfbA MzQpO8YKm8Q3bnF76isgYRh6RrneAx9MdHykhZ0/gJPZaVxlVccMdEgJA3/j9rvY kjdy =CTBR -----END PGP PUBLIC KEY BLOCK----- ************************************************************************** 10)From t_robarts@hands-on.ltd.uk Subject: USEFUL NEW RESOURCE. Hi everyone - please take note of a new Newsgroup which would seem to be in our line of business - alt.security.espionage There is a reference in this Newsgroup to a Web site which has some interesting things on it - as follows - http://www.mcs.net/~klast/www/spy.html Regards Timothy Robarts t_robarts@hands-on.ltd.uk ************************************************************************** ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue #18 ****************************************************************************** Vol.Two Issue #18 The Surveillance List Jan.16, 1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Help locating person in USA 02) Intro 03) Re: Voice Changers 04) Re: Need Help Electronics Project 05) Surveillance Career? 06) Web Site Hacking 07) PGP FAQ - Long ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Elementary Investigations Pty Ltd Subject: Help locating person in USA I'm a PI based in Sydney Australia. My client is a young woman who is about to get married and now wishes to contact her father whom she has never met. In fact the only information she has is his name and the fact he was in the US military during the Vietnam war and that he is of African/American descent. To all the members in the USA, which dept. of the military is this information available ? Is there anywhere else from where the information can be obtaned ? And can they be contacted via the net or email. Any help would be greatly appreciated ! Johan Erlandsson Elementary Investigations email : lmntry@ozemail.com.au ************************************************************************** 2)From: steague@iquest.com (Steve Teague) Subject: intro Hello to All I have been with the mailing list for some time now and thought it was about time to let everyone know about The DaShun Detective Agency in Huntsville Alabama. We specialize in a variety of areas: Divorce, Fact Finding, Surveillance, Background Checks & Transmitter (Bug) Detection. No-one in this area can touch our prices and for the next two months you can send us anywhere in the state of Alabama for only $45 per hour (flat rate) on any marriage & Business Suspicions as well as Insurance Fraud or Workmens Comp cases. DDA has already helped other investigators and insurances companies from across the US. Don't miss out on this limited time offer. Please feel free to visit our web site or call us @: http://iquest.com/~steague Voice: 1-205-852-6761 Pager: 1-205-512-1022 Fax: 1-205-851-6081 I look forward to speaking with you S. Teague ************************************************************************** 3)From: "C. Kuethe" Subject: Re: Voice Changers Page 39 of January 1993 Radio Electronics/Electronics Now Schematics of how to build your own digital signal processing voice changer. There was another issue of the same mag. with a more general purpose audio DSP board. Both about $100. More to come, once I find that other article. PLUR Chris -- Chris Kuethe LPGV Electronics and Controls http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Subject: Re: Need Help Electronics Project Bret, my advice to you is to simply swap the crystals in each transmitter, setting each to a different frequency. You may need to collect a few cheap toy walkie talkies or rip apart an old cordless telephone or two, but crystals are relatively easy and inexpensive to come by. You'll want to keep them in the low-VHF band, of course. The closer to the original frequency the better, as long as the frequencies on each transmitter are all different enough to avoid interference between themselves. After you're re-crystalled the transmitters, program each frequency into a a bank of your radio scanner and set it to scan mode. Keep a little sheet handy that tells you which frequencies correspond to which transmitters. When you're alerted by the tone, check the frequency on your scanner and glance at your handy reference sheet (if you haven't memorized it yet) for the location of the tripped alarm. Changing the audio frequency of the oscillator in each transmitter could probably be done by changing the value of a capacitor or two, but you'd have a hell of a time distinguishing between the tones, especially if you have more than two or three units operating at once. cracked@primenet.com ************************************************************************** 5)From: "Greg Papuga" Subject: question I am a freshman in college and I am trying to figure out what I want to do with my life. Recently I have been thinking about the home security buisness or some thing along the lines of what you people do. How do I get professional training? Do I have to join some government agency and get top secret clearances for this training or are there other options. thank you for your help. Greg ************************************************************************** 6)From: LazySkillz@aol.com Subject: Web site hacking or Juno hacking Anybody know how to hack a Juno account so you can access it? Or what about hacking a web site, such as a Geocities web site? Thanks for any info. +++Moderator's Note+++ You will find the Web Site Hacking FAQ at: http://beaver.fu-q.com/nomad/faqs/www/index.html This information is provided for those wishing to safeguard their site from being hacked ;-) Just in case the CIA or DOJ wants to bone up on security... ************************************************************************** 7)From" SpyKing@thecodex.com Subject: Where to get PGP FAQ For those list memebrs who don't know about or use PGP this should answer some questions. If you don't have it get it... and use it... WHERE TO GET THE PRETTY GOOD PRIVACY PROGRAM (PGP) FAQ Revised 21 December 1996 For questions not covered here, please read the documentation that comes with PGP, get one of the books mentioned below, or search for other relevant FAQ documents at rtfm.mit.edu and on the alt.security.pgp comp.security.pgp comp.security.pgp.resources news group. A NOTE FROM THE FAQ MAINTAINERS Peter Herngaard is taking over the maintenance of this FAQ until further notice. Some of you sent me (Mike Johnson) corrections and suggestions for this FAQ, and I stored them away on my hard disk to edit from. Then, Windows 95 got indigestion (induced by a sound card) and destroyed all of the data in that partition. If you suggested changes and they aren't in this FAQ, please send them to Peter Herngaard . WHAT IS THE LATEST VERSION OF PGP? Viacrypt PGP (commercial version): 4.00 MIT & Philip Zimmermann (freeware, USA-legal): 2.6.2 Staale Schumacher's International variant: 2.6.3i for non-USA (2.6.3ai source code only); 2.6.3 for USA (2.6.3 U.S. Compliant version for (Macintosh and MS-DOS)) WHERE CAN I GET VIACRYPT PGP? http://www.pgp.com PGP Inc. Headquarters 555 Twin Dolphin Drive Redwood Shores, CA 94065 Tel: (415) 631-1747 Fax: (415) 631-0599 WHERE IS PGP ON THE WORLD WIDE WEB? U.S. only availability: PGP: http://web.mit.edu/network/pgp-form.html PGPfone: http://web.mit.edu/network/pgpfone International availability: PGP and PGPfone: http://www.ifi.uio.no/pgp/ WHERE CAN I FTP PGP IN NORTH AMERICA? If you are in the USA or Canada, you can get PGP by following the instructions in any of: ftp://net-dist.mit.edu/pub/PGP/README ftp://ftp.csn.net/mpj/README.MPJ ftp://miyako.dorm.duke.edu/pub/GETTING_ACCESS ftp://ftp.csua.berkeley.edu/pub/cypherpunks/pgp/ ftp://ftp.gibbon.com/pub/pgp/README.PGP ftp://ftp.wimsey.bc.ca/pub/crypto/software/README http://www.well.com/user/ddt/crypto/pgp-ftp-readmefirst.html> WHERE IS PGP ON COMPUSERVE? GO NCSAFORUM. Follow the instructions there to gain access to Library 12: Export Controlled. AOL Go to the AOL software library and search "PGP" or ftp from ftp://ftp.csua.berkeley.edu/pub/cypherpunks/pgp or another site listed above. It is possible to get PGP from ftp sites with hidden directories with the following trick: (1) View the README file with the hidden directory name in it, then quickly (2) Start a new ftp connection, specifiying the hidden directory name with the ftp site's address, like ftp.csn.net/mpj/I_will_not_export/crypto_xxxxxxx (where the xxxxxxx is replaced with the current character string). WHAT BULLETIN BOARD SYSTEMS CARRY PGP? MANY BBS carry PGP. The following carry recent versions of PGP and allow free downloads of PGP. US 303-516-9969.Hacker's Haven, Denver, CO 303-772-1062 Colorado Catacombs BBS, Longmont CO 8 data bits, 1 stop, no parity, up to 28,800 bps. Use ANSI terminal emulation. For free access: log in with your own name, answer the questions. 314-896-9309 The KATN BBS 317-887-9568 Computer Virus Research Center (CVRC) BBS, Indianapolis, IN Login First Name: PGP Last Name: USER Password: PGP 501-791-0124, 501-791-0125 The Ferret BBS, North Little Rock, AR Login name: PGP USER Password: PGP 506-457-0483 Data Intelligence Group Corporation BBS 508-668-4441 Emerald City, Walpole, MA 601-582-5748 CyberGold BBS 612-690-5556, !CyBERteCH SeCURitY BBS! Minneapolis MN 914-667-4567 Exec-Net, New York, NY 915-587-7888, Self-Governor Information Resource, El Paso, Texas 909-681-6221 ATTENTION to Details (ATD BBS) All lines v.32bis/14.4KBPS minimum CH +41-1-322-7129 MoonLight BBS, Zurich 28800 bps, V34 ZYXEL ELITE 2864 DE +49-781-9483621 MAUS BBS, Offenburg - angeschlossen an das MausNet +49-521-68000 BIONIC-BBS Login: PGP DK +45 47 10 72 76 HIT-BBS, Veksoe 28800 bps U.S. Robotics V.34 Log in with your real first and last name and complete the registration procedure. Search for PGP in the file area. NL +31-26-3890037 Viber BBS, NOTB HOST Gelderland 8 data bits, 1 stop, no parity, up to 28,800 bps. (ISDN soon) Use ANSI terminal emulation. For free access: log in with your own name, answer the questions. Latest vesion and other tools: FILE AREA: [NOTB] - PGP +31-71-5768914 Insanity Systems III Just logon and answer some questions about where you live and get PGP as well as a lot of PGP-tools for free. The system also has an offline and online PGP-server available for your public keys. WHERE CAN I FTP PGP CLOSE TO ME? BR ftp://ftp.ibilce.unesp.br/pgp The last avaliable version is PGP 2.6ui DE ftp://ftp.cert.dfn.de/pub/pgp/ IT ftp://idea.sec.dsi.unimi.it/pub/security/crypt/PGP FI ftp://ftp.funet.fi/pub/crypt/pgp/ NL ftp://ftp.nl.net/pub/crypto/pgp ftp://ftp.nic.surfnet.nl/surfnet/net-security/encryption/pgp NO ftp://menja.ifi.uio.no/pub/pgp/ NZ ftp://ftphost.vuw.ac.nz SE ftp://leif.thep.lu.se TW ftp://nctuccca.edu.tw/PC/wuarchive/pgp/ UK ftp://sable.ox.ac.uk/pub/crypto/pgp HOW CAN I GET PGP BY EMAIL? If you have access to email, but not to ftp, send a message saying "help" to ftpmail@decwrl.dec.com or mailserv@nic.funet.fi WHERE CAN I GET MORE PGP INFORMATION? http://www.csn.net/~mpj http://www.mit.edu:8001/people/warlord/pgp-faq.html http://www.eff.org/pub/EFF/Issues/Crypto/ITAR_export/cryptusa_paper.ps.gz ftp://ds.internic.net/internet-drafts/draft-pgp-pgpformat-01.txt http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html http://web.cnam.fr/Network/Crypto/(c'est en francais) http://web.cnam.fr/Network/Crypto/survey.html(en anglais) http://www2.hawaii.edu/~phinely/MacPGP-and-AppleScript-FAQ.html http://www.pgp.net/pgp http://www.sydney.sterling.com:8080/~ggr/pgpmoose.html http://www.ifi.uio.no/pgp/ http://inet.uni-c.dk/~pethern/privacy.html http://www.stack.urc.tue.nl/~goofy/PGP http://www.well.com/user/ddt/crypto/pgp-ftp-readmefirst.html WHAT ARE SOME GOOD PGP BOOKS? Protect Your Privacy: A Guide for PGP Users by William Stallings Prentice Hall PTR ISBN 0-13-185596-4 US $19.95 PGP: Pretty Good Privacy by Simson Garfinkel O'Reilly & Associates, Inc. ISBN 1-56592-098-8 US $24.95 _E-Mail_Security_, _How To Keep Your Electronic Messages Private_ (covers PGP & PEM) by Bruce Schneier 365 pages c.1995 pub: John Wiley & Sons, Inc. ISBN 0-471-05318-X $24.95 US pace. The Computer Privacy Handbook: A Practical Guide to E-Mail Encryption, Data Protection, and PGP PRivacy Software by André Bacard Peachpit Press ISBN 1-56609-171-3 US $24.95 800-283-9444 or 510-548-4393 THE OFFICIAL PGP USER'S GUIDE by Philip R. Zimmerman MIT Press April 1995 - 216 pp. - paper - US $14.95 - ISBN 0-262-74017-6 ZIMPP Standard PGP documentation neatly typeset and bound. PGP SOURCE CODE AND INTERNALS by Philip R. Zimmerman April 1995 - 804 pp. - US $55.00 - 0-262-24039-4 ZIMPH How to Use PGP, 61 pages, (Pub #121) from the Superior Broadcasting Company, Box 1533-N, Oil City, PA 16301, phone: (814) 678-8801 (about US $10-$13). IS PGP LEGAL? Pretty Good Privacy is legal if you follow these rules: Don't export PGP from the USA except to Canada, or from Canada except to the USA, without a license. If you are in the USA, use either Viacrypt PGP (licensed for commercial use) or MIT PGP using RSAREF (limited to personal, noncommercial use). Outside of the USA, where RSA is not patented, you may prefer to use a version of PGP (2.6.3i) that doesn't use RSAREF to avoid the restrictions of that license. If you are in a country where the IDEA cipher patent holds in software (including the USA and some countries in Europe), make sure you are licensed to use the IDEA cipher commercially before using PGP commercially. (No separate license is required to use the freeware PGP for personal, noncommercial use). For direct IDEA licensing, contact Ascom Systec: Erhard Widmer, Ascom Systec AG, Dep't. CMVV Phone +41 64 56 59 83 Peter Hartmann, Ascom Systec AG, Dep't. CMN Phone +41 64 56 59 45 Fax: +41 64 56 59 90 e-mail: IDEA@ascom.ch Mail address: Gewerbepark, CH-5506 Maegenwil (Switzerland) Viacrypt has an exclusive marketing agreement for commercial distribution of Philip Zimmermann's copyrighted code. (Selling shareware/freeware disks or connect time is OK). This restriction does not apply to PGP 3.0, since it is a complete rewrite by Colin Plumb. If you modify PGP (other than porting it to another platform, fixing a bug, or adapting it to another compiler), don't call it PGP (TM) or Pretty Good Privacy (TM) without Philip Zimmermann's permission. IMPORTANT: Please note that there is an official distribution site for MIT PGP and another for the International version: WorldWideWeb references: U.S/Canada non-commercial use: http://web.mit.edu/network/pgp-form.html Norway/International non-commercial use: http://www.ifi.uio.no/pgp/ U.S. commercial use: http://www.pgp.com WHAT IS PHILIP ZIMMERMANN'S LEGAL STATUS? Philip Zimmermann was under investigation for alleged violation of export regulations, with a grand jury hearing evidence for about 28 months, ending 11 January 1996. The Federal Government chose not to comment on why it decided to not prosecute, nor is it likely to. The Commerce Secretary stated that he would seek relaxed export controls for cryptographic products, since studies show that U. S. industry is being harmed by current regulations. Philip endured some serious threats to his livelihood and freedom, as well as some very real legal expenses, for the sake of your right to electronic privacy. The battle is won, but the war is not over. The regulations that caused him so much grief and which continue to dampen cryptographic development, harm U. S. industry, and do violence to the U. S. National Security by eroding the First Ammendment of the U. S. Constitution and encouraging migration of cryptographic industry outside of the U. S. A. are still on the books. If you are a U. S. Citizen, please write to your U. S. Senators, Congressional Representative, President, and Vice President pleading for a more sane and fair cryptographic policy. WHERE CAN I GET WINDOWS & DOS SHELLS FOR PGP? http://www.dayton.net/~cwgeib ftp://menja.ifi.uio.no/pub/pgp/pc/msdos/apgp22b3.zip http://alpha.netaccess.on.ca/~spowell/crypto/pwf31.zip ftp://ftp.netcom.com/pub/dc/dcosenza/pgpw40.zip ftp://ftp.firstnet.net/pub/windows/winpgp/pgpw40.zip http://www.eskimo.com/~joelm(Private Idaho) ftp://ftp.eskimo.com/~joelm http://www.xs4all.nl/~paulwag/security.htm http://www.LCS.com/winpgp.html http://netaccess.on.ca/~rbarclay/index.html http://netaccess.on.ca/~rbarclay/pgp.html ftp://ftp.leo.org/pub/comp/os/os2/crypt/gcppgp10.zip ftp://ftp.leo.org/pub/comp/os/os2/crypt/pmpgp.zip http://www.aegisrc.com http://www.ncinter.net/~rewilson/PGPClick/ WHAT OTHER FILE ENCRYPTION (DOS, MAC) TOOLS ARE THERE? PGP can do conventional encryption only of a file (-c) option, but you might want to investigate some of the other alternatives if you do this a lot. Alternatives include Quicrypt and Atbash2 for DOS, DLOCK for DOS & UNIX, Curve Encrypt (for the Mac), HPACK (many platforms), and a few others. Quicrypt is interesting in that it comes in two flavors: shareware exportable and registered secure. Atbash2 is interesting in that it generates ciphertext that can be read over the telephone or sent by Morse code. DLOCK is a no-frills strong encryption program with complete source code. Curve Encrypt has certain user-friendliness advantages. HPACK is an archiver (like ZIP or ARC), but with strong encryption. A couple of starting points for your search are: U.S. only availability: ftp://ftp.csn.net/mpj/qcrypt11.zip ftp://ftp.csn.net/mpj/README ftp://ftp.miyako.dorm.duke.edu/pub/GETTING_ACCESS International availability: ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/file/ ftp://idea.sec.dsi.unimi.it/pub/crypt/code/ HOW DO I SECURELY DELETE FILES (DOS)? If you have the Norton Utilities, Norton WipeInfo is pretty good. I use DELETE.EXE in del110.zip, which is really good at deleting existing files, but doesn't wipe "unused" space. US ftp://ftp.csn.net/mpj/public/del121.zip NL ftp://basement.replay.com/pub/replay/pub/security/del120.zip UK ftp://ftp.demon.co.uk/pub/ibmpc/security/realdeal.zip WHAT DO I DO ABOUT THE PASS PHRASE IN MY WINDOWS SWAP FILE? The nature of Windows is that it can swap any memory to disk at any time, meaning that all kinds of interesting things could end up in your swap file. ftp://ftp.firstnet.net/pub/windows/winpgp/wswipe.zip WHERE DO I GET PGPfone(tm)? PGPfone is in beta test for Macintosh and Windows'9 users. The MIT has shut down their ftp distribution of PGPfone for Macintosh and Windows'95, so within the U.S/Canada you must obtain PGPfone using a WorldWideWeb browser. U.S. only availability: http://web.mit.edu/network/pgpfone International availability: ftp://basement.replay.com/pub/replay/pub/voice/ http://menja.ifi.uio.no/pub/pgp/ WHERE DO I GET NAUTILUS? Bill Dorsey, Pat Mullarky, and Paul Rubin have come out with a program called Nautilus that enables you to engage in secure voice conversations between people with multimedia PCs and modems capable of at least 7200 bps (but 14.4 kbps is better). See: U.S. only availability: ftp://ripem.msu.edu/pub/crypt/GETTING_ACCESS ftp://ripem.msu.edu/pub/crypt/other/nautilus-phone-0.9.2-source.tar.gz ftp://ftp.csn.net/mpj/README ftp://miyako.dorm.duke.edu/pub/GETTING_ACCESS International availability: ftp://sable.ox.ac.uk/pub/crypto/misc ftp://basement.replay.com/pub/replay/pub/voice/ The official Nautilus homepage is at: http://www.lila.com/nautilus/ HOW DO I ENCRYPT MY DISK ON-THE-FLY? Secure File System (SFS) is a DOS device driver that encrypts an entire partition on the fly using SHA in feedback mode. Secure Drive also encrypts an entire DOS partition, using IDEA, which is patented. Secure Device is a DOS device driver that encrypts a virtual, file-hosted volume with IDEA. Cryptographic File System (CFS) is a Unix device driver that uses DES. CryptDisk is a ShareWare package for Macintosh that uses strong IDEA encryption like PGP. U.S. only availability: ftp://ftp.csn.net/mpj/README ftp://miyako.dorm.duke.edu/mpj/crypto/disk/ International availability: http://www.cs.auckland.ac.nz/~pgut01/sfs.html ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/disk/ ftp://ftp.nic.surfnet.nl/surfnet/net-security/encryption/disk/ ftp://sable.ox.ac.uk/pub/crypto/misc/ ftp://menja.ifi.uio.no/pub/pgp/mac/ ftp://basement.replay.com/pub/replay/pub/disk/ WHERE IS PGP'S COMPETITION? RIPEM is the second most popular freeware email encryption package. I like PGP better for lots of reasons, but if for some reason you want to check or generate a PEM signature, RIPEM is available at ripem.msu.edu. There is also an exportable RIPEM/SIG. U.S. only availability: ftp://ripem.msu.edu/pub/GETTING_ACCESS International availability: ftp://idea.sec.dsi.unimi.it/pub/crypt/code/ HOW DO I PUBLISH MY PGP PUBLIC KEY? Send mail to one of these addresses with the single word "help" in the subject line to find out how to use them. These servers sychronize keys with each other. There are other key servers, too. pgp-public-keys@keys.pgp.net pgp-public-keys@keys.de.pgp.net pgp-public-keys@keys.no.pgp.net pgp-public-keys@keys.uk.pgp.net pgp-public-keys@keys.us.pgp.net WWW interface to the key servers: http://www-swiss.ai.mit.edu/~bal/pks-toplev.html For US $20/year or so, you can have your key officially certified and published in a "clean" key database that is much less susceptible to denial-of-service attacks than the other key servers. Send mail to info-pgp@Four11.com for information, or look at http://www.Four11.com/ Of course, you can always send your key directly to the parties you wish to correspond with by whatever means you wish. CAN I COPY AND REDISTRIBUTE THIS FAQ? Yes. Permission is granted to distribute unmodified copies of this FAQ. WHERE CAN I GET THE RECENT REVISION OF THIS FAQ IN PLAINTEXT? UseNet: alt.security.pgp,comp.security.pgp.resources, alt.answers Ftp: ftp://ftp.csn.net/mpj/getpgp.asc Note that a lot of older revisions are floating around on the net. If you want to receive new revisions this FAQ directly from the maintainer instead send an email message to: Peter Herngaard WHERE CAN I GET THIS FAQ IN HTML? Some kind people have converted this document to HTML. You are free to convert this FAQ to whatever format you want. If you do so, I would appreciate it, and include the URL in this FAQ. Steven 'GoofY' de Brouwer http://www.stack.urc.tue.nl/~goofy/PGP/get_faq.htm Florian Helmberger http://www.geocities.com/athens/1802/where-is-PGP.html Dave Del Torto http://www.well.com/user/ddt/crypto/where_is_pgp.html NOTE: If one or more of the URLs above does not work correctly I advise you to contact the individual who converted the FAQ into HTML before me. HOW DO I SUBMIT INFORMATION CORRECTLY TO THIS FAQ? Send your submission to Peter Herngaard: To submit information correctly to this FAQ, you should follow this guidelines: 1.0. When submitting information available by ftp, WWW, Gopher, etc. please use the notation similar to this: ftp://ftp.eff.org http://www.eff.org gopher://gopher.eff.org 1.1. You would help me if you yourself check the reference before sending the applicable address to me. 2.0. When submitting information about resources available on Bulletin Board Systems (BBS) please include the following data, if available: BBS Name: [_____] Telephone number with international country code prefixed [_____] Connection rate: [300/1200/4800/7200/9600/14400/16800/19200/ 21600/26400/28800/31200/33600] User registration required before download of PGP: [Yes/No] Applicable export controls: [Yes/No/Don't know] Your home town and/or province: [_____] Comment [__________ __________] 3.0. If you submit a title of a published book please include author, year of publishing, publisher, ISBN, price etc. Use the following PGP PUBLIC KEY to send secure email to: Type Bits/KeyID Date User ID pub 1024/E8E044BD 1995/11/21 Peter Herngaard Peter Herngaard ------------------------------ ************************************************************************** ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue # 19 ****************************************************************************** Vol.Two Issue #19 The Surveillance List Jan.17,1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) 5 Kinds of help with reverse search 02) Re: E-Mail Surveillance? 03) Securex Exhibition, London, UK. 04) Arkansas Bans Phone Scramblers? 05) Re: Phone Help 06) Earthcam Part II 07) RADIO SHACKS 5" TV/8MM VCR" 08) Shotgun Microphone 09) FDIC Check Out Your Competitors' Deposits, On-line 10) Join the Navy? 11) DTMF Decoding Software 12) Medical Records Search 13) Caller ID in Australia 14) Re: Question 15) Variable Capacitors 16) Re: ESI 17) Background Check Jamacia 18) Re: Cellular Phone Question 19) Cellular Interceptor for Sale ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Arlene Manduca Subject: 5 Kinds of help with reverse search >From: kevina@citynet.net >Subject: Question >hello, >I have a phone number and area code,(usa) is there any way to check and >see who the phone is listed to? thanks. kevin ************************************************************************** There are several ways to do a reverse search. Here are the top 5. The hardcore method that works with unlisted phone numbers is last. Method 1 1) I have 2 sets of disks and will give it a shot. Email me the number. Method 2 2) Buy the CD Roms that come out quarterly for the entire US. They are well worth the $100-$150 and usually come with one free update within the year. You can pay less at a computer show $89.00 but check the cut date, you want the latest. If you can't see the cut date (which quarter) Don't buy it! My recommendation is the Select Phone Series from Pro CD. It has been traditionally the most accurate according (not to a random laboratory test - funny how each company pays an independent lab to tell us that theirs is the most accurate - the tests are bullshit IMO) but two years actual use under a variety of circumstances with many hundreds of lookups. Select Phone is slower loading than the Phone Disk series but a year old issue has still shown to be more accurate than more current release of Phone Disk. The Phone Disk series seems to be getting more accurate based upon my own experience. I find having both sets very useful. If one doesn't have it, the other might, because of data entry differences. Caveat, Since the data is primarily compiled from phone books realize that the very moment that the disks are off the manufacturing line. Some of the numbers listed have come from phone books scheduled to be updated that month (ie. SOME phone listings are 11 months old. So all of the years changes to those sets of books will not be in those disks but in the next quarter's disks or later. This process of updating phone books happens to different books every month all year long, so the disks are never totally in date, but great to have nevertheless. Phone numbers change frequently and the information is primarily taken from actual paper phone books and "manually data entered" (hard to believe but that's what I've been told by their PR people) ostensibly in China. You need to be broad in your search because sometimes and "s" gets typed in as a "5" or a "Z". There is a skill to using the disks and really squeezing information out of them. I love having them, I've been getting them for a few years now and have found them invaluable. Various Uses Someone calls and says they are a 5 million dollar a year company with 80 employees working out of their home in a low income area ...I don't think so... You can pull up all of anyone's neighbors with one key stroke. Useful if your kids are at a friends house and you know the address but not the name or you need to get in touch with someone urgently and their phone is off the hook. Call up one of their neighbors! Finding Companies around the country when you don't know the city or state, just the name. Or finding companies by SIC codes. SIC (Standard Industry Codes) are not always very useful because they were devised at a time when we were primarily a farming and manufacturing economy. Many of the codes are so broad that if you were trying to find a cellular reseller, you will be stuck with "Communications Companies" as the type and that would include phone manufacturers, telephone retail outlets,long distance carriers, pager companies, voice mail companies etc. Doing a reverse search on caller ID to see where the person is calling you from. Skip tracing, calling the last known neighbors to get a forwarding address. A friend that owns a floral shop uses them to make sure that phoned in deliveries are legitimate. I'm hooked and not paid to say so. Don't tell your friends or they will pester you endlessly to look up numbers for them or find college roommates. Method 3 3) RL Polk and Dickman Criss Cross Directories. These paper directories that are in most public libraries or can be purchased or "leased". Also usually updated quarterly. Not as flexible as the disks but sometimes gives a bit more information like place of employment. The directories are more expensive than the disks (each one covers a smaller area- $325 for Syracuse, NY) but are portable and require no equipment to use them. Method 4 4) Call on a pretext like entering them for a radio station contest. (I never said that.) Make sure the entry questions include what you want to know. Method 5 Hardcore when all else fails or the number is unlisted or listed in someone elses name. 5) Call the number and charge it to your phone credit card, if it is a local call. Or your long distance service if it is a long distance call. If the Ask for some bizarre name or speak in pig latin. Say, "Oh I must have the wrong number, sorry" and hang up. When the charge shows up on your bill, call your credit card provider or long distance carrier and suggest that you are not familiar with that number. (You have a right to question any numbers you are charged for and know to whom the call was placed.) They will then tell you the name of the person that the phone is listed to, even if it is an unlisted number. Hey, you're paying for it. How do you know it's not their mistake? If it is important to maintain your own number's confidentiality: If the party you are calling has Caller ID the number you are calling from WILL SHOW UP on their Caller ID machine even if you are paying with a credit card. If you have a blocked number but they also have anonymous call reject, you will not be able to complete your call without unblocking your phone number. Many third party pay phones have blocked numbers and will not allow you to unblock them by dialing *82. The tones are rejected by the pay phone. Look for a pay phone run by the Regional Bell Operating Corporation (RBOC) instead of one of the annoying private ones, which often won't even let you use your phone credit card. Any more questions, feel free to contact me. Arlene Manduca Syracuse, NY armanduc@syr.edu ************************************************************************** 2)From: ILQQK4DOE@aol.com Subject: Re: Volume Two Jan 14, 1997 Issue #16 To:kb9nhu@juno.com Trever, If you suspect your girl is cheating on you the answer is simple. 1st gut feelings are usually right, 2nd: gut feelings are usually right, 3rd: you have already lost confidence in your relationship start a new one and save yourself a lot of heartaches. Good luck. ************************************************************************** 3)From t_robarts@hands-on.ltd.uk Thu Jan 16 11:52:20 1997 Subject: Securex Exhibition, London, UK Hi everyone - I have just returned from the last day of the Securex Exhibition and Conference which has been held in London over the past three days. Any list member who would like any information which is available from the Exhibition Catalogue and Buyers Guide on exhibitors, products, contacts, etc. is very welcome to email me and I will try to send back as much information as possible or to follow up any line of enquiry within the UK. in any way practicable. I am ready and willing to produce a complete list of every Exhibitor at this and any other Trade Exhibition which I can attend - and that is most of them in the UK and all of them in London. I am not sure whether it would be in keeping with the nature of this group if I were to publish such a list as a normal posting. I would prefer any list member to email me and I will reply directly - with a copy to the List for our general interest. Regards Timothy Robarts t_robarts@hands-on.ltd.uk telephone answering service : 0941-101678. ************************************************************************** 4)From: "John C. Randolph" Subject: ARKANSAS BANS PHONE SCRAMBLERS It figures. It's Fuehrer Clinton's home state, isn't it? Date: January 15, 1997 To: All RadioShack Stores From: RadioShack Communications Subject: URGENT PRODUCT NOTIFICATION Memo Id: 8216 IMMEDIATE ATTENTION The Arkansas Police have declared that is is illegal to own, use, or possess RSU product #11265113, a fully assembled descrambler/scrambler, in the State of Arkansas. Tandy Corporation's legal department is researching this and the product has been removed from RSU distribution. DO NOT take order or sell this product until this situation can be resolved. ************************************************************************** 5)From: Thomas Picray Subject: Re: Phone Help >From: kevina@citynet.net >Subject: Question > > I have a phone number and area code,(usa) is there any way to check and see > who the phone is listed to? thanks. kevin http://www.whowhere.com/wwphone/phone.html -- Thomas L. Picray Computer Management Sciences, Inc. Sr. Systems Consultant 6001-D Landerhaven Dr. picray@bellhow.com 800-432-5002 x6261 Cleveland, OH 44124 USA tomp@picray.en.net 216-642-9060 x6261 216-449-8004, fax -8005 ************************************************************************** 6)From: "Shadow Chasers" Subject: EARTH CAM, PART II" Not being an electronic buff, I splurged and ordered the $695 CCD/28.8 modem camera to field it's potentional surveillance uses. The possibilites are endless with EARTHCAM. Of course any electronic guru could assemble the item for a cheaper price!! Thanks to celluar technology, the EARTH CAM is not limited in it's applicatons potentials. Far as audio goes, not being an electronic guru, I assume if the EARTH CAM was modified by using DSVD or such as a overt device that allows you to call into a phone (SILENTLY) and hear the room being monitored, this would allow for sound. My understanding with the QUICK CAM version of EARTH CAM coming out, sound has been worked into the model. Price has not been set for QuickCam. I will keep the "SURVEILLANCE POSTED" as I explore all avenue's with the EARTHCAM in my day 2 day operations. SHADOW CHASER INVESTIGATIONS http:\\www.shadow-chasers.com\\ ************************************************************************** 7)From: "Shadow Chasers" Subject: RADIO SHACKS 5" TV/8MM VCR For those ineed of a portable 8mm VCR w/5" TV should drop by thier local RADIO SHACK (RS) for a close-out sale on the item. Orginally $699, I purchase two today for $200 each. The catch is, you have to find a RS that still has them in stock!!!!! ************************************************************************** 8)From: "Shadow Chasers" Subject: SHOTGUN MIC I'm looking for a high-quality shotgun mic, kinda like the one displayed on THE CODEX SIGHT under the methods of eavesdropping & surveillance section. ************************************************************************** 9)From: "JULIUS \"BUDDY\" BOMBET & LIZCA S BOMBET" Subject: FDIC Check Out Your Competitors' Deposits, On-line Interested in new and detailed information about your competitors' bank deposits? The FDIC launched at the end of December its annual Summary of Deposits survey onto the Internet, permitting easy manipulation of the data. [CFO Alert, 108 words] Check Out Your Competitors' Deposits, On-line Source: CFO Alert CFO Alert via Individual Inc. : Interested in new and detailed information about your competitors' bank deposits? The FDIC launched at the end of December its annual Summary of Deposits survey onto the Internet, permitting easy manipulation of the data. Future enhancements will allow users to select individual banks and obtain a list of that institution's office locations and deposits--a feature that was not available in the printed data book, which organizes data by county. The new service will also simplify matters for banks, allowing them to file information electronically beginning with the June 30 survey, rather than submitting a hard copy form. Deposit information can be accessed on the FDIC's web page: www.fdic.gov. [01-11-97 at 09:46 EST, Copyright 1997, American Banker] Regards, Buddy ************************************************************************** 10)From: SpyKing@thecodex.com Subject: Join the Navy? This is off-topic but I couldn't resist... Naval History - Wooden Ships and Iron Men The following is from a tale related by the chief curator of the National Park Service, and printed in no less an authoritative source than Oceanographic Ships, Fore and Aft, published by the Oceanographer of the Navy. It has to do with a cruise of the 204-foot frigate USS Constitution, commonly known as Old Ironsides , in 1779. We quote: "On 23 August 1779, the USS Constitution set sail from Boston loaded with 475 officers and men, 48,600 gallons of water, 74,000 cannon shot, 11,500 pounds of black powder and 79,400 gallons of rum. Her mission: to destroy and harass English shipping. On 6 October, she made Jamaica, took on 826 pounds of flour and 68,300 gallons of rum. Three weeks later the Constitution reached the Azores, where she provisioned with 550 pounds of beef and 6,300 gallons of Portuguese wine. On 18 November, the ship set sail for England where her crew captured and scuttled 12 English merchant vessels and took aboard their rum. But the Constitution had run out of shot. Nevertheless, she made her way unarmed up the Firth of Clyde for a night raid. Here her landing party captured a whiskey distillery, transferred 40,000 gallons aboard and headed for home. On 20 February 1780, the Constitution arrived in Boston with no cannon shot, no food, no powder, no rum, no whiskey. Just 48,600 gallons of water." Detail analysis: Length of cruise - 181 days Booze consumption - 2.26 gallons per MAN per day (plus whatever they rescued from the 12 English merchant ships) Guestimated re-enlistment rate - 100% Probable EPA Award of Gold Certificate for water conservation Courtesy of: U.S. Atlantic Command Joint Training, Analysis and Simulation Center ************************************************************************** 11)From: SpyKing@thecodex.com Subject: DTMF Decoding Software Download Shareware at: http://www.frii.com/~rsmerker/html/programs.html WinTone32 - Real Time DTMF Decoder for Windows 95/NT Takes input from any configured windows recording device and converts any existing DTMF tones to readable digits. Extensive logging of Date and Time, Duration, and Tones is available, as well as a slew of user configurable options. ************************************************************************** 12)From: "Richard Leatherwood" Subject: Medical Records Search I am in need of a Connecticut Medical Records search for a client who's getting shafted by an employee on a workmans comp. case. If anyone has the ability please send me a quote and time frame. R. L. Leatherwood nwbc@aloha.net ************************************************************************** 13)From: Trace Carpenter Subject: Caller ID in Austrailla You might try a company called Custom Electronics, Inc. He claims that his caller ID will work via a pre-amp. I don't know for sure if it will and I haven't been impressed with his equipment in the past. Further, I don't even know if he's still around. The last info I had for him was: Custom Electronics, Inc. Attn: Lee P.O. Box 9555 Reno, NV 89507 702.856.4222 702.348.1794 Maybe the quality of his equipment has improved. The good thing is he would give you your money back if you weren't satisfied. -- Sincerely, Trace Carpenter 214.828.4520 214.828.1817 Facsimile ************************************************************************** 14)From: Trace Carpenter Subject: Re: Question There are a lot of ways to find out where the telephone number goes Kevin. Feel free to call or e-mail me. If it's in one of my databanks I'll do it for you gratis. -- Sincerely, Trace Carpenter ************************************************************************** 15)From: TaaDOOW@aol.com Subject: Variable Capacitors Hello! I am looking for some company or someone who still sells variable capacitors. I have looked every where, but since there are more electronics with chips, variable capacitors are not needed. If anyone can help me I would apreciate it dearly. Thanx, Jaron Lamot College Student taadoow@aol.com ************************************************************************** 16)From: "Lorenzo Castillo Sanchez" Subject: RE: ESI I remember some other guy also posted a request about this academy I'm about to mention. The ESI (Executive Security International) Academy seems to offer quite a variety of specialist courses. I've been searching for specialist academies and I think you'd definitely want to check this out. Visit this website : http://www.esi-lifeforce.com The correspondence courses available require a resident training in order to be completed. They do cost more than a few thousand bucks, but ESI does offer ways of making the payment more affordable. And,to all of those who are interested or wanna find out about a good security specialist academy, I recommend ESI. ************************************************************************** 17)From: Donintel@aol.com Subject: Need Quick Background Check Group, We have a situation in Jamaica that is a bit touchy. An individual has applied for a live-in position with a US family. It is a highly sensitive job. The individual has presented a SS#, a New York driver's license, and a US passport. How can this individual be thoroughly checked out prior to hire? What firms can the group suggest? Anybody out there ever do any consulting type work for official organizations? Appreciate the help, Don MacDonald donintel@aol.com ************************************************************************** 18)From: trever.kb9nhu@juno.com (Trever C. Trader) Subject: Re: Cellular Phone Question Well, The only thing that you could do is use what is called the TESTMODE which can be accessed through motorola phones. The best phones to use are the EE2 Software revision, this information can be found on the little sticker of the Transceiver of the cell-phone, for a short list of the test mode commands, please e-mail me at the address above, and tell me what kind of phone that you will be using. Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 (217) 528-7015 ************************************************************************** 19)From: CorpPI@aol.com Subject: Re: CSA-8000 Cellular Interceptor Unit w/ modified AOR 3000A receiver, 486/mono Notebook Computer, Including recording outputs, and a custom Pelican Hard Case with diced foam insert. Unit can track up to 15 numbers at one time, monitoring forward control channel, reverse mode, AMPS, ETACS, and INTL System. 7 Months old and working great. Paid over $ 4600.00, first $ 3200.00 takes. Sold to quallified buyers only. Buyer assumes responsibility for compliance with local laws and regulations. Respond to Corp PI@aol.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue #20 ****************************************************************************** Vol.Two Issue #20 The Surveillance List Jan.18, 1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Cellular Phone Law Loophole? 02) DNA Fingerprinting 03) Military Searches 04) RADIO SHACK CLOSE-OUT 05) RE: Vol Two #17 BoS: LOpht? Advisory 06) Re: Variable Capacitors 07) Re: Variable Capcitors 08) Re: Need Quick Background check 09) Re: Reverse Search 10) Re: Surveillance Vans 11) RADIO SHACK TV/VCR 8MM/Intro 12) Re: Need Background Check 13) GSM Phone Interception? 14) BEEPER LOCATOR WANTED 15) Organiser/Contact Apps & Graphical Representation ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Cellular Phone Law Loophole? Thought this might be of interest to the list... Cellular Phone Law Has Loophole By JEANNINE AVERSA Associated Press Writer Friday, January 17, 1997 1:38 am EST WASHINGTON (AP) -- Bob Grove makes no bones about it. For a fee, his North Carolina company will modify a radio scanner to pick up cellular phone conversations. Isn't that illegal? Grove says no. But cellular telephone executives and others disagree. To protect cellular callers' privacy, a federal law, which took effect in 1994, made it illegal for companies to import, manufacture and sell in the United States scanners that work on cellular frequencies. Federal regulations say radio scanners ``must be incapable of operating'' on cellular frequencies or cannot be ``readily altered'' by the user to work on them. Grove insists that he is within the bounds of the law and federal regulations because his company, Grove Enterprises Inc., neither sells nor markets altered scanners. ``There is no caveat, no direct prohibition against modifying those scanners which are here,'' Grove claims. While those precise words are not used in the law or regulations, communications attorneys say companies or individuals that modify scanners to pick up cellular signals are violating federal provisions. ``The creative lawyers always claim loopholes,'' said Thomas Wheeler, president of the Cellular Telecommunications Industry Association. ``The intent of the Congress was clear, and I believe that will be backed up by the courts and if not by the Congress itself. It is wrong,'' he said. Rep. Billy Tauzin, R-La., the incoming chairman of the House Commerce Committee's telecommunications subcommittee, wants to hold hearings in early February to look into abuses of the law and possible loopholes. ``Clearly, the intent of the law is to not only prevent the sale of scanners that can intercept cellular phone calls, but also to prevent their reconfiguration,'' said Tauzin's spokesman Ken Johnson. The issue came to prominence after a Florida couple picked up on a police scanner and then taped a phone conversation during which Republicans plotted strategy for House Speaker Newt Gingrich in the wake of ethics charges. One person involved in the conversation was on a cellular phone. Parts of the tape were subsequently printed in The New York Times. Grove said the company was contacted by the FCC a year and a half ago about possible violations of the federal provisions. Grove said the company defended its practice as legal and has not heard back the agency since. The FCC declined to comment. ``By our interpretation we feel that this is definitely following the guidelines of the law and that we are not in violation,'' Grove said in a telephone interview with The Associated Press. Grove Enterprises advertises its modification services on the Internet. ``Here's all you need to do,'' the company tells prospective clients at its web site. ``Call the Grove technical line ... to discuss your modification request. Mail your unit with payment plus shipping andprecise instructions.'' Depending on the model, the company charges from $40 to $115 to make the changes to pick up cellular signals. Grove said the company does not get many such requests ``because there are only a few scanners presently being sold that can be altered.'' The company will modify a scanner only after it has been sold. ************************************************************************** 2)From: "Jamie Love" Subject: DNA fingerprinting? Hello, I joined Spyking to learn a little bit about the technology that might be used (against me) in "corporate espionage" (and now I'm scared to death!) But that isn't my reason for writing. I would like to know if there is a market for "no questions asked" DNA fingerprinting. I've done alot of DNA fingerprinting (including non-humans) in my research and I am considering offering it "out of my home". To do so would require thousands of dollars invested. So I'd like to know if "Spykingers" and their contacts would be interested in such a service. I'm located in Europe, but samples ship well through the post. As you know, DNA fingerprinting can be used to identify people, their products (semen, blood, hair) and even their kids (within the limits of "reasonable proof" as I define it). A recent letter to a newsgroup asked if semen collected from a woman's underwear could be used to prove infidelity. The short answer is "Sure as hell can!" and with little knowledge on the part of the woman (except her missing underwear!) DNA fingerprinting has "a hundred and one uses" which I'd be happy to expand upon in this newletter, if encouraged to do so. Today, my questions to "Spykingers" are, 1) have you ever needed DNA fingerprinted? 2) do you think you would have a use for this technology (at, say, a couple hundred dollars a problem)? 3) are you aware of anyone offering this service to PIs (and what has been your experience with it?) Please send me an email addressing these thoughts (to encourage me to invest in setting up my lab). All comments and suggestions welcomed. Jamie Love (PhD, MBA) Scientist for Hire "Life is my business" E-mail:jamie@enterprise.net Homepages: http://homepages.enterprise.net/jamie/sci4hire +++Moderator's Note+++ I'm aware of a PI in New York City that provides this service (female undergarment analysis for semem stains). The client is always a suspicious husband. He claims (the PI) he makes money at it (although it's not his only business)... I'm not aware what lab he uses or how much he charges but he told me business is brisk... And that attorney's love this service when trying to negotiate divorce settlements with unfaithful wives... Most PI's will agree (I think) that it's worth a shot... Prof. Love, tell us more...I'm sure the PI's on this list will be more than interested... P.S. Wouldn't it also make sense that male undergarments could be examined also for the presence of female (secretions)DNA? (an additional potential market) P.P.S. What would we call this service? Come on guys & gals... Come up with a catchy phrase ;-) "FUG" service? (female undergarments) I "FUGGED" my wife and caught her fooling around? ;-) ************************************************************************** 3)From: "Shadow Chasers" Subject: MILITARY SEARCH! YOU MAY ELECT TO CONDUCT A SEARCH THROUGH THE US GOVERNMENTS VETRANS ADMINISTRATION WEB SIGHT AT THE FOLLOWING URL: http://www.va.gov/ JUST SEARCH THE WEB SIGHT AND YOU CAN FIND WHAT YOUR LOOKING FOR, OR VISIT : http://www.wramc.amedd.army.mil/ THE ABOVE ARMY PAGE AND THEY HAVE LINKS TO WHAT YOUR LOOKING FOR! SHADOW CHASER INVESTIGATIONS http:\\www.shadow-chasers.com\\ ************************************************************************** 4)From: "Shadow Chasers" Subject: RADIO SHACK CLOSE-OUT!! For those surveillance experts who missed my last posting regarding Radio Shack's (RS) version of Sony's 8mm/TV/VCR aka by RS as Memmorex for only $197 smackaroo's time is running out for you. I acquired two myself between 5 Radio Shacks in my area. The closeout price is limited to only stock within the stores. ************************************************************************** 5)From: "Walstrom, Bradley" Subject: RE: Vol Two #17 BoS: LOpht? Advisory I am very disappointed that information that instructs a person on how to cheat a coffee machine was posted in this news group! I really don't think this is the forum to be passing on any information that is illegal or immoral or that techies generally don't have change in their pockests is justification to use the information. I have heard that excuse from most of the people I have booked into the county jail. It was my impression that this was a group of law enforcement and private investigative professionals and we would be sharing information regarding our profession. Requists for information like how do I break into someone elses e-mail account should not be answered. If you don't already know how to do it I don't think this is the place that should be teaching that kind of a thing. I think this news group has great value but lets keep it on a more professional level. Brad Walstrom ************************************************************************** 6)From: Paul Longo Subject: Re: Variable Capacitors >15)From: TaaDOOW@aol.com >Subject: Variable Capacitors >Hello! >I am looking for some company or someone who still sells variable >capacitors. I have looked every where, but since there are more electronics >with chips, variable capacitors are not needed. If anyone can help me I >would apreciate it dearly. >Jaron: Call Digi-Key at 1-800-344-4539. Their January 1997 catalog (#971) lists dozens of variable caps on pages 281-283. You can also find Digi-Key on the web at www.digikey.com. Paul Longo ************************************************************************** 7)From: Trace Carpenter Subject: Re: Variable Capcitors Hi Jaron: If you're looking for variable capacitors they're not that hard to find. I pick them up locally. But since I don't know where you're located, I'll give you a mail order company to call: Digi-Key 800-344-4539 218-681-6674 http://www.digikey.com Good Luck. Let me know if I can help further. Sincerely, Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 660 Amberton Tower Suspicions Confirmed 4144 N. Central Expy. Problems Solved ! Dallas, Texas 75204 Free Consultations 214.828.4520 214.828.1917 Facsimile ************************************************************************** 8)From: Trace Carpenter Subject: Re: Need Quick Background check Hi Don: We can certainly conduct the background check for you in the U.S., however; when you say "quick" I hope you're talking in relatvie terms. The background checks we do are not the "I'm hiring someone so I want a $50 check so the monkey's on someone else's back type of search". We do very comprehensive "security clearence" type background checks. In fact the primary investigator handling the case will be a military intelligence (I know. It's a contridiction of terms) officer now serving in the reserves. If you would like to discuss this case please feel free to contact me anytime. -- Sincerely, Trace Carpenter ************************************************************************** 9)From: Smiley2521@aol.com Subject: Re: Reverse Search If you have a phone number, you can find out whose it belongs to at the yahoo site (http://www.yahoo.com). If the number is listed, then you should be able to find out who it belongs to. ************************************************************************** 10)From: "Shadow Chasers" Subject: SURVEILLANCE VANS" Could someone point me in the right direction, I'm looking for the following: A company that can modify my full-size blazer for the o/covert surveillance use. The Blazer is new, and I want the back half of it set up with equipment, comensurate for full surveillance operations to include TSCM & TEMPEST monitoring. I plan to purchase DATASCAN from SpyKing in the near future and want the vehicle equip for install of it. I want to due this conversion for several reasons, I bought the Blazer under SCI's name for tax purposes, and installing the equipment adds further deductions under 97 TAX LAWS since it's use will prodduce more than %50 of my income, it's my rolling office!!! Anyone with insight to my request for information please email me in addition to posting your response here. Along with any known web-sights that depict surveillance vechicles. For the record, my URL address is active, but my server has yet to post my web-sight, give it a couple more days. Since I'm fresh in the private security business, any suggestions on building client base, improvements to my web-page, send me a reply. I'm not "WET BEHIND THE EAR's IN SECRUITY" just recently transitioned from the military as a counterintelligence agent with 10 years experience. SHADOW CHASER INVESTIGATIONS http:\\www.shadow-chasers.com\\ +++Moderator's Note+++ I built about two dozen surveillance vehicles years ago for one of the agencies. There are a number of companies out there advertising surveillance vehicle manufacture. MOST of them farm the work out to one or two companies. There are several things needed in surveillance vehicles and many things that are unnecessary frills. Most of the things you can do yourself with off the shelf components. I'd be happy to detail necessary equipment to the list or in private if anyone is interested. Most important is RV type Heavy Duty Deep Cycle Batteries with heavy duty vehicle alternator that re-charges batteries while motor is running. This a is a very simple and inexpensive item to install and worth it's weight in gold. I used to use two 300 amp hour batteries which provided a total of 600 amp hours. You can run several items for a while depending on current drain. There are probably newer models out now with more amp hours. ************************************************************************** 11)From: XIPNEK@aol.com Subject: RADIO SHACK TV/VCR 8MM//// intro THERE ARE A FEW UNITS LEFT IN CALIFORNIA===== MODESTO AND TURLOCK. I ORDERED MINE FROM THE LOCAL STORE AND THEY Are paying the freight.... called an investigator friend and he is getting one!!!! good luck to you all. ken affordable photo 2633 e. shaw suite#111 fresno ca 93727 209 292 6914 phone 209 442 5198 voice mail http://members.aol.com/xipnek email:xipnek@aol.com we photo, video ,print from video ,dubs, promos,hi-8,3/4",beta ************************************************************************** 12)From: RetSheriff@aol.com Subject: re: Background Check I'd like to stop lurking and answer donintel@aol.com You should have all you need to have an accurate background check done on your subject. A SS#, New York driver's Lic, and passport are about the best starting off place you can get, next to having fingerprints. Some of the more basic checks you can do yourself. 90% of all backgroung frauds are found in the most basic of checks. Enter the guys phone number in a crisscross, like http:www.switchboard.com/ and see if it comes back to him. Call a credit service. It is your legal right to have a credit report done prior to employment. Cost about $25.00. On the credit report you will learn his prior employment and if he is a credit risk. Call the prior employers and ask about him. Tell them you are a placement service and they are likey to tell you (off the record) what you need to know. If they tell you then can't make a comment, push and ask if they would rehire him. That will usually tell you all you need to know. See if their SS# is the same on the credit return. Does it return more than one SS# ? Sometimes they return 4 or 5 numbers. If the number is close it could have been a input error somewhere down the line, but if they are very different you'd better watch out. Check the SS# against SS crisscross. They should at least tell you where it was issued and when. See if this information coincides with the information given on the employment application. Write to New York Motor Vehicles. (Driver Licenses State of New York Empire State Plaza Albany New York 12228). Give them the Name and DL #. Ask them for a drivers history. This can take several weeks for a return. Anyone can get it by mail. There is also a fee. Send them a blank endorsed check under the amount write" not to exceed" say $15.00. They will fill it out and send you your report. See if if coinsides with given information. See if the SS# is the same and also look for FTA's. FTAs' are "failure to appears". This means he never showed up for Motor Vehicle court and there is propably a warrant issued for his arrest. Call the jurisdiction where the person lives and tell the desk Sgt that this subject is trying to date your 18 year old daughter. Do they have any knowledge of him. He'll do a warrant search for you and tell you if you should be cautious. That's a pretty good starting off point. Of course there is much more that can be done. If we can help, give us a call we do backgrounds every day. Good Luck, Jim Marino J. MARINO ASSOCIATES Private Investigators 203 MAIN STREET SUITE 245 FLEMINGTON, NJ 08822 Call toll free (800) 600-9551, or e-mail RetSheriff@aol.com Serving Private Citizens, Corporations, Law Firms, & Government Civil Matters, Major Crimes, Trial Prep, Fraud, Loss, Missing Persons, Background Checks Find us on the WEB in the Codex Mall: http://www.thecodex.com/jmarino.html ************************************************************************** 13)From: "Anastasios D. Panos" Subject: GSM Phone Interception? Does anyone has come up with GSM than analog type of mobile phones Interception ? I will like to hear anything that has come to your attention. ============================================================== Panos & Associates, P. 0. Box 19063, Athens 117 10, Greece, Est. 1973.. Ph: +30-1-923.7420, Fax: +30-1-923.2787 Mobile: +30-93-214.287 Contact: Anastasios D. Panos (Intelnet,WAD,CII,ASIS,NAIS,ISDA,IPC) Specialised but not limited to: V.I.P. Close Protection, Due Diligence, Counterfeit Investications,Insurance Fraud, Covert Video Surveillances, Technical Support Systems ============================================================== ************************************************************************** 14)From: VallacciNY@aol.com Subject: BEEPER LOCATOR WANTED I am looking to buy a beeper locator+interceptor w/ the Global Positioning System. If you would like to make me an offer I can't refuse, email me. ************************************************************************** 15)From: "Dean" Subject: Organiser/Contact Apps & Graphical Representation There have been previous posts in regards to Caller ID and the ability to link organiser apps / contact databases like Time & Chaos so that when a caller is recieved, the program will automatically present you with that persons "dossier" (for want of a better term). I know that there are specialised Law Enforcement / Intelligence database programs around that can graphically represent relationships between people ... does anyone know of organiser apps / contact databases like Time & Chaos , that have the ability to create these graphical representations ? I'd also like to say thanks to everyone for keeping the discussions interesting ... but can we try & minimise the signatures ? :) Dean "I refuse to have a battle of wits with an unarmed opponent" ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume #2 Issue #21 ****************************************************************************** Vol.Two Issue #21 The Surveillance List Jan.19,1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Surveillance Recorders 02) Re: Organizer/Contact Apps & Graphical Representation 03) VDA-60? 04) RADIO SHACK, PART III 05) TIME MACHINE, GOT YOUR ATTENTION? 06) Intro - Isreal 07) CFP'97 08) Kremlin 09) Re: Radio Shack's 8mm VCR/TV combo 10) How to intercept cellular telephone calls cheaply. 11) Re: DNA Testing 12) Handy Gadgets 13) Re: DNA Testing 14) Re: Vol Two #17 BoS: LOpht? Advisory ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: EdShak@aol.com Subject: Re: Surveillance Recorders In a message dated 97-01-12 23:54:52 EST, you write: RN36 recorders have been discontinued period!!!!! they are not worth $500.00. Go with the new Sony NT2 digital recorder (Around $1200.00) this is the ultimate in digital recording. Also, if you need a RN36 replacement, use the Olympus L400 ($300.00) If anyone is interested in either of these products, I am a distributor!!!!! ************************************************************************** 2)From: Donintel@aol.com Subject: Re: Organizer/Contact Apps & Graphical Representation Dean, A company called Harlequin Intelligence Systems is in the process of announcing a software product that does precisely what you require. I believe the name of the new product is "Harlequin Criminal Investigation System". The firm also provides criminal analysis software that is capable of graphical representations such as link charts, phone toll analysis charts, elaborate traces and many others. This software is called "Watson" and is widely used throughout the world. The police database sytems you refer to are commonly tied into some of our E-911 (999 UK) systems. These routinely call up pertinent info like "weapons suspected at this address", "convicted felon resides here", etc, designed to alert responding officers. The system you require is not a database system, but one that can access existing databases and manipulate/analyze data from them. The firm is headquartered in Cambridge, UK, with offices in Australia and the US. If you are from Australia, I believe the New South Wales police are familiar with the firm. If I can be of any further help, please contact me. Don ************************************************************************** 3)From: jjc@infi.net Subject: VDA-60? Hi, I've seen and read some of your material on TEMPEST and am wondering if you have any info on a piece of equipment made by Micro-Tel called a Video Display Analyzer Model VDA-60? Thanks .. Jim ************************************************************************** 4)From: "Shadow Chasers" Subject: RADIO SHACK, PART III Ok, I've got a quite a bit of inquires sent to me about Radio Shack's 5" TV/8MM VCR specs, so listed below are features right out of the owners manual: Digital Auto-Tracking control Automatic Memory Programming Real-Time counter with memory (VCR) On-Screen Displays of TV and VCR Features Audio/Video jacks, In and out Visual Search Freeze Frame 12 vdc operation with a detachable 110 vac power supply Comes with a DC power cord with cigarette lighter plug. Dual Speed Playback Flying Erase Head It's not Grundig, but it's worth $197 a unit for those quick surveillance ops, oh and if you like, one can even order a special case for it. Not being greedy, just building inventory, have aquired 5 of these units & will offer two for sale; first come, first serve. Selling at my purchase price plus postage to your destination! And if your lucky to find one at your RS and only has the floor model, take it, it gives an extended 3 month warranty!! ************************************************************************** 5)From: "Shadow Chasers" Subject: TIME MACHINE, GOT YOUR ATTENTION? Recently stumbled across the sight below: http://www.mindspring.com/~petebjr/picotrin/#Other_sites and a direct qoute from the sight as follows: "From now on, it will be possible to reach back in time to record a precise amount, of any event you want, after it happens; after you've already experienced it." >From a non-electronic guru, the technology describe at the sight describes a method in which when your in a monitor mode, say in that o/covert surveillance mode without recording anything to tape, the "Event Capture" will allow you to record at a future time whatever the median used to monitor (Camera/VCR, etc) in the past. Whatever can be monitor, voice, radio, telephone, celluar; get the drift will be able to use the the "EVENT CAPTURE TECHNOLOGY" As posted on the web sight: "You Could: Record a television program after you saw it. Record a lecture after you heard it. Record an earthquake after you felt it". TAKE A PEEK AT THE SIGHT & THE ELECTRONIC GURU's HERE GIVE INSIGHT ABOUT IT SHADOW CHASER INVESTIGATIONS http:\\www.shadow-chasers.com\\ +++Moderato's Note+++ With only the information posted on the web site it appears to be some type of database storage system that will empty after a set time frame or command similiar in nature to a time lapse recorder that resets after an extended period of time... or rewinds and replays to an event situation. Sounds like a slick new way of advertising old technology... ************************************************************************** 6)From: hotam Subject: Intro - Israel Hotam Israel Investigations, Inc. Hotam is a private consulting firm specializing in commercial investigations, business information services and security management. 27A Keren Kayemet L'Yisrael Givatayim, Israel 53225 Tel.972.3.6729958 Fax.972.3.672.2234 E-MAIL: HOTAM@INTER.NET.IL http://www.hotam-il.co.il ************************************************************************** 7)From: SpyKing@thecodex.com Subject: CFP'97 The Seventh Conference on Computers, Freedom, and Privacy March 11-14, 1997 San Francisco Airport Hyatt Regency; Burlingame, California CFP'97 : Commerce & Community CFP'97 will assemble experts, advocates, and interested people from a broad spectrum of disciplines and backgrounds in a balanced public forum to address the impact of new technologies on society. This year's theme addresses two of the main drivers of social and technological transformation. How is private enterprise changing cyberspace? How are traditional and virtual communities reacting? Topics in the wide-ranging main track program will include: PERSPECTIVES ON CONTROVERSIAL SPEECH THE COMMERCIAL DEVELOPMENT OF THE NET GOVERNMENTAL & SOCIAL IMPLICATIONS OF DIGITAL MONEY INTERNATIONAL PERSPECTIVES ON CRYPTOGRAPHY CYPHERPUNKS & CYBERCOPS REGULATION OF ISPs SPAMMING INFOWAR INTELLECTUAL PROPERTY AND INFO-PROPERTY THE 1996 ELECTIONS: CREATING A NEW DEMOCRACY THE COMING COLLAPSE OF THE NET CFP'97 will feature parallel-track lunchtime workshops during the main conference on topics including: THE CASE AGAINST PRIVACY HOW A SKIPTRACER OPERATES CYBERBANKING HOW THE ARCHITECTURE REGULATES RIGHTS IN AVATAR CYBERSPACE NATIONAL I.D. CARDS PUBLIC KEY INFRASTRUCTURES EUROPEAN IP LAW SEXUAL HARASSMENT IN CYBERSPACE VIRTUAL COMMUNITIES DOMAIN NAMES ARCHIVES, INDEXES & PRIVACY GOVERNMENT REGULATION OF ECASH CRYPTO AND THE 1st AMENDMENT The conference will also offer a number of in-depth tutorials on subjects including: * The Economics of the Internet * Regulation of Internet Service Providers * The Latest in Cryptography * The Constitution in Cyberspace * Info War: The Day After * Personal Information and Advertising on the Net * Transborder Data Flows and the Coming European Union * Intellectual Property Rights on the Net: A Primer INFORMATION A complete conference brochure and registration information are available on our web site at: http://www.cfp.org For an ASCII version of the conference brochure and registration information, send email to: cfpinfo@cfp.org +++Moderator's Note+++ This is a great conference. I attended last years at MIT. There is a wealth of information to be harvested at this event. Last year there was a technology fair that was interesting.... I hope this years (which I'll attend) is equally as informative... ************************************************************************** 8)From: "Mark Rosen" Subject: Kremlin v1.04 I'm sure you all remember my program, Very Good Privacy, and have been waiting for the release of the new version with bated breath. Well, calm your little beating hearts! Only, after being contacted by PGP, Inc. regarding a possible trademark violation, I've changed its name to Kremlin. Remember: it's like an iron curtain for your data. The new version still uses the same algorithms. The algorithms can be grouped into three categories: ASCII and Vigenere, which give little security, but are extremely fast, DES, NewDES, and Safer SK-128, which will protect against all but the most well-funded adversaries, and Blowfish, IDEA, and RC4, which are perhaps the most secure algorithms available today. The key-size of the algorithms ranges from 64-bits (actually 56-bits) in DES to 128-bits in IDEA, NewDES, and Safer SK-128, and infinite length in ASCII, Blowfish (up to 448-bits), RC4, and Vigenere. If the "Hash Passkey" option is checked, then the passkeys are hashed with a 64-bit per-source file salt using SHA1 to form a 160-bit passkey; extra bits not used by the fixed-length algorithms are discarded. Without the "Hash Passkey" option checked, the passkey is only XORed with the salt and retains its original size. If the "Encrypt Headers" option is checked, then the filename and file size of the files are encrypted, giving an attacker no information about the source files. Once the files have been encrypted, you have the option of securely deleting them by overwriting them a user-definable number of times with random data; the most secure encryption algorithm in the world is useless if the plaintext is left unsecured on the hard drive. All of this is done through one simple dialog box. To launch Kremlin, just drag a file or directory (or a combination of files or directories) onto the Encrypt icon on the Windows 95 desktop. To decrypt a file, just double-click on it and enter the passkey; no unwieldy tabbed dialog boxes or file directory navigation boxes. Plus, as a added bonus, anyone who orders 10 or more copies of Kremlin will receive a can of Spam (TM) for free! Oh, yeah, I've also been mentioned in Wired News (http://www.wired.com). For more information on Kremlin, e-mail firesoft@poboxes.com To download Kremlin, go to: http://www.geocities.com/SiliconValley/Pines/2690 ************************************************************************** 9)From: Spysociety@aol.com Subject: Re: Radio Shack's 8mm VCR/TV combo For those of you interested in purchasing one of the last of Radio Shack's 8mm VCR/TV combo, I've got three of them. They're perfect for mobile surveillance applications. contact Spysociety@aol.com ************************************************************************** 10)From: Anonymous Subject: How to intercept cellular telephone calls cheaply Now, understand that monitoring private telecommunications is a serious CRIME with a penalty of five years in jail, so DON'T MONITOR private communications, UNLESS the government indicates that it does not intend to prosecute the people who commit these crimes. Carefully follow the trials of the Martin's in Florida and Congressman McDermott to determine what the government's policy will be on this matter. Now, it is clear that the fight for freedom will be fought with information, rather than bullets, and that the battlefield of this fight will be the Internet, so it is vital that the people who value freedom, and oppose big, oppressive, self-serving government use the same weapons as their adversaries. IF government officials and government employees use scanners and recorders to violate the privacy of the peasants, in order to obtain an advantage over them, then it is incumbent upon the peasants to protect their freedom by using the same weapons. I suggest that it would be useful if some defender of freedom, set up a Web site and maintained information about the weapons available to the peasants to fight the information wars to maintain their freedom and work product. In this spirit, I post the following information with the hope that freedom loving folks will stash it away in their arsenal of information age defensive weapons. Many of the old Motorola phones have an RS232 ( DB-25 ) connector and can be put into the "test mode" by shorting pin 21 to ground. Pin 21 is ground on these models so shorting pin 20 to pin 21 will do the job. This can be accomplished by using a jumper, or a pair of RS232 connectors, or a Radio Shack RS232 breakout box, etc. Once the telephone is in the "test mode" the following commands may or may not be operative on various models: 05# - transmit on 06# - transmit off 07# - mute on 08# - mute off 11xxxx# - set to channel xxxx 13# - power off 17# - transmit a test signal 19# - Display software version 27# - Transmit RECC data 32# - Clears all programing 35x# - set audio path to x ( 1 = speaker ) 36# - scan 36xxx# scan at speed xxx 45# - display signal strength 48# - side tone on 49# - side tone off 50# - transmit test data 53# - speech scrambler on 54# - speech scrambler off 71# - adjust transmitter power 73# - adjust transmitter power Note that I list the transmitter tests so that you can avoid transmitting. I must mention that extremely powerful information age weapons are availiable to, and used by government. For example, the government has been using optical computers for over thirty years to find radar, optical and aural signatures in information such as side looking RADAR recordings, aerial photographs and audio recordings. Optical computers can find patterns in any kind of data extremely quickly. For example, optical computers are used to screen RADAR and aerial photographs to find new construction and troop movements. Optical computers have the advantage over digital computers in that they analyse an "area" of information, rather than a "point" of information (They have two degrees of freedom), and they perform fourier transforms and masking operations instantly. Some of you "Young Tom Edisons" might wish to study this field and make low cost optical computers available to the free market, as they would be great for vibration analysis, voice recognition, screening audio information for speech model patterns, etc. May the force be with you. ************************************************************************** 11)From: RetSheriff@aol.com Subject: Re: DNA Fingerprinting... Jamie Love, jamie@enterprise.net Regarding your post on DNA Fingerprinting... Jamie it sounds like something us PIs could use quite regularly. The pantie thing is almost frequent. Before now this service was cost prohibitive on the smaller cases. The only thing I think could be a problem for you is if you have to testify. One might be wary of the cost of bringing you to that country where the case is being tried. We are working a murder case right now and may be using a DNA lab out of Maryland. Their cost per check is $500. Plus they qualify as experts in a court of law, here state side. However, I do believe that there may be need for services such as yours where expert testomony is not required, such as domestic cases or in situations where the proofs are only for someone's personal knowledge, ie again panties. Good luck and keep us posted on your progress. Please e-mail me directly when you get your business up and running. Jim Marino J. MARINO ASSOCIATES Private Investigators 203 MAIN STREET SUITE 245 FLEMINGTON, NJ 08822 Call toll free (800) 600-9551, or e-mail RetSheriff@aol.com Serving Private Citizens, Corporations, Law Firms, & Government Civil Matters, Major Crimes, Trial Prep, Fraud, Loss, Missing Persons, Background Checks Find us on the WEB in the Codex Mall: http://www.thecodex.com/jmarino.html ************************************************************************** 12)From: jake01@juno.com (Brent L Sodders) Subject: Handy Gadgets A very good catalog for high tech. equipment is from the "Edge" Co. I do not have their phone number handy, but they have a few rare items. My two favorite selections are : Telephone blocking box. You select the 4 digit code that will allow a call to pass, or not. The box asks the caller for the passcode and if they make one wrong move "click" their gone. It will beep once if you get a call, and ring if they have the code. This works great when you want a listed telephone number, but block telemarketers from interrupting your nap. Friends and family will have the code, and if a friend should turn foe-change the code and re-issue it to parties. (Will not allow an answering machine to pickup when you are not home.) Second item is a radar detector activator. You can really mess with drivers w/detectors. Watch them slow down or get back into the slow lane, when they go to pass-get them again. Watch brake lights fill the sky on the interstate as you "zap" a signal to drivers. (Check your local laws) Both items about $50.00/each If anyone has the Edge Co. 1-800 # please post it thanks jake ************************************************************************** 13)From: Trace Carpenter Subject: DNA Fingerprinting I have a lab here in Dallas that does it and has never asked any ?'s. There doing a great business. -- Sincerely, Trace Carpenter ************************************************************************** 14)From: Trace Carpenter Subject: Re: Vol Two #17 BoS: LOpht? Advisory I would like to preface this posting by saying that I do understand to a certain extent the controversy over the posting regarding how to hack a coffee machine. However; I don't believe that censorship of such topics as hacking e-mail, phreaking, etc. would benefit this forum. While there are always going to be those who will use information for illicit purposes let us not forget that this forum is composed of what appears to be a rather diverse and sharp group of technicians, engineers, and other security professionals who use this knowledge to understand how things are done and how to stop it. Someone who has no clue how to hack into an e-mail account has little or no chance of securing a server against it. By the same token, one of my favorite past times (TSCM) falls into the same catagory. Understanding how illicit bugging devices, lasers, etc. work, and how and where they would be placed for optimum security and detection avoidance teaches me where and how to look for them. How many of you have ever found a bug which was dropped through the top of a hollow core door? I do not condon the burglary of a coin operated machine which in the State of Texas is a felony, and I feel that the author of that article wrote it from the standpoint of supporting the act. A more appropriate approach might have been a notice of a flaw for security professionals such as, if money is missing from this type of machine it may not be from breaking into the machine-it may have never gotten there. I hope I haven't offended anyone. Everyone I have had the privilege of speaking with from this list have either been very professional and willing to help or have been people from outside the industry who just needed professional help and turned to this group for answers. -- Sincerely, Trace Carpenter +++Moderator's Note+++ Knowledge is what we seek on this list. I will not censor/edit/delete any contribution to the list pertaining to the list topic. Hacking a coffee machine might be a LITTLE off topic but the article explains how it's done. As a security/investigative specialist you should be interested in something like this. You never can tell when a little knowledge will come in handy and make you look like a hero in the eyes of a client... Everytime I perform a TSCM survey for a client the first thing I do is walk in the target room and say to myself "Where would I plant something...how would I hide it in here?" My point being, you need to know how something is done in order to protect against it... which is one of the purposes of this list... SpyKing ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue #22 ****************************************************************************** Vol.Two Issue #22 The Surveillance List Jan.20, 1997 Over 1100 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Pager Codes 02) Re: Handy Gadgets 03) New Info Source 04) In Search Of 05) Ignorance may be bliss - but it doesn't solve problems 06) This is becoming a noisy channel 07) Real-Time DTMF decoder for Windows 95/NT (WinTone) 08) Reverse Phone Search...Not Anymore 09) Edge Company 800 # 10) Fax Interception? 11) RE: Monitoring Cellular Telephone Transmissions cheaply 12) Time Lapse Recorder 13) News Article on Gingrich Interception 14) Transmitter Help 15) Entended Range Scanners? 16) Back Issues ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Pager Codes I thought this might be of interest to the list. I sure most parties use their own private codes... >a couple of weeks ago some one on the list wanted soem pager codes.. >well this weekend i went to buy a pager for my girlfriend and i saw a >pager code book for personal pagers... here are the codes that came in >the book with in pertaining groups. 100's basic communication 100 --- available 101 --- be home by 102 --- bring me 103 --- call 104 --- call collect (if necessary) 105 --- cancel 106 --- change 107 --- come back 108 --- drop off/deliver 109 --- forgot/left behind 110 --- go to 111 --- help 112 --- leaving 113 --- lost 114 --- meet 115 --- need 116 --- no 117 --- pick up 118 --- regarding 119 --- reschedule 120 --- unavailable 121 --- wait 122 --- will arrive 123 --- will not arrive 124 --- yes 200's information codes 200 --- at a pay phone 201 --- cancel previous page 202 --- do not meet me 203 --- get off the phone 204 --- i'm/everything ok 205 --- job/deal is compleat 206 --- job/deal is not compleat 207 --- meet me 208 --- need a ride 209 --- on my way 210 --- pay phone not accepting calls 211 --- pick me up 212 --- pick you up 213 --- problem has been handled 214 --- recieved your message 215 --- running late 216 --- stuck in traffic 217 --- thank you 218 --- tired of waiting. i'm leaving 219 --- transportation problem 220 --- where are you? 221 --- why haven't you called? 300's destination codes 300 --- airport 301 --- amusement part 302 --- bank 303 --- child care 304 --- church, temple 305 --- cleaners 306 --- club/prganization 307 --- dance club/bar 308 --- doctor/dentist office 309 --- friends house 310 --- grocery store 311 --- gym/health club 312 --- home 313 --- hospital 314 --- job site 315 --- library 316 --- meeting/appointment 317 --- movies 318 --- my place 319 --- office/work 320 --- park 321 --- party/social activity 322 --- place/activity discussed 323 --- relative's house 324 --- repare shop 325 --- restaurant 326 --- school 327 --- shopping mall 328 --- sport activity 329 --- vidio/audio store 330 --- warehouse 331 --- your place 400's item codes 400 --- alcohol/beer 401 --- answer machine/v.m 402 --- bike/motorcycle 403 --- books/magazines 404 --- car/truck 405 --- cd's/tapes 406 --- cigarettes 407 --- clothes/shoes 408 --- credit cards 409 --- daytimer/orginizer 410 --- drugs/medicine 411 --- information 412 --- equipment/supplies 413 --- fax/copies 414 --- food 415 --- gas 416 --- glasses/contacts 417 --- inventory/product 418 --- item discussed 419 --- keys 420 --- mail/package 421 --- money/check 422 --- pager 423 --- paperwork 424 --- pet 425 --- radio/sterio 426 --- soft drinks 427 --- telephone 428 --- tickets 429 --- video 430 --- wallet/purse 500's time codes 500 --- after 501 --- anytime/no hurry 502 --- approximately 503 --- before 504 --- fairurgent/a.s.a.p. 505 --- hours 506 --- hurry/quickly 507 --- minutes 508 --- this afternoon 509 --- this evening 510 --- this morning 511 --- time 512 --- tomarrow 513 --- until 514 --- yesturday 911 --- emergency 600's family/relationship codes 600 --- attitude adjustment needed 601 --- happy anniversary/birthday 602 --- have a great day 603 --- hope your feeling better 604 --- hugs and kisses 605 --- i didnt want you to leave 606 --- i love you 607 --- i miss you 608 --- i owe you one 609 --- i'm mad at you 610 --- i'm scared 611 --- i'm sorry 612 --- i'm thinking of you 613 --- it's late get home 614 --- just called to say hi 615 --- let's go out 616 --- stay away for awhile 617 --- stop calling me 618 --- this my last page 619 --- wish you were here 620 --- you are in trouble 621 --- you are the greatest 622 --- you were incredible codes created by REP enterprises ************************************************************************** 2)From: CrACKeD Subject: Re: Handy Gadgets Brent, you can order a catalog from The Edge Company if you call them at 1-800-732-9976. They do have a few nifty gadgets, but they also have a lot of useless junk, IMO. Their catalog is worth a look, regardless. CrACKeD ************************************************************************** 3)From: Larry Braden Subject: New Info Source To all list members, I ran across this information yesterday and thought it might be useful to some of you on the list. Information America ( IA ) will introduce Feb. 1 " KnowX " a unique Internet public records information service. The data available is suppose to be background, assets and adverse filings on companies and individuals. There address is: http://www.merc.com/stories/cgi/story.cgi?id=1113252-3b1 Happy hunting. NOTE - I or our company is NOT connected with or indorse the above company in anyway what so ever ! Respectfully, Larry Braden Montrose Investigations E-Mail at Braden@rmii.com or visit our home page at: http://www.angelfire.com/co/WestCoPI Consider us your Colorado Internet connection ************************************************************************** 4)From Spysociety@aol.com Mon Jan 20 17:52:03 1997 Subject: In Search Of In search of Radio Shack product # 11265113 fully assembled scrambler/descrambler. price negotiable. ************************************************************************** 5)From: Donintel@aol.com Subject: Ignorance may be bliss - but it doesn't solve problems I am in complete agreement with Trace Carpenter and the moderator. The only way an Intelligence or Law Enforcement officer can hope to be effective, is to have an exhaustive understanding of how crimes are committed. Without such an understanding, the individual is left to wing the assignment, without any reference. A while back, a certain law enforcement agency, adopted a policy of recruiting only those individuals with totally "squeaky clean" backgrounds. Any KNOWLEDGE of illegal or unconventional activities was an immediate disqualifier. The agencies' arrest and conviction rate plummeted, skill-based crime shot up, - but nobody smoked. The day that coherent discussion, of the type carried out by this group, constitutes a danger to our society, than maybe it should. Don ************************************************************************** 6)From: Bret Watson Subject: This is becoming a noisy channel Whilst I don't care about the L0pht advisory I do can that it swallows up so much space. Things like that are cute but not really relevant to this forum no? If you wish to read such things why not subscribe to Best of Security - a computer security list. I would also suggest that it become policy that advertisments of services/ software be restricted in length. This is not unusual - a similar list called sechelp does this and it makes life so much easier to deal with. Cheers, bret Bret Watson bwa@usa.net +++Moderator's Note+++ If we keep the adverts to a minimum we can fit more info into the digest. I think we still want the product and services adverts but let's try to limit them to a Web Site URL or Tel/Fax Number for further info... ************************************************************************** 7)From: Richard Smerker Subject: DTMF Decoder for Windows 95 I created a Real-Time DTMF decoder for Windows 95/NT (WinTone), and was curious if anyone could give me feedback on it - As far as what it needs, and what it does just fine. I want to make it as useful as possible! You can grab it at : http://www.frii.com/~rsmerker/html/programs.html Rich ************************************************************************** 8)From: Paul Longo Subject: Reverse Phone Search...Not Anymore 9)From: Smiley2521@aol.com Subject: Re: Reverse Search If you have a phone number, you can find out whose it belongs to at the yahoo site (http://www.yahoo.com). If the number is listed, then you should be able to find out who it belongs to. Smiley: Unfortunately, reverse phone number lookups are no longer available on Yahoo. To quote their web site: What happened to the "search by telephone number" feature?" We have elected to discontinue the reverse lookup feature because of privacy concerns that have been raised by users." Paul Longo ************************************************************************** 9)From: Paul Longo Subject: Edge Company 800 # If anyone has the Edge Co. 1-800 # please post it thanks jake Jake: The Edge Company 1-800-732-9976 Paul Longo P.S.--No sales to minors... ************************************************************************** 10)From: "Lorenzo Castillo Sanchez" Subject: RE: Overt(?) Fax Interception About a week ago I faxed my pal in Moscow. Nope, he's not related to any type of surveillance industry or group. The strange thing is that he received my fax 2 days later. I also had this sort of experience with a friend in China. He received my fax several days later. Would it be possible to simply "cut in" the line and set up some kind of an interception post ? If this sort of things keep going on, what could I suggest to my friends overseas ? I, personally, think this is an openly overt type of interception. Please let me know what I should do in this situation. ************************************************************************** 11)From trever.kb9nhu@juno.com (Trever C. Trader) Subject: RE: Monitoring Cellular Telephone Transmissions cheaply If the phone that you are using for the receiving is an EE3 model, you can only receive 3 voice channels, pluse the initial paging channel. Thank you Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 ************************************************************************** 12)From: Bill Bacon Subject: Time Lapse Recorder I could use some help in finding information on a time lapse recorder. I have used a Sony in the past but have not kept up with the changes in the last couple years. I need to run it in "real time" as long as possible for a surveillance. Also has anyone ever used a motion detection type trigger for activating a video recorder with success?? Any help would be greatly appreciated. ************************************************************************** 13)From: SpyKing@thecodex.com Subject: Gingrich Cell Phone Intereception Article I thought this might be of interest to the group. State Unlikely to Prosecute Florida Couple No Call Participants Have Made Complaint MIAMI - The Florida couple who eavesdropped on House Speaker Newt Gingrich's telephone conversation last month and provided a tape to Democrats are not likely to face prosecution from state authorities. State Attorney Jerry Blair of Live, Oak, the prosecutor whose jurisdiction includes Columbia County, where the eavesdropping occurred, said Friday that none of the Republicans involved in the telephone call had contacted his office to initiate a criminal complaint. "I'm not going to file criminal charges on behalf of victims in Washington, D .C., unless I know they are willing to travel to Florida to testify, Blair said in an interview. "I have been contacted by people from all over the state and nation demanding that I prosecute, but not by any of the parties involved in the call." Blair said he was not ruling out the possibility of bringing felony wiretap charges against John and Alice Martin of Fort White. The Martins have admitted intercepting the controversial telephone conference call Dec. 21 on a radio scanner while they were driving to Lake City to shop. The couple said that when they realized that the participants included the Georgia Republican and his advisers, and that the conversation dealt with the ethics charges against the House speaker, they turned on a tape recorder. The Martins later passed the tape to House Democrats, one of whom leaked it to the New York Times and other newspapers. According to Democrats, the tape proved that Gingrich was violating a promise that his lawyers had made to the House ethics committee that he would not use his office to try to influence the course of the investigation into his activities. Gingrich has said that is a misinterpretation of the conversation. But the subject of the telephone call has become secondary to the controversy over the eavesdropping itself. Florida and federal law prohibit the taping of intercepted communications without the permission of those involved. Both are felonies. House Republicans had demanded that the Justice Department investigate the case. They also content that not only are the Martins subject to prosecution, but every Democrat who was aware of the tape's contents -- including Rep. Karen L. Thurman (D-Fla.), House Minority Whip David E. Bonior (D-Mich.) and Rep. Jim McDermott (D-Wash.), who reportedly leaked the tape to the media -- should be called to account. FBI Director Louis J. Freeh has opened an investigation. ************************************************************************** 14)From: Laura S To: 6886@mne.net Subject: Transmitter Help At my company we're having problems with laptop computer thefts. Does anyone know of a transmitter that can be placed in a laptop? I am trying to do one of two things, either: 1) Have the transmitter send out a AM or FM tone, so I can locate the laptop; or 2) Have the transmitter activate a receiver hidden in our building lobby (which in turn could activate a camera). This way I could see whomever is taking the laptop out. The major drawback is time. I have no idea how long the transmitter has to sit before the subject laptop is taken, so the battery current draw needs to be very low. (Or the transmitter needs to sit idle until activated by some outside source.) Maybe the transmitter can run off the computer's battery (which is often recharged)? Any help you can give is greatly appreciated! Laura ls@writeme.com ************************************************************************** 15)From: Jim Scales Subject: Handheld Scanners Is there a way to extend the available bands on scanners to pickup cellular/military/nasa bands W/o buying a $1200 scanner???? <<900mhz,200mhz,300mhz>>> .....ie adding crystals from radio shack etc. ************************************************************************** 16)From: "mage2" Subject: Back Issues I have a zip of all of the posts in archive if any one wants it i will send it to you through e-mail. have fun mage 281.Texas.USA "Just Because Your Paranoid Doesn't Mean There Not After You" K.S. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume2 Issue #23 ****************************************************************************** Vol.Two Issue #23 The Surveillance List Jan.21,1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Great List 02) ISC Las Vegas 03) Handheld Scanners 04) Time Lapse Recorders 05) re: Transmitter Help 06) Re: Tracking a Laptop 07) Re: Fax Interception 08) Re: Transmitter Help 09) IP Address 10) Cell Freqs for South Africa 11) PC Patrol 12) Re: Time Lapse recorders 13) Further questions on Gingrich cell call 14) re: Fax Interception 15) Intro - Australia 16) Re: Noisy Channel 17) Re: Noisy Channel 18) Reverse Phone Search ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Teresa Greatorex Subject: Great List The amount of information in your newsletter is awesome, and the volume pouring in is almost overwhelming. This is without a doubt the best place to go for information on the net. Thanks.... Teresa ************************************************************************** 2)From: Bud Andrews Subject: ISC Las Vegas Did you get any more information on this conference? Perhaps a local telephone # or contact? Thanks BA ************************************************************************** 3)From: Trace Carpenter Subject: Handheld Scanners There are several scanners still in the used market which were origionally made to monitor all freq's. The next step is the models which were made to listen to the bands in question but after the new laws were put into place they were sent back to the mfg to be modified. The next generation were never meant to monitor those bands. That dosen't mean that they are not capable of it. R&D is expensive and is a very good reason to just make modifications on existing technology. The ones that were sent back to be blocked and many of the ones that came out after that can be easily altered to monitor said freq's. Of course doing so may violate existing statutes federal and local. I only supply the info because I know your only concern is wanting to know how secure your transmissions are. Right! There are several lists out there which tell you which recievers can be easily altered, so if you see your neighbors scanner on the list, be careful. -- Trace Carpenter, PI, TSCM 214.828.4520 214.828.1917 Facsimile ************************************************************************** 4)From: Trace Carpenter Subject: Time Lapse Recorders Hi Bill, Motion detectors for what we refer to as an "event recorder" you bet. They work great! As for a time lapse system. Without talking to you to find out what your budget and requirements are e.g. size for vans, ac-dc etc. it's hard to tell you what you need, but feel free to contact me. If you want a new system to do both I can get them wholesale, if you think you might want a used system let me know. We have some that we've taken in when we upgraded systems for hotels etc and reconditioned them. If you have your own outlet and just need info, that's fine too. The best time to catch me in the office is after lunch central time. I'm often out running errands in the morning and running my traps in the evening. -- Trace Carpenter 214.828.4520 214.828.1917 Facsimile ************************************************************************** 5)From: "Peter J. Lasky" Subject: re: Transmitter Help Why don't you try using a magnetic security device. Something like a libray or Best Buy uses. Place the sticker with the metal in the computer or under an existing label on the under side of the laptop or starrt putting a company ID label on the laptop which has the metal already on it. Just put your company Name, Phone, Address that sort of thing. I hope this helps. Pete Lasky GooDFeLLa Join the family at HTTP://WWW.akoe.com/ ************************************************************************** 6)From: Trace Carpenter Subject: Tracking a Laptop If you're trying to follow a laptop there's a system already in place. I can't remember the name of the program but here's how it works. You load the program on your laptop which loads into memory similar to a virus. This is done so it's always protected. You can reformat the drive, run f-disk, etc. but the "virus" is still there. If the laptop is stolen, the program goes into action. How does it know if it's been stolen? I think every so often meaning whatever you set the parameter's for, you have to go into the program and tell it you're still in possession of said laptop via a passcode. If it's stolen then whenever the laptop is turned on, it covertly access the modem after it turns off the speaker. If the modem is currently plugged into a phone line it calls an 800 number and reports it's location. As you're probably aware, 800's can "Caller ID" the number even if it's a private number via caller id standards. I hope this helps. If you want to transmit a tone to a directional reciever, sure you could do it, but range would be very limited plus the rf interference problems which you would face would make it impractical. -- Trace Carpenter 214.828.4520 214.828.1917 Facsimile +++Moderator's Note+++ The company you seek is called CompuTrace. Trace, how could you forget that name? ;-) You will find them on the web at: http://www.absolute.com/index.html ************************************************************************** 7)From: Trace Carpenter CC: espaniola@hotmail.com Subject: Re: Fax Interception Not only is it possible, but there are services available here locally which give you a phone number which you can use as a fax line. It is primarily used for people who don't have a dedicated fax line and need one. If I fax something to the number it holds it on a hard drive. Then when you have a few free minutes, you call your "fax mail box" from your fax machine and it "faxbacks" everything to your machine. The covert possibilities for this system are obvious. -- Sincerely, Trace Carpenter, P.I, TSCM 214.828.4520 214.828.1917 Facsimile ************************************************************************** 8)From: "David S. 'Greeny' Greenberg" Subject: Re: Transmitter Help > 14)From: Laura S > To: 6886@mne.net > Subject: Transmitter Help > > At my company we're having problems with laptop computer thefts. Does > anyone know of a transmitter that can be placed in a laptop? I am > trying to do one of two things, either: > > 1) Have the transmitter send out a AM or FM tone, so I can locate the > laptop; or > > 2) Have the transmitter activate a receiver hidden in our building lobby > (which in turn could activate a camera). This way I could see whomever > is taking the laptop out. > > The major drawback is time. I have no idea how long the transmitter has > to sit before the subject laptop is taken, so the battery current draw > needs to be very low. (Or the transmitter needs to sit idle until > activated by some outside source.) Maybe the transmitter can run off the > computer's battery (which is often recharged)? > > Any help you can give is greatly appreciated! > > Laura > ls@writeme.com > ************************************************************************** I'd say the best thing to do would be to install an Inventory control system in the building, with detectors at all exits/entrances... Then take apart each laptop (or whatever you want to protect) and place one of the tags inside... Just like a thing at radio shack... Someone tries to leave w/it -=- bingo -- off goes the alarm.. To get out w/the thing (if that's allowed), then you have people go by a guard in the bldg who allows them to leave if they're authorized to take the laptop with them... Maybe a bar code on the laptop tied into a reader to make it completeely idiot proof for the guard... Enjoy... ************************************************************************** 9)From: Owen Morgan To: <6886@mne.net> Subject: IP address I see that on some IP address' that they show up on IRC as (example 207.64.379 or some thing) How would I be able to find out there numberical IP address using there, normal address (like kuntrynet.com) Owen Morgan ddraig@kuntrynet.com ************************************************************************** 10)From buxton@cis.co.za Wed Jan 22 21:40:34 1997 Subject: Cell freqs for S.A. Howdy, Does anyone know the frequency/s which are used by cell phones in South Africa? SeeU ************************************************************************** 11)From: "Shadow Chasers" TSubject: PC PATROL PC Computing Feb 97 magazine (pg 84) shows PC PATROL, a low cost home/office security system that works with your computer. It comes with one motion & two magnetic sensors & one reciever that attahces to your computer! When activated, signals are sent to the computer which can perform numerous functions, to included calling a series of numbers you designate, start taking pictures with the QUICK-CAM!! PC PATROL potential uses are only limited by your surveillance imagination. CALL (714) 435-1092 the spec's SHADOW CHASER SHADOW CHASER INVESTIGATIONS (c) http:\\www.shadow-chasers.com\\ ************************************************************************** 12)From: Jean-Pierre Forest Subject: Re: Time Lapse recorders There are several Time lapse recorders out there. I'm successfully using Panasonic, Burle and the Sanyo TLS 2000 with an AD1416(American Dynamic single channel video motion detector) and it works great to activate the time lapse in any mode you wish to program. If you need further assistance you can e-mail me privately. I do a lot of covert CCVE installation(approx 15 install at any given time, most of my TLR are Sanyo) Blue Skies, J.P. ************************************************************************** 13)From: Greg White Subject: Further questions on Gingrich cell call Just some further notes and questions about the Newt Gingrich cell phone case. There seem to be a lot of unanswered questions here. According to what I read, the Martin's said they just bought the scanner a few days earlier from Radio Shack. How were they able to pick up cell calls on a new unit? (In addition, apparently it is a felony to have a police scanner in your car in FL.) They also just happened to have a tape recorder with them? How were they able to pick both sides of a cell call? I thought the transmit and receive were on separate frequencies. It seems like many years ago (when it was still legal) listening on cell calls on a friend's scanner, I could only hear one side of the conversation. Next, from what I've read, Gingrich was not on a cell phone. Only one of the five participants was on a cell phone. The Congressman who was vacationing in FL with his family (Rep. Baynor??) was supposed to call in from a pay phone at the appointed time, but couldn't find one. So he parked in front of a Waffle House so he would have a good connection, his family went inside for breakfast, and he called in from there. The other participants may not have even known he was on a cell phone. Question: If he was parked and the Martin's were driving along while recording (as they said) how were they able to record 10-15 mins of the call? Wouldn't they have passed thru several cells during that time and lost the call? Next, concerning Pat Quinn's (?) post putting forth "the end justifies the means" defense for the Democrats. I'm certainly no fan of Gingrich, but as far as I can tell, he broke no Federal or State law. He apparently broke a RULE of the House. Yet as far as I can tell a string of Federal and State felonies may have been committed, from the Martins recording the calls to the NY Times printing the transcripts. In addition, apparently one of the participants was Gingrich's lawyer who was discussing his case, so there may have also been a violation of lawyer-client privilege. Lastly, I wonder how many people took the time to get a copy and READ the transcripts. I was curious and did. As I said I'm no fan of Gingrich, but I really don't see a problem. From what I read, Gingrich had promised not to mount a public defense against the charges and was asking his lawyer what he could and couldn't say and still stay within his promise, and also what his supporters could and couldn't say. I honestly don't see the problem. I realize this may be slightly off topic, but I think the cell phone questions are serious enough to ask the group. Hope the editorial content doesn't interfere. Greg White gregw@neosoft.com ************************************************************************** 14)From: "Shadow Chasers" Subject: Re: FAX INTERCEPTION, DUH BIG BROTHER!! So a little sarcasm is the subject line, but to author who wrote about "FAX INTERCEPTION" wanting to know wether or not it was being intercepted before it's intended reciepent outside the United States, three words for you "BIG BROTHER & NSA." Any median in which the NSA can monitor signals (SIGINT) is being done 24 hrs a day/7 days a week. They have the capability to monitor all phone calls TO & FROM the states. The author mentioned friends in RUSSIA & CHINA, you can bet there's a dossier on your fax's somewhere either between BIG BROTHER or the HOIST of other nations. SHADOW CHASER SHADOW CHASER INVESTIGATIONS (c) http:\\www.shadow-chasers.com\\ ************************************************************************** 15)From: "Mr Simon Johnson" Subject: Surveillance List Hello, My name is Simon Johnson; I am a IT Security consultant in Victoria, Australia. As you have a great site I'd love to join the surveillance list. Hope to be a part of some great discussions. Regards Simon. ************************************************************************** 16)From trever.kb9nhu@JUNO.COM Wed Jan 22 21:44:15 1997 Subject: Re: Noisy Channel Bret This is a noisy channel, because we are here to meet new people and discuss things about privacy, security, and so fourth. We are not held to a protocol at which we are to be posting. Anyway, when you start to pay for the list, then I would make a complaint, if it is a legitimate one. Trever C. Trader 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 +++Moderator's Note+++ If you guys start this I'm gonna take my football and go home ;-) ************************************************************************** 17)From admin@asianenergy.com.au Wed Jan 22 22:35:17 1997 Subject: RE: Noisy Channel Moderator, You are doing a great job with the hottest list on the net. Ignore the editor-wannabes and their pissing and crying. If you got room, publish it, if not, shorten it. Easy. The little girls who are afraid of new information aren't even in the game. They need to read Paladin Press/Delta Press and the Loompanics catalogs to see whats available for a few bucks but it probably would scare 'em. Later +++Moderator's Note+++ We're wasting digest space with this guys & gals... Talk tech please... ************************************************************************** 18)From beatle@flash.net Wed Jan 22 22:38:35 1997 Subject: Reverse Phone Search For those that are interested, the best database I've found bar none is located at www.searchamerica.com/, both for name as well as number searches. It is not free, but it will find people and numbers not located elsewhere. There are other reverse search engines as well, I believe. 8)From: Paul Longo Subject: Reverse Phone Search...Not Anymore 9)From: Smiley2521@aol.com Subject: Re: Reverse Search If you have a phone number, you can find out whose it belongs to at the yahoo site (http://www.yahoo.com). If the number is listed, then you should be able to find out who it belongs to. -- MZ ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue #24 ****************************************************************************** Vol.Two Issue #24 The Surveillance List Jan.22,1997 ***Over 1200 Members Worldwide*** ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Gingrich Cell Phone Affair 02) A Little Overkill? 03) Re: Decoding Cellular Freqs 04) Re: coffee machines. 05) Wrong Issue Number 06) Want you to know we are out there! 07) Questions 08) More Food for thought... 09) Suggestions 10) Phone Line recording 11) Laptop Retrieval/Questionable TSCM 12) Scanner Questions 13) Cocaine Contamination of US Currency ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Re: Gingrich Cell Phone Affair This was snipped from a military list. It's food for thought. Any comments? >L'Affaire Gingrich involves at least four felonies in violation of Titles >10 and 12 U.S. Code, and (I believe) four Executive Orders, including >12333 and 11088. All of these laws and EO's govern Wiretapping, >Investigative Monitoring and Eavesdropping Activity (WIMEA). As a former >Signals Security officer, I would still be in Leavenworth had I revealed >the contents of monitored conversations from my authorized activities. >This recording was entirely unknown by all the conversation's >participants and therefore entirely unauthorized and illegal. > >I am astonished at the lack of furor over these activities. There is no >way that a "police scanner" could have picked up this entire >conversation, based on technical capabilities and line of sight to the >participants. It is very unlikely that a random one-time intercept could >have intercepted this conversation even with the right equipment. I >therefore suggest that there may be a private Signals Intelligence >facility operating illegally in the Washington D.C. area which monitors >the conversations of political personalities and sells the intercepts for >profit or for political gain. This might include mobile operatives who >tail and monitor political targets employing cellular phones. If this >capability exists, it must involve either current or former SIGINT or >SIGSEC personnel who know how to monitor these conversations. That is >worrisome. > >As a brief follow-up on my hypothesis regarding the illegal monitoring of >Representative Gingrich's cellular phone conversation, there have been >earlier documented episodes of criminal intercept operations. > >There have been multiple discoveries of private SIGINT monitoring >facilities, possibly employed by drug gangs, operating in critical cities >in the U.S. From the documents recovered, it appeared that former >military SIGINT personnel had been engaged in illegal monitoring of law >enforcement frequencies. The intent was probably to provide early >warning of impending raids to criminals engaged in drug transactions or >transport. > >I can understand and disapprove the criminal element employing more >advanced techniques in their illegal enterprise. I cannot understand nor >approve any use of intelligence collection and analysis capabilities in >domestic politics. > ************************************************************************** 2)From: SpyKing@thecodex.com Subject: A Little Overkill? >FBI announces needs for wiretap capacity > By Ellen Wulfhorst > NEW YORK (Reuter) - The FBI said Tuesday that the nation's > telephone system must be capable of carrying almost 60,000 > wiretaps and phone traces simultaneously in order for law > enforcement agencies to fight crime. > Determining the capacity needed for surveillance comes under > the mandate of a 1994 federal law requiring telephone companies > to ensure that their systems can accommodate the needs of law > enforcement agencies, said James Kallstrom, head of the FBI's > New York City office, at a news conference. > ``It's designed to tell companies how much capacity they > need to build into their telephone systems so (that) if a bomb > goes off or there's a terrorist attack, we can respond,'' he > said. > Determining the capacity by law is necessary because new, > sophisticated telephone systems, made possible by digital > technology, can make surveillance such as court-ordered wiretaps > nearly impossible, he said. > In the latest technology, thousands of conversations now are > carried at one time and under this law, telephone companies must > have the ability to single out an individual conversation if > necessary, he said. > Kallstrom stressed that the capacity needs do not mean > authorities plan to conduct that much surveillance, nor do they > have any new powers to do so. > Specifically, after October 1998, the nation's telephone > system must be able to carry 57,749 wiretaps or traces on any > given day. The FBI calculated the single busiest surveillance > day in every county and wireless service area from Jan. 1, 1993 > to March 1, 1995, and factored in growth trends, he said. > Kallstrom said the capacity needs could be regarded as a > kind of insurance, and that the amount of surveillance actually > conducted will be determined by the amount of crime. > ``We're not doing 57,000 wiretaps, I can guarantee you that. > Nor does my fire department anticipate three fires on my street, > but there's three hydrants,'' he said, adding, ``Try to get > house insurance without those, and try to fight crime without > this.'' > Law enforcement agencies conduct about 900 wiretaps each > year, Kallstrom said. > An official with the American Civil Liberties Union said the > agency's ability to tap telephones is a cause for concern. > ``For every phone that is tapped, there are over a thousand > innocent interceptions,'' said Laura Murphy, director of the > ACLU's Washington office. > She said that because telephone technology is getting less > precise, ``it's more likely that innocent conversations are > being intercepted. True, they're not supposed to use those > conversations, but sometimes it's going to be hard to resist so > you'll never know when the government is going to be listening > in.'' > This surveillance includes pen registers, which record the > numbers dialed in an outgoing call; traps and traces that > identify the phone number and location of an incoming call, and > wiretaps that capture a conversation or data on a phone. > The FBI unsealed court orders in every county in the nation > and surveyed about 1,500 telephone companies over a two-year > period, Kallstrom said. Ten percent of the surveillance they > found was wiretaps, and 90 percent was pen registers and traps > and traces. > In the past 14 years, surveillance has been responsible for > convictions of more than 26,000 felons, he said. > The costs are to be borne by the telephone companies, > Kallstrom said. The FBI did not offer an estimated cost. > A little bit overkill when you consider that approximately 1000 court orders were signed last year nationwide... makes you want to run out and download Nautilus or PGP phone ;-) ************************************************************************** 3)From: ILQQK4DOE@aol.com Subject: Re: Decoding Cellular Freqs To:Jim Scales, If you are looking for a cheap device to get a scanner to decode cell type frequency ranges look up "Scanner World" I believe they are in Ohio. $85. ************************************************************************** 4)From: ILQQK4DOE@aol.com Subject: Re: coffee machines Mr. Wlastrom I just read your concerns relating to the methods to get free coffee from certain machines and I sympathize with your concerns. But I did not view this info as a license for free coffee but rather as an instructional on what to look for in other peoples behavior. I am both a private investigator and a law enforcement person. I hope the board continues to post these interesting scenarios as I intend to use the knowledge for my security observations. Sincerely, ILQQK4DOE ************************************************************************** 5)From admin@asianenergy.com.au Thu Jan 23 05:14:27 1997 Subject: Wrong Issue Number Hey....the numbers are wrong ??? I got two issue #22 Ill change it to 23 unless you tell me Mike +++Moderator's Note+++ Mea culpa Mea culpa... You're right. I flubbed the dub. Too much caffeine in my coca-cola I guess. Sorry. Last issue should have been #23 this is #24... ************************************************************************** 6)From: "The Museum Security Network" Subject: want you to know we are out there! The Museum Security Network: website and mailinglist. Devoted to all aspects of cultural property protection for museums, archives, libraries, national parks, archaeological sites, churches etc. etc. Those of you that deal in or produce security equipment that can be of use for cultural institutes are invited to send us information (textinformation, e-mail addresses, websites.....) Listing in our website is free of charge. If you want to send long files you are invited to make us of: ftp://museum-security.org/incoming . Do not upload binary files for those will be erased without opening. More information can be received via: mailto:info@museum-security.org (auto responder message) or: mailto:TonCremers@museum-security.org ************************************************************************** 7)From PRV8EYE@aol.com Subject: Questions Anyone know of any web sites or sources of info on restoring blocked freqs on a Realistic Pro-34 or a Pro-46 (for educational purposes only of course)? I would also like to know if anyone makes a PIR switch that would work with the "remote" jack in a Sony Handycam. ************************************************************************** 8)From: SpyKing@thecodex.com Subject: More food for thought... >Regarding: > > > ...There have been multiple discoveries of private SIGINT monitoring > > facilities... > >Do you have any actual references for this? How did they operate? It is >difficult to believe that a couple of people with only a scanner and a tape >recorder could be very effective. While it may be tempting to speculate >what interested parties might be able to do on a notional level, I think it >is important to examine the complexity of what is really involved. > > Cellular communications must be one of the more difficult signal >collection and exploitation targets. Even though at various trade shows we >see vendors selling suitcase collection systems against cellular, an >effective system would really require several layers of capability, >including: > >(1) a wide area surveillance from an altitude with line of sight (aircraft >or mountain) over the area of interest. This wide area capability must >have (a) the channel capacity to cover hundreds of cells and the (b) >capability to deal with complicated cochannel interference across cells. > >(2) a signal search and location capability to find the >signals-of-interest. Because of the cochannel issues, location might be >needed as a signal sorting parameter; so searches would have to be done >both spectrally and spatially. Signal-of-interest detection would involve >some method of recognizing these signals-of-interest: (a) externals, mobile >unit serial number detection, or (b) internals, speaker voice ID, keyword >recognition. > >(3) an intercept copy capability with (a) some way to track the >signals-of-interest as they move from cell to cell in the area of interest, >and (b) an interference mitigation capability to resolve the >signals-of-interest from cochannel and other electromagnetic interference. > > Other capabilities that would probably be required include: > >(4) a network penetration and exploitation capability within the public >switched network to catch the traffic of interest at the digital level with >dialed number recognition, > >(5) a decryption capability if digital cellular or computer traffic >(modems) are used. > > Although all of these technical problems can be minimized by the use of >human resources, e.g., just physically following the people you are >interested in, this raises additional complications for the collector as >well as just being difficult to scale to handle multiple targets. > > Considering the possible technical and operational scale that such an >operation could easily involve, especially on a multiple city scale, there >would have to be a significant possibility of compromise of these >operations. > > Any actual data would therefore be a useful indicator of whether >professional operations of this type are really being conducted. >Information on the techniques used would also be critical to identifying >individual protections that could counter these capabilities. Comments anyone? ************************************************************************** 9)From: ALBrubaker@aol.com Subject: Suggestions I have a couple of suggestions: 1) The subject line of The Surveillance List is so long that the issue numbers do not show up on the filing cabinet I have them stored in, so it is difficult for me to arrange them in order. My suggestion would be: Surveillance List - vol. 2, issue 7 - January 6, 1997 2) I somehow do not have Vol. 2, Issue 13 and would appreciate it if someone would forward that. Thank you. 3) When attaching longer files to the list, could you change the name of file to be downloaded so that if I don't get a chance to read them for a couple of days I can still assemble things together. 4) Thank you for your comments in vol. 2, issue 20 re "Subject: RE: Vol Two #17 BoS: LOpht? Advisory" by Brad Walstrom. I did not have time to finish my comments for the post, but view this opinion as such a serious matter. I was probably one of the largest proponents of personal privacy until recently; now I've become a proponent for freedom. Thank you for The Surveillance List. ************************************************************************** 10)From: Medic Subject: Phone Line recording I want to be able to monitor calls and save the conversations to my hard drive. Does anyone know of any programs that will do this? I also want o know if there is any sofware method to block outgoing caller ID information. I would like to incorporate these features into a program i am already using to work my phone system. ************************************************************************** 11)From: Bigsby Subject: Laptop Retrieval/Questionable TSCM Hi there, Just reading info on stolen laptops and protection here. I just saw a show on a program called "Cyberangel" invented by T.V. actor Robert Urich. His son had a laptop stolen from school. They invented a program that once installed, will automatically dial a preset number if it is connected to a phone line or service provider if someone else uses it. Thought it would be helpful. I have been studying electronics & privacy protection for some time now, and had to tell you of a recent episode. I also work in an electronic repair facility and recently a woman brought in a JCPenny remote video camera/receiver for repair(a nice unit for $300 and .1 lux). She said she needed it fast because her ex-boyfriend was slashing her tires. She also said she felt he had her house bugged, as he knew about things that were only said in there. Well, she hired a local P.I.(Sloan Agency, Ambridge, PA) who said he had some expert bug-finding equipment. He charged her $350 for a 10 minute house sweep with his $249 bug finder/sniffer/antenna. He assured her that if the needle didn't move, everything was OK (He smiled a lot too). Not only that, he charges "by the room", and was nice enough to do the bathroom for "Free"(an extra 15 seconds). He did no physical inspection and didn't check the phone lines or box, or look for hard-wired gear. I informed her that the only inspection he did was to see how much she could be taken for. It seems that these type of people are the ones making a bad name for the legit ones. I am trying to get into the business and am constantly studying all of the information I can find. If anyone needs a very knowledgeable and capable assistant, drop me a line. This site is by far one of the best forums I have encountered. Keep up the enlightening work. waddell@nauticom.net ************************************************************************** 12)From: DISCHOFF@aol.com Subject: Re: Scanner Questions Can someone please detail information on scanners and cordless phone interception. Specifically: 1. Does a cordless phone make other land-line phones "receivable" from a specific location. 2. What do the "handset frequencies" transmit and how? (ie. can a handset frequency act a room monitor while in-hook position? 3. I have a Radio Shack Pro-2044 scanner. What do more expensive scanners do that this does not. 4 . Info on hand held scanners. 5. Will a directional antenna allow more of a "lock in" on a specific frequency. Any info will be greatly appreciated and thanks to those of you who assisted with previous concerns/questions. Regards, DS ************************************************************************** 13)From: SpyKing@thecodex.com Subject: Cocaine Contamination of US Currency Although this may be a little off topic it does pertain to some privacy/surveillance/law enforcement issues... and apparently will have far reaching ramifications in some criminal and civil trials... According to an article printed in the prestigious Journal of Analytical Toxicology "Cocaine Contamination of United States Currency" , Vol. 20, pp. 213-216, 1996. "Laboratory testing confirmed cocaine was present on 79% of US currency randomly collected and tested." "Contamination was widespread and found on bills of all demoninations from fourteen (14) American cities." "These results indicate that cocaine contamination of currency is widespead throughout the United States and is likely to be primarily a result of cross contamination from other contaminated currency and from contanimated money-counting machines." "Articles of clothing, personal belongings, households, and even public areas are likely to become contaminated from casual contact". The test also concluded that casual handling of contaminated money COULD produce a positive urinalysis test for cocaine in the first 24 hours... although it detected traces in very small quantity in the urine... I found the report to be quite indepth as to the tests run and quite disturbing as to it's findings... Ramifications: 1) Certain residue arrests go out the window... 2) Drugs of Abuse tests need further clarification... 3) Failures of Drug Abuse Tests need to be re-examined... 4) Law Enforcement personnel handling drugs/money could test positive for use! 5) Everyone could test positve for cocaine... 6) PI's doing criminal defense work, run to your favorite drug lawyer with this info and get a ton of work re-opening questionabel arrests/convictions... Any comments on this? ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue # 25 ****************************************************************************** Vol.Two Issue #25 The Surveillance List Jan.23,1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) ISC SHOW 02) Title 18 USC & The Feds 03) War & Knowledge 04) Radio Shack 8mm TV/VCR Info-California 05) Surveillance Q 06) RE: Volume 2/#23/13 Currency Contamination 07) Cellular Phone Monitoring 08) Re: Questions 09) FULL CELLULAR COVERAGE 10) Re: Scanner Questions 11) Re: Gingrich Cellular Phone Affair 12) Wire Taps ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Ron Lander Subject: ISC SHOW The ISC Show is March 12-14 at the Las Vegas Convention Center. You can call Customer Service at 800-840-5602 or 203-840-5602. Their address is: ISC EXPO 1515 Champion Drive, Suite 100, Carrollton, TX, 75006. The fax number is 972-620-3099. If you have any other questions, feel free to drop me a line... Ron Lander, CPP rlander@ix.netcom.com ************************************************************************** 2)From: Trace Carpenter Subject: Title 18 USC & The Feds I'm going to try to keep this posting brief as I know that the legal end of the technical issues are not important to many who read the list, and I don't want to take up too much space with the issue as we have spent a lot of time on it lately due to the Florida incident. If anyone's interested in this they can follow it easily enough now that they know about it. Having wasted a paragraph saying all of that there is another wire interception issue going on in Dallas, Texas. The January 23-29, 1997 issue of the Dallas Observer has on it's cover in large headlines "It's all a matter of power." "When Sandy KRESS was school board president, he and Dan PEAVY held private discussions on how to limit the influence of black school board members, Their conversations were captured on the Peavy TAPES, which Kress has fought hard to keep secret. Now, U.S. Attorney Paul Coggins wants the Justice Department to review the tapes for possible CIVIL RIGHTS VIOLATIONS." The incident has been in the local news for quite a while but more legal issues have risen lately. The article goes on to say how a neighbor of Peavy who had been having problems with him for a long while captured Peavy's conversations a scanner while he was talking on his cordless telephone. The article also goes on to state that "The U.S. attorney says he will ask a federal judge to allow copies of the tapes to be forwarded to the Civil Rights Division of the U.S. Department of Justice." These tapes were also used I am told in a recent legal action against Peavy. Now Title 18 USC comes in. I don't know at this time what frequency the telephone that Peavy was using operated on. Therefore I don't know if it's on a regular dot frequency in the 49Mhz range or 900 band. I do know however that parts of Title 18 exempt the portion of the conversation which takes place between the base unit and cordless telephone. I also know that Title 18 specifically states that no part of an illicitly obtained conversations can be introduced into evidence in a judicial proceeding. Understanding that you would think that since the U.S. Attorney is trying to have it introduced, then the recording must have been obtained without a breech of the code. Right? Well the article goes on to state that the neighbor who recorded the conversation pled guilty to illegally taping the telephone conversation and was fined $5000.00. So if it was obtained illegally why do you suppose the U.S. Attorney can have it introduced into evidence? I office up here with a battery of attorneys and they're discussing how it may be done. We'll see. ************************************************************************** 3)From: Trace Carpenter Subject: War & Knowledge I came across this on another TSCM site and thought some of the members would enjoy it. I almost didn't post it because of the recent contraversy but really liked it. To the Moderator: If you want to snip it to save space I'm not going to get my feelings hurt. Therefore, I say: Know your enemy and know yourself; in a hundred battles, you will never be defeated. When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant both of your enemy and of yourself, you are sure to be defeated in every battle. --Sun Tzu, The Art of War, c. 500bc +++Moderator's Note+++ The Art of War is fascinating reading. It's also required reading in most Asian secondary schools. "Thick Face, Black Heart" by Chin-Ning Chu, AMC Publishing, Beaverton, Oregon explains Sun Tsu's teachings and describes how they are molded into the Asian method of doing business. I strongly suggest this for anyone interested in acquiring the "killer" instinct in any business... ************************************************************************** 4)From: XIPNEK@aol.com Subject: Radio shack 8mm tv/vcr info-california 1:00 pm california time spoke to modesto store. part #16-409 store #019039 modesto (1) left store# 013872 modesto(1)left you can go to your local store and order using these #'s. the store will then do a virtual lookup to verify stock # and will then have the unit shipped based on your prepay. good luck, ken affordable photo http://members.aol.com/xipnek 209 292 6914 ************************************************************************** 5)Dmpalomb@ief.iconcrossroads.org Thu Jan 23 20:10:47 1997 Subject: Surveillance Q I was wondering what pretext any private investigators use when they are on a surveillance? As for the cellular monitoring thread -- it is almost impossible to tell who you are listening to when monitoring cell freqs with a standard scanner. HOWEVER, if one has a modified cellular phone with a data connection, (or a DDI) one can monitor, record and log any and all telephone calls placed by the specified telephone #. There is a program available called "Scan", for use with certain models of Oki and AT&T cellular phones which will identify what cellular site a caller is currently using. Scan also gives a read out of every cellular telephone numbers in use in the area. This program was used by an ex-hacker turned FBI informer to help catch the infamous Kevin Mitnick. Do a web search for "CTEK software" to find out more about it. ************************************************************************** 6)From: "Richard Leatherwood" Subject: RE: Volume 2/#23/13 Currency Contamination One of my companies manufactures Drug Test, and the possibilities of testing positive from handling currency are about the same as dying in a plane crash. I can see it now in the GLOBE, "Person dies of cocaine overdose from handling currency". Lets get a grip folks. R. L. Leatherwood New World Biotechnology +++Moderator's Note+++ Richard, perhaps you could supply me with a fax number and I'll fax you the article. Take a look and see what they're talking about and how accurate their testing was... You can then post your opinion back to the group. I'm sure everyone would like to hear from someone who specializes in that end of the business... ************************************************************************** 7)From: rkdixon@esper.com Subject: Cellular Phone Monitoring The Gingrich discussions have led me to believe that most people (including myself) don't understand a lot about how the system works. Trying to figure out if an "all-american" unbiased, couple just happened to pick up the conversation is hard to determine. It is certainly possible since one of the participants was using a cellphone from a stationary location. The couple could have "happened" upon the frequency and heard both sides of the conversation. The other question about how long they could have heard it while moving themselves is the one that I have questions about. 1) Isn't it possible to pick up an intercepted frequency far outside the confines of the particular cell that the caller is located in? What is the maximum range? I have heard of receptions from phones 25 miles or more away. 2) If the caller was stationary, then that frequency might not change for a long time, if ever. 3) Therefore, one could monitor a particular call over some range of distance. How far? Obviously, someone who was really serious about monitoring cell phone traffic could do it much more efficiently than previously discussed. It certainly should be possible to use a frequency counter and lock-on a call frequency for the car next to you at the light and then dial up that frequency on your scanner. Even if you lose a frequency due to the caller moving from one cell to another, the call usually shifts to a very finite number of possible frequencies, does it not? I understand it is possible to program a really good scanner to be able to pick up these shifts in frequency. The more important questions seem to be: 1) If the couple bought the scanner less than two years ago and it had cell frequencies suppressed, how did they do it? One obvious answer is that it seems that scanning with a "cell-less" 800mhz scanner still picks up a number of calls, so either the range banned was insufficient or something. Secondly, one can always purchase a converter to convert 800-900mhz signals down to the 400-500 mhz range which almost every scanner has. And, of course, some scanners can be modified. 2) I was more impressed that they not only picked up this particular call from all of the others, but also recognized the parties, and significance, AND had a tape recorder with them. 3) Would the average American take the same actions and send the tape to Washington? It will be interesting to see what happens, but I predict that no one will be prosecuted, AND there will be more restrictive legislation introduced to punish all of those people who have never taped a conversation off the air, and more attempts to ban those assault-style scanners. Rick Dixon ************************************************************************** 8)From: CrACKeD Subject: Re: Questions To whomever requested modification instructions for the PRO-34 and PRO-46 scanners, here are both: [begin pro-34 mod] PRO-34 Scanner Modification In regard to the information presented (March Issue) on the handheld Radio Shack PRO-34 scanner, my own observations on the modifications have been: 1. To restore missing 800 MHz frequencies, remove D-11. 2. To add 66 to 88 MHz (European Coverage), install a diode at D-9. 3. D-10 must remain in place for full 800 MHz coverage. 4. If a diode is added at D-13 it cuts out aero band, also seems to affect 800 MHz channel spacing. 5. D-12 added dosen't seem to have any affect. 6. Only D-10 and D-11 are factory installed. [end pro-34 mod] [begin pro-46 mod] You will be able to tune continously from 80?whatever to 95?whatever and this will include the appx 870 - 890 cellular band with the proper 30 MHz steps for the cellular frequencies. 1.Remove battery pack, battery door and antenna. 2.Remove the 4 black screws on the back of the radio: push upward on bottom at rear case and cantliever (swing) case half up from bottom to separete and remove, its not necessary to remove belt clip. (note: This sounds much easier than it is. Be prepared to "prop and lever" around 3 catches in the battery case, along with one on each side around 1/4 of the way down the case) 3.Carefully separate RF board from processor board by inserting eyeglass screwdriver between board by plug-in connector. 4.Unsolder copper-coated plastic Rf shield from microprocessor and set aside. (note: If memory serves me correctly, this SHOULD be the side where the pushpad is. In order to follow the rest of the instructions, place the scanner face down on a piece of cloth or in a clamp with the antenna facing AWAY from you). 5.Locate two resistors marked "0" (zero) on right side of board. (note: On mine they were labeled "000", not "0") 6.Carefully unsolder and remove BOTH of the resistors. 7.Reinstall ONE of the removed resistors (or jumper) on the UPPERMOST set of EMPTY solder pads. (note: These are located just to the left of where you just removed the two resistors.) 8.Thats it, reassemble the radio. PS-Reintstall one of the removed zero marked resistors into top set of empty solder pads. DO NOT install anything into LOWER SET of empty pads (cancels 30- 50 mhz and adds 68-88 mhz. [end pro-46 mod] I have tried neither of these modifications, but have no reason to believe they wouldn't work. They came from the same sources I have used several times to modify other radios. CrACKeD ************************************************************************** 9)From: "Shadow Chasers" Subject: FULL CELLULAR COVERAGE Visit http://www.durhamradio.ca/scanners.htm and check out the lates in scanners. While looking for scanners for my soon to be surveillance vehicle came across this page and found WINRADIO " This amazing receiver on a card plugs directly into any available slot on your IBM compatible computer. Our price is only $799.00 which works out to about $579.00 US Funds. That's a saving of over $100.00 less than the current US special price being offered at some stores. Our version comes with FULL CELLULAR COVERAGE right out of the box! No modifications required. No need to wait for a hack that may not materialize." Has anyone used this? I plan to install the new MONRAIL computer system in my vehicle and wanted save space, so the WINRADIO sounds good, but is it practical? SHADOW CHASER SHADOW CHASER INVESTIGATIONS (c) http:\\www.shadow-chasers.com\\ ************************************************************************** 10)From: CrACKeD Subject: Re: Scanner Questions > Can someone please detail information on scanners and cordless phone > interception. Specifically: > 1. Does a cordless phone make other land-line phones "receivable" from > a specific location. Negative. Your cordless telephone only transmits when you are using it. Picking up an extension land-line phone doesn't change the fact that it's still a land-line phone. > 2. What do the "handset frequencies" transmit and how? (ie. can a > handset frequency act a room monitor while in-hook position? The handset frequencies transmit only your voice and not the party you are speaking with. Again, a cordless telephone only transmits when you press the "Talk" button, so it will not act like a room monitor unless you leave in sitting on a table off the hook with a quiet line. Even if you somehow managed to do so, it would be a poor room monitor. > 3. I have a Radio Shack Pro-2044 scanner. What do more expensive > scanners do that this does not. Just about everything (I have a 2044, barf). The PRO-2044 is certainly an entry-level base scanner. It's very prone to images in just about every band it receives due to its design, and it doesn't even have a very wide receive range at that. A better/more expensive scanner would have triple conversion, NFM & WFM, more memory channels, and a wider receive range, to name a few extra features. > 4 . Info on hand held scanners. A bit vague, don't you think? Check a Radio Shack catalog. > 5. Will a directional antenna allow more of a "lock in" on a specific > frequency. Any info will be greatly appreciated and thanks to those of > you who assisted with previous concerns/questions. A directional antenna tuned for the band you're listening to certainly will help you "lock in" on a specific frequency. Directional antennas typically have higher gain than most omnidirectional antennas, and they also tend to reject those signals from the side and rear of where they're aimed. CrACKeD ************************************************************************** 11)From: Tim Tyler Subject: Re: Gingrich Cellular Phone Affair 1)From: SpyKing@thecodex.com Subject: Re: Gingrich Cell Phone Affair This was snipped from a military list. It's food for thought. Any comments? >As a former >Signals Security officer, I would still be in Leavenworth had I revealed >the contents of monitored conversations from my authorized activities. Not relevent to the issue at hand. Maybe it was a convenient way of informing people if his alleged former job position... >This recording was entirely unknown by all the conversation's >participants and therefore entirely unauthorized and illegal. It wasn't illegal just because the parties didn't have knowledge or give consent. It was illegal because ignorant/stupid judges & Congress decided to give the US cellular phone network 'security' by wrongly stating cellular calls had a reasonable expectation of privacy, and put provisions into the Electronic Communications Privacy Act of 1986 to 'protect' cellular phone networks. >I am astonished at the lack of furor over these activities. There is no >way that a "police scanner" could have picked up this entire >conversation, based on technical capabilities and line of sight to the >participants. It is very unlikely that a random one-time intercept could >have intercepted this conversation even with the right equipment. Absolutely positively incorrect. The author doesn't know what he's talking about. A scanner could pick up the entire call, if the cellular phone stayed within one cell (& thus didn't switch frequencies when transferring to a new cell). Evidence indicates the user of the phone was parked in a restaurant parking lot while his family went inside to eat. The Martins didn't have to be line-of-site with the participants. They simply had to be able to receive the cell site's signal (obviously, cellular systems are full duplex, so the cell site is transmitting audio [usually both sides] back to the cellular phone, while the cellular phone is transmitting a signal to the cell site on a frequency exactly 45MHz lower). It is entirely possible that a random intercept could have caught the conversation in question. >I therefore suggest that there may be a private Signals Intelligence >facility operating illegally in the Washington D.C. area which monitors >the conversations of political personalities and sells the intercepts for >profit or for political gain. Other than the selling of the intercepts bit, sounds like the guy is describing hundreds of media outlets (& thousands of individual civillians) anywhere in the world! >This might include mobile operatives who >tail and monitor political targets employing cellular phones. Very easy to do, with a halfway decent scanner, a modicum of effort, and oh yeah, a car! > If this capability exists, it must involve either current or former SIGINT or >SIGSEC personnel who know how to monitor these conversations. That is >worrisome. It is worrisome to me that this guy is apparently so ignorant about how easy it is for anyone to do this, with a little scanner radio! Why does he think that only professional ferrets would be able to do it? Just because the gov't might have very expensive, high-tech intercept systems that do require intensive training, it does NOT mean that the same basic results can be achieved by some kid with a little scanner that she bought used for $50 (that $50 figure is the lowest price I've seen for a used scanner that I knew had the ability of easily tuning in cellular phones). >There have been multiple discoveries of private SIGINT monitoring >facilities, possibly employed by drug gangs, operating in critical cities >in the U.S. It is simple. There are a lot of tuneable receivers in the world. This is well-known. If you're using a radio to transmit information you want or need to keep private, you have a duty to try to protect the information by using coding or cryptography for the information itself, and/or the radio circuit. It is certainly not a suprise that criminals --including 'drug gangs'-- want to avoid detection and capture by police. Most humans --including criminals-- & some other species are intelligent enough to use tools. A radio (aka "SIGINT monitoring facility") can & is used as a tool. > From the documents recovered, it appeared that former >military SIGINT personnel had been engaged in illegal monitoring of law >enforcement frequencies. It isn't illegal to monitor law enforcement (including FBI, DEA, etc.) frequencies. >I can understand and disapprove the criminal element employing more >advanced techniques in their illegal enterprise. Disapproval & laws aren't going to stop the criminal element from being criminal elements. The duty to safeguard sensitive radio channels lies with the users of the channels. Don't bitch & whine because you get damaged due to your sensitive communications being intercepted. The magic wands that Congress & the courts have to make/enterpret laws DON'T protect your information, although they might give you a false sense of security. >I cannot understand nor approve any use of intelligence collection and analysis >capabilities in domestic politics. It is easy to understand -- it is a very effective, simple tool that is often passively employed. Despite what the author thinks, it doesn't take sophisticated equipment --or a sophisticated person-- to monitor cellular phones or many other radio ciruits. What *I* cannot understand is the level of sheer ignorance & misinformation (disinformation?) concerning the ability of monitoring US analog cellular telephones which has appeared in the media as a result of this particular case. Note: None of my comments rule out the fact that the cellular intercept & recording *could* have been some sort of conspiracy. I'm merely stating that even some simpletons like the the Martins could have easily done it. I have over a decade's experience in general tactical/strategic level signals intelligence using RF-based collection systems from both the hobbyist as well as 'semi-professional' perspectives. Over a decade's experience specifically with cellular phone systems. Tim -- Tim Tyler ttyler@mich.com http://www.mich.com/~ttyler/ See Web Page for PGP key... ************************************************************************** 12)From nobody@REPLAY.COM Subject: Wire Taps Please be advised that "wiretaps" (physical bugs) are only used by civillian/corporate/private parties. TELCO and FED groups utilize digital interception techniques commonly known as REMOB (remote observation.) Everything happens at the switch level. The same thing with "cellular" interception. Once the call hits the switch its open to REMOB ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue # 26 ****************************************************************************** Vol.Two Issue #26 The Surveillance List Jan.24,1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Intro - South Africa 02) Intro 03) Re: Cell phone Questions 04) Re: Phone Line Monitoring 05) Questionable TSCM 06) SIGINT & HUMINT 07) Re: Cocaine contamination 08) Re: Questions 09) RE: More food for thought 10) Regarding Scanner Mods 11) California Car Tracking 12) More Cell Phone 13) Re: The "Edge" Co. 14) Scanner Mod? 15) Best Antenna? 16) More Gingrich 17) Re: Currency Contamination ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Joan Nuttall Subject: Intro Bryan Rudolph bryan@security.co.za For any info on us and our company, visit : http://www.security.co.za and click on the "About Us" button at the bottom of the page. Regards Joan -- JOAN NUTTALL SECURITY INDUSTRY INFORMATION SERVICES CC PUBLISHERS OF : THE SOUTH AFRICAN SECURITY INDUSTRY SOURCE BOOK FOR MORE INFO http://www.security.co.za ************************************************************************** 2)From: Prasanna Shah Subject: Intro name : Prasanna Shah email id : pshah@mail.arc.nasa.gov My speciality is wireless video/audio and data transmission system, cellular tracking and interception system, covert serveillance products, etc. Cellular fraud detection and management, etc. Thanks, PS ************************************************************************** 3)From trever.kb9nhu@juno.com Fri Jan 24 09:10:29 1997 Subject: Re: Cell phone Questions Greg Let's start off this by saying that I am a ham radio operator, and my main area of interest/knowledge is in communications, mostly cellular. I also work at RadioShack. RadioShack no longer carries any scanners that are capable of being "easily" modified, for the Martin's to have bought the scanner the day before, that would have been impossible. Second, your question on why they heard both parts is, the answer on how they were receiving the conversation without being illegal. They had done nothing wrong, they were listening to a mirror frequency that the cellsite was putting out (harmonics). People believe that what they are hearing is a cell-phone, but it is just a harmonic of the phones/towers resonant frequency. They were able to pick up the whole conversation because the dude on the phone stayed in the same spot. It is not the scanner that goes through the handoff, it is the cell-phone that goes through handoff. That is how they could listen to both sides of the conversation, and how they heard it in it's entirety. And finally, you may not use a scanner while mobile by law. Unless you are a licensed Amateur (Ham) radio operator. Only Ham's are allowed to have scanner's in the car there, and in a few other states like them. I hope that this has been of some help, if you have any more questions for me, please e-mail me at trever.kb9nhu@juno.com Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 ************************************************************************** 4)From: Trace Carpenter Subject: Re: Phone Line Monitoring Most any VMB software will allow you to store calls on your hard drive. Just remember you can burn disk space quickly. Sound Blaster software can be configured to do the same thing. As for caller ID--In Texas we can have our lines blocked so all calls are private. If you don't have that capability in your state you probably do have the opportunity to enter an access code such as *67 which blocks the caller id output. Find out what your code is and there are several blockers on the market that enter that code when the line voltage drops, (When you pick up the telephone). Good Luck, hope this helps. -- Trace Carpenter,PI,TSCM 214.828.4520 214.828.1917 Facsimile ************************************************************************** 5)From: Trace Carpenter Subject: Questionable TSCM Questionable doesn't even get you in the same area code as what that was. If you have given an accurate description of what happened then; (in my humble openion); the Sloan Agency, Ambridge,PA; as you named them, committed out and out FRAUD & THEFT BY DECEPTION. People like that should immediately be reported to local authorities as well as the BBB. If they are a licensed agency then the local board should also take part. TSCM is a very complex and specialized field. If you want to get into it, then do it right. I have had potential clients get very upset and even cry on the telephone because they are sure their boyfriend has bugged their apartment and I want (in their openion) so much money to just walk in with a piece of equipment which is going to tell me if there is a bug there. Yea'h Right! Let's face it. That equipment measures readings in the room. It dosen't tell you the room's hot anymore than an EKG tells a doctor that his patient is going to die in three months. I actually had a p.i. tell me yesterday that his client wanted to know if his telephones where hot, so the p.i. was going to Radio Shack to get s $90 damnit for lack of a better word to plug into the line and check for him. How many of you think you could hide a bug from that? Aside from all of the other obvioius things; the lack of a physical search makes me so angry I'm not even going to address the issue. Sorry. I just had to vent immediately. I'm going to get off this soap box before I puke. -- Trace Carpenter, P.I. PROFESSIONAL TSCM Services ************************************************************************** 6)From shadowchasers@hotmail.com Fri Jan 24 11:56:12 1997 From: "Shadow Chasers" Subject: SIGINT & HUMINT In response to Spyking's posting about cladenstine SIGINT operations within the US, a couple of key cliche's " IT'S NOT WHO YOU KNOW, BUT WHAT YOU KNOW!!" & "KNOWLEDGE IS POWER!" You bet your ass that any median in which INTEL can be collected by HOIST, wether that HOIST be domestic or foreign, will and is being monitored for either profit or exploitation. I don't know the full extent of the intercepted "celluar conversation of Gingrich" but putting two and two together, the area in which the intercept was monitored is near military bases and NASA. I'm no electronic guru but line of sight could easliy be manipulated by bouncing off the huge attenna arrays in that area with technical knowledge of doing so. Were all in the biz of collecting intelligence for hire, have someone track the person who intercepted the "Celluar Call" and run a Background Check, see what pops up in his/her dossier! SHADOW CHASER SHADOW CHASER INVESTIGATIONS (c) http:\\www.shadow-chasers.com\\ ************************************************************************** 7)From: "STEPHEN POYNOR" Subject: Re: Cocaine contamination No wonder I spending money gives me such a high feeling.... ;P -------------------------------------- >According to an article printed in the prestigious Journal of Analytical >Toxicology "Cocaine Contamination of United States Currency" , >Vol. 20, pp. 213-216, 1996. > >"Laboratory testing confirmed cocaine was present on 79% of US currency >randomly collected and tested." > >"Contamination was widespread and found on bills of all demoninations from >fourteen (14) American cities." > >"These results indicate that cocaine contamination of currency is widespead >throughout the United States and is likely to be primarily a result of >cross contamination from other contaminated currency and from contanimated >money-counting machines." > >"Articles of clothing, personal belongings, households, and even public >areas are likely to become contaminated from casual contact". > >The test also concluded that casual handling of contaminated money COULD >produce a positive urinalysis test for cocaine in the first 24 hours... >although it detected traces in very small quantity in the urine... > ************************************************************************** 8)From: "Walstrom, Bradley" Subject: Re: Questions >Anyone know of any web sites or sources of info on restoring blocked freqs on >a Realistic Pro-34 or a Pro-46 (for educational purposes only of course)? >I would also like to know if anyone makes a PIR switch that would work with >the "remote" jack in a Sony Handycam. Check out the "Radio Shack Scanner Modification Page" located at: http://w5gb.nmsu.edu/kc5kto/mods.html Also any PIR that has a form C relay (provides both NO and NC most PIR's are just NC) should work with your Sony Handycam if it is just looking for a contact closure. You may want to have the PIR trip a timer circuit that will hold the contact closed for a longer period of time. I picked one up from my local alarm supply house that was programmable from one second to one minute or would go from one to sixty minutes. The programmable timer was about $25.00 Brad Walstrom ************************************************************************** 9)From HtPursuit@aol.com Fri Jan 24 13:35:14 1997 Subject: RE: More food for thought I am surprised at the way the couple out of Florida had all the right equipment and just happened to have all the right people to contact after they obtained there goal. Hey anyone know more of the details out there on this "couple", it would be interesting to look alittle closer at this......it may be fairly easy to find the ties. Of course we're just sitting here sharing thoughts....right?....;-) ************************************************************************** 10)From: Trace Carpenter Subject: Regarding Scanner Mods The question was asked about modifying a Radio Shack PRO-34. The following is from a mod page at http://w5gb.nmsu.edu/kc5kto/mods/pro34.txt 1. To restore missing 800 MHz frequencies, remove D-11. 2. To add 66 to 88 MHz (European Coverage), install a diode at D-9. 3. D-10 must remain in place for full 800 MHz coverage. 4. If a diode is added at D-13 it cuts out aero band, also seems to affect 800 MHz channel spacing. 5. D-12 added dosen't seem to have any affect. 6. Only D-10 and D-11 are factory installed. If I can find it, I have a program which I downloaded from an underground bbs which gives the mods for most all brands of scanners. I'll look around for it. -- Trace Carpenter ************************************************************************** 11)From: SpyKing@thecodex.com Subject: California Car Tracking In California, Sen. John Burton, chair of the Judiciary Committee, plans to introduce legislation that would prohibit police from placing tracking devices on people's cars without a warrant. The bill was written after the Orange County Registrar reported that police used hundreds of these devices each year without ever informing the targets, their lawyers or the court. ************************************************************************** 12)From: Anonymous@replay.com Subject: More Cell Phone In a conference call, the simplest protocol is to have all the participants call a "routing" number at a fixed time, and give the conference-call ID. If A does this from a stationary cellular phone, then three things will stay constant: (1) the number of the cellular phone, (2) the cell in which the cellular phone resides, and (3) the "routing" number---that is, the one that shows up on your bill. If I happen to be parked a short distance from the cellular phone, and I tap into the connection between the cellular phone and the "routing" number, I should be able to pick up everything. ************************************************************************** 13)From: everett@ionet.net (glen wicker) Subject: Re: The "Edge" Co. Here is the "Edge" Company numbers, Ordering 1.800.732.9976 Customer Service 1.800.445.1021 International 1.802.257.7759 They are a great option for inexpensive spy toys, I've tried their portable voice changer and other telephone gadgets. glen Internet/Intelligence Consultant G. Everett Wicker everett@ionet.net 918.664.1350 Intelligence Web Link http://www.ionet.net/~everett/index.shtml ************************************************************************** 14)From: zac Subject: Scanner Mod I have a radio sheck PRO-2046 scanner does anyone know the mod to make it get all the cellular band? at the moment it get some of it. I have also found that although most cell conversations have only audio from one party , the ones at the lower end of the frequency have both sides of the conversation at the same audio level. Zac ************************************************************************** 15)From: SpyKing@thecodex.com Subject: Best Antenna? I just acquired a Watkins-Johnson HF-1000 Digital HF Receiver with DSP. Do any of our experienced hams have a suggestion on the "best" antenna to use with this rig? ************************************************************************** 16)From: SpyKing@thecodex.com Subject: More Gingrich... >the many technical challenges that would confront anyone who attempted to >intercept a multi-party cellular phone conversation with widely dispersed >participants. I believe that a chance intercept might have produced a >transcript with one or two of theparticipants' contributions. But it is flatly >impossible, in my opinion,that a couple driving with a police scanner in their >car could have recorded all the participants in this conversation. ....." > >I too am not a SIGINT expert and I can appreciate the heavy weight technical >challenges in collecting multi-party cellular conversations through use of >e/m intercepts. Call me stupid, but aren't we making this problem too hard? > All of us who use Ma Bell's infrastructure can set up a multi-party >conversation. With a fancy 'phone, one can readily do this without operator >assistance. Now once having done that, I can converse with a bunch of folks >all over the world, including cell 'phone participants. To make this work, >I have to hear all ends of all connections at my end, correct?? Doesn't >this further imply that I only have to "intercept" one node of an >established party call to hear the entire conversation?? Can't I use a wire >tap and hear all sides (send/receive) of conversations from a handset >device? Applying this to a cell 'phone node would be no different than a >normal handset. And if I can snoop this one cell 'phone, both send AND >receive, then I can hear the entire conversation without having to deploy an >army of intel gear. So I can see how a focused snoop can get within LOS of >a tracked/targeted cell 'phone and use a *modified* scanner to listen in on >a particular channel. I don't think this is hard stuff. This is even >easier with analog cell 'phones. Think this can all be done with hardware >from Radio Shack and some very motivated and reasonably devious people. > >This whole affair smacks of planned, deliberate surveillance against Gingrich using hacker (maybe illegal) techniques to gain exploitable evidence. ************************************************************************** 17)From: Trace Carpenter Subject: Re: Currency Contamination To the moderator: I don't know about testing + due to handling currency but I can show you something that would make me believe it. When I was with the police department (back before I felt the power of the dark side and joined the private sector where I could afford to eat) I was a K-9 officer. My partner still lives with me and keeps me company on long surveillances. He is a 100 LB German bread German Shepard and is a full patrol package dog. (Building Search, Man Tracking, Crowd Control, Narcotics, etc.) Try wrapping a sack of currency in a t-shirt for a while and then toss the t-shirt in a drawer and send the dog in to look for narcotics. If the currency was saturated with the base elements, and they're transferred to the cloth, guess what. +++Moderator's Note+++ I thought the paper interesting because of the "79% contamination rate" and the fact that a lot of narc units are using kits to test money from arrested perps and suspects. If the money comes up "positive" the perp/suspect gets a "residue" charge... it strikes me that this study could cause a number of cases to get thrown out... it also stikes me that a completly innocent person COULD be charged... Might be a good reason to bring back the silver dollar but that crap probably sticks there also... ;-) ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue # 26 ****************************************************************************** Vol.Two Issue #26 The Surveillance List Jan.24,1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Intro - South Africa 02) Intro 03) Re: Cell phone Questions 04) Re: Phone Line Monitoring 05) Questionable TSCM 06) SIGINT & HUMINT 07) Re: Cocaine contamination 08) Re: Questions 09) RE: More food for thought 10) Regarding Scanner Mods 11) California Car Tracking 12) More Cell Phone 13) Re: The "Edge" Co. 14) Scanner Mod? 15) Best Antenna? 16) More Gingrich 17) Re: Currency Contamination ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Joan Nuttall Subject: Intro Bryan Rudolph bryan@security.co.za For any info on us and our company, visit : http://www.security.co.za and click on the "About Us" button at the bottom of the page. Regards Joan -- JOAN NUTTALL SECURITY INDUSTRY INFORMATION SERVICES CC PUBLISHERS OF : THE SOUTH AFRICAN SECURITY INDUSTRY SOURCE BOOK FOR MORE INFO http://www.security.co.za ************************************************************************** 2)From: Prasanna Shah Subject: Intro name : Prasanna Shah email id : pshah@mail.arc.nasa.gov My speciality is wireless video/audio and data transmission system, cellular tracking and interception system, covert serveillance products, etc. Cellular fraud detection and management, etc. Thanks, PS ************************************************************************** 3)From trever.kb9nhu@juno.com Fri Jan 24 09:10:29 1997 Subject: Re: Cell phone Questions Greg Let's start off this by saying that I am a ham radio operator, and my main area of interest/knowledge is in communications, mostly cellular. I also work at RadioShack. RadioShack no longer carries any scanners that are capable of being "easily" modified, for the Martin's to have bought the scanner the day before, that would have been impossible. Second, your question on why they heard both parts is, the answer on how they were receiving the conversation without being illegal. They had done nothing wrong, they were listening to a mirror frequency that the cellsite was putting out (harmonics). People believe that what they are hearing is a cell-phone, but it is just a harmonic of the phones/towers resonant frequency. They were able to pick up the whole conversation because the dude on the phone stayed in the same spot. It is not the scanner that goes through the handoff, it is the cell-phone that goes through handoff. That is how they could listen to both sides of the conversation, and how they heard it in it's entirety. And finally, you may not use a scanner while mobile by law. Unless you are a licensed Amateur (Ham) radio operator. Only Ham's are allowed to have scanner's in the car there, and in a few other states like them. I hope that this has been of some help, if you have any more questions for me, please e-mail me at trever.kb9nhu@juno.com Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 ************************************************************************** 4)From: Trace Carpenter Subject: Re: Phone Line Monitoring Most any VMB software will allow you to store calls on your hard drive. Just remember you can burn disk space quickly. Sound Blaster software can be configured to do the same thing. As for caller ID--In Texas we can have our lines blocked so all calls are private. If you don't have that capability in your state you probably do have the opportunity to enter an access code such as *67 which blocks the caller id output. Find out what your code is and there are several blockers on the market that enter that code when the line voltage drops, (When you pick up the telephone). Good Luck, hope this helps. -- Trace Carpenter,PI,TSCM 214.828.4520 214.828.1917 Facsimile ************************************************************************** 5)From: Trace Carpenter Subject: Questionable TSCM Questionable doesn't even get you in the same area code as what that was. If you have given an accurate description of what happened then; (in my humble openion); the Sloan Agency, Ambridge,PA; as you named them, committed out and out FRAUD & THEFT BY DECEPTION. People like that should immediately be reported to local authorities as well as the BBB. If they are a licensed agency then the local board should also take part. TSCM is a very complex and specialized field. If you want to get into it, then do it right. I have had potential clients get very upset and even cry on the telephone because they are sure their boyfriend has bugged their apartment and I want (in their openion) so much money to just walk in with a piece of equipment which is going to tell me if there is a bug there. Yea'h Right! Let's face it. That equipment measures readings in the room. It dosen't tell you the room's hot anymore than an EKG tells a doctor that his patient is going to die in three months. I actually had a p.i. tell me yesterday that his client wanted to know if his telephones where hot, so the p.i. was going to Radio Shack to get s $90 damnit for lack of a better word to plug into the line and check for him. How many of you think you could hide a bug from that? Aside from all of the other obvioius things; the lack of a physical search makes me so angry I'm not even going to address the issue. Sorry. I just had to vent immediately. I'm going to get off this soap box before I puke. -- Trace Carpenter, P.I. PROFESSIONAL TSCM Services ************************************************************************** 6)From shadowchasers@hotmail.com Fri Jan 24 11:56:12 1997 From: "Shadow Chasers" Subject: SIGINT & HUMINT In response to Spyking's posting about cladenstine SIGINT operations within the US, a couple of key cliche's " IT'S NOT WHO YOU KNOW, BUT WHAT YOU KNOW!!" & "KNOWLEDGE IS POWER!" You bet your ass that any median in which INTEL can be collected by HOIST, wether that HOIST be domestic or foreign, will and is being monitored for either profit or exploitation. I don't know the full extent of the intercepted "celluar conversation of Gingrich" but putting two and two together, the area in which the intercept was monitored is near military bases and NASA. I'm no electronic guru but line of sight could easliy be manipulated by bouncing off the huge attenna arrays in that area with technical knowledge of doing so. Were all in the biz of collecting intelligence for hire, have someone track the person who intercepted the "Celluar Call" and run a Background Check, see what pops up in his/her dossier! SHADOW CHASER SHADOW CHASER INVESTIGATIONS (c) http:\\www.shadow-chasers.com\\ ************************************************************************** 7)From: "STEPHEN POYNOR" Subject: Re: Cocaine contamination No wonder I spending money gives me such a high feeling.... ;P -------------------------------------- >According to an article printed in the prestigious Journal of Analytical >Toxicology "Cocaine Contamination of United States Currency" , >Vol. 20, pp. 213-216, 1996. > >"Laboratory testing confirmed cocaine was present on 79% of US currency >randomly collected and tested." > >"Contamination was widespread and found on bills of all demoninations from >fourteen (14) American cities." > >"These results indicate that cocaine contamination of currency is widespead >throughout the United States and is likely to be primarily a result of >cross contamination from other contaminated currency and from contanimated >money-counting machines." > >"Articles of clothing, personal belongings, households, and even public >areas are likely to become contaminated from casual contact". > >The test also concluded that casual handling of contaminated money COULD >produce a positive urinalysis test for cocaine in the first 24 hours... >although it detected traces in very small quantity in the urine... > ************************************************************************** 8)From: "Walstrom, Bradley" Subject: Re: Questions >Anyone know of any web sites or sources of info on restoring blocked freqs on >a Realistic Pro-34 or a Pro-46 (for educational purposes only of course)? >I would also like to know if anyone makes a PIR switch that would work with >the "remote" jack in a Sony Handycam. Check out the "Radio Shack Scanner Modification Page" located at: http://w5gb.nmsu.edu/kc5kto/mods.html Also any PIR that has a form C relay (provides both NO and NC most PIR's are just NC) should work with your Sony Handycam if it is just looking for a contact closure. You may want to have the PIR trip a timer circuit that will hold the contact closed for a longer period of time. I picked one up from my local alarm supply house that was programmable from one second to one minute or would go from one to sixty minutes. The programmable timer was about $25.00 Brad Walstrom ************************************************************************** 9)From HtPursuit@aol.com Fri Jan 24 13:35:14 1997 Subject: RE: More food for thought I am surprised at the way the couple out of Florida had all the right equipment and just happened to have all the right people to contact after they obtained there goal. Hey anyone know more of the details out there on this "couple", it would be interesting to look alittle closer at this......it may be fairly easy to find the ties. Of course we're just sitting here sharing thoughts....right?....;-) ************************************************************************** 10)From: Trace Carpenter Subject: Regarding Scanner Mods The question was asked about modifying a Radio Shack PRO-34. The following is from a mod page at http://w5gb.nmsu.edu/kc5kto/mods/pro34.txt 1. To restore missing 800 MHz frequencies, remove D-11. 2. To add 66 to 88 MHz (European Coverage), install a diode at D-9. 3. D-10 must remain in place for full 800 MHz coverage. 4. If a diode is added at D-13 it cuts out aero band, also seems to affect 800 MHz channel spacing. 5. D-12 added dosen't seem to have any affect. 6. Only D-10 and D-11 are factory installed. If I can find it, I have a program which I downloaded from an underground bbs which gives the mods for most all brands of scanners. I'll look around for it. -- Trace Carpenter ************************************************************************** 11)From: SpyKing@thecodex.com Subject: California Car Tracking In California, Sen. John Burton, chair of the Judiciary Committee, plans to introduce legislation that would prohibit police from placing tracking devices on people's cars without a warrant. The bill was written after the Orange County Registrar reported that police used hundreds of these devices each year without ever informing the targets, their lawyers or the court. ************************************************************************** 12)From: Anonymous@replay.com Subject: More Cell Phone In a conference call, the simplest protocol is to have all the participants call a "routing" number at a fixed time, and give the conference-call ID. If A does this from a stationary cellular phone, then three things will stay constant: (1) the number of the cellular phone, (2) the cell in which the cellular phone resides, and (3) the "routing" number---that is, the one that shows up on your bill. If I happen to be parked a short distance from the cellular phone, and I tap into the connection between the cellular phone and the "routing" number, I should be able to pick up everything. ************************************************************************** 13)From: everett@ionet.net (glen wicker) Subject: Re: The "Edge" Co. Here is the "Edge" Company numbers, Ordering 1.800.732.9976 Customer Service 1.800.445.1021 International 1.802.257.7759 They are a great option for inexpensive spy toys, I've tried their portable voice changer and other telephone gadgets. glen Internet/Intelligence Consultant G. Everett Wicker everett@ionet.net 918.664.1350 Intelligence Web Link http://www.ionet.net/~everett/index.shtml ************************************************************************** 14)From: zac Subject: Scanner Mod I have a radio sheck PRO-2046 scanner does anyone know the mod to make it get all the cellular band? at the moment it get some of it. I have also found that although most cell conversations have only audio from one party , the ones at the lower end of the frequency have both sides of the conversation at the same audio level. Zac ************************************************************************** 15)From: SpyKing@thecodex.com Subject: Best Antenna? I just acquired a Watkins-Johnson HF-1000 Digital HF Receiver with DSP. Do any of our experienced hams have a suggestion on the "best" antenna to use with this rig? ************************************************************************** 16)From: SpyKing@thecodex.com Subject: More Gingrich... >the many technical challenges that would confront anyone who attempted to >intercept a multi-party cellular phone conversation with widely dispersed >participants. I believe that a chance intercept might have produced a >transcript with one or two of theparticipants' contributions. But it is flatly >impossible, in my opinion,that a couple driving with a police scanner in their >car could have recorded all the participants in this conversation. ....." > >I too am not a SIGINT expert and I can appreciate the heavy weight technical >challenges in collecting multi-party cellular conversations through use of >e/m intercepts. Call me stupid, but aren't we making this problem too hard? > All of us who use Ma Bell's infrastructure can set up a multi-party >conversation. With a fancy 'phone, one can readily do this without operator >assistance. Now once having done that, I can converse with a bunch of folks >all over the world, including cell 'phone participants. To make this work, >I have to hear all ends of all connections at my end, correct?? Doesn't >this further imply that I only have to "intercept" one node of an >established party call to hear the entire conversation?? Can't I use a wire >tap and hear all sides (send/receive) of conversations from a handset >device? Applying this to a cell 'phone node would be no different than a >normal handset. And if I can snoop this one cell 'phone, both send AND >receive, then I can hear the entire conversation without having to deploy an >army of intel gear. So I can see how a focused snoop can get within LOS of >a tracked/targeted cell 'phone and use a *modified* scanner to listen in on >a particular channel. I don't think this is hard stuff. This is even >easier with analog cell 'phones. Think this can all be done with hardware >from Radio Shack and some very motivated and reasonably devious people. > >This whole affair smacks of planned, deliberate surveillance against Gingrich using hacker (maybe illegal) techniques to gain exploitable evidence. ************************************************************************** 17)From: Trace Carpenter Subject: Re: Currency Contamination To the moderator: I don't know about testing + due to handling currency but I can show you something that would make me believe it. When I was with the police department (back before I felt the power of the dark side and joined the private sector where I could afford to eat) I was a K-9 officer. My partner still lives with me and keeps me company on long surveillances. He is a 100 LB German bread German Shepard and is a full patrol package dog. (Building Search, Man Tracking, Crowd Control, Narcotics, etc.) Try wrapping a sack of currency in a t-shirt for a while and then toss the t-shirt in a drawer and send the dog in to look for narcotics. If the currency was saturated with the base elements, and they're transferred to the cloth, guess what. +++Moderator's Note+++ I thought the paper interesting because of the "79% contamination rate" and the fact that a lot of narc units are using kits to test money from arrested perps and suspects. If the money comes up "positive" the perp/suspect gets a "residue" charge... it strikes me that this study could cause a number of cases to get thrown out... it also stikes me that a completly innocent person COULD be charged... Might be a good reason to bring back the silver dollar but that crap probably sticks there also... ;-) ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue #27 ****************************************************************************** Vol.Two Issue #27 The Surveillance List Jan.25,1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Intro - Canada 02) Request for info/ideas 03) Cellular Tracking 04) re: Kremlin encryption program 05) Your Signature for Sale 06) Police MDT CPCD scanners 07) Long Range Covert 08) Re: (15) The best HF antenna 09) Handicam and Antenna Suggestions 10) Radio Shack Scanner info 11) Integrated Database Software 12) RE: Best Antenna 13) Time & Date generator 14) Laser Video transmitter 15) Deal of the Century? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: principal@connect.ab.ca Subject: Intro Principal Proctection Service Ltd, principal@connect.ab.ca, is an Edmonton Alberta based company providing close protection and counter surveillance services to individuals under threat. Investigative and counter industrial espionage services to companies targeted or at risk of being targetted by domestic and foreign competitors. 12 years as a cop and former member of Canada's counter terrorist unit I can provide clientel with top notch services in many area. I posses only a working knowledge of electronic surveillance and countermeasures. Foriegn operations, planning, surveillance and close protection are my areas of expertise. ************************************************************************** 2)From: Rick Hofmann Subject: Request for info/ideas A colleague sent me the following inquiry yesterday: A residential phone rings 4 to 5 times and is answered by the resident. When he picks up the receiver he hears a dial tone. He dials *69 and gets a recording that says, "3116231869". I tried dialing the number and get a busy signal after dialing the "1" between the 3 and 8. Since 311 does not appear to be an area code in the US, perhaps the number is a telco test number or something of that nature. Ideas or suggestions would be greatly appreciated. Thanks in advance. Best regards, Rick Hofmann, CCO ______________________________________________________________________ MICROSEARCH - Electronic Surveillance Detection * Counter-espionage Charter Member - Information Professionals Network Business Espionage Controls and Countermeasures Association, Calif.Assn.of Licensed Investigators, American Society for Industrial Security ************************************************************************** 3)From: SpyKing@thecodex.com Subject: Cellular Tracking Tracking system tested for cellular phones (CNN) -- Emergency calls to 911 are easy enough to handle when the dispatcher knows where to send help. But when a woman was lost in a blinding snowstorm in South Dakota earlier this month, rescue workers were unable to track her call for help because she was using a cellular phone. Companies working on the technology to track cellular phone calls have been given additional incentive with a Federal Communications Commission order that all cell phone service companies have location programs in place by the year 2001. "In this country, we should not talk about 40-hour response times," says Tom Wheeler of the Cellular Telephone Association. "We should be talking about minutes." New Jersey is testing such a tracking program on 50 troublesome miles of state highway. It was demonstrated to reporters by the cellular phone company ComCast, and the program's developer The Associated Group. Location determined by triangulation The system locates the source location of cellular calls by determining how long it takes a call to reach each of three cell sites, then triangulates the location. That information appears on a map in front of the 911 dispatcher. "I think this is going to be great," says one dispatcher. Cellular phones have been a blessing for thousands of people, including an Alabama woman who was abducted and locked in trunk of her car. Although she had her cellular phone with her, she couldn't tell authorities where she was, and it took two hours for police to find her. But the increased number of calls made possible by cell phones has also been a problem. "It takes us much longer to process these calls," says Robert Mill of New Jersey 911 Services. "The people don't know where they are!" Locating cell phone callers requires antennas which many communities have opposed or restricted. In presenting a program that claims to increase public safety, the cellular phone industry hopes to win some compromise on the issue. +++Moderator's Note+++ If any list members come across interesting articles related to surveillance, countersurveillance, etc. why not post them or give a URL where list members can find them. This way the whole list benefits... ************************************************************************** 4)From: sonnymac@worldnet.att.net Subject: re: Kremlin encryption program To: Fellow list subscribers I downloaded this program today and was up and running with the Win95 version in just a few minutes.The program is very intuitive, I readily grasped the mechanics of its' operation and most of all it doesn't require you to be a computer expert to use like PGP.I tried encrypting a few data files and voila-privacy! I intend to pay the 10$ registration fee so I can use the more secure algorithms; but even if one doesn't register, with the algo's available plus the over-write file capability (user determined #) to me It's a super deal and if Big Brother ever does peer into your hard drive, he'll have a real problem making any sense out of the contents. Bill Mcdonald sonnymac@worldnet.att.net +++Moderator's Note+++ For those who forgot: To download Kremlin, go to: http://www.geocities.com/SiliconValley/Pines/2690 ************************************************************************** 5)From: Trace Carpenter Organization: Trace Carpenter Investigations Subject: Your Signature for Sale In the current issue of The Codex Newsletter there is a very interesting article about U.P.S. capturing your signature and the fact that it could be processed into databanks for resale. My concern along these lines came into play in the last couple of years when our Federal Govt in their infinate wisdom passed a law allowing banks to require your thumb print to cash a check. It is my understanding that according to the statute the bank can't pass the print on, but it does travel back on the cancelled check to a private party who can do whatever they want with it. Most banks use a print ink that must be viewed under IR light. How long do you think it'll be before an ambitious database company like DBT starts entering fingerprint classifications? -- Trace Carpenter,P.I., TSCM 214.828.4520 214.828.1917 Facsimile +++Moderator's Note+++ The ramifications and possible abuses of a signature database are enormous! George Orwell is giggling from the grave... Credit card companies are already writing off (according to some studies) almost 500 million a year in bad debt and fraud... Throw in a fingerprint and/or signature database and no one is safe... I'm all for keeping information accessable to all. I feel it's the best way to keep Big Brother honest (well, almost honest) but I'm also a devout privacy advocate.Catch 22. The average American has no idea how many rights he's given up or how little privacy he or she actually has left... I've been in this business for 25+ years and the changes are enormous... I can remember when only Detectives had access to Coles Directories (reverse directories) in the NYPD... and we had to sign in to use them... Now anyone can lookup a number on the net... Forums like this explain the technology, uses of it and abuses of it... it really has come to pass that anyone can get anything on anyone else... ************************************************************************** 6)From teiwaz@wolfenet.com Sat Jan 25 19:15:55 1997 Subject: Police MDT CPCD scanners Hi: I recently ran across an interesting article concerning the interception of data being sent to the MDTs in police cruiser cars. The article as I remember it had a schematic and some other goodies for getting it connected to a scanner. With the high volume of mags, zines and listservs I am on, i can't seem to find it. It was a recent article, within the last 60days. I thought it would be relevant to the readers of this list and potentially someone might have the article handy for posting. Teiwaz +++Moderator's Note+++ I've got it. If you want it send private e-mail. The file is too large to reprint here... ************************************************************************** 7)From: "Captain" Subject: Long Range Covert I have recently done a job that would have been a lot nicer if we had a good long range bug. We were asked to keep our ears on a warehouse that was inside a large fenced area. Out side the area was well lighted and not easy to hide a surveillance vehicle. It was also a pretty rough neighborhood. What I would have liked was something with a "good" range. 3 miles with clarity would have been nice. I thought of a repeater, but I didn't have the time to rig one up. Any ideas for the repeater or bug w/no repeater needed? This would be for future reference now and maybe a side project till needed. Size was not a limitation in this scenario. BTW, give the mod a break, He is doing an excellent job, especially when you consider the pay. The Captain Being informed is neither illegal or legal, good or bad. The actions taken by the informed can only be deemed so. +++Moderator's Note+++ How about inexpensive 5 watt walkie talkie on private channel modified to only transmit. Replace onboard microphone with FET mike. This will give fairly good pickup. Mod and add AC power source and plug in. It'll heat up but work for a good while... You might want to encrypt. Try and find channel with little or no traffic... great throw-a-way...Several Asian companies sell the Maxon type WT's for about $90. each... ************************************************************************** 8)From: "Anastasios D. Panos" Subject: Re: (15) The best HF antenna ????? >I just acquired a Watkins-Johnson HF-1000 Digital HF Receiver with DSP. Do >any of our experienced hams have a suggestion on the "best" antenna to >use with this rig? >************************************************************************** It depends on your needs and availability, You may have big space available and place long wires , limmited space and place trap verticals !! An other importand thing is the frequencies you wish to monitor the best !! Long wires, Verticals or Directional beam antennas 3,4,5,6 elements ??? HF with better reception of a wide frequencey spectrum are the so called "Log Periodic" antennas require space a good tower and mast and a rotor, used for most "commercial" applications like the military, embasies etc.. You may buy the 73 Magazine and go through the ads, best regards Anastasios D. Panos (SV1IG) ============================================================== Panos & Associates, P. 0. Box 19063, Athens 117 10, Greece, Est. 1973.. Ph: +30-1-923.7420, Fax: +30-1-923.2787 Mobile: +30-93-214.287 Contact: Anastasios D. Panos (Intelnet,WAD,CII,ASIS,NAIS,ISDA,IPC) Specialised but not limited to: V.I.P. Close Protection, Due Diligence, Counterfeit Investications,Insurance Fraud, Covert Video Surveillances, Technical Support Systems ============================================================== ************************************************************************** 9)From: Steven Piotrowski Subject: Handicam and Antenna Suggestions Regarding the external control of Sony Handicam via the "remote" port. Don't. The camera is looking for more than contact closure. The remote jack is looking for a fairly complex signal (MF I believe) from a variety of Sony accessories using their "Control L" protocol. It is a two way protocol which sends commands to the camera and info back to the remote. More than meets the eye in any case..... The "best" antenna for a HF rig? Oh boy. Don't EVER ask a question like that with a bunch of Hams around unless you've got time for an extended discussion. "Best" is very subjective. For the record, you can build a Good antenna for just about any ham frequency that will work great. Most are pretty easy and not terribly sophisticated. Buy an antenna book for a few bucks and save yourself a fortune...... -- "stevepio@buffnet.net" is really Steve Piotrowski ************************************************************************** 10)From: "STEPHEN POYNOR" Subject: Radio Shack Scanner info Tandy Corp. has a fax back service available which is free! The Phone number is 800-323-6586 Or you can go to http://support.tandy.com and under the personal electronics,product documents find the faxback index plus the documents. ************************************************************************** 11)From: "STEPHEN POYNOR" Subject: Integrated Database Software This is an excellent service offering real time access to information. SSN, name, neighbor,directory assistance,and lots more at very low prices. To access it call 18008135826 login:idsguest pw:idsguest vendor code: 030 If you are wary of the prices as that info is not available online, just establish an account and wait a few days for your welcome packet to arrive in the mail which gives you the scoop on this service. Just an example, I found my father-in-law whom my wife hasn't seen in years in less then 2 minutes using info off of his dogtags. I got a current address and phone number and also found out what name he was going under. This site is not pretty but it works. BTW that search cost less than $3.00 US Sure beat the $45 some people want for the same info. ************************************************************************** 12)From: trever.kb9nhu@juno.com (Trever C. Trader) Subject: RE: Best Antenna What bands are you looking to receive and how big are you looking at for the size of antenna? Also, price would be a major concern. If you ever need a DSP for anything, I have for sale, an MFJ 784B DSP filter, the top of the line MFJ DSP, it does everything. It sells for $250.00 retail, I have no use for it, and it was a gift, it is brand new, and the box has never been opened. I am asking 185.00 or best offer. If you are interested, please call at the number below, or mail me. Thanks Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 (217) 528-7015 ************************************************************************** 13)From: Graham Subject: Time & Date generator One of my clients has shown me a compact Time & Date generator with the following discription....MADE BY Digi-Spec Model VMD-LC1 Power 7-15 volt Size 55mm X 60mm X 25mm Does anyone know who manufactures or sells this unit? Regards Graham ----------------------------------------------------------------------- SpyCam Surveillance Web site...http://www.ozemail.com.au/~spycam Postal Address P.O. Box 7143 East Brisbane Qld 4169 Australia ************************************************************************** 14)From: Graham Subject: Laser Video transmitter I am looking for a circuit diagram for a video transmitter and receiver using IR lasers. I need to transmit from a security camera across an industrial site range approx 500 meters. I do not want to use an RF system on this job as it will be a permanent setup. (Illegal to transmit video signals greater than 30 meters in Australia.) Any suggestions. Thanks GraHam ------------------------------------------------------------------------ SpyCam Surveillance Web site...http://www.ozemail.com.au/~spycam Postal Address P.O. Box 7143 East Brisbane Qld 4169 Australia ************************************************************************** 15)From: SpyKing@thecodex.com Subject: Deal of the Century? I recieved this by e-mail. I'm unfamiliar with this particular product. Anyone have info? The seller states he has no documentation. Sounds fishy... ;-) >Heath Corporation/Zenith Data Syatems Corporation, sold to >Pentagon, INTEQ - Model #ZT-218-4 TEMPEST/Mil.Spec.2-gig. >External Hard Drive, No Documtntation. Original price $125,000.00. >I sell to you for Five Hunred Dollars ($500.00). Unit in Excellent >Condition. Comments? ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue #28 ****************************************************************************** Vol.Two Issue #28 The Surveillance List Jan.26, 1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Gambling case thrown out - Illegal police eavesdropping device 02) Tracking Devices 03) Re: Deal of the Century? 04) Equipment Suppliers 05) RE: SURVEILLANCE VAN CONTENTS 06) Re: Request for info/ideas 07) RE: Deal of the Century? 08) Tracking Cellular Phones 09) Re: Signature capture devices and pads and such... 10) Re: Cell Phone Tracking 11) Cellular on Old TV's 12) Another interesting new story... ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Gambling case thrown out - Illegal police eavesdropping device I thought the list might be interested in this story I found it in a local newspaper... I've snipped some irrelevant info to save space... >New York State Attorney General Dennis Vacco and his organized crime task force are probably spending a few hours this morning wiping egg off their face. The New York State bust of a Rockland County gambling ring has to all intents and purposes been ended, in a decision issued Friday by Judge William K. Nelson of the County Court. Judge Nelson ruled that the organized crime task force did not have sufficient evidence to support a finding of probable cause for the issuance of an eavesdropping warrant "and accordingly, all evidence derived from the wiretap must be suppressed." "Since all eavesdropping and search warrants which followed were supported by unlawfully intercepted conversations obtained as a result of the original warrant, evidence obtained by means of the later warrants must also be suppressed, as the fruit of the poisonous tree," Judge Nelson wrote. > > >When Bongiorno replaced the deposed, disgraced and despised Gribetz, the Organized Crime Task Force and the New York State Police began working with his office, resulting in a $90 million gambling ring bust, which was announced to the press with great fanfare more than five months ago. However, it turns out that the bust was based on information gotten by eavesdropping via court warrant, but using techniques that had been disapproved by the New York State Court of Appeals. > >Judge Nelson heard testimony two weeks ago in his New City courtroom to determine whether the equipment the State Organized Crime Task Force used was the same sort of equipment that was used in a 1993 Court of Appeals case, People v. Bialostok. If Judge Nelson determined that the equipment that was used was capable of receiving not only tonal information, but audio information, then - Nelson ruled - he would have no choice but to void the information obtained from that unlawful device. Judge Nelson wrote that he found that "The equipment used here likewise has the inherent capacity to intercept and transmit audio/voice communications in addition to digital or tone information...Although there is no evidence that conversations were actually intercepted or monitored, since no eavesdropping warrant was issued before the monitoring equipment was installed, the information derived from the Pen Register must be suppressed." > >District Attorney Michael Bongiorno had earlier told this newspaper that "If Judge Nelson decides against us, it is unlikely that we will be able to go forward with the prosecutions." Bongiorno's office was in charge of prosecuting the individuals who were arrested in Rockland County, though the initial investigation was handied by the Attorney General's office. In Bongiomo's opinion, the decision of the Court of Appeals on which Judge Nelson based his decision is inappropriate. "We had sworn testimony here of New York State Police officers that the devices were not tampered with, and that there was no unauthorized or illegal eavesdropping," Bongiomo said. > > > It appears that the NYS Police installed a pen register (dialed number recorder)to gather evidence in a gambling case. There is was no information in the article stating if they had a warrant to install the pen register... Evidently the device they installed was also capable of listening to and recording the audio part of the conversation... the evidence that was gathered was used to support an affidavit to acquire an eavesdropping warrant. Heads will roll on this one... Violation of Federal law or not? Comments? ************************************************************************** 2)From: "Lorenzo Castillo Sanchez" Subject: Tracking Devices I've been reviewing some of the articles the members posted up here and I was wondering if tracking devices using a digital signal is a lot more better the ones using RF signals. I was asking some info to this company - Intelligence Incorporated in San Mateo, CA. They have this system called Tracker Pro which puts a digital compass in the transmitter box and the transmitter sends the coded signal about 30 times a second. Has anyone used this Tracker Pro ? It seems good to me. Please let me know what the system is like. ************************************************************************** 3)From: BrK Subject: Re: Deal of the Century? >Heath Corporation/Zenith Data Syatems Corporation, sold to >Pentagon, INTEQ - Model #ZT-218-4 TEMPEST/Mil.Spec.2-gig. >External Hard Drive, No Documtntation. Original price $125,000.00. >I sell to you for Five Hunred Dollars ($500.00). Unit in Excellent >Condition. Yeah, my guess it is a regular SCSI HDD in a Tempest style external enclosure. $500 is really no favor for a used 2GB SCSI HDD, in my opinion anyways. I'm guessing that it's SCSI, because that is the most common HDD interface for external drives. But it could be IDE (very unlikely) or some other type of bastardized government-designed proprietary interface. Heath/Zenith is not known for their adherence to industry standards. ************************************************************************** 4)From: "Rumen Alvarado" Subject: Equipment Suppliers I am looking on the net to contact with suppliers of eavesdropping, surveillance, countersurveillance & privacy related technology. Roumen Alvarado rumen@luznet.es ************************************************************************** 5)From Filmgroup1@aol.com Mon Jan 27 08:16:04 1997 Subject: RE: SURVEILLANCE VAN CONTENTS To list moderator and/or members, A while back there was an offer to detail essential contents of surveillance vans. could someone please email a list of said items to me? Thanks, Daniel (filmgroup1@aol.com) ************************************************************************** 6)From: "Anastasios D. Panos" Subject: Re: Request for info/ideas >2)From: Rick Hofmann >Subject: Request for info/ideas >A residential phone rings 4 to 5 times and is answered by the resident. >When he picks up the receiver he hears a dial tone. He dials *69 and gets a >recording that says, "3116231869". > >I tried dialing the number and get a busy signal after dialing the "1" >between the 3 and 8. Since 311 does not appear to be an area code in the >US, perhaps the number is a telco test number or something of that nature. > >Ideas or suggestions would be greatly appreciated. Thanks in advance. Did you try Europe ? 31 stands for Holland 1 is the area and 6231869 is the number, an other psosibility is a Greece that is 30. 1 is the area code for Athens and then is the number, but many times it is misprinted as 31-1-62..etc.. best regards Anastasios D. Panos ============================================================== Panos & Associates, P. 0. Box 19063, Athens 117 10, Greece, Est. 1973.. Ph: +30-1-923.7420, Fax: +30-1-923.2787 Mobile: +30-93-214.287 Contact: Anastasios D. Panos (Intelnet,WAD,CII,ASIS,NAIS,ISDA,IPC) Specialised but not limited to: V.I.P. Close Protection, Due Diligence, Counterfeit Investications,Insurance Fraud, Covert Video Surveillances, Technical Support Systems ============================================================== +++Moderator's Note+++ Try 011 for overseas before that number... ************************************************************************** 7)From: "J-See" Subject: RE: Deal of the Century? > >>Heath Corporation/Zenith Data Syatems Corporation, sold to >>Pentagon, INTEQ - Model #ZT-218-4 TEMPEST/Mil.Spec.2-gig. >>External Hard Drive, No Documtntation. Original price $125,000.00. >>I sell to you for Five Hunred Dollars ($500.00). Unit in Excellent >>Condition. > >Comments? What it looks like to me is that it could be a 2 Gig Computer Harddrive that is "TEMPEST safe" (ie: the hard drive is shielded to prevent TEMPEST emissions). It was probably bought at a DRMO sale. As for the original price of $125K, the government is always paying 10 to 100 times of what an item is worth. If the item is still being stocked by the military, you should be able to get more info through military supply catalogs. -- JC ************************************************************************** 8)From: Trace Carpenter Subject: Tracking Cellular Phones I had heard about that article regarding the lady in the snow storm. What most people don't understand is that your cell phone transmits a signal every few seconds even when you're not talking on it. It tells the cell system who you are and where you are. That way when someone dials your number, the switch knows which cell site to transfer the call to. You can apparently use a SAMS unit in the field to home directly in on bandit roamers that way. We are currently looking for a similar system for a case we are working on to catch these bandits. If anyone has product info please pass it on. Trace Carpenter 214.828.4520 214.828.1917 Facsimile ************************************************************************** 9)From: "David S. 'Greeny' Greenberg" Subject: Re: Signature capture devices and pads and such... > 5)From: Trace Carpenter > Organization: Trace Carpenter Investigations > Subject: Your Signature for Sale > > In the current issue of The Codex Newsletter there is a very interesting > article about U.P.S. capturing your signature and the fact that it could > be processed into databanks for resale. Sure... UPS does this, that's why when I 'sign' my name on their platter that I don't use my actual signature -- I print my name... Drives the drivers crazy, but they're too busy to bitch much about it... I most definately DO NOT want my signature in some database that a moron from UPS protects... Did you know that UPS allows lookups of the signatures from it's tracking software so you can prove that 'bob, who doesn't dot his i's, signed for the package' (from a TV ad)... Something similar are those 'signature pads' that Circuit City and other such stores (here in the US) have you sign the credit card slip on... After the clerk inserts it into the pad, I always pull it out, and sign it on the counter... Then I tap the pad with my fingernail and it appears to the computer as if it's captured a signature... I always get a wierd look from the clerk, but I always tell them that I'm not allowing them to capture my signature into their system. Remind them that once their CC company gives them an authorization # that they're getting paid... If they bitch about it, ask for the Manager. Only once did the manager give me grief, so I said "OK, fine... VOID the order, I'm going to Best Buy (competitor)"... Got it voided, went to Best Buy, got the *SAME* price, didn't have to deal with a moronic sig. pad capture device... Next time in Circuit City (about 3 months later; when I couldn't find the item at Best Buy) I did the same thing, but the clerk didn't squawk... > My concern along these lines came into play in the last couple of years > when our Federal Govt in their infinate wisdom passed a law allowing Huh? I've never heard of this law... A citation to a law book please? > banks to require your thumb print to cash a check. It is my Tell them to go to hell when they ask... Or best yet, give them something unusable by getting some grease on your hands before you go in... Petroleum jelly would seem to do wonders... Tell them you have dry skin... > understanding that according to the statute the bank can't pass the > print on, but it does travel back on the cancelled check to a private > party who can do whatever they want with it. Most banks use a print ink What private party? > that must be viewed under IR light. > > How long do you think it'll be before an ambitious database company like > DBT starts entering fingerprint classifications? > -- > Trace Carpenter,P.I., TSCM > 214.828.4520 > 214.828.1917 Facsimile > ************************************************************************** 10)From: HtPursuit@aol.com Subject: Re: Cell Phone Tracking I thought this was accomplished already, though I am not that well versed in this field. I do know that as of around the late eighties, cell phones did have Title lll capability and have been targeted by law enforcement. I also know that cell phone calls can be trapped. Sometime around 1992 I was informed by a cell phone company tech who assited law enforcement with the taps and traps that they were attempting to setup tracking of cell phones. This was a big goal for the feds and has been for some time. Since Im out of that loop, I am not sure where it is at this time. Maybe someone out there can answer that. ************************************************************************** 11)From: Jonahop Subject: Cellular on Old TV's I am a regular civilian who simply enjoys the leisure of the field and the secrecy of "information-power" it can sometimes provide... I want to congradulate this list for its continuous quality and quantity of good "Stuff".... In/Valuable information has been passed around through here: Very enjoyable! .. Heheh it remindedme of the first time I heard a phone call .. I had my old Philco TV on channel 80-83 and was fine tuning what I thought to be a channel (YEARS ago) and there came MANY phone calls! It still works on new TV's just as well, except perhaps their lack of easy fine tuning.... Thank you for including me in the list. I have one question : Let's say that somebody hears and tapes a conversation of which someone shares their intent to commit a crime with another person, and they actually do it.. Can this data be used against them in the court of law? Thanks..... ************************************************************************** 12)From: SpyKing@thecodex.com Subjest: Another interesting new story... Man Convicted In Trunked Radio Case A Tulsa (Okla.) security company owner has been convicted in federal court on charges that he illegally programmed a trunked radio to receive certain police talk groups. Larry Gass was found guilty on 17 counts and faces 85 years and prison and over $4 million in fines. "Whatever it takes and as long as it takes, this definitely will be appealed because we think the people have a right to know what their police are doing," Gass said. This is the first trial to tackle the issue and the conviction has set off loud debate among scanner enthusiasts, police chiefs and legal experts over freedom of the airwaves, privacy and officer safety. A Denver man also faces trial for allegedly programming trunked radios to receive restricted police talk groups (DISPATCH, July 1995). The Tulsa police department operates an 800 MHz trunked radio system with about 20 talk groups. However, to protect certain operations, the police department authorizes the programming of only three talk groups on trunked radios purchased by the public or media. The talk groups are Tulsa PD's main patrol channels. The only persons who can program the radios are technicians with the appropriate FCC license and frequency programming software licensed to them by Motorola. The government prosecutor alleged that Gass programmed trunked radios for all 20 TPD talk groups and sold them to media outlets. Their case rested on certain FCC regulations that limit radio programming to licensed technicians and prohibit decoding of "encrypted" data if the software to do it isn't readily available. In this case, the decoding software--the Motorola trunked software program--is licensed only to authorized Motorola dealers and is not sold to the public. However, the defense claimed that, since any appropriate scanner can receive the frequencies of the restricted talk groups, and there is no law limiting such monitoring, that the Tulsa PD could not restrict access to those talk groups on a trunked radio. Witnesses There were 10 witnesses called in the case, including a Motorola engineer, newsmen, police and federal agents and Tulsa police chief Ron Palmer. He testified about the importance of a police radio system that cannot be compromised. The defense called newsmen from several local television and radio stations, who talked briefly about radios and scanners. The defense claims that most Tulsa media outlets have scanners tuned to all 20 of Tulsa's trunked radio frequencies. TV cameraman Gary Kruse testified that he uses a scanner that can pick up any Tulsa police channel. Steve Stidham, an attorney for Gass, asked, "What do you do if you want to follow a conversation?' "I push the scan button," Kruse said. An employee of Gass', Jon David Astacio testified that he modified radios, usually at the instruction of Gass. Astacio admitted that he used proprietary Motorola software that he claimed to have obtained at communications flea markets or radio shops. Debate The conviction immediately raised the voices of "scannerheads", hobbyists who listen to public safety and other services on scanners. The group is already wary of law enforcement from such technology advances as digital encryption, mobile data terminals and restricted frequency bands. Now they fear that police departments are trying to lock them out of certain bands without supporting law. After the conviction, scannerheads debated the issue on several electronic bulletin boards, including the Internet. Some felt that chief Palmer overstepped his authority by restricting listeners to just three talk groups. Since it's legal to monitor these 800 MHz channels on a conventional scanner, why is it illegal to monitor on a trunked radio? "I guess this shows that some agencies do believe that trunked systems are `private,'" wrote one scannerhead. "I have no idea where they got this idea." The real concern now, he said, "is whether or not this case has declared that users of trunked radio systems have a reasonable expectation of privacy. "If the courts decide that trunked radio systems do give users a reasonable expectation of privacy, then it will open the door for yet another sterling piece of anti-scanning legislation. Ugh." Property Rights Others recognized Motorola's right to protect its copyrighted software. "I don't necessarily believe that people have the right to use Motorola's proprietary software and equipment to program their radios," wrote a scanner listener. "Not because the police have any `right to privacy,' but because Motorola has a right to control who uses their intellectual property." Another scanner enthusiast saw a distinction in Gass' conviction. "The only thing this poor guy (Gass) did wrong was he--I assume--had an unauthorized technician program the radios," he said. "If they want to prosecute this type of a case then the prosecutors of America have their work cut out for them because they would be in for a surprise if they only knew how many unauthorized techs are programming radios everyday." Another Internet writer pointed out that Gass' case wasn't really about scanner monitoring. "Mr. Gass was obviously not an ordinary scanner hobbyist," the persons said. Rather, he was someone out to make money from by programming radios. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue # 29 ****************************************************************************** Vol.Two Issue #29 The Surveillance List Jan.27, 1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: reverse searches 02) Web Search Sites? 03) re: Deal of the Century? 04) Re: Surveillance Vans 05) Las Vegas ISC Show 06) Re: Telephone Number Help 07) Re: Equipment Suppliers 08) re: Long range covert 09) Re: Tracking Cellular Phones 10) To catch a cheat 11) Re: Gambling case 12) HELP NEEDED....LOOKING FOR TRAINING 13) Covert Electronic Listening 14) Re: Deal of the Century ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Dominic Palombo" Subject: Re: reverse searches > and the changes are enormous... I can remember when only Detectives had access > to Coles Directories (reverse directories) in the NYPD... and we had to sign > in to use them... Now anyone can lookup a number on the net... Forums like > this In Louisiana, you can get a reverse listing just by dialing 411. Just state that you would like to do a CNA on the particular number. [ Dominic Palombo ::::::::::::::: .....[ dmpalomb@ief.iconcrossroads.org ************************************************************************** 2)From: "jon melberg" Subject: Web Search Sites? I need some help in finding certain sites on the net.... I need to find a site that( or sites ) offer searching birth certificates from any documented date to people dead or alive ....( alive would be nice ) and a SS# data base search web ssite on the net ..( if they allow it still) so you can search through SS# for a certain one ..... and mabey ...if there is a backround search through the web by entering some ones name for there record... if it hasnt been outlawed now ..... THANKS! for any ones help ! I need to to find a past married friend...and others..... e-mail me at: jonm@usa.net ************************************************************************** 3)To:From: Jim Conrad Subject: re: Deal of the Century? > >I recieved this by e-mail. I'm unfamiliar with this particular product. Anyone >have info? The seller states he has no documentation. Sounds fishy... ;-) > >>Heath Corporation/Zenith Data Syatems Corporation, sold to >>Pentagon, INTEQ - Model #ZT-218-4 TEMPEST/Mil.Spec.2-gig. >>External Hard Drive, No Documtntation. Original price $125,000.00. >>I sell to you for Five Hunred Dollars ($500.00). Unit in Excellent >>Condition. > >Comments? INTEQ made many TEMPEST Zenith computers for DoD. I have had a large number of these and most are 286 or older units. I don't recognize the ZT-218 designation but I wouldn't spend $500 on it unless you verify the processor and the type. Many of the older Zenith computers used a version of DOS that was not 100% Microsoft compatable because they had made some hardware changes requiring modified DOS/BIOS. INTEQ also made TEMPEST Printers and Plotters which I still have several. If your setting up a TEMPEST System let me know. Most of this stuff goes to the scrap dealers now for metal recovery so I can usually find it through some of my contacts for alot less then $500. <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> <:> Jim Conrad - Ocean View Communications - jjc@infi.net <:> <:> 757-490-8127 Office - 757-587-8251 Fax - 757-473-6740 Pager <:> <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> ************************************************************************** 4)From: SpyKing@thecodex.com Subject: Re: Surveillance Vans >From Filmgroup1@aol.com Mon Jan 27 08:16:04 1997 >Subject: RE: SURVEILLANCE VAN CONTENTS >To list moderator and/or members, > >A while back there was an offer to detail essential contents of surveillance >vans. could someone please email a list of said items to me? > >Thanks, > >Daniel (filmgroup1@aol.com) The classic surveillance would contain most of these basic components... you can buy one of these babies for about $35-40K or make one yourself for less than half that price... if you're going to attempt to do it yourself, layout everything first and make sure it fits. Make sure you have enough juice to power up everything for approx 24 hours... Polyurethane insulation filled floors, ceiling and walls. Commercial grade carpeting on floor, walls and ceiling. Custom captains chairs. White and red (darkroom lights) interior lighting controlled from source and console. Cellular telephone installation. Custom rack mounting of your communications and video equipment. Heavy duty power system. Ideally 2-3 RV deep cycle batteries 300 amp hour each Battery isolators and chargers to be attached to main vehicle battery. Rear compartment engine starting. Rear engine gauge for volts, oil and temperature. Bulkhead separating front and rear compartments. Front to rear reversible, variable speed ventilation system. Rear bulkhead, disguised as storage racks. 12VDC refrigerator. (keeps the soda pop cold) ;-) Manual periscope. Electronic Videoscope. Time and date generators. Power invertor with 110V AC pure sine wave outlets. Master power switching for front and rear batteries. Rear engine kill switch (disallows starting from front). Individual circuit breakers for each circuit. Outside air exchanger (variable speed). Storage compartments and counter top layout. 4 microphone audio security system (One in each wheelwell). LP gas detector. Propane heating system. ABC fire extinguisher. Roof top mounted pipe rack for the concealment of antennas. Front/rear intercom system. Vehicle alarm system with remote pager and panic switches (wireless). Ice air conditioner package (if dry ice is used make sure the compartment is WELL vented to outside). Gauges for the monitoring of power consumption, battery status and 110V AC systems. Variety of B&W & color cameras, night scope, video switchers, audio & video recorders, commo equipment,etc. And MOST IMPORTANT... a "surveillance relief device" - portable chemical toilet ;-) with a few rolls of TP... with a GOOD exhaust fan... The list is endless and really depends on the types of surveillance you'll do...you can install just about anything in a normal size van but the most important thing is to keep everything at arms length when you're sitting at the rear console... ************************************************************************** 5)From: SpyKing@thecodex.com Subject: Las Vegas ISC Show From their FAQ: >What, Where, and When of ISC EXPO/Las Vegas '97 > >All the technologies... all the Solutions... >This is your chance to see all the new products and advanced technologies that are changing the way >the security industry does business. You'll find innovative ideas from more than 400 leading >suppliers. > ...and all the Education you need.... > The ISC EXPO Conference presents a comprehensive program of in-depth workshops and > seminars covering state-of-the-art security applications, advanced technologies and industry issues. > Led by respected industry experts. > > ...all under one roof! > > * CCTV * Intrusion Detection * Fire Detection* Home Systems * Central Station Monitoring * > Access Control * Wireless Data Services * Security Software * Biometrics * Outdoor Perimeter * > Protection * Lighting Controls * Door Hardware * Personal Security * Locking Mechanisms * > Electronic Article Surveillance * Wire & Cable Fire Optics * Financial Services * Electrician > Professional Tools * Hardware Protection * Electrical Components * Identification Systems * Data > Protection * Energy Management *Publications * > > Technology Pavilions > * CCTV * Home Systems * Security Hardware * > > > Las Vegas Convention Center, Las Vegas, NV USA > Conference: March 11-13, 1997 > Exposition: March 12-14, 1997 ************************************************************************** 6)From: M van der Wel Subject: tel.nr Holland Hello, I am from Holland and I have checked the phone number. 31 is for Holland 1623 is the old city code for Oosterhout The new code is now 162 and you have to put a 6 between the citycode and the number. But the number is not in use, you receive the information tone. Regards, M.v.d.Wel www.tip.nl/users/wel/secure.htm *Fa v.d.Wel....................................... At your service* ************************************************************************** 7)From: M van der Wel Subject: equipment suppliers Mr Rumen Alvares, About equipment suppliers: We are already selling equipment in Europe. See www.tip.nl/users/wel/secure.htm Regards, M.v.d.Wel ************************************************************************** 8)From: Graham Subject: re: Long range covert > )From: "Captain" > Subject: Long Range Covert > > I have recently done a job that would have been a lot nicer if we had a > good long range bug. We were asked to keep our ears on a warehouse that > was inside a large fenced area. Out side the area was well lighted and not > easy to hide a surveillance vehicle. It was also a pretty rough > neighborhood. What I would have liked was something with a "good" range. > 3 miles with clarity would have been nice. I thought of a repeater, but I > didn't have the time to rig one up. Any ideas for the repeater or bug w/no > repeater needed? This would be for future reference now and maybe a side > project till needed. Size was not a limitation in this scenario. Our RM-1 ( see our web address below ) has been used by Aust Police and they have told me that on a recent OB they were able to park the van 3 miles away (hill country not city) with excellent reception. They also used a pack of 6 D cells to power it for over a month. If you would like the circuit diag just email me. Regards GraHam --------------------------------------------------------------------------------------- SpyCam Surveillance Web site...http://www.ozemail.com.au/~spycam Postal Address P.O. Box 7143 East Brisbane Qld 4169 Australia ************************************************************************** 9)From: BrK Subject: Re: Tracking Cellular Phones >8)From: Trace Carpenter >Subject: Tracking Cellular Phones > >You can apparently use a SAMS unit in the field to home directly in on >bandit roamers that way. We are currently looking for a similar system >for a case we are working on to catch these bandits. If anyone has >product info please pass it on. See what you can dig up on the Kevin Mitnik computer crime case. It's a fairly popular case, so their should be a lot of information available. I remember reading the story about 2 years ago, the pheds captured him by triangulating a signal from a cell phone he was using to hack computers. They homed in with a vehicle mounted system, then when in the general area, used some sort of handheld equipment to locate the room at the (apartment/motel) place he was staying. Good luck. ************************************************************************** 10)From: jake01@juno.com (Brent L Sodders) Subject: To catch a cheat Cheating, ever had a friend suspect their partner of cheating? The pager method: There was a lady that suspected her partner of cheating. She went to a pager company to get the same identical pager her spouce carried. She swaped pagers, intercepted all the pages; however, repaged them to her decoy pager so the spouce thought his pager was working fine. After a few weeks of numbers and research-bingo. This sounds like it could be used in several "situations". I suggest if you carry a co. pager test it, to be sure there is not a lag time between pages. Could your boss or spouce be monitoring your numbers with a decoy pager? Does anyone know the legalities of this (other than pager theft) ? Would this be stealing information even if a company owned the pager? Your input or other methods encouraged. ************************************************************************** 11)From: HtPursuit@aol.com Subject: Re: Gambling case I thought that this case should have been an easy one, but I guess the laws have been interpeted differently or are different in New York. I know the state of Illinois has required a judge's order for the use of a pen register. It was a very easily obtained and not like the title lll or search warrant. It has been viewed as a tool to obtain instant "muds" on your target phone(s). Even though it is technically a listening post and has the capability of being eavesdrop, it was never viewed as one and just needed a court order. Once the order was signed, the phone company would setup the extra pair, the police tech would setup the rest and then it was gathering the outgoing phone numbers dialed and duration of call. What was the Judges decision on the pen? That it was an eavesdropping device? +++Moderator's Note+++ A warrant for a pen register is required in New York also. The defense attorney balked at the equipment used. It appears they used a Racal unit that has audio listen-in and recording hookups built-in. The judge entertained the defense's motion that they did not have a warrant to hookup an "eavesdropping device" (audio intercept) and the judge ruled in his favor suppressing all info gathered from the wiretap. This is not the first case thrown out because of "illegal" or "unauthorized" listening devices used by LE or government agencies. I guess the "tech" guys better bone up and do their homework... ************************************************************************** 12)From: Wanda Lisoway Subject: HELP NEEDED....LOOKING FOR TRAINING I am currently a LAN Analyst for the Canadian Federal Gov't. I wish to specialize in security given the "lack of" people in this area and the amount of users connecting to the WWW. I have been searching for 8 months for something that meets my standards. Specialized training in this area is hard to find in Canada except for "Firewalls". I require high end specialized training on hardware and software that will educate me and certify me on ALL types of security breeches. Any help would be greatly appreciated. Wanda Lisoway LisowayW@inac.gc.ca ************************************************************************** 13)From: "David L. Mills" Subject: Covert Electronic Listening Does anyone have a list of what states allow covert recording or listening devices during non-governmental (private) investigations? I know it's illegal in Washington state and we can't even sell or rent such equipment. Comments?? Dave Mills Mills & Associates, Inc. Kennewick, WA 99336 Conducting Private Inquiries and Investigations for Attorneys, Insurers, Business and Individuals +++Moderator's Note+++ Checkout: http://www.thecodex.com/consent.html for state by state tape recording laws and the federal law regarding eavesdropping... ************************************************************************** 14)From: jmatk@tscm.com (James M. Atkinson, Comm-Eng) Subject: Deal of the Century >3)From: BrK >Subject: Re: Deal of the Century? >Heath Corporation/Zenith Data Syatems Corporation, sold to >Pentagon, INTEQ - Model #ZT-218-4 TEMPEST/Mil.Spec.2-gig. >External Hard Drive, No Documtntation. Original price $125,000.00. >I sell to you for Five Hunred Dollars ($500.00). Unit in Excellent >Condition. Yeah, my guess it is a regular SCSI HDD in a Tempest style external enclosure. $500 is really no favor for a used 2GB SCSI HDD, in my opinion anyways. I'm guessing that it's SCSI, because that is the most common HDD interface for external drives. But it could be IDE (very unlikely) or some other type of bastardized government-designed proprietary interface. Heath/Zenith is not known for their adherence to industry standards. ************************************************************************** It's a Zenith (probably a Z-150) desktop cpu enclosed in a low level tempest chassis.... Virtually worthless (except for scrap metal value). The machine was never cleared for anything higher then confidential. Thousands of these units were given to National Guard Units back in 1984 and 1985... most were trashed back in 88 and 89. -jma =============================================================== Train, Observe, Detect, Protect, Defend, Repel =============================================================== James M. Atkinson Granite Island Group - TSCM.COM 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =============================================================== The First, The Largest, The Most Popular, and the Most Complete TSCM Counterintelligence Site on the Internet =============================================================== ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Volume 2 Issue # 30 ****************************************************************************** Vol.Two Issue #30 The Surveillance List Jan.28, 1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Transmission of Video/Audio Signal 02) Watch this case ruling! Bugs in the commonplace! 03) Re: Tracking Devices 04) Re: Request for info/ideas 05) Info sought on executions 06) Re: Deal of the Century? 07) Speak Freely 08) Video Surveillance 09) Re: Help 10) Directional Mic 11) Never enough toys 12) Sony Camcorder modification 13) Intro 14) RE: Web Search Sites 15) RE: Gambling case 16) Re: Web Search Sites 17) Freedom of information act ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Trace Carpenter Subject: Transmission of Video/Audio Signal I recieved the following tech question earlier today and thought some other members of the list might be interested: > Trace, > > Have you ever established a WIRELESS video surveillance link? I am curious > -- if I plug the video out of a CCD camera into the video input of a common > VCR (to make use of the RF modulator), then take the RF output to a long > wire antenna, how much range would you expect me to get? Maybe 200 feet? > Do you think an inline RF amplifier (the kind used for weak television > reception) would boost the signal by any appreciable amount or might they > have limiter circuitry within them? > > Don't you just hate all these theoretical questions? First, I usually use a 900Mhz type transmitter for these type applications. You an get a cheap one from Wal-Mart and work it from there. However, regarding your question: The modulator on your basic VCR is trying to shoot enough signal to power about 4 tv's, that's all. So you're not going to get any power there. On the other hand, if you want to do it, here's how you would go about it. There is a mining company in East Texas that had the same delima and they needed to protect their equipment at night. First, take the video (and audio if you want to) output and put it into a UHF Modulator. We use the USM8 UHF Modulator from DSI in Dallas, Texas. I think retail price on it's around $49. It comes preset to channel 19 but you can change it. From the modulator pipe the signal into a Yagi type antenna. You can use a UHF roof top antenna if you have the room. Point the signal at another roof top antenna which recieves the signal and into the TV. Now as far as boosters go. First let's differentiate between the type of amps. You have a post signal amp and a preamp which is basically a booster. A post signal amp is what the cable companies use. It takes a useable signal and sends it down the line. That's what you would use on the transmitter end. If you really want to pump it up, I use the AIM Model 14-4900 from Wiltronics in Paris, Texas. It's a UHF Amp that'll give you about 20db of power that only has one place to go. Out the antenna. If you still get a fuzzy picture; (I don't think you will), slap a signal booster on the other end between the antenna and the TV. Now, a neet little tech tip. Take a video splitter and turn it around backwards, so that you are taking the input to your television. Then take the two outputs and put one to your recieving antenna. The other to your rooftop antenna for regular television. Make sure you set the signal modulator on the transmitter to a channel that doesn't have anything on either side. That way your bleedover won't trash someone's rerun's of Gilligan's Island and call the FCC. I guess I should have mentioned to put the backwards splitter at the central connection point where the main feed from your regular tv breaks off to each television in the house. If you have done this correctly, then when you're inside you can turn any tv in the house to your reciever channel (we'll say channel 19) and look at the camera's view. Sorry. Did I go overboard with the answer? I get carried away. Guess it's a good thing I don't have a government budget. I'm beginning to see why a toilet seat cost's hundred's of dollars. Let me know if you have any questions. -- Trace Carpenter,PI, TSCM 214.828.4520 214.828.1917 Facsimile ************************************************************************** 2)From: Trace Carpenter Subject: Watch this case ruling! Bugs in the commonplace! I realize most engineering types aren't too interested in the legal issues but this is one that bears watching. As many of you have probably seen on national news, there is a mother in Rowlett, Texas who is charged with killing her two sons and staging a robbery for the insurance money. Doug Mulder, a nationally known criminal attorney from Dallas is representing her. Mulder has filed a motion to supress evidence based on what he calls a violation of Title 18 USC. The local police bugged the grave site of the two deceased children and apparently got some good evidence. I don't know if it was her apologizing or what. Anyway, he claims that it was an illegal placement of the device requiring a title III warrant.This is a common place, not inside a bedroom. This hearing could mess with our lives. The hearing was this morning and I don't know if the ruling has come down yet. I'll be waiting to hear. -- Trace Carpenter 214.828.4520 214.828.1917 Facsimile ************************************************************************** 3)From: dj73550@goodnet.com Subject: Re: Tracking Devices We currently use the Protrak I tracking system. I believe the system you are inquiring about (the tracker pro) is the same thing. The system comes with two transmitters. One being a digital compass capable of showing the direction of the vehicle and distance away from receiver. And the other being a more simpler unit which just shows distance away from receiver. We have experienced a lot of problems with the compass transmitter because it is very difficult to mount on a vehicle. This is mainly due to it having a compass in it. The first problem is that you cannot use amagnet to attach it underneath a vehicle. It has to be attached withthe antenna on the unit pointing down using snip ties. The second problem is that you cannot put it close to any metal, or if it is closeto any metal you are supposed to mount it so that it has an equal amountof metal on every side of it. As you can imagine this can be a very difficult task. As far as range on the unit I am very impressed. It gives you a digital readout in feet and it updates about once every five seconds. In the city the usual range I get is about 1/2 to 1 1/2 miles. Although if you have access to a plane this unit can go in excess of 10 miles. The unit will run for a good 12 days on one 9-volt which is nice. If you are still interested in purchasing the system send me an e-mail and I'll get you the name and number for the people who actually manufacture the unit, they are out of Boulder, Co. Jeff @ I.S.C. 602-264-6475 dj73550@goodnet.com ************************************************************************** 4)From: Al Thompson Subject: Re: Request for info/ideas > 6)From: "Anastasios D. Panos" > Subject: Re: Request for info/ideas > > >2)From: Rick Hofmann > >Subject: Request for info/ideas > > >A residential phone rings 4 to 5 times and is answered by the resident. > >When he picks up the receiver he hears a dial tone. He dials *69 and gets a > >recording that says, "3116231869". > > > >I tried dialing the number and get a busy signal after dialing the "1" > >between the 3 and 8. Since 311 does not appear to be an area code in the > >US, perhaps the number is a telco test number or something of that nature. > > > >Ideas or suggestions would be greatly appreciated. Thanks in advance. > > Did you try Europe ? 31 stands for Holland 1 is the area and 6231869 is > the number, an other psosibility is a Greece that is 30. 1 is the area > code for Athens and then is the number, but many times it is misprinted as > 31-1-62..etc.. I doubt that *69 would make an international call. It's odd that it would make a long distance call at all. I don't remember if he said if 623 was a valid prefix in his area code or not. I know that, at one time, 311 was a telco prefix used for testing. If he knows the day and time it happened, he might try calling the phone company to see if a long distance call was placed (or just wait for his bill). ************************************************************************** 5)From: Rick Pedersen Subject: Info sought on executions. How do I get specifics on someone I beleive was put to death in S. Carolina in the mid to late eighties? Is there a "free" service resource on internet for this. I tried the SSN death index on a geneology/ancestry site, but can't find this listing. I,m a beginner here and have enjoyed soaking up all the great info here and hope to work in the surveilance field one day. Thanks, Rick Pedersen La Crosse, WI r.allenn@centuryinter.net ************************************************************************** 6)From: admin@asianenergy.com.au Subject: Re: Deal of the Century? >Heath Corporation/Zenith Data Syatems Corporation, sold to >Pentagon, INTEQ - Model #ZT-218-4 TEMPEST/Mil.Spec.2-gig. >External Hard Drive, No Documtntation. Original price $125,000.00. >I sell to you for Five Hunred Dollars ($500.00). Unit in Excellent >Condition. Heath Zenith quit making computers several years ago. This could possibly be one of their old 286 PC's modified for DOD TEMPEST Might be interesting to take apart and see how they made it TEMPEST proof. Mike ************************************************************************** 7)From: "Dan Frezza" Subject: Speak Freely Here's a nice 1-1 real time audio program to try that works very well under Window's 95 to encrypt securely a conversation using a few means of "encryption" on the Internet with a 28.8 kbs or higher connection speed. It's called "Speak Freely" and run quite reliably in the encryption mode with no noticeable degradation of audio quality. I use it at times with the PGP public key option that seeds the IDEA 128 bit one-time session key for both parties to use. It works very well and I am very impressed with the performance and low cpu overhead involved. This program is completely free and very compact. It doesn't have all the Frills, Bells, and Whistles as some commerical real time audio software has, but it does the job. However, some commerical products are advertising their products with "encryption." I suggest you look very carefully and examine what they mean by encryption. They may claim the encryption is the same thing is the mathematical algorithm used to compress and decompress real time audio. However in "Speak Freely' this isn't so. There is compression and decompression using, an one example, GSM with "Speak Freely" protocol. However, when encryption mode is selected, for example, IDEA, then each packet is encrypted using IDEA on top of the compression/decompression algorithms. I have tried PGP phone with haphazard sucess. I wouldn't recommend it until it is completely bug fixed. One last note: To use any real time 1-1 audio program, you MUST understand how to use your sound card, ie, the mixer settings. Without any basic understanding of it, only frustration can be your guide! Speak Freely can be found at: http://www.fourmilab.ch/speakfree/windows/ As I said, it's completely free and, I haven't found a better program for true 1-1 real time audio encryption on the Internet. BTW, it can work well with a 14.4 modem by checking "GSM with Simple" to cut the demanding bandwidth down to around 7500 bps. Some loss of audio quality can be expected. Also, Speak Freely is available for some flavors of Unix and complete source code can be downloaded and inspected for the curious. There's a version also available for Window's 3.1 or 3.11 users. Sorry, no Mac version available. Dan Frezza PGP -- An Envelope for Your E-mail Key ID: 0x0B6C9381 Key Fingerprint = 8C E2 78 50 24 80 D7 0C 64 29 D2 3B FE 4B C5 4E ************************************************************************** 8)From: shadowrunner@cryogen.com (Shadow Runner) Subject: Video Surveillance Hi, all. I have a question. A friend of mine needs security cameras to monitor his house. I helped him install a first by his front door (which works great). He says he probably needs about 4 or 5 more. Now, I've just recently gotten into surveilance, he doesn't have a lot of money to spend, so he is looking for something used and or cheap. Thank you for any tips. Shadow Runner ************************************************************************** 9)From: MikeRowley@aol.com Subject: Re: Help >A residential phone rings 4 to 5 times and is answered by the resident. >When he picks up the receiver he hears a dial tone. He dials *69 and gets a >recording that says, "3116231869". >I tried dialing the number and get a busy signal after dialing the "1" >between the 3 and 8. Your friend and you are both lucky you didn't dial the number with the 0 (zero) that belongs befor the 3. I heard about this several months back. It's a deliberate scam to get you to call either an international number or other number that bills your phone substantial (long distance) or (service) fees. May be an information line (weather, sports) a sex line, or a service (astrology) etc. Watch out because the number with the recording is local and I was told that the phone company is reluctant to adjust these off your bill. ************************************************************************** 10)From: lazlo@shadowlink.net Subject: Directional Mic Can anyone tell me where to get details about directional microphones, and similar equipment (Dan Gibson.) I'd like to find out which kind is the best, and which kind is the best value. Opinions? -Lazlo ************************************************************************** 11)From: "Richard Leatherwood" Subject: Never enough toys Just thought I'd post an interesting sight. www.i-sight.com/products.htm Worth a look. There's never enough toys. ************************************************************************** 12)From: wildcat1@flinthills.com Subject: Sony Camcorder modification Greetings to all! I am wanting to modify a Sony 8mm camcorder. It no longer records or plays back very well, however I thought it might have use as a surveillance camera. The standby mode, which displays an image on a monitor without recording suts down after a couple of minutes. I would like to extend the standby stage indefintely. Any suggestions on how this might be accomplished would be greatly appreciated. Thanks. ************************************************************************** 13)From JoeSleuth@aol.com Subject: Intro In a message dated 97-01-29 02:12:35 EST, you write: << EDE >> like to list my school lion investigation academy a duly licensed and accredited school offering a reconized assocites degree in investigations and security forensic courses available via distance learning 1 800 637 7507 434 clearfeild st beth pa 18017 ************************************************************************** 14)From chaos@tccbbs.com Subject: RE: Web Search Sites American Automated Systems offers several unique search services via the Web, all usable on your initial visit. Social Locator provided by AAS www.americanautomated.com/social.htm - Uses a SS# to return current and or previous addresses along with associated Names/Aliases. INSTANT! National DOB provided by AAS www.americanautomated.com/dob/dob.htm - Uses as little as a FIRST NAME and DOB to return a list of matching persons, Cities, States and Zip codes to your search query. INSTANT! Address Locator provided by AAS www.americanautomated.com/add/add.htm - Automaticly cross references a previous/old address and name to return any associated current/new addresses for the name. INSTANT! Driver Records provided by AAS www.americanautomated.com/dmv/dmv.htm - Returns Driver Records in 13 different States INSTANTLY! Visit our HOME page for more info: http://www.americanautomated.com ************************************************************************** 15)From HtPursuit@aol.com Subject: RE: Gambling case I thought that was pretty interesting, it seem the pedulum has really swung the other way for LE. For years all it took was the testimony of a detective or police officer of what the facts were and that was that. Unfortunately for the decent hardworking officers, being witness is not always what it use to be. It would be interesting on where the prosecution stands presently, are they going to appeal?? ************************************************************************** 16)From: "Frank "The Stand Man"" Subject: Re: Web Search Sites Check out my Home Page which contains a nice comprehensive listing of all sites that can help you serach for people SS#, etc. on-line included as well are search engines that can help you. Keep in mind, most records have not been made available on-line, so chances are you WILL have to use the phone or snail mail to get what you need. Frank Pagano Computer Science Major, A.S. Criminal Justice-Law Enforcement Auxiliary Police Officer #7144 Nassau County, New York (The Habitation of Justice) http://www.geocities.com/Area51/3399 ************************************************************************** 17)From: JK Subject: Freedom of information act I have several questions. First, I am curious about the ability to gain access to the information stored on a hard drive. Specifically, how were you able to read mine...and what can I do to protect my data? Second, I have spent many hours looking for searchable databases on the net regarding vital records (birth cert., marriage, etc.). So far however, all I have found are services who claim to have access to these databases, but charge for their access to these databases. From my research, the only way to actually get this information is by physically going to the courthouse and looking them up. So my question is: are there any free databases on the net that private individuals can search. Specifically for montgomery and Chester County in PA. FYI, Chester county (PA) has a site called ChescoNet that offers access to the courthouse records, but for a cost. I look forward to your reply. +++Moderator's Note+++ I didn't really look at your hard drive, you did. The on my index page simply directs your browser to view your c: directory. It was put there for "shock" effect to warn novice computer users of the dangers of not protecting their proprietary data. Judging by the 50 or so requests I get per day to know how I did it and how to protect against it, it works... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue #31 ****************************************************************************** Vol.Two Issue #31 The Surveillance List Jan.30, 1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) re: Surveillance van contents 02) Re: To Catch a Cheat 03) Re: Covert Electronic Listening 04) Anonymous Remailers (for mailing list) 05) Better Way to Intercept pages 06) FW: scams 07) Scanner Mods? 08) SL Suggestions 09) Protecting your Data 10) Resources? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: ERIC C HART Subject: re: Surveillance van contents To: List moderator and/or members I found the list of contents to be very informative, as we are planning our own "van". In the short time that I have been a member of this list I have found that it has become a "tutor" of sorts for me. I am, by far, not an expert in electronics but the Surveillance List is providing me with an education, born of practicality. My thanks to the list moderator and all members. Best regards, Eric Hart +++Moderator's Note+++ Thanks for the compliment. The surveillance list CAN be a wealth of information for all members... we have an incredible amount of talent on this list with members from surveillance, investigative, computer & communications backgrounds... We also have members from 28 different countries... If we can get the LURKERS to contibute by posting a question or answering one we can really get this forum off the ground... I'd like to thank all the list members who have contributed and make this list possible. ************************************************************************** 2)From: Trace Carpenter Subject: Re: To Catch a Cheat Hate to tell you but if you clone the beeper they both go off at the same time and there is no lag. -- Sincerely, Trace Carpenter 214.828.4520 214.828.1917 Facsimile ************************************************************************** 3)From: "Dominic Palombo" Subject: Re: Covert Electronic Listening > Does anyone have a list of what states allow covert recording or > listening devices during non-governmental (private) investigations? > I know it's illegal in Washington state and we can't even sell or > rent such equipment. Comments?? Most states have a 1 party consent law -- meaning that a conversation can be recorded as long as participating member consents to it. California and a few other states require that all parties consent to the recording / monitoring, unless there is a warrant issued. [ Dominic Palombo ::::::::::::::: .....[ dmpalomb@ief.iconcrossroads.org ************************************************************************** 4)From: "Frank "The Stand Man"" Subject: Anonymous Remailers (for mailing list) Anyone have any information on GOOD anonymous remailer applications that could be used via the World Wide Web? I am trying to set up a remailer at my site for people who want to report crimes or disclose information that can be valuable for a given case. My only problem is finding a remailer that is as secure as a phone line conversation. Please contact me if you have any info. Thanks! Frank Pagano Computer Science Major, A.S. Criminal Justice-Law Enforcement Auxiliary Police Officer #7144 Nassau County, New York (The Habitation of Justice) http://www.geocities.com/Area51/3399 ************************************************************************** 5)From: trever.kb9nhu@juno.com (Trever C. Trader) Subject: Better Way to Intercept pages Here is a better way to get pages. Get a pager, and request the same cap code as your suspects pager's cap code. Or, if you know a communications company, you can send your pager to them to have the cap code changed to the desired one, I am set up as a cellular and paging dealer, so if nothing else let me know and I can have it sent in with your requested cap code. This is also useful if you need multiple pagers for your company, then you can have multiple pagers set to the same cap code. Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 (217) 528-7015 ************************************************************************** 6)From: Rick Pedersen Subject: FW: scams Thought you might be interested in the following. It was sent to all of us at the university by our Director of Protective Services. __________________________________ Subject: FYI: Scams Author: Harroll_Chisom_at_HYL101@ccmailgw.mcgawpark.baxter.com at Internet Date: 01/22/97 11:35 There is a big scam going on where a person calls and says that they are doing a computer survey from a company. The company name that they give is usually a big well-known software company, and they usually say that they are doing the survey because they want to give out free software. They want to know what would be a good time for someone to come from their company and install the software on your PC. They also ask questions about income, etc. During their questioning, they (unknowingly to you) find out what time you're usually home, what kind of computer equipment you have and all sorts of other valuable information. At a company where a friend of mine works, a co-worker of his received one of these calls, >> and he was robbed the very next day (of course, when he was not home). I received a similar call yesterday afternoon. Fortunately, I knew about this ahead of time, and we didn't provide them with any information. I want to make you all aware of the situation and the potential danger Involved in giving out any information like this over the phone. The people sound very genuine, and very few people are going to question receiving free software. I would advise you, however, to tell the people that if they have your phone number, they should have your address (we think they're getting it off the internet somehow), and they can mail you any free software they might be offering. If you have a home computer set-up, you should be familiar with installing your own software. You may even want to tell them you don't have a home computer. Whatever you're comfortable with. Please don't give out any information that you may regret later. Pass this information along to friends and family members, as well. The fewer people they are able to scam, the better. ************************************************************************** 7)From: Forez Subject: Scanner Mods? I just purchased a used PRO 51 scanner of which I have tried all of the "codes" to access the blocked frequencies... The lower band unlocked but the 869-896 (cellular) did not? I understand that Uniden corrected the bug because the FCC made them... Is there any other way to do it w/our or with very little mod's? Thanks! (Information purposes only of course : ) To add to my other post regarding the PRO 51 scanner..... I would like to know "secret" frequencies most commonly used by fed,p.i., any other frequencies of that nature.. Thank you once again.. ************************************************************************** 8)From: VIPER113@aol.com Subject: SL Suggestions Dear Spyking, I would like to tell you that this surveilance list thing is great. I am glad that you have it and that is free of charge. I just wanted to make one suggestion. 1. You should condense these lists/forums and send out one a week, instead of several a day or something close to that. Put everything in there that you would for the week (all the postings you get for that week) and make it one downloadable file. I am sure this would make it easier on you (less time sending out all these e-mails) as well as me and others because if you are like me where I try to save all of them in case I need to refer to them later, the files build up real fast. So if you could do this it would be a great help. Thank you for your time, VIPER113 +++Moderator's Note+++ IMO once a week would inhibit the timely exchange of information. We send the list daily. Condensing would mean editing and I won't do that... I'll correct an obvious misspelling (so you don't look dumb) but I won't edit posts... Comments from list? Daily or Weekly? ************************************************************************** 9)From: cpitts@ArkansasUSA.com (CHRISTOPHER C. PITTS) Subject: Protecting your Data In Reply >7)From: JK >Subject: Freedom of information act >I have several questions. First, I am curious about the ability to gain >access to the information stored on a hard drive. Specifically, how >were you able to read mine...and what can I do to protect my data? Since proprietary data protection is my speciality I'll Bite. it is *VERY* easy to access the data on a local (or accessed network) drive. check out www.digicrime.com for a few examples.. they are pretty harmless, but using an autoloading href to grab info from your drive is pretty easy, I have *not* seen any widespread examples of this but it is as easy as loading any other link/file. There are several ways to protect your self, disableing auto-href loading, disabling autoacceptance of cookies, looking at links before you actually open them. (if you are suspecious about a link just check out the HTML source code before loading it.) none of these are prefect, but then computer security is never fool-proof. Tadghe De Djin Tadghe@ThePentagon.com Only the Paranoid Survive. ~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^ Tadghe De Djin cpitts@arkansasusa.com Despite all my Rage I'm still a Rat in a Cage ~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~^~ ************************************************************************** 10)From: Located@aol.com Subject: Resources? Hello Fellow Peers and Lurkers: I would like to here from those of you that use online data bases for information resources both free and otherwise. I currently use CDB, DBT, and IDS. I know of IRSC and a few others. If anyone has a special resource that they like..please pass it on. Mike Weisenberg Discovery Investigative Services 1-800-393-7794 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue #32 ****************************************************************************** Vol.Two Issue #32 The Surveillance List Jan.31, 1997 Over 1200 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Radio Shack portable 8mm VCR/TV combo's 02) KAOS? 03) Intro - Australia 04) to catch a cheat 05) Daily distribution 06) Keep it like it is 07) List Frequency 08) Re: Sony Camcorder modification 09) Microphone(s) - Enhanced Audio 10) Latest of Radio Shack Closeout 11) Fiber Optic Intereception? 12) Pro-34 13) Anonymous remailers 14) Intercepting beepers 15) Response to Suggestions / Once a week 16) Re: list 17) Re: Scanner Mods? 18) Intro 19) Moderator's Note ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Spysociety@aol.com Subject: Radio Shack portable 8mm VCR/TV combo's Only two Radio Shack portable 8mm VCR/TV combo's left. Can ship via UPS C.O.D to all 50 U.S. states for only $4.75 C.O.D. charge plus S/H plus price negotiated for 8mm VCR/TV. Going once.........going twice............... sold to the highest bidder! ************************************************************************** 2)From: "Richard Leatherwood" Subject: KAOS Does anyone have the number or address for KAOS Systems? Need info on an bullet proof car they build. RLL nwbc@aloha.net ************************************************************************** 3)From: Philip R Peart Subject: Intro > Fact Finders Australia is an Experienced, Innovative & Resourceful > Investigative Firm. The principal, Philip Peart has been involved in > the investigation industry for more than 20 years, primarily in > specialist surveillance. He has worked throughout Australia and > travelled extensively overseas. He has been a member of the World > Association of Dectectives Inc. since 1991. Fact Finders has developed > a unique investigative concept with sound quality management, integrity > and professionalism. > > Our system has been formally documented and we are now looking for > SPECIALIST SURVEILLANCE OPERATIVES who can fulfill the role of Franchise > Owners throughout Australia. Our aim is to have a newtwork of > specialist operatives servicing our existing and new clientele, offering > benefits not seen before. We have a sophisticated on-line database and > management system ensuring our services are of the highest standard. > > We continue to provide specialist surveillance services to major law > firms, insurance companies and corporations throughout Queensland with > the emphasis on Personal Injury Litigation. > > I welcome genuine inquiries from interested investigators who may wish > to join our network. > > Kind Regards > > Phil Peart > Fact Finders Australia ************************************************************************** 4)From: jake01@juno.com (Brent L Sodders) Subject: re: to catch a cheat She didn't "clone" the beeper. She only had the (twin) identical appearance. If she would have cloned the beeper, there would be a good possibility that he would be double billed since a lot of co.'s use your pager number for your account. Also when she deactivated her beeper his would not be deactivated in error. In order to make sure someone at the pager co. could keep quiet, she only needed to know his number (which of course she knew so she could page his pager) , and not inquire about any information of his to get her beeper. Yes it could be done a few different ways, however, the fewer people involved; the better. ************************************************************************** 5)From: Rick Pedersen Subject: Daily distribution Rick Pedersen r,allenn@centuryinter.net Moderator-Wanted to say I appreciate daily distribution of the list. This allows faster exchange of information. Keep up the good work. ************************************************************************** 6)From: Jim Ray Subject: Keep it like it is Immense weekly files will choke some mailers, let him FTP if HE wants. JMR Regards, Jim Ray DNRC Minister of Encryption Advocacy One of the "legitimate concerns of law enforcement" seems to be that I was born innocent until proven guilty and not the other way around. -- me http://shopmiami.com/prs/jimray/ PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5 57 52 64 0E DA BA 2C 71 ************************************************************************** 7)From: alpha1@pobox.com Subject: List Frequency Daily gets my vote. Lynn Bradshaw ************************************************************************** 8)From: fiveyes@iiiii.com (5-i's = V) Subject: Re: Sony Camcorder modification >In (Vol 2 Issue # 30 Jan 28, 1997) wildcat1@flinthills.com did write: >Subject: Sony Camcorder modification >Greetings to all! I am wanting to modify a Sony 8mm camcorder. It no >longer records or plays back very well, however I thought it might have >use as a surveillance camera. The standby mode, which displays an image >on a monitor without recording suts down after a couple of minutes. I >would like to extend the standby stage indefintely. Any suggestions on >how this might be accomplished would be greatly appreciated. Thanks. Before getting out the micro-electronic tool chest: Have you tried this with no tape in it? Most camcorders only do the shutoff thing with a cassette loaded... 5-i's kc5mog fiveyes@iiiii.com ************************************************************************** 9)From: "Samuel A. Graham, Jr." Subject: Microphone(s) - Enhanced Audio I am trying to find a highly sensitive, highly directional microphone that I can use to sit on the sidelines during military exercises and hear what is going on with my troops. The information that I would receive would be extremely useful in getting actual feedback from the guys on the ground and writing realistic training scenarios. This information once incorporated into a training scenario would serve to extend the livelihood of the guys on the ground. We already take live video --- but would definitely like to get the audio that we could associate with the action. As always, a source, price and your help would be appreciated. Sam Graham Base Level War Planning and Mobility Superintendent SamGraham@AmericaMail.Com ************************************************************************** 10)From: "Samuel A. Graham, Jr." Subject: Latest of Radio Shack Closeout Could anyone enlighten me on the latest status of various sitings of the Motorola Model 17, 1996 Catalog --- 8mm system that is being closed out at Radio Shack stores across the country. Anyone have the actual Radio Shack catalog (item) number? Would sure like to get one --- there isn't any at our three Radio Shacks. ************************************************************************** 11)From: "William Ehrendreich" Subject: Fiber Optic Intereception? There seems to be an interesting brain trust in on this list so lets see if you gents can assemble an answer on a technical question..... You need to monitor communications under these conditions. 1. Can't get on site.... risk factor too high 2. Communications are carried from the facility on fiber but you know where it lies.... 3. They monitor link integrity... means you must investigate in a less than invasive manner There is a way.... lets see if you physics gurus out there can come up with an answer William Ehrendreich Executive Vice President PCS - Secure Technical Services Information Security / Economic Espionage Counter Measures ************************************************************************** 12)From: PRV8EYE@aol.com Subject: Pro-34 Okay, I give up. I removed the cover from my Realistic Pro-34 and have spent four days with a magnifying glass trying to locate D11. I can't find any visible D followed by less than three digits. Can anyone give me a clue to the location of D11 (for educational purposes only, of course)? Gus Morrow Top Secret Research & Investigations Oceanside CA ************************************************************************** 13)From: "Steven R. Price" Subject: Anonymous remailers -----BEGIN PGP SIGNED MESSAGE----- To: Frank "The Stand Man" Re: Anonymous remailers/security Look to 'http://pgp.rivertown.net' for links to what ails you. Regards; SRP -----BEGIN PGP SIGNATURE----- Version: 4.0 Personal Edition iQCVAgUBMvJpxLMuN++C0NtHAQEIwAQApNl5lOv0laKvx+uTm3MGIhtFGmxutEGH DTBHCvEGwOtyCkooRFmTyPUhhFBIa35ne6S7rD3aHFzNNdRSbkET5crTGpfGx2qB OUccasZw3p86wKp1+I2nLbnSvq34kpQmLZ4tsljBkaD9eJxAG1u/MISxgBeUGvSV H+dmXlaKT/o= =GPtM -----END PGP SIGNATURE----- ************************************************************************** 14)From: LazySkillz@AOL.COM Subject: Intercepting beepers If I know somebody's beeper number, is there a way to intercept all messages/numbers that are sent to this number?? ************************************************************************** 15)From: Trace Carpenter Subject: Response to Suggestions / Once a week PLEASE NO! I look forward to my daily list, and really enjoy the exchange of information and being able to help other tech/engineers with their projects. The problem is lack of time. As it is, I have trouble devoting enough time read the list and the numerous private e-mail requests that I get from the list. Cutting the delivery to once a week would make it very difficult to allow enough time to efficiently go through number of posts that would accumulate and do a good job responding. Another major problem would be responding in a timely manner to the posts. P.S. To the Moderator: Anything of interest which comes from a private request that I think would benefit the list I always post with the response. I just remove the senders e-mail address. -- Sincerely, Trace Carpenter 214.828.4520 214.828.1917 Facsimile ************************************************************************** 16)From: trever.kb9nhu@juno.com (Trever C. Trader) Subject: Re: list daily Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 ************************************************************************** 17)From: dbugman@amug.org (tim johnson) Subject: Re: Scanner Mods? Hang around along enough and you'll learn something new every day. I wasn't aware that there are codes for unblocking certain frequency bands. Is there information on Radio Shack scanners, as well? I have a 60 channel model which is a year or two old. (I have it packed up in my equipment case as I use it occasionally to monitor a frequency I've identified while I finish my sweep). It would be nice to gain access to some of the bands that are presently blocked without having to "lift diodes". Thanks Tim Johnson ======================================================== Tim Johnson Technical Security Consultants Inc. (602) 786-0909 dbugman@amug.org http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. (c)TSCI 1987 ======================================================== ************************************************************************** 18)From: dbugman@amug.org (tim johnson) Subject: Intro I've been a lurker for all of about a week now. I found out about this site through someone who visits and chats with me on a regular basis. I've been doing something similiar to this posting for several months now, but only on a random basis. I may set up something similair for the people on my e-mail list. Anyhow, My name is Tim Johnson, President of Technical Security Consultants Inc. and specializing in electronic countermeasures. I've been at it for approximately 25 years, having started (officially) with the Air force Office of Special Investigations in 1972 as a technicall trained Special Agent. I can be contacted at dbugman@amug.org or feel free to visit my site at http://www.amug.org/~dbugman/ As time goes, I'll throw in a few things and respond to some of the questions. Thanks Tim Johnson ************************************************************************** 19)From: SpyKing@thecodex.com Subject: Moderator's Note The Surveillance List was created as a vehicle for the free exchange of information pertaining to surveillance & countersurveillance technology. I think it's starting to accomplish this... It was started because there was a void on the internet in this area... Yes, there are a few "investigator's lists and some of them are quite informative but we are specialists. I felt there was enough interest to start and maintain a "surveillance list" and apparently I was right. We now have over 1200 members worldwide with members from 28 different countries. Not all the members are "practioners" but the membership is quite diverse. We have members from law enforcement, private investigations, industrial security, the surveillance & countersurveillance industry, video specialists, optical & night vision specialists, the computer field, cryptographers, members of the media, communications, scanner & ham buffs, hackers, phone phreaks, etc... There are a lot of "good" minds here... we should make the most of it... I am fairly sure at this point that just about "ANY" question could be answered correctly... There will always be "lurkers" but to really get the most from this list the membership should participate... there is something to be learned here by everyone... surveillance is a "broad" topic... ALL the members can contribute something of value from their respective fields... SpyKing ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... ****************************************************************************